Results 101 to 110 of about 1,966 (130)

Огляд технологій VPN [PDF]

open access: yes, 2009
Костик, С.
core  
Some of the next articles are maybe not open access.

Related searches:

Password Acquisition and Traffic Decryption Based on L2TP/IPSec

2020 IEEE 20th International Conference on Communication Technology (ICCT), 2020
Private Network (VPN) is a widely used technology that transmits information through an encrypted tunnel on the internet and military networks. Combining the advantages of security mechanisms based on the Layer-Two Tunneling Protocol (L2TP) and the Internet Protocol Security (IPSec), L2TP/IPSec is generally regarded as a strong VPN encryption protocol.
Qingbing Ji
exaly   +2 more sources

Communication Between Remote LANs Based on L2TP

2018 IEEE 9th International Conference on Software Engineering and Service Science (ICSESS), 2018
L2TP (Layer 2 Tunneling Protocol)is a type of VPDN(Virtual Private Dial-up Network)tunneling protocol. It extends the application of PPP (Point-to-Point Protocol). L2TP establishes a tunnel from the enterprise branch user to the enterprise headquarters through the dial-up network and PPP based negotiation, so that remote users can access the enterprise
Zhengyi Liu, Baihui Tang
exaly   +2 more sources

The Application of Linux Pseudo-terminal Device in the L2TP

2009 Third International Symposium on Intelligent Information Technology Application, 2009
Discussed the basic principles of terminal equipment of Linux pseudo, as well as the naming process and a typical structure of pseudo-terminal. Analyzed how access to and use of pseudo-terminals pseudo-terminal master and slave data communications equipment dynamically. Combination of Layer Two Tunneling Protocol (L2TP) to achieve the Linux process, it
Yan Niu, Jun Li, Dong Li
exaly   +2 more sources

Research and implementation of Layer Two Tunneling Protocol (L2TP) on carrier network

2011 4th IEEE International Conference on Broadband Network and Multimedia Technology, 2011
As IPv4 addresses are being exhausted, researches on how to implement IPv6 [1] on carrier network are becoming valuable. IETF Softwire Group has proposed many useful methods, such as the Layer Two Tunneling Protocol (L2TP), towards this end. This paper firstly explains L2TP [2] tunnel technology in detail and then proposes the deployments of gateway ...
Mingming Hu   +4 more
exaly   +2 more sources

Application of VPN Based on L2TP and User’s Access Rights in Campus Network

Lecture Notes in Computer Science, 2018
VPN is widely used in colleges and universities at present, having brought great convenience to teachers and students in their study and life. Due to the fact that the current VPN in colleges and universities has the same access rights to all users, as long as VPN users login successfully via VPN account, they can access the campus network. As a result,
Shuying Liu   +3 more
exaly   +2 more sources

Application and Study of Virtual Private Network Base on L2TP-IPSec

Advanced Materials Research, 2014
Using IPSec protocol and VPN technology can be in the open, insecure public network, build a safe and stable communication channel, ensure the safety of data transmission. The communicating peers should implement mutual ID authentication prior to the building up of IPSec channel. Traditional way of IPSec ID authentication is based on “Pre-shared keys”,
exaly   +2 more sources

Home - About - Disclaimer - Privacy