SIP and XXXXX Sample Clauses

SIP and XXXXX. In order not to add additional roundtrips to the call establishment, the key agreement conducted with XXXXX should be contained in the SIP INVITE transaction. The simplest case, when no error occurs, is conducted as illus- trated in figure 11.1. MIKEY usually requires no more than one roundtrip, so the whole key exchange can be included in the INVITE transaction. Figure 11.1: XXXXX in a SIP INVITE transaction An Internet Draft [25] defines how XXXXX should be integrated into the SIP messages, as part of the session description. The MIKEY messages are added as an SDP attribute key-mgmt, either at the session level (in which case it applies to all the streams), or at the media level (if it is specific to protecting only one stream). Several key-mgmt attributes can be included if the initiator wants to offer several alternative ways of exchanging keys. To avoid a downgrade attack, each key agreement message must contain the list of the key agreement meth- ods and protect its integrity. In the case of XXXXX, this is done by adding a GENERAL EXTENSION payload containing this list. Re-keying should be included into RE-INVITE messages. However, this has not yet been implemented.
AutoNDA by SimpleDocs

Related to SIP and XXXXX

  • Xxxxxxx and X Xxxx¨cker. A detailed account of Xxxxx Xxxxxx’ version of the standard model. IV. Rev. Math. Phys. 8 (1996) 205–228.

  • Xxxxxxxx and X X. Xxxxx. 1930. Checklist of the fishes and fishlike vertebrates of North and Middle America north of the northern boundary of Venezuela and Columbia. Rept. U.S. Fish Comm. 1928(2):1-670. Jordan, D.S. and X.X. Xxxxxxxx. 1896. The fishes of North and Middle America. Part 1. U.S. Natl. Mus. Bul. 47:1-1240. Xxxxx, S. and X. Xxxxxx. 2005..Hydrogeologic setting of the snake valley hydrologic basin, Xxxxxxx County, Utah, and White Pine and Lincoln Counties, Nevada – implications for possible effects of proposed water xxxxx. Report of investigation 254, Utah Geological Survey. Xxxxxxx, M.C. 1982. Status report of three Bonneville basin endemic fishes. Prepared for the U.S. Fish and Wildlife Service. 27 pp. May, B. E. and X. X. Xxxxx. 1981. Comparative effects of sheep and cattle grazing on the Xxxxx Creek drainage. Transactions of the Bonneville Chapter American Fisheries Society. 1981:48-62. Xxxxx, X.X. 1985. Predation and species replacement in American Southwestern fishes: a case study. Southwestern Naturalist. 30:173-187. Xxxxxx, X. X. and X. X. Xxxxxx. 1985. Two New Intergeneric Cyprinid Hybrids from the Bonneville Basin, Utah. Copeia, 1985(2):509-515. Xxxxxx, X.X. 1972. Threatened freshwater fishes of the United States. Trans. Amer, Fish. Soc. 101(2):239-252.

  • Xxxxxxxxx and X Xxxxxxx. A

  • Xxxxxx and X Xxxxxxxxx. Key-agreement in ad-hoc networks. In Nordsec’99, 1999. [4] X. Xxxxxxxx, X. Xxxxxxx, and X. Xxxxxx. Authenticated Group Key Agreement and Friends. In 5th ACM Conference on Computer and Communications Security, pages 17–26. ACM, November 1998. [5] X. Xxxxxx and X. Xxxxx. Communication complexity of group key distribution. In 5th ACM Conference on Computer and Communications Security, November 1998. [6] X. Xxxxxxx and X. Xxxxxxx. Random oracles are practical: A paradigm for designing efficient protocols. In 1st ACM Conference on Computer and Communications Security, 1993. [7] Xxx Xxxxx. The Decision Xxxxxx-Xxxxxxx problem. In Third Algorithmic Number Theory Symposium, number 1423 in Lecture Notes in Computer Science, pages 48–63. Springer-Verlag, Berlin Germany, 1998. [8] Xxx Xxxxx and Xxxxx Xxxxxxxxxx. Applications of multilinear forms to cryptography. To appear in Contemporary Mathematics, American Mathematical Society. [9] Xxxxxxxx Xxxxxxx, Xxxxxxx Xxxxxxxxx, and Xxxxx Xxxxxxxxxxx. Provably authenticated group Xxxxxx-Xxxxxxx key exchange — the dynamic case. In Xxxxx Xxxx, editor, Advances in Cryptology – ASIACRYPT ’2001, Lecture Notes in Computer Science, Gold Coast, Australia, 2001. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany. [10] Xxxxxxxx Xxxxxxx, Xxxxxxx Xxxxxxxxx, Xxxxx Xxxxxxxxxxx, and Xxxx-Xxxxxxx Xxxxxxxxxx. Provably authenticated group xxxxxx-xxxxxxx key exchange. In Xxxxxxxxxx Xxxxxxxx, editor, 8th ACM Conference on Computer and Communications Security, Philadelphia, PA, USA, November 2001. ACM Press. [11] Xxxx Xxxxxxxxx and Xxx Xxxxxxx. A secure and efficient conference key distribution system. In X. Xx Xxxxxx, editor, Advances in Cryptology – EUROCRYPT ’94, number 950 in Lecture Notes in Computer Science. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, 1995. final version of proceedings. [12] X. Xxxxxxx, X. Xxxxxxxxx, X. Xxx, X. Xxxxxx, and X. Xxxxxxxx. The VersaKey framework: Versatile group key management. IEEE Journal on Selected Areas in Communications, 17(9), September 1999. [13] Xxxxx Xxxxx. Zero-knowledge undeniable signatures. In X.X. Xxxxxxx, editor, Advances in Cryptology – EUROCRYPT ’90, number 473 in Lecture Notes in Computer Science, pages 458–464. Springer-Verlag, Berlin Germany, May 1991.

  • SHOP XXXXXXX (a) The Union may elect or appoint a Shop Xxxxxxx or Shop Stewards to represent the employees and the Union shall notify the Company as to the name or names of such Shop Xxxxxxx or Shop Stewards. The Company agrees that no Shop Xxxxxxx shall suffer any discrimination by reason of holding such office.

  • Xxxxx-Xxxxx Act Xxxxx-Xxxxx Act, as amended (40 U.S.C. 3141-3148). When required by Federal program legislation, all prime construction contracts in excess of $2,000 awarded by non-Federal entities must include a provision for compliance with the Xxxxx-Xxxxx Act (40 U.S.C. 3141-3144, and 3146-3148) as supplemented by Department of Labor regulations (29 CFR Part 5, “Labor Standards Provisions Applicable to Contracts Covering Federally Financed and Assisted Construction”). In accordance with the statute, contractors must be required to pay wages to laborers and mechanics at a rate not less than the prevailing wages specified in a wage determination made by the Secretary of Labor. In addition, contractors must be required to pay wages not less than once a week. The non-Federal entity must place a copy of the current prevailing wage determination issued by the Department of Labor in each solicitation. The decision to award a contract or subcontract must be conditioned upon the acceptance of the wage determination. The non-Federal entity must report all suspected or reported violations to the Federal awarding agency. The contracts must also include a provision for compliance with the Xxxxxxxx “Anti-Kickback” Act (40 U.S.C. 3145), as supplemented by Department of Labor regulations (29 CFR Part 3, “Contractors and Subcontractors on Public Building or Public Work Financed in Whole or in Part by Loans or Grants from the United States”). The Act provides that each contractor or Subrecipient must be prohibited from inducing, by any means, any person employed in the construction, completion, or repair of public work, to give up any part of the compensation to which he or she is otherwise entitled. The non-Federal entity must report all suspected or reported violations to the Federal awarding agency.

  • XXXXXXXX ANTI-KICKBACK ACT (a) The Sub-Recipient hereby agrees that, unless exempt under Federal law, it will incorporate or cause to be incorporated into any contract for construction work, or modification thereof, the following clause:

  • PREVENTION OF FRAUD AND XXXXXXX The Supplier represents and warrants that neither it, nor to the best of its knowledge any Supplier Personnel, have at any time prior to the Commencement Date: committed a Prohibited Act or been formally notified that it is subject to an investigation or prosecution which relates to an alleged Prohibited Act; and/or been listed by any government department or agency as being debarred, suspended, proposed for suspension or debarment, or otherwise ineligible for participation in government procurement programmes or contracts on the grounds of a Prohibited Act. The Supplier shall not during the Term: commit a Prohibited Act; and/or do or suffer anything to be done which would cause the Customer or any of the Customer’s employees, consultants, contractors, sub-contractors or agents to contravene any of the Relevant Requirements or otherwise incur any liability in relation to the Relevant Requirements. The Supplier shall during the Term: establish, maintain and enforce, and require that its Sub-Contractors establish, maintain and enforce, policies and procedures which are adequate to ensure compliance with the Relevant Requirements and prevent the occurrence of a Prohibited Act; keep appropriate records of its compliance with its obligations under Clause 14.3.1 and make such records available to the Customer on request; if so required by the Customer, within twenty (20) Working Days of the Commencement Date, and annually thereafter, certify to the Customer in writing that the Supplier and all persons associated with it or its Sub-Contractors or other persons who are supplying the Ordered Panel Services in connection with this Legal Services Contract are compliant with the Relevant Requirements. The Supplier shall provide such supporting evidence of compliance as the Customer may reasonably request; and have, maintain and where appropriate enforce an anti-bribery policy (which shall be disclosed to the Customer on request) to prevent it and any Supplier Personnel or any person acting on the Supplier's behalf from committing a Prohibited Act. The Supplier shall immediately notify the Customer in writing if it becomes aware of any breach of Clause 14.1, or has reason to believe that it has or any of the Supplier Personnel have: been subject to an investigation or prosecution which relates to an alleged Prohibited Act; been listed by any government department or agency as being debarred, suspended, proposed for suspension or debarment, or otherwise ineligible for participation in government procurement programmes or contracts on the grounds of a Prohibited Act; and/or received a request or demand for any undue financial or other advantage of any kind in connection with the performance of this Legal Services Contract or otherwise suspects that any person or Party directly or indirectly connected with this Legal Services Contract has committed or attempted to commit a Prohibited Act. If the Supplier makes a notification to the Customer pursuant to Clause 14.4, the Supplier shall respond promptly to the Customer's enquiries, co-operate with any investigation, and allow the Customer to audit any books, records and/or any other relevant documentation. If the Supplier breaches Clause 14.3, the Customer may by notice: require the Supplier to remove from performance of this Legal Services Contract any Supplier Personnel whose acts or omissions have caused the Supplier’s breach; or immediately terminate this Legal Services Contract. Any notice served by the Customer under Clause 14.4 shall specify the nature of the Prohibited Act, the identity of the Party who the Customer believes has committed the Prohibited Act and the action that the Customer has elected to take (including, where relevant, the date on which this Legal Services Contract shall terminate).

  • Data Protection Xxx 0000 19.1 For the purposes of the Data Protection Xxx 0000 (the “Act”) the Executive gives his consent to the holding, processing and disclosure of personal data (including sensitive data within the meaning of the Act) provided by the Executive to the Company for all purposes relating to the performance of this agreement including, but not limited to:

  • Fraud, Xxxxx and Abuse If you have concerns about being billed for services you never received, or that your insurance information has been stolen or used by someone else, you may report potential health care fraud, waste or abuse to our Special Investigations Unit by using our confidential anti-fraud hotline at 0-000-000-0000 or by email at XXX@xxxxxx.xxx. You may also send an anonymous letter to us at: Blue Cross & Blue Shield of Rhode Island Special Investigations Unit 000 Xxxxxxxx Xxxxxx Providence RI, 02903

Time is Money Join Law Insider Premium to draft better contracts faster.