Server Virtualization with Windows Server Hyper-V and System Center Certificate (original) (raw)

An Efficient Secure Key Management in Mobile Ad Hoc Networks

Nasurudeen Ahamed N

View PDFchevron_right

Using a privilege management infrastructure for secure web-based e-health applications

George Stasinopoulos, Bernd Blobel

Computer Communications, 2003

View PDFchevron_right

Auto-connectivity and security setup for access network elements

Henning Sanneck

2009 IFIP/IEEE International Symposium on Integrated Network Management, 2009

View PDFchevron_right

Security Enhancement in MANET Authentication by checking the CRL Status of Servers

muhammad usman

2008

View PDFchevron_right

Access Control System for Grid Security Infrastructure

Thinn Thu Naing

2007

View PDFchevron_right

A Transport Layer Security Protocol for Hybrid Networks

Nikos Komninos

View PDFchevron_right

On the Performance and Analysis of DNS Security Extensions

Aniello Del Sorbo, R. Curtmola

Lecture Notes in Computer Science, 2005

View PDFchevron_right

An advanced certificate validation service and architecture based on XKMS

Antonio Ruiz-Martínez

Software: Practice …, 2011

View PDFchevron_right

A Quantitative Comparison Between X. 509 CA Verification and DANE Via Attack

Lixia Zhang

View PDFchevron_right

Indications and results of liver resection and hepatic chemoembolization for metastatic gastrointestinal neuroendocrine tumors

Sambasiva Rao

Surgery, 2001

View PDFchevron_right

A Distributed and Collaborative Approach for Evaluating New Root CA Certificates

Sulieman Ahmad

View PDFchevron_right

SIP Proxies: New Reflectors in the Internet

Simone Fischer-hübner

Communications and Multimedia Security, 2010

View PDFchevron_right

ConChord: Cooperative SDSI Certificate Storage and Name Resolution

moh ammed

2002

View PDFchevron_right

Certificate-based Access Control for Widely Distributed Resources

hoo i

1999

View PDFchevron_right

An authentication architecture for healthcare information systems

Ioannis Mavridis

Health Informatics Journal, 2002

View PDFchevron_right