Results 41 to 50 of about 2,951 (197)

Inferring OpenVPN State Machines Using Protocol State Fuzzing [PDF]

open access: yes2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2018
The reliability of a security protocol is of the utmost importance but can easily be compromised by a vulnerability in the implementation. A crucial aspect of an implementation is the protocol's state machine. The state machine of an implementation can be inferred by black box testing using regular inference.
Daniel, L.-A.   +2 more
openaire   +2 more sources

Scalability evaluation of VPN technologies for secure container networking [PDF]

open access: yes, 2019
For years, containers have been a popular choice for lightweight virtualization in the cloud. With the rise of more powerful and flexible edge devices, container deployment strategies have arisen that leverage the computational power of edge devices for ...
De Turck, Filip   +3 more
core   +1 more source

PERBANDINGAN KINERJA DARI PROTOKOL VPN SSTP, OPENVPN DAN IPSEC BERBASIS MIKROTIK [PDF]

open access: yes, 2016
Informasi merupakan salah satu faktor pendukung keberhasilan bisnis dari suatu organisasi atau perusahaan. Namun, ada beberapa jenis informasi yang bersifat rahasia dan hanya boleh diakses oleh orang-orang yang berhak atas informasi ...
Doddy Ferdiansyah, DS   +2 more
core   +2 more sources

Securing autonomous networks through virtual closure [PDF]

open access: yes, 2016
The increasing autonomy of Mobile Ad Hoc Networks (MANETs) has enabled a great many large-scale unguided missions, such as agricultural planning, conservation and similar surveying tasks. Commercial and military institutions have expressed great interest
Adekunle, Andrew   +2 more
core   +1 more source

The Impact of Operating System on Bandwidth in Open VPN Technology

open access: yesمجلة بغداد للعلوم, 2016
The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet.
Baghdad Science Journal
doaj   +1 more source

Security architecture for law enforcement agencies [PDF]

open access: yes, 2016
In order to carry out their duty to serve and protect, law enforcement agencies (LEAs) must deploy new tools and applications to keep up with the pace of evolving technologies.
Machník, Petr   +3 more
core   +2 more sources

Performance evaluation of INDECT security architecture

open access: yesIteckne, 2018
This paper evaluates the performance of the key elements of the security architecture developed by the INDECT project. In particular it first evaluates three different concurrent error detection mechanism (parity check, Berger code, and cyclic redundancy
Petr Machník   +3 more
doaj   +1 more source

A LoRaWAN Testbed Design for Supporting Critical Situations: Prototype and Evaluation

open access: yesWireless Communications and Mobile Computing, Volume 2019, Issue 1, 2019., 2019
The Internet of Things is one of the hottest topics in communications today, with current revenues of $151B, around 7 billion connected devices, and an unprecedented growth expected for next years. A massive number of sensors and actuators are expected to emerge, requiring new wireless technologies that can extend their battery life and can cover large
Jorge Navarro-Ortiz   +5 more
wiley   +1 more source

Diseño e integración de algoritmos criptográficos en sistemas empotrados sobre FPGA

open access: yesRevista Ingeniería Electrónica, Automática y Comunicaciones, 2013
En este trabajo se integran implementaciones hardware de algoritmos criptográficos a la biblioteca OpenSSL la cual es utilizadapor aplicaciones sobre el sistema operativo Linux para asegurar redes TCP/IP.
Alejandro Cabrera Aldaya   +1 more
doaj   +1 more source

OSHI - Open Source Hybrid IP/SDN networking (and its emulation on Mininet and on distributed SDN testbeds)

open access: yes, 2014
The introduction of SDN in IP backbones requires the coexistence of regular IP forwarding and SDN based forwarding. The former is typically applied to best effort Internet traffic, the latter can be used for different types of advanced services (VPNs ...
Gerola, Matteo   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy