نتایج جستجو برای: vpn سیار

تعداد نتایج: 1850  

2013
K. C. Okafor

Contemporary, global cyber terrorism via the internet have changed the landscape of security implementations in cooperate organizations. This paper discusses analyses and develops novel security architecture for secure transactions in Virtual Private Network (VPN) environments. Open standard VPN has been in use for a long time without addressing the security holes in VPN wired and wireless netw...

Journal: :Stroke 2002
Marcel Dihné Christian Grommes Michael Lutzenburg Otto W Witte Frank Block

BACKGROUND AND PURPOSE After focal cerebral ischemia, depending on its localization and extent, secondary neuronal damage may occur that is remote from the initial lesion. In this study differences in secondary damage of the ventroposterior thalamic nucleus (VPN) and the reticular thalamic nucleus (RTN) were investigated with the use of different ischemia models. METHODS Transient middle cere...

Journal: :JCS 2014
Jayanthi Gokulakrishnan V. Thulasi Bai

A network which merges the usage of the public and the private networks and uses security software for the purpose of compressing, encrypting and masking the digital packets that are being transmitted in the network is called as Virtual Private Network (VPN). In VPN, the communication between the user ends is maintained such that it appears as if the source end is directly linked to the destina...

2016
Hung-Chang Shen Jia-Yi Wei Sao-Yu Chu Pei-Chi Chung Tsai-Chi Hsu Hung-Hsiang Yu

In the Drosophila olfactory system, odorant information is sensed by olfactory sensory neurons and relayed from the primary olfactory center, the antennal lobe (AL), to higher olfactory centers via olfactory projection neurons (PNs). A major portion of the AL is constituted with dendrites of four groups of PNs, anterodorsal PNs (adPNs), lateral PNs (lPNs), lateroventral PNs (lvPNs) and ventral ...

2005
Osamu Honda Hiroyuki Ohsaki Makoto Imase Junichi Murayama Kazuhiro Matsuda

In recent years, IP-based virtual private networks (IP-VPNs), which provide a virtual privately owned network over an IP network, have attracted attention. With existing IP-VPNs, however, there is a serious problem that fairness among IPVPN customers is not satisfied. In our previous work, we have proposed an IP-VPN fairness control mechanism called I2VFC (Interand Intra-VPN Fairness Control) t...

Journal: :IEEE Access 2022

Recently, many video streaming services, such as YouTube, Twitch, and Facebook, have contributed to traffic, leading the possibility of unwanted inappropriate content minors or individuals at workplaces. Therefore, monitoring is necessary. Although traffic encrypted, several studies proposed techniques using data decipher users’ activity on web. Dynamic Adaptive Streaming over HTTP (DASH...

2010
T. Oshima T. Fujita M. Seki H. Kawashima K. Hoshino K. Shibanuma M. Verrecchia B. Teuchner

The CAD models will be exchanged and integrated at Naka for JT-60SA, a common computer network efficiently connected between Naka site and the Garching site is needed to be established. Virtual Private Network (VPN) was introduced with LAN on computer network physically-separated from JAEA intranet area and firewall. In July 2009, a new VPN connection between the Naka and Garching sites has bee...

Journal: :RFC 2012
Rahul Aggarwal Eric C. Rosen

To provide Multicast VPN (MVPN) service, Provider Edge routers originate BGP Update messages that carry Multicast-VPN ("MCAST-VPN") BGP routes; they also originate unicast VPN routes that carry MVPNspecific attributes. These routes encode addresses from the customer’s address space, as well as addresses from the provider’s address space. These two address spaces are independent, and the address...

2003
Yoshihiro HARA Hiroyuki OHSAKI Makoto IMASE Yoshitake TAJIMA Masahiro MARUYOSHI Junichi MURAYAMA Kazuhiro MATSUDA

Recent improvements in network technology enable network communications in various social organizations and enable various social organizations to be virtualized in networks. We named the mass of virtual organizations “cybersociety”. A “person” in cyber-society needs to establish secure communication associations with multiple virtual organizations. Therefore, we believe that VPN service can he...

Journal: :IEICE Transactions 2009
Sho Fujita Keiichi Shima Yojiro Uo Hiroshi Esaki

We present a decentralized VPN service that can be built over generalized mobile ad-hoc networks (Generalized MANETs), in which topologies can be represented as a time-varying directed multigraph. We address wireless ad-hoc networks and overlay ad-hoc networks as instances of Generalized MANETs. We first propose an architecture to operate on various kinds of networks through a single set of ope...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید