Results 31 to 40 of about 2,910 (182)
Security architecture for law enforcement agencies [PDF]
In order to carry out their duty to serve and protect, law enforcement agencies (LEAs) must deploy new tools and applications to keep up with the pace of evolving technologies.
Manuel Urueña +3 more
core +5 more sources
Rancang Bangun Jaringan Pribadi Menggunakan OpenVPN
OpenVPN adalah perangkat lunak gratis dengan sumber terbuka yangmengimplementasikan virtual private network (VPN), yang menyediakan fiturotentikasi dan enkripsi dalam komunikasi antar titik ke titik jaringan. Hal yangdiutamakan dalam komunikasi disebuah jaringan adalah menjaga keamanan danprivasi dalam komunikasi tersebut.
Charlie Brinsley, Yongky Fernando
openaire +1 more source
The Impact of Operating System on Bandwidth in Open VPN Technology
The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet.
Baghdad Science Journal
doaj +1 more source
Virtual Private Networks are essential for securing Internet communication, but the selection of a VPN protocol can substantially affect overall network performance.
Sura Ghanim Hussein +1 more
doaj +1 more source
Performance evaluation of INDECT security architecture
This paper evaluates the performance of the key elements of the security architecture developed by the INDECT project. In particular it first evaluates three different concurrent error detection mechanism (parity check, Berger code, and cyclic redundancy
Petr Machník +3 more
doaj +1 more source
A LoRaWAN Testbed Design for Supporting Critical Situations: Prototype and Evaluation
The Internet of Things is one of the hottest topics in communications today, with current revenues of $151B, around 7 billion connected devices, and an unprecedented growth expected for next years. A massive number of sensors and actuators are expected to emerge, requiring new wireless technologies that can extend their battery life and can cover large
Jorge Navarro-Ortiz +5 more
wiley +1 more source
Diseño e integración de algoritmos criptográficos en sistemas empotrados sobre FPGA
En este trabajo se integran implementaciones hardware de algoritmos criptográficos a la biblioteca OpenSSL la cual es utilizadapor aplicaciones sobre el sistema operativo Linux para asegurar redes TCP/IP.
Alejandro Cabrera Aldaya +1 more
doaj +1 more source
Virtual closed networks: A secure approach to autonomous mobile ad hoc networks [PDF]
The increasing autonomy of Mobile Ad Hoc Networks (MANETs) has enabled a great many large-scale unguided missions, such as agricultural planning, conservation and similar surveying tasks. Commercial and military institutions have expressed great interest
Adekunle, Andrew +2 more
core +1 more source
Software‐Defined Edge Cloud Framework for Resilient Multitenant Applications
Edge application’s distributed nature presents significant challenges for developers in orchestrating and managing the multitenant applications. In this paper, we propose a practical edge cloud software framework for deploying multitenant distributed smart applications.
Kaikai Liu +6 more
wiley +1 more source
In the current digital era, people's need for data storage media that is practical and can be accessed at any time is increasing. This research aims to design and implement a practical cloud-based data storage system using a Raspberry Pi 4 Model B device
Dwi Bayu Putra Pamungkas +2 more
doaj +1 more source

