Results 21 to 30 of about 24,263 (216)

VPN Enhanced Power Grid Communication Security Scheme Based on QS-KMS [PDF]

open access: yesJisuanji gongcheng, 2018
In the future quantum computing era,there will be security risks in the authentication and key exchange links of constructing Virtual Private Network(VPN).Therefore,a VPN enhanced security architecture based on Quantum Secure Key Management Service(QS ...
TANG Pengyi,LI Guochun,YU Gang,ZHONG Jun,ZHANG Yinghua,XUE Lu,ZHAO Ziyan
doaj   +1 more source

Spatial separation effects in a guiding procedure in a modified ion-beam-sputtering process [PDF]

open access: yes, 2015
Cloud computing is a paradigm in which information is permanently stored in servers on the Internet and cached temporarily on clients. Virtual private network (VPN) is the most widely used technology for secure cloud access.
Jupé, Marco   +2 more
core   +2 more sources

Implementasi VPN Pada VPS Server Menggunakan OpenVPN dan Raspberry Pi

open access: yesTeknika, 2022
Komunikasi jaringan internet butuh keamanan, kemudahan, dan kecepatan transfer data yang baik. Hal ini harus diperhatikan oleh setiap pengguna dalam melakukan kegiatan di dunia maya atau internet, sehingga kerahasiaan informasi bisa terjaga dengan baik ...
Taufik Rahman   +3 more
doaj   +1 more source

Scalability evaluation of VPN technologies for secure container networking [PDF]

open access: yes, 2019
For years, containers have been a popular choice for lightweight virtualization in the cloud. With the rise of more powerful and flexible edge devices, container deployment strategies have arisen that leverage the computational power of edge devices for ...
De Turck, Filip   +3 more
core   +1 more source

ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE MODEL WITH QUALITY OF SERVICE SUPPORT USING WAXMAN MODEL [PDF]

open access: yesICTACT Journal on Communication Technology, 2011
As Internet usage grows exponentially, network security issues become increasingly important. Network security measures are needed to protect data during transmission. Various security controls are used to prevent the access of hackers in networks.
R. Ravi
doaj  

Performance Analysis of Volume Loads of (Services and Transmission) Traffic in VPN Networks: A Comparative Study

open access: yesمجلة النهرين للعلوم الهندسية, 2019
This paper proposes a design for a network connected over public networks using Virtual Private Network (VPN) technique. The network consists of five sites; center server and four customer service sites, each site consists of a number of LANs depending ...
Subhi Aswad Mohammed
doaj   +1 more source

A VPN Performances Analysis of Constrained Hardware Open Source Infrastructure Deploy in IoT Environment

open access: yesFuture Internet, 2022
Virtual private network (VPN) represents an HW/SW infrastructure that implements private and confidential communication channels that usually travel through the Internet.
Antonio Francesco Gentile   +4 more
doaj   +1 more source

Routing algorithm for provisioning symmetric virtual private networks in the hose model [PDF]

open access: yes, 2005
A virtual private network (VPN) is a private data network where remote sites are connected over a shared provider network. In order to provide secure communications between customer sites, predetermined paths are used to forward data packets.
Chim, TW, Lui, KS, Wong, CP, Yeung, KL
core   +1 more source

PROVISIONING RESTORABLE VIRTUAL PRIVATE NETWORKS USING BARABASI AND WAXMAN TOPOLOGY GENERATION MODEL [PDF]

open access: yesICTACT Journal on Communication Technology, 2010
As internet usage grows exponentially, network security issues become increasingly important. Network security measures are needed to protect data during transmission. Various security controls are used to prevent the access of hackers in networks.
R. Ravi
doaj  

VPN (Virtual Private Network) SW's examination example analysis [PDF]

open access: yesJournal of the Korea Academia-Industrial cooperation Society, 2010
VPN can give safety in connection in Timbuc-too, by corporation`s basis communication means today that transfer user support in Timbuc-too is required compulsorily, VPN is activated. This research wishes to investigate base technology of VPN software field and investigate VPN software market trend and standard and develop estimation model of VPN ...
Kyung-Muk Kim, Hae-Sool Yang
openaire   +1 more source

Home - About - Disclaimer - Privacy