Results 31 to 40 of about 107,397 (277)
Multicast traffic aggregation in MPLS-based VPN networks [PDF]
This article gives an overview of the current practical approaches under study for a scalable implementation of multicast in layer 2 and 3 VPNs over an IP-MPLS multiservice network. These proposals are based on a well-known technique: the aggregation of
Larrabeiti López, David +3 more
core +2 more sources
The VPN Conjecture Is True [PDF]
We consider the following network design problem. We are given an undirected graph G = ( V , E ) with edge costs c ( e ) and a set of terminal nodes W ⊆ V .
Goyal, N., Olver, N.K., Shepherd, F.B.
openaire +1 more source
Virtual private network (VPN) represents an HW/SW infrastructure that implements private and confidential communication channels that usually travel through the Internet.
A. F. Gentile +4 more
semanticscholar +1 more source
Evaluating Susceptibility of VPN Implementations to DoS Attacks Using Adversarial Testing [PDF]
Many systems today rely heavily on virtual private network (VPN) technology to connect networks and protect their services on the Internet. While prior studies compare the performance of different implementations, they do not consider adversarial ...
Fabio Streun, Joel Wanner, A. Perrig
semanticscholar +1 more source
Impact of Different Topology on the Performance of IPSec VPN Multimedia Using CLSA
Due to multimedia application, network communication are expected to support multimedia traffic such as voice, video streaming and real time chat with a variety of Quality of Service (QoS) requirements.
Linna Oktaviana Sari +1 more
doaj +1 more source
Spatial separation effects in a guiding procedure in a modified ion-beam-sputtering process [PDF]
Cloud computing is a paradigm in which information is permanently stored in servers on the Internet and cached temporarily on clients. Virtual private network (VPN) is the most widely used technology for secure cloud access.
Jupé, Marco +2 more
core +2 more sources
VPN and Non-VPN Network Traffic Classification Using Time-Related Features
The continual growth of the use of technological appliances during the COVID-19 pandemic has resulted in a massive volume of data flow on the Internet, as many employees have transitioned to working from home.
Mustafa A. Al-Fayoumi +2 more
semanticscholar +1 more source
Mathematical Model of VPN in a Special Purpose Telecommunication Network
The purpose of the article is to develop a mathematical model of VPN in communication networks of special purpose, which allows to determine the margin of throughput, for scheduled VPN-tunnels.
S. S. Vrublevsky +2 more
doaj +1 more source
Secure communication using dynamic VPN provisioning in an Inter-Cloud environment [PDF]
Most of the current cloud computing platforms offer Infrastructure as a Service (IaaS) model, which aims to provision basic virtualised computing resources as on-demand and dynamic services.
Dimitrakos, T. +4 more
core +1 more source
SCNN-Attack: A Side-Channel Attack to Identify YouTube Videos in a VPN and Non-VPN Network Traffic
Encryption Protocols e.g., HTTPS is utilized to secure the traffic between servers and clients for YouTube and other video streaming services, and to further secure the communication, VPNs are used. However, these protocols are not sufficient to hide the
M. U. S. Khan +5 more
semanticscholar +1 more source

