Results 71 to 80 of about 789 (132)

A pull-based Wireguard control plane

open access: yes, 2020
This thesis is based on IP security, Internet Protocol (IP) was developed without security or mobility. Later with the time, IPsec was implemented, a secure IP protocol which is complicated, weighty and doesn?t include mobility either. Wireguard is a VPN protocol from the new security family protocols which provides a security layer for IP in a very ...
openaire   +1 more source

Performance Evaluation of WireGuard and IPSec Protocols in Various Network Configurations

open access: yesOsmaniye Korkut Ata Üniversitesi Fen Bilimleri Enstitüsü Dergisi
This study evaluates the performance of WireGuard and IPSec VPN protocols under various network configurations to determine their efficiency, reliability, and resource utilization in different scenarios. The configurations examined include Round Robin, IEEE 802.3ad bonding, single interface/single tunnel, dual interfaces/dual tunnels, and single ...
Demirdelen, Tuğçe, Kırmızı, Sefa
openaire   +2 more sources

Trusted virtual switching in 5G MEC for critical systems : implementation and performance evaluation [PDF]

open access: yes, 2019
LAUREA MAGISTRALENegli ultimi anni una nuova rivoluzione industriale ha caratterizzato l'innovazione tecnologica e i relativi investimenti. Questo trend è stato chiamato Industria 4.0 e include, tra gli altri, l'ottimizzazione della produzione, il ...
De GAETANO, ANDREA
core  

QUICstep: Circumventing QUIC-based Censorship

open access: yes, 2023
Governments around the world limit free and open communication on the Internet through censorship. To reliably identify and block access to certain web domains, censors inspect the plaintext TLS SNI field sent in TLS handshakes.
Jia, Watson   +3 more
core  

Application Layer Packet Processing Using PISA Switches. [PDF]

open access: yesSensors (Basel), 2021
Butun I, Tuncel YK, Oztoprak K.
europepmc   +1 more source

Implementacija programsko določljivega roba omrežja s tuneli WireGuard

open access: yes, 2021
In the field of computer security, we face new challenges and risks year after year. Modern networks include Legacy devices and Internet of Things devices that are often vulnerable to exploitation. Due to the ever-increasing complexity of internal networks, we need to explore new approaches to ensure network security.
openaire   +1 more source

Home - About - Disclaimer - Privacy