We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Crypt Sample Clauses

Crypt. (ISCISC’2019), Mashhad, Iran, November 2019. [83] X. Xxxxx, X. Xxxxxx, and S. Saeedinaeeni. Universal superposition codes: capacity regions of compound quantum broadcast channel with confidential messages. arXiv:1911.07753, 2019. [84] X. X. Xxxx, X. X. Xxxxxxxx, X. Xxxxx, X. X. Xxxxx, X. Xxxxxxx, X. Xxxxxxx, and X. Xxxx. Quantum-secure covert communication on bosonic channels. Nature Commun., 6(1):1–9, 2015. [85] X. X. Xxxxxxx, X. X. Xxxxxxxx, X. Xxxx, and X. X. Xxxx. Entanglement-assisted quantum-secure covert communication. In Quantum 2.0, pages QM6B–5. Optical Society of America, 2020. [86] X. X. Xxxxxxx, X. X. Xxxxxxxx, X. Xxxx, and X. X. Xxxx. Fundamental limits of quantum-secure covert communication over bosonic channels. IEEE J. Selected Areas Commun., 38(3):471–482, 2020.

Related to Crypt

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • Online Payments may be made online from the Money Matters tab in the Licensee’s Cal Poly Portal or at xxxx://xxx.xxx.xxxxxxx.xxx/student_accounts/online_payments.asp. Online payments can be made with either eCheck (with no added convenience fee) or credit card (with an added 2.75% convenience fee). Online payments received after 5:00 pm will be recorded as paid the following business day. If there are any problems making a payment online, contact the University Student Accounts Office at (000) 000-0000 or by email to xxxxxxxxxxxxxxx@xxxxxxx.xxx

  • Encrypt or Encryption As defined in the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Security Rule at 45 CFR 164.304, means the use of an algorithmic process to transform Personally Identifiable Information into an unusable, unreadable, or indecipherable form in which there is a low probability of assigning meaning without use of a confidential process or key.

  • Automation Customer agrees that all shipping locations will use a FedEx online or FedEx compatible shipping solution that is approved and authorized by FedEx, and an agreement for the placement or use of any such shipping solution shall be accepted prior to such use.

  • Network Services Preventive care: 100% coverage. Preventive services include, but are not restricted to routine physical exams, routine gynecological exams, routine hearing exams, routine eye exams, and immunizations. A $100 single and $200 family combined annual deductible will apply to lab/diagnostic testing after which 100% coverage will apply. A $50 copay will apply to CT and MRI scans.

  • Cryptography Supplier will maintain policies and standards on the use of cryptographic controls that are implemented to protect Accenture Data.

  • Games The Private Party shall not be entitled to introduce any arcade type amusement or gaming machines into the Restaurant Facility without the prior written approval of SANParks.

  • Moonlighting Employment as a physician in a professional capacity outside of what is outlined in this Agreement, whether temporary special medical activity (“TSMA”) or external moonlighting, must be approved in writing, in advance, by the Departmental Chair, Program Director and Director of Graduate Medical Education (or designee). Even if approved, professional and general liability insurance as outlined in Section 5.4 is not provided to Trainee engaged in external moonlighting. Trainee acknowledges he or she has the responsibility to obtain insurance for such engagement. TSMA and external moonlighting must be included and reported as part of Trainee's hours spent on clinical experience and education. Trainee shall not be required to engage in any outside work.

  • Network Management 56.1 CLEC and CenturyLink will exchange appropriate information (e.g., network information, maintenance contact numbers, escalation procedures, and information required to comply with requirements of law enforcement and national security agencies) for network management purposes. In addition, the Parties will apply sound network management principles to alleviate or to prevent traffic congestion and to minimize fraud associated with third number billed calls, calling card calls, and other services related to this Agreement. 56.2 The Parties will employ characteristics and methods of operation that will not interfere with or impair the Parties’ networks, or the network of any third parties or Affiliated companies, connected with or involved directly in the network or facilities of CenturyLink. 56.3 CLEC shall not interfere with or impair service over any circuits, facilities or equipment of CenturyLink, its Affiliated companies, or its connecting and concurring carriers. 56.4 If CLEC causes any impairment or interference, CenturyLink shall promptly notify CLEC of the nature and location of the problem and that, unless promptly rectified, a temporary discontinuance of the use of any circuit, facility or equipment may be required. The Parties agree to work together to attempt to promptly resolve the impairment or interference. If CLEC is unable to promptly remedy, then CenturyLink may, at its option, temporarily discontinue the use of the affected circuit, facility or equipment until the impairment is remedied. 56.5 Any violation of Applicable Law or regulation regarding the invasion of privacy of any communications carried over CenturyLink’s facilities, or that creates hazards to the employees of CenturyLink or to the public, is also considered an impairment of service. 56.6 CenturyLink shall give advanced notice to CLEC of all non-scheduled maintenance or other planned network activities to be performed by CenturyLink on any Network Element, including any hardware, equipment, software, or system, providing service functionality of which CLEC has advised CenturyLink may potentially impact CLEC End Users. 56.7 The Parties shall provide notice of network changes and upgrades in accordance with 47 C.F.R. §§51.325 through 51.335. CenturyLink may discontinue any Interconnection arrangement, Telecommunications Service, or Network Element provided or required hereunder due to network changes or upgrades after providing CLEC notice as required by this Section. CenturyLink agrees to cooperate with CLEC and/or the appropriate regulatory body in any transition resulting from such discontinuation of service and to minimize the impact to customers which may result from such discontinuance of service.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.