Results 61 to 70 of about 2,910 (182)
Securing autonomous networks through virtual closure [PDF]
The increasing autonomy of Mobile Ad Hoc Networks (MANETs) has enabled a great many large-scale unguided missions, such as agricultural planning, conservation and similar surveying tasks. Commercial and military institutions have expressed great interest
Adekunle, Andrew +2 more
core +1 more source
OPENVPN E SUA APLICAÇÃO EM AMBIENTE EMPRESARIAL
Virtual Private Networks are essential to ensure secure communication on public networks. This study presents explanations of the security protocols used in VPNs and their application in network environments. Initially, the document defines VPNs and their relevance in protecting data transmission on vulnerable networks.
Paulo Marcelo Gervasio Fernandes +1 more
openaire +1 more source
Application for Encrypted Communication [PDF]
Cílem této bakalářské práce je vytvořit aplikaci pro operační systém Android, která umožňuje komunikaci přes šifrované OpenVPN spojení. Aplikace podporuje textovou komunikaci, hlasovou komunikaci, přenos videa a sdílení souborů mezi uživateli.
Mrázek, Jakub
core
Individual Professional Practice in the Company [PDF]
Tato bakalářská práce představuje popis úkolů a jejich řešení, které jsem absolvoval během odborné praxe ve firmě AudioNIKA s.r.o. V práci je popsáno odborné zaměření firmy, zadané úkoly, jejich řešení a technologie, které byly při daných úkolech použity.
Janík, Tadeáš
core
Open source system OpenVPN in a function of Virtual Private Network [PDF]
Using of Virtual Private Networks (VPN) can establish high security level in network communication. VPN technology enables high security networking using distributed or public network infrastructure. VPN uses different security and managing rules inside networks.
Skendžić, Aleksandar +1 more
openaire +3 more sources
Telemedicine system in the South Atlantic. Phase VII (I) [PDF]
The information technology and communications (also known as ICT) are an essential part of the evolution in the economy and society. Access to information has become a vital tool for the development of a community.
Boj Sugrañes, Alba +1 more
core +3 more sources
Scalability evaluation of VPN technologies for secure container networking [PDF]
For years, containers have been a popular choice for lightweight virtualization in the cloud. With the rise of more powerful and flexible edge devices, container deployment strategies have arisen that leverage the computational power of edge devices for ...
De Turck, Filip +3 more
core +1 more source
SDN based Network Function Parallelism in Cloud
Network function virtualization (NFV) based service function chaining (SFC) allows the provisioning of various security and traffic engineering applications in a cloud network.
Chowdhary, Ankur, Huang, Dijiang
core
Secure Integration of Desktop Grids and Compute Clusters Based on Virtualization and Meta-Scheduling [PDF]
Reducing the cost for business or scientific computations, is a commonly expressed goal in today’s companies. Using the available computers of local employees or the outsourcing of such computations are two obvious solutions to save money for additional ...
Schridde, C.
core
ІНТЕГРАЛЬНА МОДЕЛЬ БЕЗПЕКИ ІНТЕРНЕТУ РЕЧЕЙ У ПРОСТОРІ ІНТЕЛЕКТУАЛІЗАЦІЇ ОБ’ЄКТІВ ІНФРАСТРУКТУРИ
У статті досліджено питання моделей архітектури і безпеки Інтернету речей (ІоТ) у просторі інтелектуалізації обєктів інфраструктури суспільства. Проведено аналітичний огляд відомих методологій та моделей в розробленні архітектури ІоТ та створення ...
Валерій Дудикевич +2 more
doaj +1 more source

