Security of XXX MKA protocol Sample Clauses

Security of XXX MKA protocol. Theorem 2 (security of XXX). Let Q be the number of queries an adversary makes to the oracles of the user-mult game. Assume dprf is a (tdprf , εdprf )-secure pseudorandom generator, uske is a (tcpa∗, εcpa∗)- CPA*-secure USKE scheme, and τmka is a (stree, sskex, x, xxx(xxxx))-xxxx. Xxen, XXX is a (strxx, xxx(xxxx)· xxxxx, xxx(xxxx) · sskel, sskel, t, qc, nmax, ε)-secure MKA protocol with respect to the user-mult security game for ε ∈ {εS, εRO}, where t ≈ tdprf ≈ tcpa∗. In the standard model, εS = qc(Q · εdprf + 2εcpa∗ · deg(τmka)) · (2 deg(τmka))d · Q(deg(τmka)·d+1). In the random oracle model, εRO = qc(εcpa∗ · 2(stree · Q)2 + negl). The proof of Theorem 2 is provided in Appendix C. Corollary 1.
AutoNDA by SimpleDocs
Security of XXX MKA protocol 

Related to Security of XXX MKA protocol

  • Security of Access Code You may use one (1) or more access codes with your electronic fund transfers. The access codes issued to you are for your security purposes. Any access codes issued to you are confidential and should not be disclosed to third parties or recorded on or with the card. You are responsible for safekeeping your access codes. You agree not to disclose or otherwise make your access codes available to anyone not authorized to sign on your accounts. If you authorize anyone to use your access codes, that authority shall continue until you specifically revoke such authority by notifying the Credit Union. You understand that any joint owner you authorize to use an access code may withdraw or transfer funds from any of your accounts. If you fail to maintain the security of these access codes and the Credit Union suffers a loss, we may terminate your EFT services immediately.

  • Security of Data a. Each of the parties shall:

  • Security of State Information To the extent Contractor shall have access to, processes, handles, collects, transmits, stores or otherwise deals with State Data, the Contractor represents and warrants that it has implemented and it shall maintain during the term of this Master Agreement the highest industry standard administrative, technical, and physical safeguards and controls consistent with NIST Special Publication 800-53 (version 4 or higher) and Federal Information Processing Standards Publication 200 and designed to (i) ensure the security and confidentiality of State Data; (ii) protect against any anticipated security threats or hazards to the security or integrity of the State Data; and (iii) protect against unauthorized access to or use of State Data. Such measures shall include at a minimum: (1) access controls on information systems, including controls to authenticate and permit access to State Data only to authorized individuals and controls to prevent the Contractor employees from providing State Data to unauthorized individuals who may seek to obtain this information (whether through fraudulent means or otherwise); (2) industry-standard firewall protection; (3) encryption of electronic State Data while in transit from the Contractor networks to external networks; (4) measures to store in a secure fashion all State Data which shall include multiple levels of authentication; (5) dual control procedures, segregation of duties, and pre-employment criminal background checks for employees with responsibilities for or access to State Data; (6) measures to ensure that the State Data shall not be altered or corrupted without the prior written consent of the State; (7) measures to protect against destruction, loss or damage of State Data due to potential environmental hazards, such as fire and water damage; (8) staff training to implement the information security measures; and (9) monitoring of the security of any portions of the Contractor systems that are used in the provision of the services against intrusion on a twenty-four (24) hour a day basis.

  • Building and Construction Industry Security of Payment Act 1999 (NSW);

  • Government Data Practices and Intellectual Property The Contractor and State shall comply with the Minnesota Government Data Practices Act, Minn. Stat. ch.

  • Security and Validation Procedures The Scheduling Coordinator shall apply to the Meter Data of the Scheduling Coordinator Metered Entities that it represents the security and validation procedures prescribed by the relevant Local Regulatory Authority. If the relevant Local Regulatory Authority has not prescribed any such procedures, the Scheduling Coordinator shall apply the procedures set forth in the CAISO Tariff. Meter Data submitted by a Scheduling Coordinator for Scheduling Coordinator Metered Entities shall conform to these standards unless the CAISO has, at its discretion, exempted the Scheduling Coordinator from these standards.

  • Security of Vendor Facilities All Vendor and Vendor Staff facilities in which Citizens Confidential Information is located or housed shall be maintained in a reasonably secure manner. Within such facilities, all printed materials containing Citizens Confidential Information should be kept locked in a secure office, file cabinet, or desk (except when materials are being used).

  • NIST Cybersecurity Framework The U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity Version 1.1.

  • Commercial Driver’s License As a result of recent Federal statutory requirements, the State of Michigan enacted Act 346 of 1988. The parties agree that as a result of these statutory requirements some employees within the Technical Bargaining Unit may be required to obtain and retain a Commercial Drivers License (CDL) to continue to perform certain duties for the State. Whenever a CDL is referred to in this Section, it is understood to mean the CDL and any required endorsements. In order to implement this provision, the parties agree to the following:

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!