نتایج جستجو برای: vpn سیار

تعداد نتایج: 1850  

Journal: :Journal of the Korea Institute of Information Security and Cryptology 2014

2006
Sang Su Lee

IPsec protocol[1] is a set of security extensions developed by the IETF and it provides privacy and authentication services at the IP layer by using modern cryptography. In this paper, we describe both of H/W and S/W architectures of our router system, SRS-10. The system is designed to support high performance routing and IPsec VPN. Especially, we used Cavium’s CN2560 processor to implement IPs...

2011
R. Ravi

As Internet usage grows exponentially, network security issues become increasingly important. Network security measures are needed to protect data during transmission. Various security controls are used to prevent the access of hackers in networks. They are firewall, virtual private networks and encryption algorithms. Out of these, the virtual private network plays a vital role in preventing ha...

Journal: :CoRR 2016
Ravishankar Ravindran Changcheng Huang Krishnaiyan Thulasiraman Tachun Lin

VPN service providers (VSP) and IP-VPN customers have traditionally maintained service demarcation boundaries between their routing and signaling entities. This has resulted in the VPNs viewing the VSP network as an opaque entity and therefore limiting any meaningful interaction between the VSP and the VPNs. A key challenge is to expose each VPN to information about available network resources ...

Journal: :Computer Communications 2008
Christos Xenakis Christoforos Ntantogian Ioannis Stavrakakis

This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Telecommunication System (UMTS). The proposed scheme, which is based on IPsec, distributes the required security functionality for deploying a VPN between the involved user’s device and the mobile network limiting the co...

2011
Ramanathan Rajasekar Ramaraj Ravi Beulah Shekhar

Problem statement: Virtual private networks have provided customers with a secure and low-cost communication environment. Approach: The COVPA, the provisioning algorithm for a Virtual Private Network service, which built and managed VPNs on demand. Results: The COVPA allowed each VPN to have guaranteed resources and customized control and supported a highly dynamic VPN service where creation an...

2012
R. Seshadri

As a business grows, it might expand to multiple branches across the country and around the world. To maintain things running ably, the people functioning in those locations require fast, secure and consistent way to share information across computer networks. In addition, mobile employees like sales people require evenly secure and reliable approach to connect to their business's computer netw...

Journal: :Journal of neuropathology and experimental neurology 2016
Xialin Zuo Qinghua Hou Jizi Jin Lixuan Zhan Xinyu Li Weiwen Sun Kunqin Lin En Xu

Secondary degeneration in areas beyond ischemic foci can inhibit poststroke recovery. The cysteine protease Cathepsin B (CathB) regulates cell death and intracellular protein catabolism. To investigate the roles of CathB in the development of secondary degeneration in the ventroposterior nucleus (VPN) of the ipsilateral thalamus after focal cerebral infarction, infarct volumes, immunohistochemi...

2004
Shashank Khanvilkar Ashfaq Khokhar

Virtual Private Networks (VPNs) provide the security and isolation properties of private networks, but at lower costs made possible by using a shared infrastructure such as the Internet. VPNs use point-to-point tunnels to create a secure overlay network, with every tunnel being pre-configured to encrypt, compress, and/or authenticate traffic. Once the tunnels are created such properties are mai...

2005
Shashank Khanvilkar Ashfaq A. Khokhar

Virtual Private Networks (VPNs) are commonly used to provide secure connectivity over public networks. VPNs use tunnels to provide encryption, compression, and authentication functions, which are identically applied to every packet passing through them. However, this behavior may be overly rigid in many situations where the applications require different functions to be applied to different par...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید