Results 51 to 60 of about 789 (132)
Energy Efficiency of Kernel and User Space Level VPN Solutions in AIoT Networks
The ability to process data locally using complex algorithms is becoming increasingly important in Internet of Things (IoT) contexts. Numerous factors contribute to this trend, including the requirement for immediate response, the need to protect data ...
ALEKSANDAR JEVREMOVIC +5 more
doaj +1 more source
A Unified Symbolic Analysis of WireGuard
WireGuard [22], [21] is a Virtual Private Network (VPN), presented at NDSS 2017, recently integrated into the Linux Kernel [57] and paid commercial VPNs such as NordVPN, Mullvad and ProtonVPN [56]. It proposes a different approach from other classical VPN such as IPsec [29] or OpenVPN [48]because it does not let users configure cryptographic algorithms.
Lafourcade, Pascal +2 more
openaire +1 more source
Replacing OpenVPN with Wireguard, including on Synology devices
This week, I decided that I should move my VPN system that I run on all my devices to use the new Wireguard protocol, replacing the OpenVPN setup. To do this, I used [NetMaker](https://github.com/gravitl/netmaker) for the configuration and setup and I have to say that it is superb.
openaire +2 more sources
Quantum computing poses an immediate threat to VPN infrastructure through the "harvest now, decrypt later" attack model, where adversaries collect encrypted traffic today for future decryption with quantum computers. While existing VPN protocols await formal post-quantum standardization, practical protection is needed now.
Peter Membrey, Timo Beyel
openaire +1 more source
Performance evaluation of wireguard in kubernetes cluster
Containerization has gained popularity for deploying applications in a lightweight environment. Kubernetes and Docker have gained a lot of dominance for scalable deployments of applications in containers. Usually, kubernetes clusters are deployed within a single shared network.
Gunda, Pavan, Voleti, Sri Datta
openaire +1 more source
Network Slicing in Beyond 5G: Implementation, Isolation, and Coexistence [PDF]
The contemporary landscape of telecommunications is defined by the advent of Fifth Generation (5G) and the tantalizing promise of Beyond 5G (B5G) networks.
Esmaeily, Ali
core
ChaCha: Development and modification of Salsa20 in modern cryptographic systems
The study reviewed the ChaCha20 stream cypher as the successor to the Salsa20 algorithm, emphasising development, technical features, and application in modern cryptosystems.
O. Palii, O. Dudnyk
doaj +1 more source
Since the year 2000, the fields of error-correction codes and Virtual Private Networks (VPNs) have undergone significant advancements driven by technological demands for higher reliability and security in communication systems. In error-correction codes,
Vladyslav Sharov, Olena Nikulina
doaj +1 more source
BackgroundDigital behaviors such as sleep, social interactions, and productivity reflect how individuals structure their daily lives. Among university students, online activity patterns mirror academic schedules, social rhythms, and lifestyle habits ...
Rameen Mahmood +12 more
doaj +1 more source
Detecting the misuse of secrets: foundations, protocols, and verification [PDF]
Secrets are the basis of most protocol security, enabling authentication and secrecy over untrusted channels even in the presence of active adversaries.
Milner, Kevin
core +2 more sources

