Results 61 to 70 of about 36,043 (85)
Some of the next articles are maybe not open access.
РАЗРАБОТКА И ИССЛЕДОВАНИЕ МЭМС-ДАТЧИКА КУРСА МОБИЛЬНОГО РОБОТА-ПОГРУЗЧИКА
Nanoindustry RussiaРазработан датчик курса на основе одноосевого МЭМС-датчика угловой скорости, предназначенный для определения ориентации мобильного робота-погрузчика.
С.А. Анчутин +7 more
semanticscholar +1 more source
SINUSOIDA
Jaringan Virtual Private Network (VPN) dalam Multi Protocol Label Switching (MPLS) adalah suatu bentuk komunikasi data yang menggunakan jaringan publik untuk menghubungkan dua atau lebih cabang komputer, pelanggan, secara tertutup yang dipisahkan oleh ...
Irmayani Irmayani +2 more
semanticscholar +1 more source
Jaringan Virtual Private Network (VPN) dalam Multi Protocol Label Switching (MPLS) adalah suatu bentuk komunikasi data yang menggunakan jaringan publik untuk menghubungkan dua atau lebih cabang komputer, pelanggan, secara tertutup yang dipisahkan oleh ...
Irmayani Irmayani +2 more
semanticscholar +1 more source
Post-Quantum Secure VPN: A Quantum-Resistant Protocol for Confidential Communication
2026 IEEE International Conference on Emerging Computing and Intelligent Technologies (ICoECIT)The fast development of quantum computing presents a great threat to the security of classical cryptographic algorithms that support secure communication systems like Virtual Private Networks (VPNs).
P. Khan, G. G
semanticscholar +1 more source
Design and Implementation of a Secure WAN Using Site-to-Site VPN: A Practical Comparison with MPLS
AlQalam journal of medical and applied sciencesThis study presents a technical implementation and comparative analysis of a multi-site Wide Area Network (WAN) architecture connecting a central Headquarters (HQ) in Tripoli to three remote Branch Offices.
Samia Bilhaj, Nuredin Ahmed
semanticscholar +1 more source
Information research. An international electronic journal
Introduction. VPNs primarily establish encrypted tunnels for network traffic and mask users’ IP addresses; they do not inherently block malware, phishing, or denial-of-service attacks.
Yu-wen Huang +6 more
semanticscholar +1 more source
Introduction. VPNs primarily establish encrypted tunnels for network traffic and mask users’ IP addresses; they do not inherently block malware, phishing, or denial-of-service attacks.
Yu-wen Huang +6 more
semanticscholar +1 more source
Study and implementation of a high-availability site-to-site VPN
International Journal of Scientific Research and Innovative StudiesSince the early days of the Internet until today, technology has evolved enormously. Since the advent of the Internet, information exchange has become commonplace; information is exchanged between one or more people; between a user and a server; between ...
Etumangele Tshitaka
semanticscholar +1 more source
SCNN-Attack: A Side-Channel Attack to Identify YouTube Videos in a VPN and Non-VPN Network Traffic
Electronics (Switzerland), 2022Muhammad U S Khan +2 more
exaly
Hybrid End-to-End VPN Security Approach for Smart IoT Objects
Journal of Network and Computer Applications, 2020Mazen Juma +2 more
exaly
Penerapan Metode Open Vpn-access Server sebagai Rancangan Jaringan Wide Area Network
, 2014Burhanuddin, Mohammad Badrul
semanticscholar +1 more source

