ty authentication, it's very difficult to provide either
confidentiality or data integrity. For instan... For instance, at the level of
email, it might either mean an RFC-822 message or a single SMTP
comma... r security than USERNAME/PASSWORD often
employ either a ONE TIME PASSWORD [OTP] scheme or a CHALLENGE-
... o carry that information with the certificate,
either as a certificate extension/attribute [PKIX, SPKI]
(effective): A name actually resolved, which is either the
name originally queried or a name re... ME (final): The name actually resolved, which is either the
name actually queried or else the la... sses.
Address records: Records whose type is either A or AAAA. [RFC2181]
informally defines th... e of a server that receives DNS
queries and either responds to those queries from a local cache or
odes of its member
values. If the node is neither an array nor an object, it has no
children.... , integers
in the inclusive base 16 ranges, either 0 to D7FF or E000 to
10FFFF). JSONPath que... SON values,
each with its own node. A node is either the root node or one of its
descendants.
T... , which
may be unexpected and indicate bugs in either. JSONPath
implementations might therefore wan
ed to as "keys" or "secrets"
interchangeably. Either term denotes a value that MUST be kept
confide... es
be useful to link epochs cryptographically, either within a group or
across groups. MLS derives ... parent nodes.
Each node in a ratchet tree is either _blank_ (containing no value)
or it holds an H... fo object that it will use to join
a group, either via a Welcome or via an external Commit
* Wh
rogramming of the explicit network path may be
either performed using a signaling protocol that travers... Prescriptive TE can be further
categorized as either corrective or perfective. Corrective TE
presc... rward data based on the information carried in
either packet or cell headers. Specifically, such LSRs ... g, these
recommendations can be categorized as either functional or non-
functional recommendations:
uirements:
* must be for standards purposes (either for an IETF Standard or
other standard rela... uirements:
* must be for standards purposes (either for an IETF Standard or
other standard rela... entified by an EtherType that is then followed by either
another tag, an EtherType, or an LLC Link-Laye... me past an EtherType it does not understand.
Neither EtherTypes nor LSAPs are assigned by IANA; they a
ble traffic are essentially the same: a censor
either directly identifies undesirable content using the... ainst images
and videos known to be restricted either by governments,
institutions, organizations or... ification of search engine results in response to either
copyright, trademark, data protection, or defa... be routed. Typically, the traffic is split using either a mirror
switch or fiber splitter and analyzed
measurements over the public Internet can target either
collaborating parties or non-collaborating one... Internet, and those
packets can be destined to either collaborating parties or non-
collaborating on... alarm that will request
some investigations by either the party receiving the probe (i.e.,
when the ... FC8200], include it in a PadN option inside
either a Hop-by-Hop or Destination Options header.
T
TTP transactions. This relay
needs to provide either (1) generic access to gateways or (2) a
servic... overy mechanisms described in this section can be either publicly
accessible or specific to a network. ... resolver supports Oblivious
HTTP using DDR, by either querying _dns.resolver.arpa to a locally
confi... eway as described in Section 6
and can be done either directly or via the relay or another proxy to
nks are created by using square brackets. You can either just give a [[pagename]] or use an additional [[p... nks are created by using square brackets. You can either just give
a [[pagename]] or use an additional [... eds to have the same filename as the video and be either a jpg or png file. In the example above a ''video... typed (without any formatting), enclose the area either with ''%%<nowiki>%%'' tags or even simpler, with
is 32*S bits in
length; i.e., the length is either 0 bits or 32 bits.
Reserved (Resv): 9 bits. ... trys decoder. In
practice, Tetrys can be used either as a standalone protocol or
embedded inside an existing protocol, and either above, within, or
below the transport layer. ... ful.
7.1. Problem Statement
An attacker can either target the content, protocol, or network. The
ed.
* a "ca" key with a boolean value set to either true when the
requested certificate is allo... ges or TelephoneNumbers
([RFC8226], Section 9) either associated with an SPC or with the
scope of te... s section in [RFC9447],
an Authority Token can either have a scope that attests all of the
resources... the
Certificate Signing Request (CSR) for either CA certificate or
end-entity certificate.
reverse search is no longer able to be used MUST either
note that the relevant reverse search is no lo... lable to ensure interoperability.
Creators of either new RDAP reverse searches or new mappings for
... isted below
leverage the capabilities that are either built in or provided as
extensions by the Open... y can be required to specify the
purpose as either a claim of their account or a query parameter.
rror correction
(FEC) schemes that are applied either hop-by-hop or end-to-end, the
BATS coding sche... h information.
We assume that a DDP packet is either correctly received or
completely erased during... coder to
each of the recoders and the decoder, either embedded in the DDP
packets or transmitted usi
hen an EID-Prefix is removed from the Map-Server (either when
explicitly withdrawn or when its TTL expi... lic specification"). The designated experts will either
approve or deny the registration request, and ... ests two TTL values for Negative Map-
Replies: either a 15-minute TTL (if the EID-Prefix does not exist