Results 31 to 40 of about 2,910 (182)

Security architecture for law enforcement agencies [PDF]

open access: yes, 2014
In order to carry out their duty to serve and protect, law enforcement agencies (LEAs) must deploy new tools and applications to keep up with the pace of evolving technologies.
Manuel Urueña   +3 more
core   +5 more sources

Rancang Bangun Jaringan Pribadi Menggunakan OpenVPN

open access: yesSyntax : Jurnal Informatika, 2018
OpenVPN adalah perangkat lunak gratis dengan sumber terbuka yangmengimplementasikan virtual private network (VPN), yang menyediakan fiturotentikasi dan enkripsi dalam komunikasi antar titik ke titik jaringan. Hal yangdiutamakan dalam komunikasi disebuah jaringan adalah menjaga keamanan danprivasi dalam komunikasi tersebut.
Charlie Brinsley, Yongky Fernando
openaire   +1 more source

The Impact of Operating System on Bandwidth in Open VPN Technology

open access: yesمجلة بغداد للعلوم, 2016
The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet.
Baghdad Science Journal
doaj   +1 more source

Protocol Efficiency and Resource Utilization in VPN Technologies: A Comparative Analysis of OpenVPN and WireGuard

open access: yesJournal of Techniques
Virtual Private Networks are essential for securing Internet communication, but the selection of a VPN protocol can substantially affect overall network performance.
Sura Ghanim Hussein   +1 more
doaj   +1 more source

Performance evaluation of INDECT security architecture

open access: yesIteckne, 2018
This paper evaluates the performance of the key elements of the security architecture developed by the INDECT project. In particular it first evaluates three different concurrent error detection mechanism (parity check, Berger code, and cyclic redundancy
Petr Machník   +3 more
doaj   +1 more source

A LoRaWAN Testbed Design for Supporting Critical Situations: Prototype and Evaluation

open access: yesWireless Communications and Mobile Computing, Volume 2019, Issue 1, 2019., 2019
The Internet of Things is one of the hottest topics in communications today, with current revenues of $151B, around 7 billion connected devices, and an unprecedented growth expected for next years. A massive number of sensors and actuators are expected to emerge, requiring new wireless technologies that can extend their battery life and can cover large
Jorge Navarro-Ortiz   +5 more
wiley   +1 more source

Diseño e integración de algoritmos criptográficos en sistemas empotrados sobre FPGA

open access: yesRevista Ingeniería Electrónica, Automática y Comunicaciones, 2013
En este trabajo se integran implementaciones hardware de algoritmos criptográficos a la biblioteca OpenSSL la cual es utilizadapor aplicaciones sobre el sistema operativo Linux para asegurar redes TCP/IP.
Alejandro Cabrera Aldaya   +1 more
doaj   +1 more source

Virtual closed networks: A secure approach to autonomous mobile ad hoc networks [PDF]

open access: yes, 2015
The increasing autonomy of Mobile Ad Hoc Networks (MANETs) has enabled a great many large-scale unguided missions, such as agricultural planning, conservation and similar surveying tasks. Commercial and military institutions have expressed great interest
Adekunle, Andrew   +2 more
core   +1 more source

Software‐Defined Edge Cloud Framework for Resilient Multitenant Applications

open access: yesWireless Communications and Mobile Computing, Volume 2019, Issue 1, 2019., 2019
Edge application’s distributed nature presents significant challenges for developers in orchestrating and managing the multitenant applications. In this paper, we propose a practical edge cloud software framework for deploying multitenant distributed smart applications.
Kaikai Liu   +6 more
wiley   +1 more source

Implementation of Samba Server Using OpenVPN Based on Single Board Computer (SBC) for Private Cloud Storage

open access: yesJournal of Applied Informatics and Computing
In the current digital era, people's need for data storage media that is practical and can be accessed at any time is increasing. This research aims to design and implement a practical cloud-based data storage system using a Raspberry Pi 4 Model B device
Dwi Bayu Putra Pamungkas   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy