Security of Rep Sample Clauses

Security of Rep. Even if the adversary modifies P , the string produced by Rep has high entropy: for all (adversarial) functions A and suitable (W, W', E), if (R, P ) ← Gen(W ), P' ← A(P, E), and R' ← Rep(W',P'), then H˜ ∞(R' | E, P ) ≥ hR' . We can build weakly robust fuzzy conductors out of any secure sketch (SS, Rec). We use the secure sketch constructions of [DORS08] to build weakly robust fuzzy conductors for Hamming, set difference, and edit distance metrics. Namely, in Appendix B, we easily obtain • for Hamming distance over an alphabet of size F , given an [n, κ, 2t + 1] linear error-correcting code for the alphabet, we get hR = hW − (n − κ) log F , hR' = hW − 2(n − κ) log F , and η = t. • for set difference, with sets whose elements come from a universe of size U , we get hR = hW − η log(U + 1) and hR' = hW − 2η log(U + 1) for any η. • for edit distance over an alphabet of size we get hR = hW − [ n| log(n − c + 1) − α, and hR' = hW − [ n| log(n − c + 1) − 2α, where α = (2c − 1)η[log(F c + 1)|, for any constant c and

Related to Security of Rep

  • Security of Data a. Each of the parties shall: i. ensure as far as reasonably practicable, that Data is properly stored, is not accessible to unauthorised persons, is not altered, lost or destroyed and is capable of being retrieved only by properly authorised persons; ii. subject to the provisions of Sub-Clause 8.a. ensure that, in addition to any security, proprietary and other information disclosure provision contained in the Contract, Messages and Associated Data are maintained in confidence, are not disclosed or transmitted to any unauthorised person and are not used for any purpose other than that communicated by the sending party or permitted by the Contract; and iii. protect further transmission to the same degree as the originally transmitted Message and Associated Data when further transmissions of Messages and Associated Data are permitted by the Contract or expressly authorised by the sending party. b. The sending party shall ensure that Messages are marked in accordance with the requirements of the Contract. If a further transmission is made pursuant to Sub-Clause 3. a. iii. the sender shall ensure that such markings are repeated in the further transmission. c. The parties may apply special protection to Messages by encryption or by other agreed means, and may apply designations to the Messages for protective Interchange, handling and storage procedures. Unless the parties otherwise agree, the party receiving a Message so protected or designated shall use at least the same level of protection and protective procedures for any further transmission of the Message and its Associated Data for all responses to the Message and for all other communications by Interchange or otherwise to any other person relating to the Message. d. If either party becomes aware of a security breach or breach of confidence in relation to any Message or in relation to its procedures or systems (including, without limitation, unauthorised access to their systems for generation, authentication, authorisation, processing, transmission, storage, protection and file management of Messages) then it shall immediately inform the other party of such breach. On being informed or becoming aware of a breach the party concerned shall: i. immediately investigate the cause, effect and extent of such breach; ii. report the results of the investigation to the other party; and iii. use all reasonable endeavours to rectify the cause of such breach. e. Each party shall ensure that the contents of Messages that are sent or received are not inconsistent with the law, the application of which could restrict the content of a Message or limit its use, and shall take all necessary measures to inform without delay the other party if such an inconsistency arises.

  • Security of Access Code You may use one (1) or more access codes with your electronic fund transfers. The access codes issued to you are for your security purposes. Any access codes issued to you are confidential and should not be disclosed to third parties or recorded on or with the card. You are responsible for safekeeping your access codes. You agree not to disclose or otherwise make your access codes available to anyone not authorized to sign on your accounts. If you authorize anyone to use your access codes, that authority shall continue until you specifically revoke such authority by notifying the Credit Union. You understand that any joint owner you authorize to use an access code may withdraw or transfer funds from any of your accounts. If you fail to maintain the security of these access codes and the Credit Union suffers a loss, we may terminate your EFT services immediately.

  • Security Bond The security bond provides protection to Owner if Contractor presents an acceptable guaranteed maximum price (“GMP”) to Owner but is unable to deliver the required payment and performance bonds within the time period stated below.

  • Maturity of Receivables Each Receivable shall have an original maturity of not less than 24 months nor greater than 72 months and, as of the Cutoff Date, a remaining maturity of not less than 6 months nor greater than 69 months.

  • Security of Vendor Facilities All Vendor and Vendor Staff facilities in which Citizens Confidential Information is located or housed shall be maintained in a reasonably secure manner. Within such facilities, all printed materials containing Citizens Confidential Information should be kept locked in a secure office, file cabinet, or desk (except when materials are being used).