Results 81 to 90 of about 14,303 (202)

The Engineering of a Scalable Multi-Site Communications System Utilizing Quantum Key Distribution (QKD)

open access: yes, 2017
Quantum Key Distribution (QKD) is a means of generating keys between a pair of computing hosts that is theoretically secure against cryptanalysis, even by a quantum computer. Although there is much active research into improving the QKD technology itself,
Ling, Xinhua   +3 more
core   +1 more source

Rancang Bangun Keamanan Data Jaringan Komputer dengan Menggunakan Metode Ipsec Vpn (Studi Kasus: Pt.agrabudi Komunika) [PDF]

open access: yes, 2017
Virtual Private Network (VPN), merupakan sebuah jaringan yang dibuat untuk melakukan transaksi data yang telah dienkripsi antara dua atau lebih pengguna jaringan yang resmi : Jaringan VPN seluruhnya menggunakan internet sehingga factor keamanan menjadi ...
Burhanuddin, A. (Amieq)   +1 more
core  

DIP: Disruption-Tolerance for IP [PDF]

open access: yes, 2010
Disruption Tolerant Networks (DTN) have been a popular subject of recent research and development. These networks are characterized by frequent, lengthy outages and a lack of contemporaneous end-to-end paths.
Neufeld, Michael
core  

Research on improving the registration success rate of VoWi-Fi under multiple equivalent path scenarios

open access: yesDianxin kexue, 2019
The 3GPP's VoWi-Fi S2b specification requires the client to use the IPSec tunnel to register with the ePDG through the metropolitan area network. When IPSec faces a path forwarding fault in a multi-equivalent path environment of a metropolitan area ...
Deyi CHENG, Jian QIAO
doaj   +2 more sources

Telesurgery and telesurgical support using a double-surgeon cockpit system allowing manipulation from two locations. [PDF]

open access: yesSurg Endosc, 2023
Oki E   +25 more
europepmc   +1 more source

Componentes básicos para una red segura bajo VPN*

open access: yesInventum Ingeniería, Tecnología e Investigación, 2007
Siempre que se piense en seguridad para una red de área Local (Lan) o global (Wan) se debe tener en cuenta las alternativas mas óptimas tecnológicas que ofrecen el mercado , como ejemplo “Vpn, Ipsec, Claves públicas, Firewall” elementos que acompañados ...
Edgar Arturo Bustos Caldas
doaj   +1 more source

EDOS Initiatives to Decrease Latency of NRT Data for LANCE [PDF]

open access: yes
NASA's EOS Data and Operations System (EDOS) is the primary supplier of NRT (near real-time) data to the NASA NRT user community known as the Land, Atmosphere NRT Capability for EOS (LANCE).
Michael, Karen
core   +1 more source

Virtual Privet Networks using Cisco Routers

open access: yesJournal of Engineering and Sustainable Development, 2009
Virtual private Network (VPN), is a technology that provides a secure communications mechanism for data and control information transmitted between networks. It can be used over existing network such as data across public network.
Haider Tarish Haider   +1 more
doaj  

An Analisys of Business VPN Case Studies [PDF]

open access: yes
A VPN (Virtual Private Network) simulates a secure private network through a shared public insecure infrastructure like the Internet. The VPN protocol provides a secure and reliable access from home/office on any networking technology transporting IP ...
Crescenzio Gallo   +2 more
core  

Home - About - Disclaimer - Privacy