Results 51 to 60 of about 789 (132)

Energy Efficiency of Kernel and User Space Level VPN Solutions in AIoT Networks

open access: yesIEEE Open Journal of the Computer Society
The ability to process data locally using complex algorithms is becoming increasingly important in Internet of Things (IoT) contexts. Numerous factors contribute to this trend, including the requirement for immediate response, the need to protect data ...
ALEKSANDAR JEVREMOVIC   +5 more
doaj   +1 more source

A Unified Symbolic Analysis of WireGuard

open access: yesProceedings 2024 Network and Distributed System Security Symposium
WireGuard [22], [21] is a Virtual Private Network (VPN), presented at NDSS 2017, recently integrated into the Linux Kernel [57] and paid commercial VPNs such as NordVPN, Mullvad and ProtonVPN [56]. It proposes a different approach from other classical VPN such as IPsec [29] or OpenVPN [48]because it does not let users configure cryptographic algorithms.
Lafourcade, Pascal   +2 more
openaire   +1 more source

Replacing OpenVPN with Wireguard, including on Synology devices

open access: yes, 2021
This week, I decided that I should move my VPN system that I run on all my devices to use the new Wireguard protocol, replacing the OpenVPN setup. To do this, I used [NetMaker](https://github.com/gravitl/netmaker) for the configuration and setup and I have to say that it is superb.
openaire   +2 more sources

Post-Quantum WireGuard

open access: yes
Quantum computing poses an immediate threat to VPN infrastructure through the "harvest now, decrypt later" attack model, where adversaries collect encrypted traffic today for future decryption with quantum computers. While existing VPN protocols await formal post-quantum standardization, practical protection is needed now.
Peter Membrey, Timo Beyel
openaire   +1 more source

Performance evaluation of wireguard in kubernetes cluster

open access: yes, 2021
Containerization has gained popularity for deploying applications in a lightweight environment. Kubernetes and Docker have gained a lot of dominance for scalable deployments of applications in containers. Usually, kubernetes clusters are deployed within a single shared network.
Gunda, Pavan, Voleti, Sri Datta
openaire   +1 more source

Network Slicing in Beyond 5G: Implementation, Isolation, and Coexistence [PDF]

open access: yes, 2023
The contemporary landscape of telecommunications is defined by the advent of Fifth Generation (5G) and the tantalizing promise of Beyond 5G (B5G) networks.
Esmaeily, Ali
core  

ChaCha: Development and modification of Salsa20 in modern cryptographic systems

open access: yesÌнформаційні технології та компʼютерна інженерія
The study reviewed the ChaCha20 stream cypher as the successor to the Salsa20 algorithm, emphasising development, technical features, and application in modern cryptosystems.
O. Palii, O. Dudnyk
doaj   +1 more source

STUDY OF COMPATIBILITY OF METHODS AND TECHNOLOGIES OF HIGH-LEVEL PROTOCOLS AND ERROR-CORRECTING CODES

open access: yesВісник Національного технічного університету "ХПÌ": Системний аналіз, управління та інформаційні технології
Since the year 2000, the fields of error-correction codes and Virtual Private Networks (VPNs) have undergone significant advancements driven by technological demands for higher reliability and security in communication systems. In error-correction codes,
Vladyslav Sharov, Olena Nikulina
doaj   +1 more source

Digital Phenotyping via Passive Network Traffic Monitoring: Prospective Observational Study in University Students

open access: yesJMIR Formative Research
BackgroundDigital behaviors such as sleep, social interactions, and productivity reflect how individuals structure their daily lives. Among university students, online activity patterns mirror academic schedules, social rhythms, and lifestyle habits ...
Rameen Mahmood   +12 more
doaj   +1 more source

Detecting the misuse of secrets: foundations, protocols, and verification [PDF]

open access: yes, 2018
Secrets are the basis of most protocol security, enabling authentication and secrecy over untrusted channels even in the presence of active adversaries.
Milner, Kevin
core   +2 more sources

Home - About - Disclaimer - Privacy