Known Specific Temporary Information Attack Sample Clauses

Known Specific Temporary Information Attack. If an adversary obtains secret parameters and , he cannot get session key = ℎ( ∥ ∥ ∥ 2) because hidden value is = ℎ( ∥ ∥ ) = ℎ( ∥ ∥ ) wherein and are stored in each device and is inaccessible. Therefore, our protocol is secure against temporary secret leakage attack.
AutoNDA by SimpleDocs

Related to Known Specific Temporary Information Attack

  • Information Release a. Grantee shall keep and maintain public records required by DEO to perform Grantee’s responsibilities hereunder. Grantee shall, upon request from DEO’s custodian of public records, provide DEO with a copy of the requested records or allow the records to be inspected or copied within a reasonable time per the cost structure provided in chapter 119, F.S., and in accordance with all other requirements of chapter 119, F.S., or as otherwise provided by law. Upon expiration or termination of this Agreement, Grantee shall transfer, at no cost, to DEO all public records in possession of Grantee or keep and maintain public records required by DEO to perform the service. If the Grantee keeps and maintains public records upon completion of the Agreement, the Grantee shall meet all applicable requirements for retaining public records. All records stored electronically must be provided to DEO, upon request from the DEO’s custodian of records, in a format that is compatible with the information technology systems of DEO.

  • CONFIDENTIAL & PROPRIETARY INFORMATION The parties may provide technical information, documentation and expertise to each other that is either (1) marked as being confidential or, (2) if delivered in oral form is summarized in writing within 10 working days and identified as being confidential (“Confidential Information”). The receiving party shall for a period of five (5) years from the date of disclosure (i) hold the disclosing party’s Confidential Information in strict confidence, and (ii), except as previously authorized in writing by the disclosing party, not publish or disclose the disclosing party’s Confidential Information to anyone other than the receiving party’s employees on a need-to-know basis, and (iii) use the disclosing party’s Confidential Information solely for performance of this Contract. The foregoing requirement shall not apply to any portion of a party’s Confidential Information which (a) becomes publicly known through no wrongful act or omission on the part of the receiving party; (b) is already known to the receiving party at the time of the disclosure without similar nondisclosure obligations; (c) is rightfully received by the receiving party from a third party without similar nondisclosure obligations; (d) is approved for release by written authorization of the disclosing party; (e) is clearly demonstrated by the receiving party to have been independently developed by the receiving party without access to the disclosing party’s Confidential Information; or (f) is required to be disclosed by order of a court or governmental body or by applicable law, provided that the party intending to make such required disclosure shall promptly notify the other party of such intended disclosure in order to allow such party to seek a protective order or other remedy.

  • Confidentiality & Proprietary Information The Consultant acknowledges that it will be necessary for the Client to disclose certain confidential and proprietary information to the Consultant in order for the Consultant to perform their duties under this Agreement. The Consultant acknowledges that disclosure to a third (3rd) party or misuse of this proprietary or confidential information would irreparably harm the Client. Accordingly, the Consultant will not disclose or use, either during or after the term of this Agreement, any proprietary or confidential information of the Client without the Client's prior written permission except to the extent necessary to perform the Services on the Client's behalf. Proprietary or confidential information includes, but is not limited to:

  • Confidentiality and Safeguarding of University Records; Press Releases; Public Information Under this Agreement, Contractor may (1) create, (2) receive from or on behalf of University, or (3) have access to, records or record systems (collectively, University Records). Among other things, University Records may contain social security numbers, credit card numbers, or data protected or made confidential or sensitive by Applicable Laws. [Option (Include if University Records are subject to FERPA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Family Educational Rights and Privacy Act, 20 United States Code (USC) §1232g (FERPA) are addressed in Section 12.41.] [Option (Include if University is a HIPAA Covered Entity and University Records are subject to HIPAA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Health Insurance Portability and Accountability Act and 45 Code of Federal Regulations (CFR) Part 160 and subparts A and E of Part 164 (collectively, HIPAA) are addressed in Section 12.26.] Contractor represents, warrants, and agrees that it will: (1) hold University Records in strict confidence and will not use or disclose University Records except as (a) permitted or required by this Agreement, (b) required by Applicable Laws, or (c) otherwise authorized by University in writing; (2) safeguard University Records according to reasonable administrative, physical and technical standards (such as standards established by the National Institute of Standards and Technology and the Center for Internet Security [Option (Include if Section 12.39 related to Payment Card Industry Data Security Standards is not include in this Agreement.):, as well as the Payment Card Industry Data Security Standards]) that are no less rigorous than the standards by which Contractor protects its own confidential information; (3) continually monitor its operations and take any action necessary to assure that University Records are safeguarded and the confidentiality of University Records is maintained in accordance with all Applicable Laws and the terms of this Agreement; and (4) comply with University Rules regarding access to and use of University’s computer systems, including UTS165 at xxxx://xxx.xxxxxxxx.xxx/board-of-regents/policy-library/policies/uts165-information-resources-use-and-security-policy. At the request of University, Contractor agrees to provide University with a written summary of the procedures Contractor uses to safeguard and maintain the confidentiality of University Records.

  • Return of Proprietary Information The Executive acknowledges and agrees that all the Proprietary Information used or generated during the course of working for the Company Group is the property of the Company Group. The Executive agrees to deliver to the Company Group all documents and other tangibles (including diskettes and other storage media) containing the Proprietary Information at any time upon request by the Board of Trustees during his employment and immediately upon termination of his employment.

  • Confidentiality and Proprietary Information 6.1 For the purposes of this Agreement, "

  • News/Information Release The Contractor agrees that it will not issue any news releases in connection with either the award of this Contract or any subsequent amendment of or effort under this Contract without first obtaining review and written approval of said news releases from the County through the County’s Project Manager.

  • RELEASE OF BID EVALUATION MATERIALS Requests concerning the evaluation of Bids may be submitted under the Freedom of Information Law. Information, other than statistical or factual tabulations or data such as the Bid Tabulation, shall only be released as required by law after Contract award. Bid Tabulations are not maintained for all procurements. Names of Bidders may be disclosed after Bid opening upon request. Written requests should be directed to the Commissioner.

  • HANDLING OF CONFIDENTIAL INFORMATION The Company agrees to undertake the following in relation to IHiS’ Confidential Information: to maintain the same in confidence and to use it only for the Purpose and for no other purpose; not to make any commercial use thereof; not to use the same for the benefit of itself or of any third party other than pursuant to a further agreement with IHiS; not to use the same for the purpose of guiding or conducting a search of any information, materials or sources, whether or not available to the public, for any purpose whatsoever, including without limitation, for the purpose of demonstrating that any information falls within one of the exceptions in Clause 1.1(b); not to copy, reproduce, reverse engineer or reduce to writing any part thereof except as may be reasonably necessary for the Purpose and that any copies, reproductions or reductions to writing so made shall be the property of IHiS; not to disclose the Confidential Information whether to its employees or to third parties except in confidence to such of its Representatives who have been informed of the confidential nature thereof and who need to know the same for the Purpose and that: such Representatives are contractually obliged (whether by their contracts of employment or service, or otherwise) not to disclose the same or to use the same otherwise than for the Purpose; and the Company shall enforce such obligations at its expense, and to such extent as may be required by IHiS, in the event of a breach thereof that relates to IHiS' Confidential Information; to ensure the compliance to this NDA (including sub-clauses (a) to (f) above) on the part of its Representatives to whom Confidential Information is disclosed; and to apply to the Confidential Information no lesser security measures and degree of care than those which the Company applies to its own confidential or proprietary information of similar nature, but in no event less than reasonable care, and which the Company warrants as being adequate protection of such information from unauthorised disclosure, copying or use. The Company, as the principal party, shall be responsible and held liable for any breach of this NDA by any of its Representatives. If the Company is uncertain as to whether any information is Confidential Information, the Company shall treat the information as if it was Confidential Information, unless otherwise agreed by IHiS in writing. The Company shall immediately notify IHiS of any unauthorised disclosure or use of the Confidential Information of which the Company becomes aware and will take all steps which IHiS may require in relation to such unauthorised disclosure or use, or to prevent further unauthorised disclosure or use. Notwithstanding the foregoing, the Company shall be entitled to make any disclosure of the Confidential Information as required by law, but shall give IHiS not less than TWO (2) business days' notice of such disclosure and shall consult with IHiS prior to such disclosure with a view to avoiding such disclosure, if legally possible.

  • Release of Confidential Information No Party shall release or disclose Confidential Information to any other person, except to its Affiliates (limited by FERC Standards of Conduct requirements), subcontractors, employees, consultants, or to parties who may be considering providing financing to or equity participation with Developer, or to potential purchasers or assignees of a Party, on a need-to-know basis in connection with this Agreement, unless such person has first been advised of the confidentiality provisions of this Article 22 and has agreed to comply with such provisions. Notwithstanding the foregoing, a Party providing Confidential Information to any person shall remain primarily responsible for any release of Confidential Information in contravention of this Article 22.

Time is Money Join Law Insider Premium to draft better contracts faster.