Results 21 - 30
of
50,911
Name Last First MI Social Security Number
"... Teaching Application INSTRUCTIONS: Please answer the following questions as completely as possible. Items that do not apply to you should be answered "NA. " The information contained herein is considered confidential. Return this application in addition to your resume to teach in the ..."
Abstract
- Add to MetaCart
Teaching Application INSTRUCTIONS: Please answer the following questions as completely as possible. Items that do not apply to you should be answered "NA. " The information contained herein is considered confidential. Return this application in addition to your resume to teach in the
QUESTIONS PEOPLE DON’T LIKE TO ANSWER: WEALTH AND SOCIAL SECURITY NUMBERS
"... computer assisted personal interview (CAPI) survey administered annually by the National Center for Health Statistics, Centers for Disease Control and Prevention, collects data on family income, but virtually no data on wealth. Yet research has identified a strong, separate association between wealt ..."
Abstract
- Add to MetaCart
wealth and health status. Will people answer questions on wealth? In addition, social security numbers are needed for linkage to administrative databases, but suffer from high item nonresponse. Can we improve reporting? This paper presents early results from a field test designed to address
Analysis of the Social Security Number Validation Component of the Social Security Number, Privacy Attitudes, and Notification Experiment
, 2003
"... (TXE) Program, designed to assess Census 2000 and to inform 2010 Census planning. Findings from the Census 2000 TXE Program reports are integrated into topic reports that provide context and background for broader interpretation of results. Linda Brudvig Planning, Research, and ..."
Abstract
- Add to MetaCart
(TXE) Program, designed to assess Census 2000 and to inform 2010 Census planning. Findings from the Census 2000 TXE Program reports are integrated into topic reports that provide context and background for broader interpretation of results. Linda Brudvig Planning, Research, and
Analysis of the Social Security Number Notification Component of the Social Security Number, Privacy Attitudes, and Notification Experiment
, 2001
"... (TXE) Program, designed to assess Census 2000 and to inform 2010 Census planning. Findings from the Census 2000 TXE Program reports are integrated into topic reports that provide context and background for broader interpretation of results. Jennifer A. Guarino, ..."
Abstract
- Add to MetaCart
(TXE) Program, designed to assess Census 2000 and to inform 2010 Census planning. Findings from the Census 2000 TXE Program reports are integrated into topic reports that provide context and background for broader interpretation of results. Jennifer A. Guarino,
IRB GUIDANCE: Collection of Social Security Numbers (or other selected “Personal Identifying Information”) for Research Purposes
"... There are occasions within the research setting when an investigator either needs to or is required to collect the social security number (SSN) of a subject. Most often, the SSN is collected as required by law, to comply with Internal Revenue Service (IRS) reporting requirements. Less often, the SSN ..."
Abstract
- Add to MetaCart
There are occasions within the research setting when an investigator either needs to or is required to collect the social security number (SSN) of a subject. Most often, the SSN is collected as required by law, to comply with Internal Revenue Service (IRS) reporting requirements. Less often
will be prompted for you last name, social security number, and PIN.
"... The preferred link to Biological Abstracts is through the Databases tab on the Library’s web page at ..."
Abstract
- Add to MetaCart
The preferred link to Biological Abstracts is through the Databases tab on the Library’s web page at
Basic concepts and taxonomy of dependable and secure computing
- IEEE TDSC
, 2004
"... This paper gives the main definitions relating to dependability, a generic concept including as special case such attributes as reliability, availability, safety, integrity, maintainability, etc. Security brings in concerns for confidentiality, in addition to availability and integrity. Basic defin ..."
Abstract
-
Cited by 779 (6 self)
- Add to MetaCart
This paper gives the main definitions relating to dependability, a generic concept including as special case such attributes as reliability, availability, safety, integrity, maintainability, etc. Security brings in concerns for confidentiality, in addition to availability and integrity. Basic
Secure Group Communications Using Key Graphs
- SIGCOMM '98
, 1998
"... Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group communications model, i.e., they require packet delivery from one or more authorized senders to a very large number of au ..."
Abstract
-
Cited by 556 (17 self)
- Add to MetaCart
Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group communications model, i.e., they require packet delivery from one or more authorized senders to a very large number
Universally composable security: A new paradigm for cryptographic protocols
, 2013
"... We present a general framework for representing cryptographic protocols and analyzing their security. The framework allows specifying the security requirements of practically any cryptographic task in a unified and systematic way. Furthermore, in this framework the security of protocols is preserved ..."
Abstract
-
Cited by 833 (37 self)
- Add to MetaCart
, protocols are guaranteed to maintain their security in any context, even in the presence of an unbounded number of arbitrary protocol instances that run concurrently in an adversarially controlled manner. This is a useful guarantee, that allows arguing about the security of cryptographic protocols
Results 21 - 30
of
50,911