Description of Algorithms Sample Clauses

Description of Algorithms. In this subsection, we present three interval-based dis- tributed rekeying algorithms. They are the Rebuild algo- rithm, the Batch algorithm and the Queue-batch algorithm. The use of interval-based rekeying aims to maintain good rekeying performance independent of the dynamics of joins and leaves. The three distributed algorithms are developed based on the following assumptions: The key tree of TGDH is used as a foundation of all the algorithms. The rekeying operations are carried out at the begin- ning of every rekey interval. There exists a virtual queue holding all join and leave requests till the be- ginning of the next rekey interval. When a new member sends a join request, it should also include its individual blinded key. For simplicity, all clients know the existing key tree structure and they also know all the blinded keys within the tree. The group members would elect sponsors to be respon- sible for computing and broadcasting blinded keys. To obtain the blinded keys of the renewed nodes (a node is said to be renewed if it is a non-leaf node and its as- clients contribute to the composition of the group key. The pseudo code of the Batch algorithm is given as: sociated keys are updated), the key paths of the spon- sors should contain those renewed nodes. Since the interval-based rekeying operations involve nodes lying on more than one key paths, more than one sponsors may be elected. Also, a renewed node may be rekeyed by more than one sponsor. In this case, we assume that the sponsors can coordinate with one another such that the blinded keys of all the renewed nodes are broadcast once only. We adopt the following notations for the three distributed algorithms. Let denote the existing key tree. Assume that existing members = wish to leave, and new members = wish to join the communication group within a rekey interval.
AutoNDA by SimpleDocs
Description of Algorithms public function construct(Point g); The constructor serves only to populate the generator point for ECDH. public function getPublicPoint(); When called, this method generates a pseudo-random number ”secret” between 0 and the order of the generator point. Upon successful generation it returns the public point secret*Generator. public function setPublicPoint(Point q); This method is used to set a public point that was received from the person wishing to establish secure communication through an untrusted channel. public function calculateKey(); The calculateKey method’s purpose is to finally establish the shared secret. When both parties call this method, they both arrive at the same key. Find the explanation of cor- rectness behind ECDH in Section 3. public function encrypt(string); public function decrypt(string); public function encryptFile(path); public function decryptFile(path); The methods above are demonstrations of how a dual-key encryption scheme may be used with the ECDH shared key agreement protocol. The first pair of methods may be used for arbitrary strings. For hashing the x value of the generated shared secret, the implemen- tations use SHA256. This hash is then fed into the 256 bit EAS encryption function in CBC mode. The methods which operate on files are identical to the previous two, but are designed to read in a file as the message to be communicated between Xxxxx and Xxx. Note: The dual key encryption/decryption algorithm uses AES 256 for two way encryp- tion. This may be substituted by other two way encryption functions as long as the function used to encrypt the message is identical to the one used to decrypt the message.

Related to Description of Algorithms

  • Description of Funding Techniques 6.2.1 The following are terms under which standard funding techniques shall be implemented for all transfers of funds to which the funding technique is applied in section 6.3.2 of this Agreement. Funding Technique Name Description Actual Clearance, ZBA - ACH The State shall request funds such that they are deposited by ACH in a State account on the settlement date of payments issued by the State. The request shall be made in accordance with the appropriate Federal agency cut-off time specified in Exhibit I. The amount of the request shall be for the amount of funds that clear the State's account on the settlement date. This funding technique is interest neutral. Actual Clearance, ZBA - Same Day Payment The State shall request funds the same day it pays out funds, in accordance with the appropriate Federal agency cut-off time specified in Exhibit I. A Federal agency will deposit funds in a State account the same day as requested. The amount of the request shall be for the amount of funds that clear the State's account that day. This funding technique is interest neutral. Average Clearance The State shall request funds such that they are deposited by ACH on the dollar- weighted average day of clearance for the disbursement, in accordance with the clearance pattern specified in Exhibit II. The request shall be made in accordance with the appropriate Federal agency cut-off time specified in Exhibit I. The amount of the request shall be for the exact amount of that disbursement. This funding technique is interest neutral.

  • Description of Services (a) Services Provided on an Ongoing Basis, If Applicable.

  • Description of Activities The objectives of the activities (Activities) to be financed under this Trust Fund are to contribute to: (a) enhanced capacity for effective policy formulation in the countries of grant recipients of the African Capacity Building Foundation (variously, “ACBF” or “Recipient”); and (b) improvements in the management of ACBF’s operations. The Activities consist of the following:

  • Descriptions All descriptions referred to in this Agreement are expressly incorporated herein by reference as if set forth in full, whether or not attached hereto.

  • Description of Program This Agreement is established to facilitate an exchange program at the partner institution with students, faculty and researchers from each institution (collectively, the “Exchange Program”). The student exchange program enables students from one university to take classes at the other university while working towards a degree at the university where he or she is formally enrolled (individually, the “Student Exchange”) and to encourage faculty members and researchers from each university to visit the other university and engage in certain activities (individually, the “Faculty/Researcher Exchange”). [Substitute the purpose of your program if different.] For purposes of this Agreement, with respect to the Student Exchange, the term “Home University” shall mean the institution in which a student is formally enrolled as a degree candidate, and “Host University” shall mean the institution that has agreed to receive students from the Home University for a period of study. With respect to the Faculty/Researcher Exchange, as used herein, “Home University” shall mean the university where the faculty member and/or researcher is normally employed, and “Host University” shall mean the university that the faculty member and/or researcher is visiting.

