Results 31 to 40 of about 107,397 (277)

Multicast traffic aggregation in MPLS-based VPN networks [PDF]

open access: yes, 2007
This article gives an overview of the current practical approaches under study for a scalable implementation of multicast in layer 2 and 3 VPNs over an IP-MPLS multiservice network. These proposals are based on a well-known technique: the aggregation of
Larrabeiti López, David   +3 more
core   +2 more sources

The VPN Conjecture Is True [PDF]

open access: yesJournal of the ACM, 2008
We consider the following network design problem. We are given an undirected graph G = ( V , E ) with edge costs c ( e ) and a set of terminal nodes W ⊆ V .
Goyal, N., Olver, N.K., Shepherd, F.B.
openaire   +1 more source

A VPN Performances Analysis of Constrained Hardware Open Source Infrastructure Deploy in IoT Environment

open access: yesFuture Internet, 2022
Virtual private network (VPN) represents an HW/SW infrastructure that implements private and confidential communication channels that usually travel through the Internet.
A. F. Gentile   +4 more
semanticscholar   +1 more source

Evaluating Susceptibility of VPN Implementations to DoS Attacks Using Adversarial Testing [PDF]

open access: yesNetwork and Distributed System Security Symposium, 2021
Many systems today rely heavily on virtual private network (VPN) technology to connect networks and protect their services on the Internet. While prior studies compare the performance of different implementations, they do not consider adversarial ...
Fabio Streun, Joel Wanner, A. Perrig
semanticscholar   +1 more source

Impact of Different Topology on the Performance of IPSec VPN Multimedia Using CLSA

open access: yesInternational Journal of Electrical, Energy and Power System Engineering, 2018
Due to multimedia application, network communication are expected to support multimedia traffic such as voice, video streaming and real time chat with a variety of Quality of Service (QoS) requirements.
Linna Oktaviana Sari   +1 more
doaj   +1 more source

Spatial separation effects in a guiding procedure in a modified ion-beam-sputtering process [PDF]

open access: yes, 2015
Cloud computing is a paradigm in which information is permanently stored in servers on the Internet and cached temporarily on clients. Virtual private network (VPN) is the most widely used technology for secure cloud access.
Jupé, Marco   +2 more
core   +2 more sources

VPN and Non-VPN Network Traffic Classification Using Time-Related Features

open access: yesComputers, Materials & Continua, 2022
The continual growth of the use of technological appliances during the COVID-19 pandemic has resulted in a massive volume of data flow on the Internet, as many employees have transitioned to working from home.
Mustafa A. Al-Fayoumi   +2 more
semanticscholar   +1 more source

Mathematical Model of VPN in a Special Purpose Telecommunication Network

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2023
The purpose of the article is to develop a mathematical model of VPN in communication networks of special purpose, which allows to determine the margin of throughput, for scheduled VPN-tunnels.
S. S. Vrublevsky   +2 more
doaj   +1 more source

Secure communication using dynamic VPN provisioning in an Inter-Cloud environment [PDF]

open access: yes, 2012
Most of the current cloud computing platforms offer Infrastructure as a Service (IaaS) model, which aims to provision basic virtualised computing resources as on-demand and dynamic services.
Dimitrakos, T.   +4 more
core   +1 more source

SCNN-Attack: A Side-Channel Attack to Identify YouTube Videos in a VPN and Non-VPN Network Traffic

open access: yesElectronics, 2022
Encryption Protocols e.g., HTTPS is utilized to secure the traffic between servers and clients for YouTube and other video streaming services, and to further secure the communication, VPNs are used. However, these protocols are not sufficient to hide the
M. U. S. Khan   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy