Results 21 to 30 of about 789 (132)

Hands‐on Interdomain network slicing framework and evaluation

open access: yesInternet Technology Letters, Volume 5, Issue 6, November/December 2022., 2022
5G enables tailoring network services to the needs of different vertical use cases. These Verticals may require deployments across distinct communication service providers' administrative domains. Ensuring secure interaction between domains is fundamental for deploying end‐to‐end services in such environments.
João P. Fonseca   +5 more
wiley   +1 more source

Оцінка ефективності функціонування VPN при використанні терміналів супутникового зв’язку Starlink

open access: yesСистеми обробки інформації, 2023
В роботі проведено дослідження ефективності функціонування VPN при підключенні до мережі Інтернет з використанням терміналу супутникового зв’язку Starlink.
Д. С. Комін   +3 more
doaj   +1 more source

Small‐Scale 5G Testbeds for Network Slicing Deployment: A Systematic Review

open access: yesWireless Communications and Mobile Computing, Volume 2021, Issue 1, 2021., 2021
Developing specialized cloud‐based and open‐source testbeds is a practical approach to investigate network slicing functionalities in the fifth‐generation (5G) mobile networks. This paper provides a comprehensive review of most of the existing cost‐efficient and small‐scale testbeds that partially or fully deploy network slicing.
Ali Esmaeily   +2 more
wiley   +1 more source

A WireGuard Exploration

open access: yes, 2023
Internet users require secure means of communication. Virtual Private Networks (VPNs) often serve this purpose, for consumers and businesses. The research aims of this paper were an analysis and implementation of the new VPN protocol WireGuard. The authors explain the cryptographic primitives used, build server and client code implementations of ...
Master, Alexander, Garman, Christina
openaire   +3 more sources

Achieving Linear CPU Scaling in WireGuard with an Efficient Multi-tunnel Architecture [PDF]

open access: yes
Despite widespread adoption, the WireGuard tunneling mechanism available in the Linux kernel is unable to provide high-speed connectivity in a site-to-site setup when routing through a standard single-tunnel configuration. In fact, its capability to scale with the number of available CPU cores is limited, even in the presence of a software architecture
Barone, Mirco   +3 more
openaire   +3 more sources

Scalability evaluation of VPN technologies for secure container networking [PDF]

open access: yes, 2019
For years, containers have been a popular choice for lightweight virtualization in the cloud. With the rise of more powerful and flexible edge devices, container deployment strategies have arisen that leverage the computational power of edge devices for ...
De Turck, Filip   +3 more
core   +1 more source

Autenticação em VPNs e redes 802.1X com provedores de identidade [PDF]

open access: yes, 2023
Services provided by companies or public sector departments often require people to register themselves, i.e. to create an account. Such registration usually involves the provisioning of users’ authentication credentials, usually a username and ...
Mortágua, Duarte Neves Tavares
core  

Performance Comparison of VPN Solutions [PDF]

open access: yes, 2020
Virtual Private Networks (VPN) is the state-of-the-art method to build secure connections between remote hosts over public networks. In times of high-speed connections to the internet, a need for personal information security and business cases, like ...
Haeberle, Marco   +2 more
core   +1 more source

Protocol Efficiency and Resource Utilization in VPN Technologies: A Comparative Analysis of OpenVPN and WireGuard

open access: yesJournal of Techniques
Virtual Private Networks are essential for securing Internet communication, but the selection of a VPN protocol can substantially affect overall network performance.
Sura Ghanim Hussein   +1 more
doaj   +1 more source

A survey of the interaction between security protocols and transport services [PDF]

open access: yes, 2020
This document provides a survey of commonly used or notable network security protocols, with a focus on how they interact and integrate with applications and transport protocols.
Enghardt, T.   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy