Known Specific Temporary Information Attack Sample Clauses

Known Specific Temporary Information Attack. If an adversary 𝒜 obtains secret parameters 𝑥 and 𝑦, he cannot get session key 𝑆𝐾𝑖𝑗 = ℎ(𝑇𝐼𝐷𝑖 ∥ 𝑇𝐼𝐷𝑗 ∥ 𝐾 ∥ 𝑡2) because hidden value 𝐾 is 𝐾 = ℎ(𝛼𝑖 ∥ 𝑑𝑖 𝜏𝑗 ∥ 𝑀𝑖𝑄𝑗) = ℎ(𝑑𝑗𝜏𝑖 ∥ 𝛽𝑗 ∥ Xx Xx) wherein 𝑀𝑖 and Xx are stored in each device and is inaccessible. Therefore, our protocol is secure against temporary secret leakage attack.
AutoNDA by SimpleDocs

Related to Known Specific Temporary Information Attack

  • CONFIDENTIAL & PROPRIETARY INFORMATION The parties may provide technical information, documentation and expertise to each other that is either (1) marked as being confidential or, (2) if delivered in oral form is summarized in writing within 10 working days and identified as being confidential (“Confidential Information”). The receiving party shall for a period of five (5) years from the date of disclosure (i) hold the disclosing party’s Confidential Information in strict confidence, and (ii), except as previously authorized in writing by the disclosing party, not publish or disclose the disclosing party’s Confidential Information to anyone other than the receiving party’s employees on a need-to-know basis, and (iii) use the disclosing party’s Confidential Information solely for performance of this Contract. The foregoing requirement shall not apply to any portion of a party’s Confidential Information which (a) becomes publicly known through no wrongful act or omission on the part of the receiving party; (b) is already known to the receiving party at the time of the disclosure without similar nondisclosure obligations; (c) is rightfully received by the receiving party from a third party without similar nondisclosure obligations; (d) is approved for release by written authorization of the disclosing party; (e) is clearly demonstrated by the receiving party to have been independently developed by the receiving party without access to the disclosing party’s Confidential Information; or (f) is required to be disclosed by order of a court or governmental body or by applicable law, provided that the party intending to make such required disclosure shall promptly notify the other party of such intended disclosure in order to allow such party to seek a protective order or other remedy.

  • Confidentiality & Proprietary Information The Consultant acknowledges that it will be necessary for the Client to disclose certain confidential and proprietary information to the Consultant in order for the Consultant to perform their duties under this Agreement. The Consultant acknowledges that disclosure to a third (3rd) party or misuse of this proprietary or confidential information would irreparably harm the Client. Accordingly, the Consultant will not disclose or use, either during or after the term of this Agreement, any proprietary or confidential information of the Client without the Client's prior written permission except to the extent necessary to perform the Services on the Client's behalf. Proprietary or confidential information includes, but is not limited to: a.) The written, printed, graphic, or electronically recorded materials furnished by Client for Consultant to use; b.) Any written or tangible information stamped "confidential," "proprietary," or with a similar legend, or any information that Client makes reasonable efforts to maintain the secrecy of, business or marketing plans or strategies, customer lists, operating procedures, trade secrets, design formulas, know-how and processes, computer programs and inventories, discoveries and improvements of any kind, sales projections, and pricing information; and c.) Information belonging to customers and suppliers of the Client about whom the Consultant gained knowledge as a result of the Consultant‘s Services to the Client. Upon termination of the Consultant's Services to the Client, or at the Client's request, the Consultant shall deliver all materials to the Client in the Consultant's possession relating to the Client's business. The Consultant acknowledges any breach or threatened breach of confidentiality under this Agreement will result in irreparable harm to the Client for which damages would be an inadequate remedy. Therefore, the Client shall be entitled to equitable relief, including an injunction, in the event of such breach or threatened breach of confidentiality. Such equitable relief shall be in addition to the Client's rights and remedies otherwise available at law. Furthermore, proprietary information, under this Agreement, shall include: a.) The product of all work performed under this Agreement ("Work Product"), including without limitation all notes, reports, documentation, drawings, computer programs, inventions, creations, works, devices, models, works-in-progress and deliverables, will be the sole property of the Client, and Consultant hereby assigns to the Client all right, title, and interest therein, including, but not limited to, all audiovisual, literary, moral rights and other copyrights, patent rights, trade secret rights, and other proprietary rights therein. Consultant retains no right to use the Work Product and agrees not to challenge the validity of the Client's ownership in the Work Product; b.) Consultant hereby assigns to the Client all right, title, and interest in any and all photographic images and videos or audio recordings made by the Client during Consultant's work for them, including, but not limited to, any royalties, proceeds, or other benefits derived from such photographs or recordings; and c.) The Client will be entitled to use the Consultant's name and/or likeness in advertising and other materials.

  • Data Access and Proprietary Information 6.1 The Fund acknowledges that the databases, computer programs, screen formats, report formats, interactive design techniques, and documentation manuals furnished to the Fund by the Transfer Agent as part of the Fund’s ability to access certain Fund Confidential Information maintained by the Transfer Agent on databases under the control and ownership of the Transfer Agent or other third party (“Data Access Services”) constitute copyrighted, trade secret, or other proprietary information of substantial value to the Transfer Agent or other third party (collectively, “Transfer Agent Proprietary Information”). In no event shall Transfer Agent Proprietary Information be deemed Fund Confidential Information. The Fund agrees to treat all Transfer Agent Proprietary Information as proprietary to the Transfer Agent and further agrees that it shall not divulge any Transfer Agent Proprietary Information to any person or organization except as may be provided hereunder. Without limiting the foregoing, the Fund agrees for itself and its employees and agents to: (a) Use such programs and databases (i) solely on the Fund’s computers or on computers of Federated Services Company or its affiliates (collectively, “Fund Computers”), or (ii) solely from equipment at the location agreed to between the Fund and the Transfer Agent and (iii) solely in accordance with the Transfer Agent’s applicable user documentation; (b) Refrain from copying or duplicating in any way (other than in the normal course of performing processing on the Fund Computers), the Transfer Agent Proprietary Information; (c) Refrain from obtaining unauthorized access to any portion of the Transfer Agent Proprietary Information, and if such access is inadvertently obtained, to inform Transfer Agent in a timely manner of such fact and dispose of such information in accordance with the Transfer Agent’s instructions; (d) Refrain from causing or allowing information transmitted from the Transfer Agent’s computer to the Fund’s terminal to be retransmitted to any other computer terminal or other device except as expressly permitted by the Transfer Agent (such permission not to be unreasonably withheld); (e) Allow the Fund to have access only to those authorized transactions as agreed to between the Fund and the Transfer Agent; and (f) Honor all reasonable written requests made by the Transfer Agent to protect at the Transfer Agent’s expense the rights of the Transfer Agent in the Transfer Agent Proprietary Information at common law, under federal copyright law and under other federal or state law. 6.2 The Fund shall take reasonable efforts to advise its employees of their obligations pursuant to this Section 6. The obligations of this Section shall survive any earlier termination of this Agreement. 6.3 If the Fund notifies the Transfer Agent that any of the Data Access Services do not operate in material compliance with the most recently issued user documentation for such services, the Transfer Agent shall use its best efforts in a timely manner to correct such failure. Organizations from which the Transfer Agent may obtain certain data included in the Data Access Services are solely responsible for the contents of such data and the Fund agrees to make no claim against the Transfer Agent arising out of the contents of such third-party data, including, but not limited to, the accuracy thereof; provided, however, that the Fund shall be entitled to insist that the Transfer Agent, and the Transfer Agent for the benefit of the Fund shall, enforce any and all rights under applicable contracts for the Data Access Services. SUBJECT TO THE FOREGOING OBLIGATIONS OF THE TRANSFER AGENT, DATA ACCESS SERVICES AND ALL COMPUTER PROGRAMS AND SOFTWARE SPECIFICATIONS USED IN CONNECTION THEREWITH ARE PROVIDED ON AN AS IS, AS AVAILABLE BASIS. EXCEPT AS OTHERWISE PROVIDED HEREIN TO THE CONTRARY, THE TRANSFER AGENT EXPRESSLY DISCLAIMS ALL WARRANTIES INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. 6.4 If the transactions available to the Fund include the ability to originate Proper Instructions through electronic instructions to the Transfer Agent in order to: (i) effect the transfer or movement of cash or Shares; or (ii) transmit Shareholder information or other information, then in such event the Transfer Agent shall be entitled to rely on the validity and authenticity of such Proper Instructions without undertaking any further inquiry as long as such Proper Instruction is undertaken in conformity with applicable security procedures.

  • Return or Destruction of Confidential Information If an Interconnection Party provides any Confidential Information to another Interconnection Party in the course of an audit or inspection, the providing Interconnection Party may request the other party to return or destroy such Confidential Information after the termination of the audit period and the resolution of all matters relating to that audit. Each Interconnection Party shall make Reasonable Efforts to comply with any such requests for return or destruction within ten days of receiving the request and shall certify in writing to the other Interconnection Party that it has complied with such request.

  • Return of Proprietary Information 20.6.1 All Proprietary Information, other than Derivative Information, shall remain the property of the Disclosing Party, and all documents or other tangible media delivered to the Receiving Party that embody such Proprietary Information shall be, at the option of the Disclosing Party, either promptly returned to Disclosing Party or destroyed, except as otherwise may be required from time to time by Applicable Law (in which case the use and disclosure of such Proprietary Information will continue to be subject to this Agreement), upon the earlier of (i) the date on which the Receiving Party’s need for it has expired and (ii) the expiration or termination of this Agreement. 20.6.2 At the request of the Disclosing Party, any Derivative Information shall be, at the option of the Receiving Party, either promptly returned to the Disclosing Party or destroyed, except as otherwise may be required from time to time by Applicable Law (in which case the use and disclosure of such Derivative Information will continue to be subject to this Agreement), upon the earlier of (i) the date on which the Receiving Party’s need for it has expired and (ii) the expiration or termination of this Agreement. 20.6.3 The Receiving Party may at any time either return the Proprietary Information to the Disclosing Party or destroy such Proprietary Information. If the Receiving Party elects to destroy Proprietary Information, all copies of such information shall be destroyed and upon the written request of the Disclosing Party, the Receiving Party shall provide to the Disclosing Party written certification of such destruction. The destruction or return of Proprietary information shall not relieve any Receiving Party of its obligation to continue to treat such Proprietary Information in the manner required by this Agreement.

  • Confidentiality and Proprietary Information 9.1 For the purposes of this Agreement, Confidential Information (“Confidential Information”) means confidential or proprietary technical or business information given by one Party (the “Discloser”) to the other (the “Recipient”). All information which is disclosed by one Party to the other in connection with this Agreement, during negotiations and the term of this Agreement will not be deemed Confidential Information to the Discloser and subject to this Section 9, unless the confidentiality of the information is confirmed in writing by the Discloser prior to disclosure. The Recipient agrees (i) to use Confidential Information only for the purpose of performing under this Agreement, (ii) to hold it in confidence and disclose it to no one other than its employees having a need to know for the purpose of performing under this Agreement, and (iii) to safeguard it from unauthorized use or disclosure using at least the same degree of care with which the Recipient safeguards its own Confidential Information. If the Recipient wishes to disclose the Discloser's Confidential Information to a third-party agent or consultant, such disclosure must be agreed to in writing by the Discloser, and the agent or consultant must have executed a written agreement of nondisclosures and nonuse comparable in scope to the terms of this section. 9.2 The Recipient may make copies of Confidential Information only as reasonably necessary to perform its obligations under this Agreement. All such copies will be subject to the same restrictions and protections as the original and will bear the same copyright and proprietary rights notices as are contained on the original. 9.3 The Recipient agrees to return all Confidential Information in tangible form received from the Discloser, including any copies made by the Recipient, within thirty (30) days after a written request is delivered to the Recipient, or to destroy all such Confidential Information if directed to do so by Discloser except for Confidential Information that the Recipient reasonably requires to perform its obligations under this Agreement; the Recipient shall certify destruction by written letter to the Discloser. If either Party loses or makes an unauthorized disclosure of the Party’s Confidential Information, it will notify such other Party immediately and use its best efforts to retrieve the lost or wrongfully disclosed information. 9.4 The Recipient shall have no obligation to safeguard Confidential Information: (i) which was in the possession of the Recipient free of restriction prior to its receipt from the Discloser; (ii) after it becomes publicly known or available through no breach of this Agreement by the Recipient; (iii) after it is rightfully acquired by the Recipient free of restrictions on its discloser; (iv) after it is independently developed by personnel of the Recipient to whom the Discloser's Confidential Information had not been previously disclosed. In addition, either Party will have the right to disclose Confidential Information to any mediator, arbitrator, state or federal regulatory body, or a court in the conduct of any mediation, arbitration or approval of this Agreement, as long as, in the absence of an applicable protective order, the Discloser has been previously notified by the Recipient in time sufficient for the Recipient to undertake all lawful measures to avoid disclosing such confidential information and for Discloser to have reasonable time to seek or negotiate a protective order before or with any applicable mediator, arbitrator, state or regulatory body or a court. 9.5 The Parties recognize that an individual End User may simultaneously seek to become or be a customer of both Parties. Nothing in this Agreement is intended to limit the ability of either Party to use customer specific information lawfully obtained from End Users or sources other than the Discloser. 9.6 Each Party’s obligations to safeguard Confidential Information disclosed prior to expiration or termination of this Agreement will survive such expiration or termination. 9.7 No license is hereby granted under any patent, trademark, or copyright, nor is any such license implied solely by virtue or the disclosure of any Confidential Information. 9.8 Each Party agrees that the Discloser may be irreparably injured by a disclosure in breach of this Agreement by the Recipient or its representatives and the Discloser will be entitled to seek equitable relief, including injunctive relief and specific performance, in the event of any breach or threatened breach of the confidentiality provisions of this Agreement. Such remedies will not be deemed to be the exclusive remedies for a breach of this Agreement, but will be in addition to all other remedies available at law or in equity.

  • News/Information Release The Contractor agrees that it will not issue any news releases in connection with either the award of this Contract or any subsequent amendment of or effort under this Contract without first obtaining review and written approval of said news releases from the County through the County’s Project Manager.

  • HANDLING OF CONFIDENTIAL INFORMATION The Company agrees to undertake the following in relation to IHiS’ Confidential Information: to maintain the same in confidence and to use it only for the Purpose and for no other purpose; not to make any commercial use thereof; not to use the same for the benefit of itself or of any third party other than pursuant to a further agreement with IHiS; not to use the same for the purpose of guiding or conducting a search of any information, materials or sources, whether or not available to the public, for any purpose whatsoever, including without limitation, for the purpose of demonstrating that any information falls within one of the exceptions in Clause 1.1(b); not to copy, reproduce, reverse engineer or reduce to writing any part thereof except as may be reasonably necessary for the Purpose and that any copies, reproductions or reductions to writing so made shall be the property of IHiS; not to disclose the Confidential Information whether to its employees or to third parties except in confidence to such of its Representatives who have been informed of the confidential nature thereof and who need to know the same for the Purpose and that: such Representatives are contractually obliged (whether by their contracts of employment or service, or otherwise) not to disclose the same or to use the same otherwise than for the Purpose; and the Company shall enforce such obligations at its expense, and to such extent as may be required by IHiS, in the event of a breach thereof that relates to IHiS' Confidential Information; to ensure the compliance to this NDA (including sub-clauses (a) to (f) above) on the part of its Representatives to whom Confidential Information is disclosed; and to apply to the Confidential Information no lesser security measures and degree of care than those which the Company applies to its own confidential or proprietary information of similar nature, but in no event less than reasonable care, and which the Company warrants as being adequate protection of such information from unauthorised disclosure, copying or use. The Company, as the principal party, shall be responsible and held liable for any breach of this NDA by any of its Representatives. If the Company is uncertain as to whether any information is Confidential Information, the Company shall treat the information as if it was Confidential Information, unless otherwise agreed by IHiS in writing. The Company shall immediately notify IHiS of any unauthorised disclosure or use of the Confidential Information of which the Company becomes aware and will take all steps which IHiS may require in relation to such unauthorised disclosure or use, or to prevent further unauthorised disclosure or use. Notwithstanding the foregoing, the Company shall be entitled to make any disclosure of the Confidential Information as required by law, but shall give IHiS not less than TWO (2) business days' notice of such disclosure and shall consult with IHiS prior to such disclosure with a view to avoiding such disclosure, if legally possible.

  • Release of Confidential Information No Party shall release or disclose Confidential Information to any other person, except to its Affiliates (limited by FERC Standards of Conduct requirements), subcontractors, employees, consultants, or to parties who may be considering providing financing to or equity participation with Developer, or to potential purchasers or assignees of a Party, on a need-to-know basis in connection with this Agreement, unless such person has first been advised of the confidentiality provisions of this Article 22 and has agreed to comply with such provisions. Notwithstanding the foregoing, a Party providing Confidential Information to any person shall remain primarily responsible for any release of Confidential Information in contravention of this Article 22.

  • Proprietary Information and Inventions Agreement The Company shall require all employees and consultants to execute and deliver a Proprietary Information and Inventions Agreement substantially in a form approved by the Company’s counsel or Board of Directors.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!