نتایج جستجو برای: vpn سیار

تعداد نتایج: 1850  

2014
A. Asadi Eskandar Mahbubur R Syed M. B. Zarei

With rapid growth in use of multimedia applications, including IP Telephony (also known as Voice over IP), the demand for security and privacy of communications has significantly increased. Given the fact that IP Telephony utilizes public IP infrastructure, deployment of IP VPN is one approach to protect traffic of interest. However, VPN is presumed to have a negative impact on VOIP performance...

2012
Christos Xenakis Lazaros Merakos

The Mobile Internet requires enhanced security services available to all mobile subscribers in a dynamic fashion. A network-wide Virtual Private Network (VPN) deployment scenario over the General Packet Radio Service (GPRS) is proposed and analyzed from a security viewpoint. The proposed security scheme improves the level of protection that is currently supported in GPRS and facilitates the rea...

2000
Seung-Jin Baek Moon-Sang Jeong Jong-Tae Park Tai-Myung Chung

Using IP-based Virtual Private Network (IP-VPN) technology, a company can establish its virtual private network over public networks. Recently, IP-VPN emerges as one of main technologies for increasing business competitiveness with reasonable costs. The standards for IP-VPN are currently being developed by Internet Engineering Task Forces (IETF) and others. In this paper, we identify the limita...

2009
Boulbaba Thabti Habib Youssef

A Virtual Private Network (VPN) is an overlay network defined over a public network infrastructure like the Internet. A VPN provides customers with a secure, low cost, and more flexible communication environment than leased lines. The allocation of bandwidth for VPNs to meet the requirements specified by customers is an important traffic engineering research issue. A VPN workload model called h...

2014
Mushtaq Ahmed Abdul Basit

With increasing popularity and ever emerging business needs there was an immense focus to improve the Internet world and to provide guarantee for service delivery. Simplest example for this case is VoIP where two subscribers make a voice call through MPLS based backbone. The end subscribers should have similar quality as that of POTS. Subscribers will expect a real time conversation with limite...

2012
Ki Hyun Kim Jang - Hee Yoo Kyo Il Chung

This paper proposes a VPN Accelerator Board (VPN-AB), a virtual private network (VPN) protocol designed for trust channel security system (TCSS). TCSS supports safety communication channel between security nodes in internet. It furnishes authentication, confidentiality, integrity, and access control to security node to transmit data packets with IPsec protocol. TCSS consists of internet key exc...

2012
Marsh Ray Jacob Appelbaum Karl Koscher Ian Finder

User-accessed Virtual Private Network systems allow authorized users remote access to protected or otherwise privileged networks while avoiding dependence on ISPs along the route for data confidentiality and integrity. This direct expression of the internet’s end-to-end principle of security is generally accepted as a highly successful design. VPN services and technology advertising censorship ...

Journal: :EAI Endorsed Trans. Collaborative Computing 2014
Pierre St. Juste Kyuho Jeong Heungsik Eom Corey Baker Renato J. O. Figueiredo

Virtual private networking (VPN) has become an increasingly important component of a collaboration environment because it ensures private, authenticated communication among participants, using existing collaboration tools, where users are distributed across multiple institutions and can be mobile. The majority of current VPN solutions are based on a centralized VPN model, where all IP traffic i...

2002
Raouf Boutaba

irtual Private Network (VPN) is one of the major trends in the integrated broadband communications environment. There is a myriad of definitions of a VPN used in the networking community to describe a broad set of problems and solutions. In [1], Ferguson et al. define a VPN as a communications environment in which access is controlled to permit peer connections only within a defined community o...

2000
Ibrahim Khalil Torsten Braun

As today’s network infrastructure continues to grow and Differentiated Services IP backbones are now available to provide various levels of quality of service (QoS) to VPN traffic, the ability to manage increasing network complexity is considered as a crucial factor for QoS enabled VPN solutions. There is growing trend by corporate customers to outsource such complicated management services to ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید