Academic literature on the topic 'IPsec IPsec protocol suite'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IPsec IPsec protocol suite.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "IPsec IPsec protocol suite"
Hadood, Ashraf Khalifa M. "Implementation of Site to Site IPsec VPN Tunnel using GNS3 Simulation." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 2302–7. https://doi.org/10.22214/ijraset.2024.65635.
Full textAlhaj, Abdullah A. "Performance Evaluation of Secure Data Transmission Mechanism (SDTM) for Cloud Outsourced Data and Transmission Layer Security (TLS)." International Journal of Cloud Applications and Computing 4, no. 1 (2014): 45–49. http://dx.doi.org/10.4018/ijcac.2014010104.
Full textElezi, Muhamed, and Bujar Raufi. "Conception of Virtual Private Networks Using IPsec Suite of Protocols, Comparative Analysis of Distributed Database Queries Using Different IPsec Modes of Encryption." Procedia - Social and Behavioral Sciences 195 (July 2015): 1938–48. http://dx.doi.org/10.1016/j.sbspro.2015.06.206.
Full textNikeshin, A. V., N. V. Pakulin, and V. Z. Shnitman. "Development of a test suite for the verification of implementations of the IPsec v2 security protocol." Programming and Computer Software 37, no. 1 (2011): 26–40. http://dx.doi.org/10.1134/s0361768811010038.
Full textTyshyk, Ivan. "CHOICE OF REMOTE ACCESS TECHNOLOGY FOR EFFECTIVE ORGANIZATION OF PROTECTION OF NETWORK CONNECTIONS." Cybersecurity: Education, Science, Technique 3, no. 19 (2023): 34–45. http://dx.doi.org/10.28925/2663-4023.2023.19.3445.
Full textSaid, Muhammad Ali, Setyorini Setyorini, and Erwid M. Jadied. "Analysis of IPSec Implementation on Dynamic Multipoint VPN Protocol Using Routing Border Gateway Protocol." Building of Informatics, Technology and Science (BITS) 4, no. 2 (2022): 595–605. http://dx.doi.org/10.47065/bits.v4i2.1836.
Full textChen, Xiao Dan, Qiang Yue, and Li Min Su. "The Research and Design for IPSec Protocol Based on Embedded Linux OS over IPv6." Applied Mechanics and Materials 195-196 (August 2012): 1111–15. http://dx.doi.org/10.4028/www.scientific.net/amm.195-196.1111.
Full textAli, Twana. "Literature Review on Using Internet Protocol Security (IPsec) on network Connectivity." Sulaimani Journal for Engineering Sciences 11, no. 1 (2024): 111–19. https://doi.org/10.17656/sjes.10183.
Full textFan, Ya Qin, Ling Lv, Mei Lin Liu, and Fei Xie. "Improvements Based on the IPSec VPN Secuirity." Advanced Materials Research 756-759 (September 2013): 2693–97. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2693.
Full textRahman, Ikhwanul Kurnia, and L. N. Harnaningrum. "Analisa Quality of Service (QoS) Pada Jaringan L2TP IPSec Dan Wireguard VPN untuk mengamankan VoIP." Jurnal RESISTOR (Rekayasa Sistem Komputer) 7, no. 1 (2024): 10–20. http://dx.doi.org/10.31598/jurnalresistor.v7i1.1553.
Full textDissertations / Theses on the topic "IPsec IPsec protocol suite"
Ульянік, О. М. "Графічний інтерфейс налаштування набору технологій DMVPN(Multipoint GRE+NHRP) over IPsec". Master's thesis, Сумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/82385.
Full textBani-Hani, Raed M. "Enhancing the IKE preshared key authentication method." Diss., Columbia, Mo. : University of Missouri-Columbia, 2006. http://hdl.handle.net/10355/4406.
Full textHorn, John F. "IPSec-based dynamic security services for the MYSEA environment." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FHorn.pdf.
Full textMohan, Raj. "XML based adaptive IPsec policy management in a trust management context /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FMohan.pdf.
Full textHellsing, Mattias, and Odervall Albin. "Efficient Multi-Core Implementation of the IPsec Encapsulating Security Payload Protocol for a Single Security Association." Thesis, Linköpings universitet, Programvara och system, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-151984.
Full textIzadinia, Vafa Dario. "Fingerprinting Encrypted Tunnel Endpoints." Diss., University of Pretoria, 2005. http://hdl.handle.net/2263/25351.
Full textValverde, Lionel J., and Romelo B. Nafarrette. "Secure wireless handoff." Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/943.
Full textDuarte, Coscia Bruno Marcel. "Evaluation of Network-Layer Security Technologies for Cloud Platforms." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-290293.
Full textSchlake, Farimehr. "Optimal Consumer-Centric Delay-Efficient Security Management in Multi-Agent Networks: A Game and Mechanism Design Theoretic Approach." Diss., Virginia Tech, 2012. http://hdl.handle.net/10919/77362.
Full textKonstantaras, Dimitrios, and Mustafa Tahir. "Securing Network Connected Applications with Proposed Security Models." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2022.
Full textBooks on the topic "IPsec IPsec protocol suite"
Carmouche, James Henry. IPsec virtual private network fundamentals. Cisco Press, 2007.
Find full textCarmouche, James Henry. IPsec virtual private network fundamentals. Cisco Press, 2007.
Find full textBollapragada, Vijay, Scott Wainner, and Mohamed Khalid. IPSec VPN Design. Cisco Press, 2005.
Find full textBollapragada, Vijay, Scott Wainner, and Mohamed Khalid. IPSec VPN Design. Pearson Education, Limited, 2005.
