نتایج جستجو برای: vpn سیار

تعداد نتایج: 1850  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه ارومیه - دانشکده فنی 1391

مدیریت جابجایی و تأمین امنیت ارتباطات به طوری که ارتباط امن کاربر سیار حین جابجایی قطع نشود، همواره دو موضوع مهم در شبکه های بی سیم بوده اند. راه حل هایی که ارتباطات کاربر سیار، بین شبکه ی مورد اعتماد داخلی و شبکه ی غیرقابل اعتماد خارجی را به طور امن فراهم می آورند، اصطلاحاً شبکه های vpn سیار نام دارند. ietf برای چنین حالاتی که هم امکان جابجایی و هم امنیت داده های یک کاربر سیار فراهم شود، دو معم...

2004
Hyung-Woo Choi Young-Tak Kim

VPN efficiently connects Intranet sites which are distributed over wide areas. Internet based VPN has lots of merits, such as flexibility in network configuration, expansibility, and low operational cost compared to existing leased line private network. Since the request of reliable information exchange through Internet is increasing explosively, and the MPLS network can offer efficient traffic...

2006
J. De Clercq D. Ooms

This document describes a method by which a Service Provider may use its packet-switched backbone to provide Virtual Private Network (VPN) services for its IPv6 customers. This method reuses, and extends where necessary, the "BGP/MPLS IP VPN" method for support of IPv6. In BGP/MPLS IP VPN, "Multiprotocol BGP" is used for distributing IPv4 VPN routes over the service provider backbone, and MPLS ...

1996
Mun Choon Chan Hisaya Hadama Rolf Stadler

Emerging ATM-based Virtual Private Network (VPN) services offer customers a flexible way to interconnect Customer Premises Networks (CPNs) via high-speed links. Compared with traditional leased lines, these services allow for rapid provisioning of VPN bandwidth through cooperative control between customer and provider. Customers can dynamically renegotiate the VPN bandwidth according to their c...

Journal: :Computer Networks 2011
Michael Roßberg Günter Schäfer

Virtual private networks (VPN) offer a secure data exchange over public networks. Despite being cheaper than leased lines, growing sizes and dynamic behavior of VPN nodes, e.g., for mobility or reasons of denial-of-service-attacks, make a manual configuration of large, dynamic VPN expensive. Consequently, a number of different VPN auto-configuration approaches have been invented and partially d...

2007
Koutaro YAGI Osamu HONDA Hiroyuki OHSAKI Kazuhiro MATSUDA Makoto IMASE

In this paper, we propose a ring-based P2P-VPN (Peer-to-Peer Virtual Private Network) that provides a secure and reliable network to a large number of virtual organizations. The ring-based P2P-VPN establishes VPN by logically connecting nodes that operate autonomously in a ring topology. The ring-based P2P-VPN has an advantage of a high scalability in terms of the number of VPNs accommodated. I...

2004
Yoshihiro Hara Hiroyuki Ohsaki Makoto Imase Yoshitake Tajima Masahiro Maruyoshi Junichi Murayama

In our previous work, we have proposed a new VPN architecture for enabling user-based multiply associated VPNs [1]. Almost all existing VPN technologies assume that users never simultaneously access more than a single VPN. Thus, for realizing a new VPN service allowing users to simultaneously join multiple VPNs, several fundamental mechanisms, such as dynamically changing user’s VPN association...

2003
Gustav Rosenbaum William Lau Sanjay Jha

VPN services has been around for decades but it did not get wide-spread usage until recently. A combination of new VPN technologies, network technologies and business communication requirements are the driving force behind the VPN services. This survey gives an overview of the recent approaches of VPN solutions and compare their scalability and flexibility aspects. The survey also categorises V...

2001
William Yurcik David Doss

A virtual private network (VPN) is simply secure network connectivity over a shared public network—basically, a private network on a public network infrastructure (the Internet). Figure 1 (next page) shows an example of a network layer VPN (adapted from Paul Ferguson and Geoff Huston, “What is a VPN? Part I,”The Internet Protocol J., June 1998,pp.2-19).Corporation X’s subnetworks (which belong ...

2016

We describe an efficient cross-protocol attack, which enables an attacker to learn the VPN session key shared between a victim client and a VPN endpoint. The attack recovers the key which is used to encrypt and authenticate VPN traffic. It leverages a weakness of the RADIUS protocol executed between VPN endpoint and RADIUS server, and allows an “insider” attacker to read the VPN traffic of othe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید