Results 31 to 40 of about 789 (132)

Modular Design of KEM-Based Authenticated Key Exchange [PDF]

open access: yes, 2023
acceptedVersio
Boyd, Colin Alexander   +2 more
core   +1 more source

Analisis Perbandingan Penggunaan Metode Tunneling Cloud Virtual Private Network dan Wireguard Virtual Private Network pada Implementasi Infrastruktur Hybrid Cloud

open access: yesJournal of Internet and Software Engineering
Perkembangan teknologi dalam infrastruktur server terus maju signifikan setiap tahun. Organisasi dan perusahaan cenderung beralih ke sistem yang lebih kompleks dan terpusat, mendorong migrasi infrastruktur server dari on-premise ke public cloud.
Rusdi Hermawan, Yuris Mulya Saputra
doaj   +1 more source

Assessing the Latency of Network Layer Security in 5G Networks [PDF]

open access: yes
In contrast to its predecessors, 5G supports a wide range of commercial, industrial, and critical infrastructure scenarios. One key feature of 5G, ultra-reliable low latency communication, is particularly appealing to such scenarios for its real-time ...
Henze, Martin   +2 more
core   +2 more sources

A WireGuard Exploration [PDF]

open access: yes, 2021
Internet users require secure means of communication. Virtual Private Networks (VPNs) often serve this purpose, for consumers and businesses. The research aims of this paper were an analysis and implementation of the new VPN protocol WireGuard.
Garman, Christina, Master, Alexander
core   +1 more source

Fortifying Linux Server and Implementing a Zero Trust Network Access (ZTNA) for Enhanced Security

open access: yesEngineering Proceedings
For organizations, protecting computer networks has always been a very tough and demanding task. In the current technological era digital resources can now be protected without the need for outdated traditional perimeter-based security techniques ...
Syed Hasnat Ansar   +4 more
doaj   +1 more source

Hybrid Testbed for Security Research in Software-Defined Networks [PDF]

open access: yes, 2023
Tele-operations require secure end-to-end Network Slicing leveraging Software-Defined Networking to meet the diverse requirements of multi-modal data streams.
Abedi, Kamyar   +4 more
core   +2 more sources

Full‐mesh VPN performance evaluation for a secure edge‐cloud continuum

open access: yesSoftware: Practice and Experience, Volume 54, Issue 8, Page 1543-1564, August 2024.
Abstract The recent introduction of full‐mesh virtual private network (VPN) solutions which offer near native performance, coupled with modern encryption algorithms and easy scalability as a result of a central control plane have a strong potential to enable the implementation of a seamless edge‐cloud continuum.
Vojdan Kjorveziroski   +3 more
wiley   +1 more source

Comparative Quality of Service Analysis of VPN Protocols on IPv6

open access: yesJurnal Nasional Pendidikan Teknik Informatika (JANAPATI)
The increase in internet users has led to the depletion of IPv4 supplies and the increase in cyber attacks, one of which is data leakage incidents. Several innovations were created such as switching to IPv6 which provides more addresses and implementing
Sabela Trisiana Oktavia   +3 more
doaj   +1 more source

SISTEM PEMANTAUAN LIMBAH CAIR BERBASIS INTERNET OF THINGS DAN TERPROTEKSI WIREGUARD

open access: yesKURVATEK, 2023
Air telah menjadi salah satu kebutuhan manusia yang sangat penting, terutama di sungai yang berkaitan dengan pengolahan limbah industri. Parameter kualitas limbah cair yang berkaitan erat dengan kehidupan manusia adalah kadar pH, Total Dissolve Solids (TDS), dan suhu air.
Bagus Gilang Pratama   +1 more
openaire   +1 more source

МЕТОДИ СТВОРЕННЯ НАДІЙНИХ СПІВСТАВЛЕНЬ UDP ПОРТІВ У СЕРЕДОВИЩІ НА ОСНОВІ NAT

open access: yesКібербезпека: освіта, наука, техніка
Використання протоколів без встановлення з’єднань, таких як  UDP (User Datagram Protocol) стає все більш важливим у сучасних цифрових мережах, які постійно розширюються та стають все більш складними. Підтримка відображень UDP у середовищах на основі NAT,
Максим Котов   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy