نتایج جستجو برای: virtual private network

تعداد نتایج: 890394  

Journal: :RFC 2010
Eric C. Rosen Yiqun Cai IJsbrand Wijnands

This document describes the MVPN (Multicast in BGP/MPLS IP VPNs) solution designed and deployed by Cisco Systems. The procedures specified in this document are largely a subset of the generalized MVPN framework recently standardized by the IETF. However, as the deployment of the procedures specified herein predates the publication of IETF standards (in some cases by over five years), an impleme...

2005
Antonio Liotta Daniel H. Tyrode-Goilo Adetola Oredope

Virtual Private Networks have evolved considerably over the last few years, reaching their full maturity in fixed networks such as ATM, frame relay and the Internet. Wireless and cellular networks pose, however, more stringent requirements that have not yet been fully addressed. In order to assess the suitability of state-of-the-art technologies for the realization of mobile VPNs over the Inter...

2002
Cédric de Launois Aurélien Bonnet Marc Lobelle

Many remote computers need to be securely connected to their organization main network through a public IP network (e.g. Internet). Our purpose is to integrate as seamlessly as possible remote networks in the organization network, i.e. to put these in exactly the same situation as if they were located inside the organization. After summarizing the state of the art, the paper presents a solution...

2011
R. Ravi

As Internet usage grows exponentially, network security issues become increasingly important. Network security measures are needed to protect data during transmission. Various security controls are used to prevent the access of hackers in networks. They are firewall, virtual private networks and encryption algorithms. Out of these, the virtual private network plays a vital role in preventing ha...

2016
Xia Zhao Ling Xue Fuqiang Zhang

This paper studies an outsourcing problem where two service providers (suppliers) compete for the service contract from a client. The suppliers face uncertain cost for providing the service because they do not have perfect information about the client's type. The suppliers receive differential private signals about the client type and thus compete under asymmetric information. We first characte...

2005
Lexi Pimenidis

This paper presents an approach to enhance the usability of anonymizing networks, by creating a virtual anonymous IP-network. Users are able to communicate as usual with additional protection of their privacy. We combine the deployed Tor anonymizing network with virtual private networking – this allows for transparent use of TCP applications or IP services. Support for typical services on IPs, ...

1997
STUART DORSEY DAVID A. MACPHERSON

Pensions and Training Economic analysis of private pensions commonly assumes that incentives for long tenure and early retirement enhance workforce productivity. An implication of the productivity theory of pensions is that workers who receive job training are more likely to be covered. We test this prediction with data from the Current Population Survey (CPS). We find a strong positive relatio...

Journal: :Information Systems Frontiers 2012
Rodrigo Roman Javier López Olivier Dugeon Marc Lacoste Pierre Yves Plaza Marta Bel

Our society is becoming increasingly more IT-oriented, and the images and sounds that reflect our daily life are being stored mainly in a digital form. This digital personal life can be part of the home multimedia contents, and users demand access and possibly share these contents (such as photographs, videos, and music) in an ubiquitous way: from any location and with any device. The purpose o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید