• Documents
  • Authors
  • Tables

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 21 - 30 of 50,911
Next 10 →

Name Last First MI Social Security Number

by Email Address, Summit Topeka, Wichita North, Kansas City
"... Teaching Application INSTRUCTIONS: Please answer the following questions as completely as possible. Items that do not apply to you should be answered "NA. " The information contained herein is considered confidential. Return this application in addition to your resume to teach in the ..."
Abstract - Add to MetaCart
Teaching Application INSTRUCTIONS: Please answer the following questions as completely as possible. Items that do not apply to you should be answered "NA. " The information contained herein is considered confidential. Return this application in addition to your resume to teach in the

QUESTIONS PEOPLE DON’T LIKE TO ANSWER: WEALTH AND SOCIAL SECURITY NUMBERS

by James M. Dahlhamer, Peter S. Meyer, John R. Pleis
"... computer assisted personal interview (CAPI) survey administered annually by the National Center for Health Statistics, Centers for Disease Control and Prevention, collects data on family income, but virtually no data on wealth. Yet research has identified a strong, separate association between wealt ..."
Abstract - Add to MetaCart
wealth and health status. Will people answer questions on wealth? In addition, social security numbers are needed for linkage to administrative databases, but suffer from high item nonresponse. Can we improve reporting? This paper presents early results from a field test designed to address

Analysis of the Social Security Number Validation Component of the Social Security Number, Privacy Attitudes, and Notification Experiment

by unknown authors , 2003
"... (TXE) Program, designed to assess Census 2000 and to inform 2010 Census planning. Findings from the Census 2000 TXE Program reports are integrated into topic reports that provide context and background for broader interpretation of results. Linda Brudvig Planning, Research, and ..."
Abstract - Add to MetaCart
(TXE) Program, designed to assess Census 2000 and to inform 2010 Census planning. Findings from the Census 2000 TXE Program reports are integrated into topic reports that provide context and background for broader interpretation of results. Linda Brudvig Planning, Research, and

Analysis of the Social Security Number Notification Component of the Social Security Number, Privacy Attitudes, and Notification Experiment

by Henry F. Woltman , 2001
"... (TXE) Program, designed to assess Census 2000 and to inform 2010 Census planning. Findings from the Census 2000 TXE Program reports are integrated into topic reports that provide context and background for broader interpretation of results. Jennifer A. Guarino, ..."
Abstract - Add to MetaCart
(TXE) Program, designed to assess Census 2000 and to inform 2010 Census planning. Findings from the Census 2000 TXE Program reports are integrated into topic reports that provide context and background for broader interpretation of results. Jennifer A. Guarino,

IRB GUIDANCE: Collection of Social Security Numbers (or other selected “Personal Identifying Information”) for Research Purposes

by unknown authors
"... There are occasions within the research setting when an investigator either needs to or is required to collect the social security number (SSN) of a subject. Most often, the SSN is collected as required by law, to comply with Internal Revenue Service (IRS) reporting requirements. Less often, the SSN ..."
Abstract - Add to MetaCart
There are occasions within the research setting when an investigator either needs to or is required to collect the social security number (SSN) of a subject. Most often, the SSN is collected as required by law, to comply with Internal Revenue Service (IRS) reporting requirements. Less often

A Greek (Privacy) Tragedy: The Introduction of Social Security Numbers in Greece

by Eleni Gessiou
"... ..."
Abstract - Add to MetaCart
Abstract not found

will be prompted for you last name, social security number, and PIN.

by unknown authors
"... The preferred link to Biological Abstracts is through the Databases tab on the Library’s web page at ..."
Abstract - Add to MetaCart
The preferred link to Biological Abstracts is through the Databases tab on the Library’s web page at

Basic concepts and taxonomy of dependable and secure computing

by Algirdas Avizienis, Jean-claude Laprie, Brian Randell, Carl Landwehr - IEEE TDSC , 2004
"... This paper gives the main definitions relating to dependability, a generic concept including as special case such attributes as reliability, availability, safety, integrity, maintainability, etc. Security brings in concerns for confidentiality, in addition to availability and integrity. Basic defin ..."
Abstract - Cited by 779 (6 self) - Add to MetaCart
This paper gives the main definitions relating to dependability, a generic concept including as special case such attributes as reliability, availability, safety, integrity, maintainability, etc. Security brings in concerns for confidentiality, in addition to availability and integrity. Basic

Secure Group Communications Using Key Graphs

by Chung Kei Wong, Mohamed Gouda , Simon S. Lam - SIGCOMM '98 , 1998
"... Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group communications model, i.e., they require packet delivery from one or more authorized senders to a very large number of au ..."
Abstract - Cited by 556 (17 self) - Add to MetaCart
Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group communications model, i.e., they require packet delivery from one or more authorized senders to a very large number

Universally composable security: A new paradigm for cryptographic protocols

by Ran Canetti , 2013
"... We present a general framework for representing cryptographic protocols and analyzing their security. The framework allows specifying the security requirements of practically any cryptographic task in a unified and systematic way. Furthermore, in this framework the security of protocols is preserved ..."
Abstract - Cited by 833 (37 self) - Add to MetaCart
, protocols are guaranteed to maintain their security in any context, even in the presence of an unbounded number of arbitrary protocol instances that run concurrently in an adversarially controlled manner. This is a useful guarantee, that allows arguing about the security of cryptographic protocols
Next 10 →
Results 21 - 30 of 50,911
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University