Results 21 to 30 of about 24,263 (216)
VPN Enhanced Power Grid Communication Security Scheme Based on QS-KMS [PDF]
In the future quantum computing era,there will be security risks in the authentication and key exchange links of constructing Virtual Private Network(VPN).Therefore,a VPN enhanced security architecture based on Quantum Secure Key Management Service(QS ...
TANG Pengyi,LI Guochun,YU Gang,ZHONG Jun,ZHANG Yinghua,XUE Lu,ZHAO Ziyan
doaj +1 more source
Spatial separation effects in a guiding procedure in a modified ion-beam-sputtering process [PDF]
Cloud computing is a paradigm in which information is permanently stored in servers on the Internet and cached temporarily on clients. Virtual private network (VPN) is the most widely used technology for secure cloud access.
Jupé, Marco +2 more
core +2 more sources
Implementasi VPN Pada VPS Server Menggunakan OpenVPN dan Raspberry Pi
Komunikasi jaringan internet butuh keamanan, kemudahan, dan kecepatan transfer data yang baik. Hal ini harus diperhatikan oleh setiap pengguna dalam melakukan kegiatan di dunia maya atau internet, sehingga kerahasiaan informasi bisa terjaga dengan baik ...
Taufik Rahman +3 more
doaj +1 more source
Scalability evaluation of VPN technologies for secure container networking [PDF]
For years, containers have been a popular choice for lightweight virtualization in the cloud. With the rise of more powerful and flexible edge devices, container deployment strategies have arisen that leverage the computational power of edge devices for ...
De Turck, Filip +3 more
core +1 more source
ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE MODEL WITH QUALITY OF SERVICE SUPPORT USING WAXMAN MODEL [PDF]
As Internet usage grows exponentially, network security issues become increasingly important. Network security measures are needed to protect data during transmission. Various security controls are used to prevent the access of hackers in networks.
R. Ravi
doaj
This paper proposes a design for a network connected over public networks using Virtual Private Network (VPN) technique. The network consists of five sites; center server and four customer service sites, each site consists of a number of LANs depending ...
Subhi Aswad Mohammed
doaj +1 more source
Virtual private network (VPN) represents an HW/SW infrastructure that implements private and confidential communication channels that usually travel through the Internet.
Antonio Francesco Gentile +4 more
doaj +1 more source
Routing algorithm for provisioning symmetric virtual private networks in the hose model [PDF]
A virtual private network (VPN) is a private data network where remote sites are connected over a shared provider network. In order to provide secure communications between customer sites, predetermined paths are used to forward data packets.
Chim, TW, Lui, KS, Wong, CP, Yeung, KL
core +1 more source
PROVISIONING RESTORABLE VIRTUAL PRIVATE NETWORKS USING BARABASI AND WAXMAN TOPOLOGY GENERATION MODEL [PDF]
As internet usage grows exponentially, network security issues become increasingly important. Network security measures are needed to protect data during transmission. Various security controls are used to prevent the access of hackers in networks.
R. Ravi
doaj
VPN (Virtual Private Network) SW's examination example analysis [PDF]
VPN can give safety in connection in Timbuc-too, by corporation`s basis communication means today that transfer user support in Timbuc-too is required compulsorily, VPN is activated. This research wishes to investigate base technology of VPN software field and investigate VPN software market trend and standard and develop estimation model of VPN ...
Kyung-Muk Kim, Hae-Sool Yang
openaire +1 more source

