Academic literature on the topic 'IPsec'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IPsec.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "IPsec"
Sridevi, Sridevi. "L2TP/IPsec Interworking." International Journal of Scientific Research 2, no. 8 (June 1, 2012): 89–91. http://dx.doi.org/10.15373/22778179/aug2013/28.
Full textSaid, Muhammad Ali, Setyorini Setyorini, and Erwid M. Jadied. "Analysis of IPSec Implementation on Dynamic Multipoint VPN Protocol Using Routing Border Gateway Protocol." Building of Informatics, Technology and Science (BITS) 4, no. 2 (September 22, 2022): 595–605. http://dx.doi.org/10.47065/bits.v4i2.1836.
Full textStreet, Derek. "IPSec Solution." EDPACS 38, no. 5 (November 4, 2008): 6–17. http://dx.doi.org/10.1080/07366980802379871.
Full textGengler, Barbara. "IPSec specification." Network Security 1999, no. 11 (November 1999): 5–6. http://dx.doi.org/10.1016/s1353-4858(00)80001-x.
Full textChen, Xiao Dan, Qiang Yue, and Li Min Su. "The Research and Design for IPSec Protocol Based on Embedded Linux OS over IPv6." Applied Mechanics and Materials 195-196 (August 2012): 1111–15. http://dx.doi.org/10.4028/www.scientific.net/amm.195-196.1111.
Full textFan, Ya Qin, Ling Lv, Mei Lin Liu, and Fei Xie. "Improvements Based on the IPSec VPN Secuirity." Advanced Materials Research 756-759 (September 2013): 2693–97. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2693.
Full textYessenzholov, Ulan, and Nurbol Kaliaskarov. "IMPLEMENTATION OF TRAFFIC PROTECTION BASED ON IPSEC VPN TECHNOLOGY AND NETWORK MODELING ON ENSP SOFTWARE ENVIRONMENT." Вестник КазАТК 126, no. 3 (June 19, 2023): 198–204. http://dx.doi.org/10.52167/1609-1817-2023-126-3-198-204.
Full textLiu, Tao. "Application and Study of Virtual Private Network Base on L2TP-IPSec." Advanced Materials Research 1044-1045 (October 2014): 1071–74. http://dx.doi.org/10.4028/www.scientific.net/amr.1044-1045.1071.
Full textFitrisia, Yuli, and Maruf Alfiando Setianto. "Implementasi GRE Over IPSec Tunnel VPN menggunakan Fortigate." Jurnal Komputer Terapan 9, no. 2 (December 22, 2023): 212–23. http://dx.doi.org/10.35143/jkt.v9i2.6097.
Full textHong, Sunghyuck. "Issues and Security on IPSec: Survey." Journal of Digital Convergence 12, no. 8 (August 28, 2014): 243–48. http://dx.doi.org/10.14400/jdc.2014.12.8.243.
Full textDissertations / Theses on the topic "IPsec"
Schreiber, Alexander, and Holm Sieber. "VPN/IPSec." Universitätsbibliothek Chemnitz, 2002. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200200982.
Full textAgar, Christopher D. "Dynamic parameterization of IPSEC." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA401378.
Full textThesis Advisor (s): Irvine, Cynthia E. "December 2001." Includes bibliographical references (p. 311-313). Also available online.
Xu, Chen, and chen8002004@hotmail com. "Building mobile L2TP/IPsec tunnels." RMIT University. Electrical and Computer Engineering, 2010. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20100329.160455.
Full textDavis, Carlton R. "IPSec base virtual private network." Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33390.
Full textJones, Chad F. (Chad Frederick) 1975. "An application level emulation of IPSEC." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/50051.
Full textIncludes bibliographical references (leaves 38-39).
by Chad F. Jones.
M.Eng.
Falconi, Aritana Pinheiro. "Uso dinâmico de IPSEC com IPV6." Instituto Nacional de Pesquisas Espaciais, 2004. http://urlib.net/sid.inpe.br/jeferson/2005/01.07.10.46.
Full textThe objective of this work is to propose a methodology of use of the security platform IP Security - IPSec - with the Internet Protocol Version 6 - IPv6 - in order to evaluate and increase the performance of the communication between machines connected by a network computer. The proposition is enabling IPSec only when strictly necessary, without keeping an encryption tunnel during the whole communication between machines. This is made by the applications having access directly to the IPSec security policies database and modifying some policies. The POP3 and FTP services had been used to evaluate the IPSec use only during the transference of an application user password. After that, the IPSec is disabled during the same TCP session.
Hiran, Vaishali Rahul. "Usability evaluation of IPsec configuring components." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-122423.
Full textKavun, Elif Bilge. "A Compact Cryptographic Processor For Ipsec Applications." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12612439/index.pdf.
Full textJutvik, Vilhelm. "IPsec and IKEv2 for the Contiki Operating System." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-229574.
Full textУльянік, О. М. "Графічний інтерфейс налаштування набору технологій DMVPN(Multipoint GRE+NHRP) over IPsec." Master's thesis, Сумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/82385.
Full textBooks on the topic "IPsec"
Carmouche, James Henry. IPsec virtual private network fundamentals. Indianapolis, Ind: Cisco Press, 2007.
Find full textCarmouche, James Henry. IPsec virtual private network fundamentals. Indianapolis, Ind: Cisco Press, 2007.
Find full textVPNs illustrated: Tunnels, VPNs, and IPsec. Upper Saddle River, NJ: Addison-Wesley, 2005.
Find full textA technical guide to IPSec virtual private networks. Boca Raton, FL: Auerbach, 2001.
Find full textA Technical Guide to IPSec Virtual Private Networks. London: Taylor and Francis, 2000.
Find full textDan, Harkins, ed. IPSec: The new security standard for the Internet, intranets, and virtual private networks. 2nd ed. Upper Saddle River, NJ: Prentice Hall PTR, 2003.
Find full textBook chapters on the topic "IPsec"
Rosen, Rami. "IPsec." In Linux Kernel Networking, 279–304. Berkeley, CA: Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-6197-1_10.
Full textIoannidis, John. "IPsec." In Encyclopedia of Cryptography and Security, 635–38. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_269.
Full textPerez, André. "IPSec Mechanism." In Network Security, 77–107. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781119043942.ch4.
Full textNuopponen, Antti, Sami Vaarala, and Teemupekka Virtanen. "IPsec Clustering." In Security and Protection in Information Processing Systems, 367–79. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/1-4020-8143-x_24.
Full textPohlmann, Norbert. "IPSec-Verschlüsselung." In Cyber-Sicherheit, 373–405. Wiesbaden: Springer Fachmedien Wiesbaden, 2019. http://dx.doi.org/10.1007/978-3-658-25398-1_10.
Full textPohlmann, Norbert. "IPSec-Verschlüsselung." In Cyber-Sicherheit, 403–38. Wiesbaden: Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-36243-0_10.
Full textSchwenk, Jörg. "IP Security (IPSec)." In Sicherheit und Kryptographie im Internet, 112–44. Wiesbaden: Vieweg+Teubner Verlag, 2002. http://dx.doi.org/10.1007/978-3-322-93903-6_5.
Full textSchwenk, Jörg. "IP-Sicherheit (IPsec)." In Sicherheit und Kryptographie im Internet, 123–79. Wiesbaden: Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29260-7_8.
Full textSchwenk, Jörg. "IP Security (IPSec)." In Sicherheit und Kryptographie im Internet, 124–57. Wiesbaden: Vieweg+Teubner, 2010. http://dx.doi.org/10.1007/978-3-8348-9665-0_5.
Full textSchwenk, Jörg. "IP Security (IPSec)." In Sicherheit und Kryptographie im Internet, 118–51. Wiesbaden: Vieweg+Teubner Verlag, 2005. http://dx.doi.org/10.1007/978-3-322-95321-6_5.
Full textConference papers on the topic "IPsec"
Barylski, Marcin. "On IPSec performance testing of IPv4/IPv6 IPSec gateway." In 2008 1st International Conference on Information Technology (IT 2008). IEEE, 2008. http://dx.doi.org/10.1109/inftech.2008.4621618.
Full textDhall, Hitesh, Dolly Dhall, Sonia Batra, and Pooja Rani. "Implementation of IPSec Protocol." In Communication Technologies (ACCT). IEEE, 2012. http://dx.doi.org/10.1109/acct.2012.64.
