Results 11 to 20 of about 14,303 (202)

Automatic multicast IPsec by using a proactive IPsec discovery protocol and a group key management

open access: yesJournal of Telecommunications and Information Technology, 2023
Internet protocol based networking is gaining ground in armed forces, leading to a concept described by the NATO as network centric capabilities (NCC).
Thorsten Aurisch   +5 more
doaj   +1 more source

Secure data transmission in geographically distributed information systems in ophthalmology based on domestic equipment

open access: yesОфтальмохирургия, 2022
Relevance. Currently, to ensure secure data transmission in geographically distributed information systems, including in ophthalmology, in particular secure data transmission of telemedicine consultations, when exchanging data between various healthcare ...
I.A. Ushakov   +2 more
doaj   +1 more source

High-performance FPGA Architecture for Data Streams Processing on Example of IPsec Gateway [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2018
In modern digital world, there is a strong demand for efficient data streams processing methods. One of application areas is cybersecurity — IPsec is a suite of protocols that adds security to communication at the IP level. This paper presents principles
Mateusz Korona   +3 more
doaj   +1 more source

Implementasi Jaringan VPN Menggunakan L2TP Dengan IP Sec Pada PT Datindo Infonet Prima

open access: yesComputer Science, 2022
Perancangan ini berlatar belakang oleh adanya kebutuhan suatu jaringan yang mengkhususkan user tertentu untuk mengakses data lokal dari suatu server.
Farizal Triyansa, Irwan Agus Sobari
doaj   +1 more source

Boston University Alzheimer's Disease Research Center Clinical Core: Infrastructure to facilitate research on post-traumatic Alzheimer's disease and related dementias. [PDF]

open access: yesAlzheimers Dement
Abstract We describe the rationale, methodology, and design of the Boston University Alzheimer's Disease Research Center (BU ADRC) Clinical Core (CC). The CC characterizes a longitudinal cohort of participants with/without brain trauma to characterize the clinical presentation, biomarker profiles, and risk factors of post‐traumatic Alzheimer's disease (
Alosco ML   +29 more
europepmc   +2 more sources

Evaluación del Rendimiento de una red IPv6 utilizando IPSec en Modo Túnel

open access: yesInformática y Sistemas, 2023
El espacio de direcciones IPv4 está a punto de llegar a su límite y podría colapsar, para corregir este evento muchos proponen que las redes existentes deberán realizar la migración definitiva a IPv6, tomando como referencia que este protocolo permitirá ...
Yumber Alejandro Ponce Loor   +1 more
doaj   +1 more source

Q-ESP: a QoS-compliant Security Protocol to enrich IPSec Framework [PDF]

open access: yes, 2009
IPSec is a protocol that allows to make secure connections between branch offices and allows secure VPN accesses. However, the efforts to improve IPSec are still under way; one aspect of this improvement is to take Quality of Service (QoS) requirements ...
Fraboul, Christian   +2 more
core   +3 more sources

The quantum internet: A synergy of quantum information technologies and 6G networks

open access: yesIET Quantum Communication, Volume 4, Issue 4, Page 147-166, December 2023., 2023
This review paper includes a comprehensive overview of the recently established quantum internet and 6G technologies, as well as a comprehensive introduction to the fundamental principles in these domains. Abstract The quantum internet is a cutting‐edge paradigm that uses the unique characteristics of quantum technology to radically alter communication
Georgi Gary Rozenman   +6 more
wiley   +1 more source

A Repeater Encryption Unit for IPv4 and IPv6 [PDF]

open access: yes, 2005
IPsec is a powerful mechanism for protecting network communications. However, it is often viewed as difficult to use due to the elaborate configuration that is needed to ensure correct (and secure) operation. In this paper, we seek to answer the question
Keromytis, Angelos D.   +1 more
core   +4 more sources

Evaluation of A Secure Live Migration of Virtual Machines Using IPsec Implementation [PDF]

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2015
Live migration enables administrators to perform online maintenance on host and virtual machines without interrupted service during fault occurrences. While migrating VMs between physical servers of different data centers over the network is considered ...
Norshazrul Azman bin Sulaiman   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy