Academic literature on the topic 'IPsec'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IPsec.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "IPsec"

1

Sridevi, Sridevi. "L2TP/IPsec Interworking." International Journal of Scientific Research 2, no. 8 (June 1, 2012): 89–91. http://dx.doi.org/10.15373/22778179/aug2013/28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Said, Muhammad Ali, Setyorini ‏‏‎ ‏‏‎ Setyorini‏‏‎, and Erwid M. Jadied. "Analysis of IPSec Implementation on Dynamic Multipoint VPN Protocol Using Routing Border Gateway Protocol." Building of Informatics, Technology and Science (BITS) 4, no. 2 (September 22, 2022): 595–605. http://dx.doi.org/10.47065/bits.v4i2.1836.

Full text
Abstract:
Dynamic Multipoint Virtual Private Network (DMVPN) technology is one of Cisco's solutions to overcome the limitations of VPN scalability. DMVPN has a combination of components: Next hop resolution protocol (NHRP), Multipoint Generic Routing Encapsulation (mGRE) and Routing protocol. This research implements a simple network consisting of Hub, Spoke1, Spoke2, Lan1, Lan2 and Lan3 using the GNS3 simulator. This study compares the performance of IPSec and without IPsec on DMVPN using the BGP Routing protocol on performance parameters namely delay, throughput, jitter and packet loss to evaluate the security impact of the DMVPN network. The results of this study indicate that IPSec DMVPN has an effect on sending UDP packets which have a throughput value without IPSec of 5082.18 kbit/s while IPSec's throughput is 5034.40 kbit/s. The value of packet loss without IPSec has a value of 7.54% while IPSec has a value of 4.79%. The results of the jitter value have the same value. The delay value without IPSec has a value of 0.183s while the IPSec delay value is 0.410s. TCP packet delivery has a throughput value without IPSec is 1139.16 kbit/s while the IPSec throughput value is 1105.20 kbit/s. The results of the packet loss value and the jitter value have the same value. The delay value without IPSec has a value of 0.185s while the IPSec delay value is 0.187s.
APA, Harvard, Vancouver, ISO, and other styles
3

Street, Derek. "IPSec Solution." EDPACS 38, no. 5 (November 4, 2008): 6–17. http://dx.doi.org/10.1080/07366980802379871.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gengler, Barbara. "IPSec specification." Network Security 1999, no. 11 (November 1999): 5–6. http://dx.doi.org/10.1016/s1353-4858(00)80001-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Xiao Dan, Qiang Yue, and Li Min Su. "The Research and Design for IPSec Protocol Based on Embedded Linux OS over IPv6." Applied Mechanics and Materials 195-196 (August 2012): 1111–15. http://dx.doi.org/10.4028/www.scientific.net/amm.195-196.1111.

Full text
Abstract:
The paper analyzes the principle and key technique of IPSec protocol, researches the security policy and processing flow of IPSec, presents the design ideal and implementation scheme of IPSec based on embedded Linux Operation System. The realization of IPSec mainly consists of five modules. In addition, every module function is discussed in detail.
APA, Harvard, Vancouver, ISO, and other styles
6

Fan, Ya Qin, Ling Lv, Mei Lin Liu, and Fei Xie. "Improvements Based on the IPSec VPN Secuirity." Advanced Materials Research 756-759 (September 2013): 2693–97. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2693.

Full text
Abstract:
In this paper, through specific description of the concept of virtual private network VPN, operating principles and the IPSec protocol, and using the OPNET software for performance simulation of IPSec VPN network, we get the result of IPSec VPN throughput of the network, which is unstable. o though IPSec VPN has improved the safety performance of data transmission, it at the same time affects the transmission efficiency. By analyzing the problems of IPSec VPN, in terms of improving safety performance, the combination of PKI and IPSec VPN program was proposed. Theoretical analysis shows that such program can indeed solve the problem of authentication imperfect, thus improving the safety performance of the network.
APA, Harvard, Vancouver, ISO, and other styles
7

Yessenzholov, Ulan, and Nurbol Kaliaskarov. "IMPLEMENTATION OF TRAFFIC PROTECTION BASED ON IPSEC VPN TECHNOLOGY AND NETWORK MODELING ON ENSP SOFTWARE ENVIRONMENT." Вестник КазАТК 126, no. 3 (June 19, 2023): 198–204. http://dx.doi.org/10.52167/1609-1817-2023-126-3-198-204.

Full text
Abstract:
The article is devoted to the study of such technology as IPsec VPN. The role of this technology in the field of information and communication technologies is quite significant. Firstly, IPsec VPN supports many modern encryption algorithms and authentication methods. Secondly, IPsec VPN is supported by many vendors, which allows you to deploy this technology based on equipment from different manufacturers. Thirdly, IPsec VPN does not require much performance from the hardware. Fourth, IPsec VPN is easy to use and easy to monitor. This article shows an example of IPsec VPN implementation on eNSP software environment based on Huawei equipment. As can be seen from the practical part of the article, the creation and implementation of this technology consists of only four steps.
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Tao. "Application and Study of Virtual Private Network Base on L2TP-IPSec." Advanced Materials Research 1044-1045 (October 2014): 1071–74. http://dx.doi.org/10.4028/www.scientific.net/amr.1044-1045.1071.

Full text
Abstract:
Using IPSec protocol and VPN technology can be in the open, insecure public network, build a safe and stable communication channel, ensure the safety of data transmission. The communicating peers should implement mutual ID authentication prior to the building up of IPSec channel. Traditional way of IPSec ID authentication is based on “Pre-shared keys”, it has lower security. It makes a detaied analysis on the key technologies in VPN based on IPSec. A design of the IPSec ID authentication building VPN based on certificate is proposed. Finally, in the VMWare simulation experiment has been carried out on the design, experimental results show the design is safe, steady operation and easy to implement.
APA, Harvard, Vancouver, ISO, and other styles
9

Fitrisia, Yuli, and Maruf Alfiando Setianto. "Implementasi GRE Over IPSec Tunnel VPN menggunakan Fortigate." Jurnal Komputer Terapan 9, no. 2 (December 22, 2023): 212–23. http://dx.doi.org/10.35143/jkt.v9i2.6097.

Full text
Abstract:
VPN adalah sebuah teknologi komunikasi yang menggunakan jaringan private (pribadi) yang dapat terhubung ke sebuah jaringan publik. Dengan cara tersebut, maka akan didapatkan hak dan pengaturan yang sama seperti halnya berada didalam jaringan lokal itu sendiri, walaupun sebenarnya menggunakan jaringan publik. Pada penelitian ini yang dipakai adalah protokol GRE over IPSec. GRE adalah protokol enkapsulasi yang secara default tidak mendukung keamanan enkripsi. Maka untuk menambahkan lapisan enkripsi di GRE Tunnel dengan dukungan IPSec dan protokol enkripsi IKEv2. Maka dibuat lah kombinasi antara GRE dan IPSec pada Fortigate yang memungkinkan pengguna untuk membuat jalur tuneling aman antara dua jaringan yang berbeda. Seluruh lalu lintas data yang melewati jalur tuneling akan dienkripsi menggunakan protokol IPSec. Setelah berhasil membangun VPN tunnel GRE Over IPSec, kemudian jaringan tersebut di uji. Hasil pengujian terhadap GRE Over IPSec tunnel VPN dengan protokol IKEv2 sudah berjalan dengan baik dan paket yang melalui tunnel tersebut sudah terenkripsi dengan aman. Sedangkan Dari hasil pengujian yang telah dilakukan terhadap performa jaringan GRE over IPSec pada Fortigate dilakukan untuk mengukur performa dari delay dan throughput paket yang dikirim, pengujian dilakukan dua kali pengujian yaitu upload dan download. Menurut THIPON dari jaringan yang dibangun termasuk kedalam kategori “sangat bagus”.
APA, Harvard, Vancouver, ISO, and other styles
10

Hong, Sunghyuck. "Issues and Security on IPSec: Survey." Journal of Digital Convergence 12, no. 8 (August 28, 2014): 243–48. http://dx.doi.org/10.14400/jdc.2014.12.8.243.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "IPsec"

1

Schreiber, Alexander, and Holm Sieber. "VPN/IPSec." Universitätsbibliothek Chemnitz, 2002. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200200982.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Agar, Christopher D. "Dynamic parameterization of IPSEC." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA401378.

Full text
Abstract:
Thesis (M.S. in Computer Science) Naval Postgraduate School, December 2001.
Thesis Advisor (s): Irvine, Cynthia E. "December 2001." Includes bibliographical references (p. 311-313). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
3

Xu, Chen, and chen8002004@hotmail com. "Building mobile L2TP/IPsec tunnels." RMIT University. Electrical and Computer Engineering, 2010. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20100329.160455.

Full text
Abstract:
Wireless networks introduce a whole range of challenges to the traditional TCP/IP network, especially Virtual Private Network (VPN). Changing IP address is a difficult issue for VPNs in wireless networks because IP addresses are used as one of the identifiers of a VPN connection and the change of IP addresses will break the original connection. The current solution to this problem is to run VPN tunnels over Mobile IP (MIP). However, Mobile IP itself has significant problems in performance and security and that solution is inefficient due to double tunneling. This thesis proposes and implements a new and novel solution on simulators and real devices to solve the mobility problem in a VPN. The new solution adds mobility support to existing L2TP/IPsec (Layer 2 Tunneling Protocol/IP Security) tunnels. The new solution tunnels Layer 2 packets between VPN clients and a VPN server without using Mobile IP, without incurring tunnel-re-establishment at handoff, without losing packets during handoff, achieves better security than current mobility solutions for VPN, and supports fast handoff in IPv4 networks. Experimental results on a VMware simulation showed the handoff time for the VPN tunnel to be 0.08 seconds, much better than the current method which requires a new tunnel establishment at a cost of 1.56 seconds. Experimental results with a real network of computers showed the handoff time for the VPN tunnel to be 4.8 seconds. This delay was mainly caused by getting an IP address from DHCP servers via wireless access points (4.6 seconds). The time for VPN negotiation was only 0.2 seconds. The experimental result proves that the proposed mobility solution greatly reduces the VPN negotiation time but getting an IP address from DHCP servers is a large delay which obstructs the real world application. This problem can be solved by introducing fast DHCP or supplying an IP address from a new wireless access point with a strong signal while the current Internet connection is weak. Currently, there is little work on fast DHCP and this may open a range of new research opportunities.
APA, Harvard, Vancouver, ISO, and other styles
4

Davis, Carlton R. "IPSec base virtual private network." Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33390.

Full text
Abstract:
The Internet evolved from an experiential packet-switching network called the ARPANET. This network has grown exponentially since its conversion from an experimental to an operational network in 1975. However, the need for confidential and secure data channel has dissuaded many enterprises from using this ubiquitous public infrastructure. The IPSec protocol suite developed by the Internet Engineering Task Force (IETF) makes it possible to implement secure communication channels or virtual private network (VPN) over the Internet. Corporations can benefit from substantial financial savings by utilizing VPN for inter-company or intra-company communications rather than using expensive lease or privately own network infrastructure with its associated high maintenance costs. In this thesis, we will discuss the architecture, design and use of IPSec base VPN.
APA, Harvard, Vancouver, ISO, and other styles
5

Jones, Chad F. (Chad Frederick) 1975. "An application level emulation of IPSEC." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/50051.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1998.
Includes bibliographical references (leaves 38-39).
by Chad F. Jones.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
6

Falconi, Aritana Pinheiro. "Uso dinâmico de IPSEC com IPV6." Instituto Nacional de Pesquisas Espaciais, 2004. http://urlib.net/sid.inpe.br/jeferson/2005/01.07.10.46.