Full textHamadah, Fatin, M. A. Rahman, and Thien Wan Au. "Impact of IPSec on MANET." In 2016 International Symposium on Computer, Consumer and Control (IS3C). IEEE, 2016. http://dx.doi.org/10.1109/is3c.2016.110.
Full textZheng, Liangbin, and Yongbin Zhang. "An Enhanced IPSec Security Strategy." In 2009 International Forum on Information Technology and Applications (IFITA). IEEE, 2009. http://dx.doi.org/10.1109/ifita.2009.203.
Full textBrower, Etzel, LaTonya Jeffress, Jonah Pezeshki, Rohan Jasani, and Emre Ertekin. "Integrating Header Compression with IPsec." In MILCOM 2006. IEEE, 2006. http://dx.doi.org/10.1109/milcom.2006.302503.
Full textIoannides, J., and A. Keromytis. "Network security and IPsec (tutorial)." In the 7th ACM conference. New York, New York, USA: ACM Press, 2000. http://dx.doi.org/10.1145/352600.352601.
Full textShue, C. A., M. Gupta, and S. A. Myers. "IPSec: Performance Analysis and Enhancements." In 2007 IEEE International Conference on Communications. IEEE, 2007. http://dx.doi.org/10.1109/icc.2007.256.
Full textWang, Cliff X., and William J. Chimiak. "Application of IPsec to teleradiology." In Medical Imaging '99, edited by G. James Blaine and Steven C. Horii. SPIE, 1999. http://dx.doi.org/10.1117/12.352763.
Full textChitre, Prakash, Manish Karir, and Michael Hadjitheodosiou. "TCP In the IPSEC Environment." In 22nd AIAA International Communications Satellite Systems Conference & Exhibit 2004 (ICSSC). Reston, Virigina: American Institute of Aeronautics and Astronautics, 2004. http://dx.doi.org/10.2514/6.2004-3207.
Full textHerzinger, Daniel, Stefan-Lukas Gazdag, and Daniel Loebenberger. "Real-World Quantum-Resistant IPsec." In 2021 14th International Conference on Security of Information and Networks (SIN). IEEE, 2021. http://dx.doi.org/10.1109/sin54109.2021.9699255.
Full textReports on the topic "IPsec"
Ertekin, E., C. Christou, and C. Bormann. IPsec Extensions to Support Robust Header Compression over IPsec. RFC Editor, May 2010. http://dx.doi.org/10.17487/rfc5858.
Full textPatel, B., B. Aboba, W. Dixon, G. Zorn, and S. Booth. Securing L2TP using IPsec. RFC Editor, November 2001. http://dx.doi.org/10.17487/rfc3193.
Full textHoffman, P. Cryptographic Suites for IPsec. RFC Editor, December 2005. http://dx.doi.org/10.17487/rfc4308.
Full textWilliams, N. IPsec Channels: Connection Latching. RFC Editor, October 2009. http://dx.doi.org/10.17487/rfc5660.
Full textNir, Y. IPsec Cluster Problem Statement. RFC Editor, October 2010. http://dx.doi.org/10.17487/rfc6027.
Full textFrankel, S. E., K. Kent, R. Lewkowski, A. D. Orebaugh, R. W. Ritchey, and S. R. Sharma. Guide to IPsec VPNs. Gaithersburg, MD: National Institute of Standards and Technology, 2005. http://dx.doi.org/10.6028/nist.sp.800-77.
Full textBarker, Elaine, Quynh Dang, Sheila Frankel, Karen Scarfone, and Paul Wouters. Guide to IPsec VPNs. Gaithersburg, MD: National Institute of Standards and Technology, June 2020. http://dx.doi.org/10.6028/nist.sp.800-77r1.
Full textFraser, Laurie, Kathryn Roose, and Greg Nix. IPSec VPN Capabilities and Interoperability. Fort Belvoir, VA: Defense Technical Information Center, July 2006. http://dx.doi.org/10.21236/ada451929.
Full textJason, J., L. Rafalow, and E. Vyncke. IPsec Configuration Policy Information Model. RFC Editor, August 2003. http://dx.doi.org/10.17487/rfc3585.
Full textBerger, L., R. White, and E. Rosen. BGP IPsec Tunnel Encapsulation Attribute. RFC Editor, June 2009. http://dx.doi.org/10.17487/rfc5566.
Full text