Computation Complexity and Security Sample Clauses

Computation Complexity and Security. Property 5 Conclusion User identity privacy is an important security property for protocols used in several environments such as mobile networks. In this paper we investigate the user identity privacy in the protocols employing identity-based primitives from pairings. By considering both security strength and computation efficiency, we present an identity-based protocols using pairing which preserves both user iden- tity privacy and high efficiency.
AutoNDA by SimpleDocs

Related to Computation Complexity and Security

  • Safety and Security Contractor is responsible for maintaining safety in the performance of this Contract. Contractor shall be responsible for complying with the District’s rules and regulations pertaining to safety, security, and driving on school grounds, particularly when children are present.

  • Health, Safety and Security 22.2.1 The University and the Association agree to promote safe, secure and healthy working conditions and procedures, and to encourage Members to adopt and follow sound health, safety and security procedures in the performance of their work.

  • Delivery and Security All Zee Group Channels must be delivered by the DTH Operator to subscribers in a securely encrypted manner and without any alteration. The transmission specifications and infrastructure allocated by DTH Operator in respect of the broadcast signals of the Zee Group Channels by DTH Operator to its Subscribers shall be no worse than that of the signal of any other channel within the same genre on its DTH Platform. ZEEL shall provide requisite number of Integrated Receivers and Decoders (IRDs) subject to payment of stipulated interest free security deposit per IRD as per the conditions laid down in the TRAI Regulations. Further, the DTH Operator shall confirm the details of Integrated Receiver Decoder (IRD’s) in respect of all such channels availed from ZEEL in the format provided in ANNEXURE XI. The Parties acknowledge and agree that in the event the DTH Operator intends to make any changes to the Addressable System’s security and encryption technology, including the encryption system (other than standard software upgrades which are deemed not to be material changes), during the Term, the DTH Operator shall intimate the same to ZEEL by submitting Form for Change in Addressable Systems which is made available on ZEEL’s Website.

  • Data and Security If Contractor is granted access to Court Data, Confidential Information or Court Work Locations in the performance of the Work;

  • GEOGRAPHIC AREA AND SECTOR SPECIFIC ALLOWANCES, CONDITIONS AND EXCEPTIONS The following allowances and conditions shall apply where relevant: Where the company does work which falls under the following headings, the company agrees to pay and observe the relevant respective conditions and/or exceptions set out below in each case.

  • Privacy and Security (a) The Service Provider shall not transmit or store any AHS data outside the borders of Canada, nor transmit any AHS data in Canada to any party not specifically contemplated in this Agreement, without AHS’s prior written consent to each such data transmittal, which consent may be arbitrarily and unreasonably withheld.

  • Password and Security If you are issued or create any password or other credentials to access the Service or the portion of the Site through which the Service is offered, you agree not to give or make available your password or credentials to any unauthorized individuals, and you agree to be responsible for all actions taken by anyone to whom you have provided such credentials. If you believe that your credentials have been lost or stolen or that someone may attempt to use them to access the Site or Service without your consent, you must inform us at once at the telephone number provided in Section 6 of the General Terms above. See also Section 16 of the General Terms above regarding how the timeliness of your notice impacts your liability for unauthorized transfers.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • DATA HANDLING AND SECURITY It will always be the responsibility of the selected Contractor to manage data transfer and to secure all data appropriately during the project to prevent unauthorized access to all data, products, and deliverables.

  • Information Integrity and Security Contractor shall immediately notify County of any known or suspected breach of personal, sensitive and confidential information related to Contractor’s work under this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.