Full text
Abstract:
Este trabalho tem como objetivo propor uma metodologia de uso da plataforma de segurança IP Security - IPSec - com o Internet Protocol Version 6 - IPv6 - no intuito de avaliar e aumentar o desempenho da comunicação entre máquinas interligadas por uma rede de computadores. Propõe-se habilitá-lo quando estritamente necessário, sem manter um túnel criptógrafico durante toda a comunicação entre as máquinas envolvidas. Isso é feito permitindo que as aplicações acessem diretamente a base de dados de políticas do IPSec, alterando suas políticas. Para validar a metodologia, utilizou-se os serviços POP3 e FTP com uso do IPSec durante a transferência de senha de um usuário da aplicação, desabilitando o IPSec durante o resto da sessão TCP, mantendo a sessão.
The objective of this work is to propose a methodology of use of the security platform IP Security - IPSec - with the Internet Protocol Version 6 - IPv6 - in order to evaluate and increase the performance of the communication between machines connected by a network computer. The proposition is enabling IPSec only when strictly necessary, without keeping an encryption tunnel during the whole communication between machines. This is made by the applications having access directly to the IPSec security policies database and modifying some policies. The POP3 and FTP services had been used to evaluate the IPSec use only during the transference of an application user password. After that, the IPSec is disabled during the same TCP session.
APA, Harvard, Vancouver, ISO, and other styles
7

Hiran, Vaishali Rahul. "Usability evaluation of IPsec configuring components." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-122423.

Full text
Abstract:
The security protocol IPsec is used in the LTE network to achieve a securecommunication from prying eyes. However, the use of IPsec is optional bythe LTE standard. Whether or not to use the IPsec thus becomes a securitydecision that each operator has to make after having considered applicablerisks and anticipated costs. It is also important to consider the OperationalExpenditure (OPEX) for deploying, operating, and maintaining the IPsecinstallation. One important factor that can aect OPEX is usability. Forthis reason understanding the usability properties of a system can help toidentify improvements that can reduce OPEX.This study mainly focused on investigating the challenges and also investigateswhether poor usability was a contributing factor for deploymentchallenges of IPsec in the LTE infrastructure. Additionally, this study alsofocused on prerequisite knowledge for an individual in order to ensure thecorrect deployment of IPsec in the LTE network.Cognitive Walkthrough and Heuristic Evaluation usability methods wereused in this study. By using these methods, several usability issues related toIPsec conguring components like documentation, the MO structure, anda used tool were identied. It was also identied that each componenthad rooms for improvements, especially for documentation which can signicantly aid in the deployment of IPsec. Moreover, in order to smoothlydeploy IPsec in the LTE network, it is important to have beforehand knowledgeof conguring components used to deploy IPsec.
APA, Harvard, Vancouver, ISO, and other styles
8

Kavun, Elif Bilge. "A Compact Cryptographic Processor For Ipsec Applications." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12612439/index.pdf.

Full text
Abstract:
A compact cryptographic processor with custom integrated cryptographic coprocessors is designed and implemented. The processor is mainly aimed for IPSec applications, which require intense processing power for cryptographic operations. In the present design, this processing power is achieved via the custom cryptographic coprocessors. These are an AES engine, a SHA-1 engine and a Montgomery modular multiplier, which are connected to the main processor core through a generic flexible interface. The processor core is fully compatible with Zylin Processor Unit (ZPU) instruction set, allowing the use of ZPU toolchain. A minimum set of required instructions is implemented in hardware, while the rest of the instructions are emulated in software. The functionality of the cryptographic processor and its suitability for IPSec applications are demonstrated through implementation of sample IPSec protocols in C-code, which is compiled into machine code and run on the processor. The resultant processor, together with the sample codes, presents a pilot platform for the demonstration of hardware/software co-design and performance evaluation of IPSec protocols and components.
APA, Harvard, Vancouver, ISO, and other styles
9

Jutvik, Vilhelm. "IPsec and IKEv2 for the Contiki Operating System." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-229574.

Full text
Abstract:
Contiki is a small and resource-efficient OS for the IoT (Internet of Things). IPsec and IKEv2 are two standards used for secure communication over the Internet. Can they be implemented on Contiki using current hardware while still being interoperable with other Internet hosts? The question was answered by implementing and then evaluating the standards. A connection was established with another Internet host while measurements were made of ROM / RAM consumption, required processing time (i.e. energy consumption). By writing an efficient runtime and using Elliptic Curve Cryptography, I concluded that an interoperable implementation for Contiki was feasible. However, I also found that the standards -as such- were unsuitable for the IoT infrastructure due to their complexity and the fact that IPsec's policies are expressed in network layer primitives (i.e. unsuitable for networks with a dynamic topology).
APA, Harvard, Vancouver, ISO, and other styles
10

Ульянік, О. М. "Графічний інтерфейс налаштування набору технологій DMVPN(Multipoint GRE+NHRP) over IPsec." Master's thesis, Сумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/82385.

Full text
Abstract:
Розроблена веб-орієнтована інформаційна система, графічний інтерфейс якої дозволяє вибрати необхідні налаштування, автоматично конфігурувати інтерфейси роутера, налаштувати на маршрутизаторах конфігурацію захищених мереж DMVPN over IPsec. Система дозволяє зручно перенести згенерований код налаштувань роутера в налаштування реального мережевого обладнання. Система має пояснювальну записку щодо отриманих команд, а також має захист від невірно введених початкових даних. Систему реалізовано у формі веб-додатку з використанням мови програмування JavaScript.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "IPsec"

1

IPSec: Securing VPNs. New York: Osborne/McGraw-Hill, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Frankel, Sheila. Demystifying the IPsec puzzle. Boston, MA: Artech House, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Carmouche, James Henry. IPsec virtual private network fundamentals. Indianapolis, Ind: Cisco Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

IPsec virtual private network fundamentals. Indianapolis, Ind: Cisco Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Carmouche, James Henry. IPsec virtual private network fundamentals. Indianapolis, Ind: Cisco Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Big book of IPsec RFCs. San Diego, CA: Morgan Kaufmann, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

VPNs illustrated: Tunnels, VPNs, and IPsec. Upper Saddle River, NJ: Addison-Wesley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

A technical guide to IPSec virtual private networks. Boca Raton, FL: Auerbach, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

A Technical Guide to IPSec Virtual Private Networks. London: Taylor and Francis, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dan, Harkins, ed. IPSec: The new security standard for the Internet, intranets, and virtual private networks. 2nd ed. Upper Saddle River, NJ: Prentice Hall PTR, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "IPsec"

1

Rosen, Rami. "IPsec." In Linux Kernel Networking, 279–304. Berkeley, CA: Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-6197-1_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ioannidis, John. "IPsec." In Encyclopedia of Cryptography and Security, 635–38. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_269.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Perez, André. "IPSec Mechanism." In Network Security, 77–107. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781119043942.ch4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nuopponen, Antti, Sami Vaarala, and Teemupekka Virtanen. "IPsec Clustering." In Security and Protection in Information Processing Systems, 367–79. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/1-4020-8143-x_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pohlmann, Norbert. "IPSec-Verschlüsselung." In Cyber-Sicherheit, 373–405. Wiesbaden: Springer Fachmedien Wiesbaden, 2019. http://dx.doi.org/10.1007/978-3-658-25398-1_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pohlmann, Norbert. "IPSec-Verschlüsselung." In Cyber-Sicherheit, 403–38. Wiesbaden: Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-36243-0_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Schwenk, Jörg. "IP Security (IPSec)." In Sicherheit und Kryptographie im Internet, 112–44. Wiesbaden: Vieweg+Teubner Verlag, 2002. http://dx.doi.org/10.1007/978-3-322-93903-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schwenk, Jörg. "IP-Sicherheit (IPsec)." In Sicherheit und Kryptographie im Internet, 123–79. Wiesbaden: Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29260-7_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Schwenk, Jörg. "IP Security (IPSec)." In Sicherheit und Kryptographie im Internet, 124–57. Wiesbaden: Vieweg+Teubner, 2010. http://dx.doi.org/10.1007/978-3-8348-9665-0_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Schwenk, Jörg. "IP Security (IPSec)." In Sicherheit und Kryptographie im Internet, 118–51. Wiesbaden: Vieweg+Teubner Verlag, 2005. http://dx.doi.org/10.1007/978-3-322-95321-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "IPsec"

1

Barylski, Marcin. "On IPSec performance testing of IPv4/IPv6 IPSec gateway." In 2008 1st International Conference on Information Technology (IT 2008). IEEE, 2008. http://dx.doi.org/10.1109/inftech.2008.4621618.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dhall, Hitesh, Dolly Dhall, Sonia Batra, and Pooja Rani. "Implementation of IPSec Protocol." In Communication Technologies (ACCT). IEEE, 2012. http://dx.doi.org/10.1109/acct.2012.64.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hamadah, Fatin, M. A. Rahman, and Thien Wan Au. "Impact of IPSec on MANET." In 2016 International Symposium on Computer, Consumer and Control (IS3C). IEEE, 2016. http://dx.doi.org/10.1109/is3c.2016.110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zheng, Liangbin, and Yongbin Zhang. "An Enhanced IPSec Security Strategy." In 2009 International Forum on Information Technology and Applications (IFITA). IEEE, 2009. http://dx.doi.org/10.1109/ifita.2009.203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Brower, Etzel, LaTonya Jeffress, Jonah Pezeshki, Rohan Jasani, and Emre Ertekin. "Integrating Header Compression with IPsec." In MILCOM 2006. IEEE, 2006. http://dx.doi.org/10.1109/milcom.2006.302503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ioannides, J., and A. Keromytis. "Network security and IPsec (tutorial)." In the 7th ACM conference. New York, New York, USA: ACM Press, 2000. http://dx.doi.org/10.1145/352600.352601.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shue, C. A., M. Gupta, and S. A. Myers. "IPSec: Performance Analysis and Enhancements." In 2007 IEEE International Conference on Communications. IEEE, 2007. http://dx.doi.org/10.1109/icc.2007.256.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Cliff X., and William J. Chimiak. "Application of IPsec to teleradiology." In Medical Imaging '99, edited by G. James Blaine and Steven C. Horii. SPIE, 1999. http://dx.doi.org/10.1117/12.352763.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chitre, Prakash, Manish Karir, and Michael Hadjitheodosiou. "TCP In the IPSEC Environment." In 22nd AIAA International Communications Satellite Systems Conference & Exhibit 2004 (ICSSC). Reston, Virigina: American Institute of Aeronautics and Astronautics, 2004. http://dx.doi.org/10.2514/6.2004-3207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Herzinger, Daniel, Stefan-Lukas Gazdag, and Daniel Loebenberger. "Real-World Quantum-Resistant IPsec." In 2021 14th International Conference on Security of Information and Networks (SIN). IEEE, 2021. http://dx.doi.org/10.1109/sin54109.2021.9699255.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "IPsec"

1

Ertekin, E., C. Christou, and C. Bormann. IPsec Extensions to Support Robust Header Compression over IPsec. RFC Editor, May 2010. http://dx.doi.org/10.17487/rfc5858.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Patel, B., B. Aboba, W. Dixon, G. Zorn, and S. Booth. Securing L2TP using IPsec. RFC Editor, November 2001. http://dx.doi.org/10.17487/rfc3193.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hoffman, P. Cryptographic Suites for IPsec. RFC Editor, December 2005. http://dx.doi.org/10.17487/rfc4308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Williams, N. IPsec Channels: Connection Latching. RFC Editor, October 2009. http://dx.doi.org/10.17487/rfc5660.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nir, Y. IPsec Cluster Problem Statement. RFC Editor, October 2010. http://dx.doi.org/10.17487/rfc6027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Frankel, S. E., K. Kent, R. Lewkowski, A. D. Orebaugh, R. W. Ritchey, and S. R. Sharma. Guide to IPsec VPNs. Gaithersburg, MD: National Institute of Standards and Technology, 2005. http://dx.doi.org/10.6028/nist.sp.800-77.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Barker, Elaine, Quynh Dang, Sheila Frankel, Karen Scarfone, and Paul Wouters. Guide to IPsec VPNs. Gaithersburg, MD: National Institute of Standards and Technology, June 2020. http://dx.doi.org/10.6028/nist.sp.800-77r1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fraser, Laurie, Kathryn Roose, and Greg Nix. IPSec VPN Capabilities and Interoperability. Fort Belvoir, VA: Defense Technical Information Center, July 2006. http://dx.doi.org/10.21236/ada451929.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jason, J., L. Rafalow, and E. Vyncke. IPsec Configuration Policy Information Model. RFC Editor, August 2003. http://dx.doi.org/10.17487/rfc3585.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Berger, L., R. White, and E. Rosen. BGP IPsec Tunnel Encapsulation Attribute. RFC Editor, June 2009. http://dx.doi.org/10.17487/rfc5566.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography