Public security

Results: 63438



#Item
331Immigration to the United States / Identity documents / Legal documents / Government / Public records / I-9 / Travel / Permanent residence / Employment authorization document / United States Passport Card / United States passport / Certified copy

Employment Eligibility Verification USCIS Form I-9 Department of Homeland Security

Add to Reading List

Source URL: gov.pulaskionline.org

Language: English - Date: 2015-04-21 15:36:01
332Economy / Finance / Money / Corporate finance / Financial economics / Stock market / FamaFrench three-factor model / Initial public offering / Center for Research in Security Prices

Journal of Financial Economics}249 Is the abnormal return following equity issuances anomalous? Alon Brav , Christopher Geczy, Paul A. Gompers * Fuqua School of Business, Duke University, Durham, NC, 277

Add to Reading List

Source URL: people.stern.nyu.edu

Language: English - Date: 2003-01-20 09:48:40
333Internal Revenue Service / Backup withholding / Taxation / Stock market / International taxation / Finance / Economy / Security / Bureau of the Public Debt / Income distribution / Withholding tax / Form W-9

RESET For official use only: Customer Name Customer No.

Add to Reading List

Source URL: freedom-school.com

Language: English - Date: 2015-05-02 12:24:44
334Agriculture / Food and drink / Natural environment / Biodiesel / Soybean / Aquaculture / Food security / Food safety / Biofuel / Agricultural policy / United States Environmental Protection Agency / National Biodiesel Board

Indiana Soybean Alliance Membership & Policy Committee Public Policy Positions Adopted December 16, 2015

Add to Reading List

Source URL: www.indianasoybean.com

Language: English - Date: 2015-12-16 13:14:19
335Law enforcement / Prevention / Safety / Terrorism / National security / Public safety / Security / Paintball / Counter-terrorism

Hobby Shops What should I consider suspicious? Suspicious Activities What should I do? Be part of the solution.

Add to Reading List

Source URL: homelandsecurity.ohio.gov

Language: English - Date: 2013-01-30 08:13:51
336Cryptography / Secret sharing / Public-key cryptography / Proactive secret sharing / Commitment scheme / Ciphertext indistinguishability / Adversary model / Digital signature / Encryption / Information-theoretic security

The proceedings version of this paper appears in ACM CCSThis is the full version of that paper. Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare∗

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2007-08-20 03:37:31
337Cryptography / Key management / Public key infrastructure / Public-key cryptography / Transport Layer Security / E-commerce / StartCom / Certificate authority / Extended Validation Certificate / Public key certificate / S/MIME / X.509

StartCom Ltd. (Start Commercial Limited) StartSSLâ„¢ Certificates & Public Key Infrastructure

Add to Reading List

Source URL: www.startssl.com

Language: English - Date: 2015-12-18 07:04:44
338Cryptography / Key management / Public key infrastructure / Public-key cryptography / E-commerce / Computer security / Public key certificate / Conveyancing / Professional certification / Accreditation / Certificate authority / Information security

Electronic Conveyancing National Law (Victoria) Operating Requirements Determined by the Registrar of Titles Version 3

Add to Reading List

Source URL: www.dtpli.vic.gov.au

Language: English - Date: 2015-09-29 22:03:52
339Employment / Retirement plans in the United States / Government of Maine / Maine Public Employees Retirement System / Retirement / Employee benefits / Business / Social Security / Railroad Retirement Board

2016 Legislative Update LEGISLATION ENACTED IN THE SECOND REGULAR SESSION OF THE 127TH LEGISLATURE An Act to Amend the Laws Governing Participating Local Districts in the Maine Public Employees Retirement System PL 2015,

Add to Reading List

Source URL: www.mainepers.org

Language: English - Date: 2016-07-15 11:14:09
340Cryptography / Public-key cryptography / Homomorphic encryption / Secure multi-party computation / Cryptographic protocol / Paillier cryptosystem / Privacy / Digital signature / Internet privacy / Zero-knowledge proof / Encryption / Cloud computing security

Privacy-Preserving Computation (Position Paper) Florian Kerschbaum SAP Research Karlsruhe, Germany

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2012-12-10 10:27:09
UPDATE