Results 151 to 160 of about 14,303 (202)
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2011
In the article the main features of the implementation of the protocol ??PSec in different operating systems to create secure virtual networks (V??rtual Pr??vate Network), analyzed their advantages and disadvantages.
+5 more sources
In the article the main features of the implementation of the protocol ??PSec in different operating systems to create secure virtual networks (V??rtual Pr??vate Network), analyzed their advantages and disadvantages.
+5 more sources
IPSec Database Query Acceleration
2008IPSec is a suite of protocols that adds security to communications at the IP level. Protocols within IPSec make extensive use of two databases, namely the Security Policy Database (SPD) and the Security Association Database (SAD). The ability to query the SPD quickly is fundamental as this operation needs to be done for each incoming or outgoing IP ...
A. Ferrante, S. Chandra, V. Piuri
openaire +1 more source
2014
Die Vermittlungsscbicht (Schicht 3 des ISO/OSI-Modells) hat die Aufgabe, Datenpakete in strukturierten Netzwerken uber grosere Entfernungen und verschiedene Schicht- 2-Technologien hinweg zu ubertragen. Im Internet hat sich durch „evolutionare Verdrangung“ die technisch einheitliche Situation ergeben, dass es hier nur noch ein grundlegendes Protokoll ...
openaire +1 more source
Die Vermittlungsscbicht (Schicht 3 des ISO/OSI-Modells) hat die Aufgabe, Datenpakete in strukturierten Netzwerken uber grosere Entfernungen und verschiedene Schicht- 2-Technologien hinweg zu ubertragen. Im Internet hat sich durch „evolutionare Verdrangung“ die technisch einheitliche Situation ergeben, dass es hier nur noch ein grundlegendes Protokoll ...
openaire +1 more source
2002
Das Internet Protocol (IP) hat in den letzten Jahren alle anderen Netzwerkprotokolle weitgehend verdrangt. Die Grunde fur diesen verdienten Erfolg sind vielfaltig und reichen von der sauberen Aufgabenteilung zwischen IP und TCP (Transport Control Protocol) uber die Verbreitung von Open Source Software bis hin zum Erfolg des WWW in der Geschaftswelt.
openaire +1 more source
Das Internet Protocol (IP) hat in den letzten Jahren alle anderen Netzwerkprotokolle weitgehend verdrangt. Die Grunde fur diesen verdienten Erfolg sind vielfaltig und reichen von der sauberen Aufgabenteilung zwischen IP und TCP (Transport Control Protocol) uber die Verbreitung von Open Source Software bis hin zum Erfolg des WWW in der Geschaftswelt.
openaire +1 more source
2023
The topic of the final paper was the implementation of the IPsec (Internet Protocol Security) protocol in a Virtual Private Network (VPN) with the aim of establishing communication between three locations. IPsec was developed as a foundation for ensuring authentication, integrity, and reliability of communication, as well as protecting traffic at the ...
openaire +1 more source
The topic of the final paper was the implementation of the IPsec (Internet Protocol Security) protocol in a Virtual Private Network (VPN) with the aim of establishing communication between three locations. IPsec was developed as a foundation for ensuring authentication, integrity, and reliability of communication, as well as protecting traffic at the ...
openaire +1 more source
On IPSec performance testing of IPv4/IPv6 IPSec gateway
2008 1st International Conference on Information Technology, 2008Ensuring that IP Security (IPSec) gateway meets its performance expectations is one of the most important objectives that IPSec gateway development team must face with. Only suitable validation approach may prove that IPSec gateway throughput is correct, Security Associationspsila adding/removing time is acceptable, IPSec gateway is capable of ...
openaire +1 more source
IPsec-WIT: the NIST IPsec Web-based interoperability test system
Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000), 2002NIST is an active participant in the Internet Engineering Task Force (IETF) efforts to develop Internet Protocol Security (IPsec) technology. Our ultimate goal is to expedite the rapid commercialization and ubiquitous deployment of IPsec protocols.
R. Glenn, S. Frankel, D. Montgomery
openaire +1 more source
Voice over IPsec: analysis and solutions
18th Annual Computer Security Applications Conference, 2002. Proceedings., 2003In this paper we present the results of the experimental analysis of the transmission of voice over secure communication links implementing IPsec. Critical parameters characterizing the real-time transmission of voice over an IPsec-ured Internet connection, as well as techniques that could be adopted to overcome some of the limitations of VoIPsec ...
R. Barbieri, D. Bruschi, E. Rosti
openaire +1 more source