  • DESCRIPTION OF THE WORKS Employer’s objectives The scope of the request includes the recommended monthly preventative, quarterly and annual maintenance that needs to be conducted to ensure all areas of the airports are lit and compliant. It will include all the other adhoc request (labor rates) where required upon approval by the maintenance manager. The compliance will be based on the following: • Maintenance as per OEM • Organizational guidelines and codes of practice • OHS act 93 – Occupational Health and Safety • ISO 9001 – Quality management • ISO 14001 – Environmental Management • SANS 10142 – The wiring code • ICAO Annex 14 chapter 5. • ACSA Maintenance Procedure D060 024M This scope entails the maintenance and repair of LV systems and all lighting at Costal airports. In brief, maintenance involves servicing, repairs, and testing of lights and LV systems. This involves carrying out maintenance on electrical equipment such as LV DBs, electrical plant, wiring enclosures and luminaires and associated control systems, portable appliances and other specific electrical equipment, in order to minimize downtime, and ensure that the equipment performs at optimal levels and functions to specification at the specified areas. Servicing - performing routine preventive maintenance as prescribed by the original equipment manufacturer (OEM), ACSA’s planned maintenance routines, and applicable legal and design standards. Repairs – responding to breakdowns, callouts and restoring the equipment to safe working conditions on an as and when basis. Advisory – telephonically guiding airport electricians under emergency situations to ensure systems are safely shutdown or returned to service within stringent times. System Performance Test – Testing equipment performance against the OEM, ACSA, and statutory requirements for compliance and return to service purposes. Extent of the works The Contractor will be fully responsible for meeting all requirements in this document regarding the Works. For each piece of equipment, all work will be carried out to standards as required by the Original Equipment Manufacturer (OEM) as well as any applicable governing law and/or regulations. Where OEM standards differ from those required by this document the more stringent requirement shall apply. The Contractor will be fully responsible for obtaining (and keeping up to date with) said requirements. The proposed minimum scheduled maintenance activities can be found in annex H.

  • Description of Work (a) that has been omitted or

  • Topic Description Licensee Responsibilities Licensee must:  Take appropriate steps to ensure the security, integrity, and confidentiality of Confidential Information and must comply with all relevant applicable laws and regulations, including laws protecting borrower privacy.  Not disclose Confidential Information to third parties, without Xxxxxx Mae’s prior written approval, except on a need‐to‐know basis to Licensee’s partners, Topic Description affiliates, officers, employees, directors, contractors, counsels, agents or representatives, provided they are subject to confidentiality obligations at least as stringent as those set forth in this Section A3.  Not use Confidential Information in any way that could be viewed as a conflict of interest, a breach of confidentiality or privacy, or the gaining of an unfair advantage from the relationship with Xxxxxx Xxx.  Implement commercially reasonable measures meeting or exceeding industry standards to ensure the security, integrity, and confidentiality of Confidential Information, including using industry‐standard encryption for data in transit and virus checking programs designed to prevent the transmission and receipt of viruses and other malicious code, implementing appropriate disaster recovery and back‐up procedures, implementing appropriate procedures to prevent disclosure of data and other materials to a party other than the intended recipient, and employing methods for securely disposing or destroying such information.  These measures must meet, at least, the same level of protection that the Receiving Party seeks for its own information of a similar nature.  Licensee must collaborate with Xxxxxx Mae in assessing the sufficiency of these measures and Licensee’s information security program, upon reasonable request.  Instruct its Related Parties who may receive Confidential Information about the requirements of this Section A3, and the processes and procedures necessary to comply with them.  Comply with all reasonable security policies and procedures required by Xxxxxx Xxx related to the access and use of Xxxxxx Mae’s systems or any Licensed Materials.  Not transmit to Xxxxxx Mae’s systems any materials that contain bugs, viruses, worms or other functions, routines, devices or instructions which may create any unauthorized access or damage to, or interruption in the functioning of, the Licensed Application or Xxxxxx Mae’s systems. Restrictive Legends  Licensee must abide by and reproduce and include any restrictive legend or proprietary rights notice that appears in or on any Confidential Information of Xxxxxx Xxx or any Third‐Party Licensor (or other third‐party owner) that it is authorized to reproduce.  Licensee also agrees that it will not remove, alter, cover or distort any trademark, trade name, copyright or other proprietary rights notices, legends, symbols or labels appearing on or in any Confidential Information of Xxxxxx Mae or any Third‐Party Licensor (or other third‐party owner). Required Actions in Case of Data Breach  Licensee must address any Data Breach with prompt and effective corrective action, including cooperation with Xxxxxx Xxx in the investigation and remediation of such Data Breach, as well as prompt disclosure and notification where legally required; and  Licensee must promptly notify Xxxxxx Mae of any Data Breach in writing ‐‐ at xxxxxxx_xxxxxxxxxxxx@xxxxxxxxx.xxx ‐‐ and must take all steps reasonably requested by Xxxxxx Xxx to mitigate the consequences of such Data Breach.

  • Processes Any employer, employee, trade union or employer’s association may at any point in time apply for an exemption from any of the provisions of this Collective Agreement. The applicant is required to complete and submit in writing with the relevant office of the Council, a fully and properly completed prescribed application for exemption form, accompanied by all relevant supporting documentation.

  • Description of Appropriate Unit For purposes of this Agreement, the appropriate unit shall mean all Education Assistant/LPN/ARN employees employed by the School District excluding the following: confidential employees, supervisory employees, essential employees, part-time employees whose services do not exceed 14 hours per week or 35% of normal work week, employees who hold positions of a temporary or seasonal character for a period not in excess of 67 working days in any calendar year, and emergency employees.

Time is Money Join Law Insider Premium to draft better contracts faster.