Find full textCarmouche, James Henry. IPsec Virtual Private Network Fundamentals. Cisco Press, 2006.
Find full textTiller, James S. Technical Guide to Ipsec Virtual Private Networks. Taylor & Francis Group, 2000.
Find full textBook chapters on the topic "IPsec IPsec protocol suite"
Bhutta, Muhammad Nasir Mumtaz, and Haitham Cruickshank. "A New Dynamic Multilayer IPSec Protocol." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36787-8_15.
Full textKiraly, Csaba, Simone Teofili, Giuseppe Bianchi, Renato Lo Cigno, Matteo Nardelli, and Emanuele Delzeri. "Traffic Flow Confidentiality in IPsec: Protocol and Implementation." In The Future of Identity in the Information Society. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-79026-8_22.
Full textKumar, Jayendra, Mohit Kumar, Deepak Kumar Pandey, and Rishikesh Raj. "Encryption and Authentication of Data Using the IPSEC Protocol." In Lecture Notes in Electrical Engineering. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5546-6_71.
Full textTian, Kai, Fushan Wei, Chunxiang Gu, and Yanan Shi. "Analysis of Vulnerability of IPsec Protocol Implementation Based on Differential Fuzzing." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96791-8_21.
Full textHau, Kwan-Leong, Amelia Lane, Rosellina Guarascio, and Michael E. Cheetham. "Eye on a Dish Models to Evaluate Splicing Modulation." In Methods in Molecular Biology. Springer US, 2022. http://dx.doi.org/10.1007/978-1-0716-2010-6_16.
Full textBhattacharjya, Aniruddha, Xiaofeng Zhong, Jing Wang, and Xing Li. "CoAP—Application Layer Connection-Less Lightweight Protocol for the Internet of Things (IoT) and CoAP-IPSEC Security with DTLS Supporting CoAP." In Internet of Things. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-18732-3_9.
Full textAlhaj, Abdullah A. "Performance Evaluation of Secure Data Transmission Mechanism (SDTM) for Cloud Outsourced Data and Transmission Layer Security (TLS)." In Cloud Technology. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6539-2.ch038.
Full textLoshin, Pete. "The IP Security Protocol (IPsec)." In IPv6. Elsevier, 2004. http://dx.doi.org/10.1016/b978-155860810-8/50009-4.
Full textStackpole, William. "IP Security Protocol Working Group (IPSec)." In Encyclopedia of Information Assurance. CRC Press, 2010. http://dx.doi.org/10.1081/e-eia-120046372.
Full textMujinga, M., Hippolyte Muyingi, Alfredo Terzoli, and G. S. V. Radha Krishna Rao. "IPSec Overhead in Dual Stack IPv4/IPv6 Transition Mechanisms." In Web Services Security and E-Business. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59904-168-1.ch019.
Full textConference papers on the topic "IPsec IPsec protocol suite"
Korona, Mateusz, Krzysztof Skowron, Mateusz Trzepinski, and Mariusz Rawski. "FPGA implementation of IPsec protocol suite for multigigabit networks." In 2017 International Conference on Systems, Signals and Image Processing (IWSSIP). IEEE, 2017. http://dx.doi.org/10.1109/iwssip.2017.7965619.
Full textCoutinho, Murilo, Iago Passos, Rafael T. de Sousa Jr., and Fábio Borges. "Improving the Security of ChaCha against Differential-Linear Cryptanalysis." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg.2020.19224.
Full textDhall, Hitesh, Dolly Dhall, Sonia Batra, and Pooja Rani. "Implementation of IPSec Protocol." In Communication Technologies (ACCT). IEEE, 2012. http://dx.doi.org/10.1109/acct.2012.64.
Full textSong, Mei, and Zhitang Li. "One Improved IPSec Protocol Supporting Multicast Communication." In Second International Conference on Digital Telecommunications, ICDT 2007. IEEE, 2007. http://dx.doi.org/10.1109/icdt.2007.26.
Full textS, Amaldeep, and Sriram Sankaran. "Cross Protocol Attack on IPSec-based VPN." In 2023 11th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2023. http://dx.doi.org/10.1109/isdfs58141.2023.10131787.
Full textXin Wen, Changqiao Xu, Jianfeng Guan, Wei Su, and Hongke Zhang. "Performance investigation of IPsec protocol over IPv6 network." In 2010 International Conference on Advanced Intelligence and Awareness Internet (AIAI 2010). IET, 2010. http://dx.doi.org/10.1049/cp.2010.0747.
Full textTran, Trung. "Proactive Multicast-Based IPSEC Discovery Protocol and Multicast Extension." In MILCOM 2006. IEEE, 2006. http://dx.doi.org/10.1109/milcom.2006.302252.
Full textWu, Jianwu. "Implementation of Virtual Private Network Based on IPSec Protocol." In 2009 ETP International Conference on Future Computer and Communication (FCC). IEEE, 2009. http://dx.doi.org/10.1109/fcc.2009.16.
Full textLastinec, Jan, and Ladislav Hudec. "A performance analysis of IPSec/AH protocol for automotive environment." In the 16th International Conference. ACM Press, 2015. http://dx.doi.org/10.1145/2812428.2812434.
Full textSu, Rui-dan, Xiang-quan Che, Shao-feng Fu, Long-hai Li, and Li-hua Zhou. "Protocol-Based Hidden Key Recovery: IBE Approach and IPSec Case." In 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009). IEEE, 2009. http://dx.doi.org/10.1109/nswctc.2009.137.
Full textReports on the topic "IPsec IPsec protocol suite"
Burgin, K., and M. Peck. Suite B Profile for Internet Protocol Security (IPsec). RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6380.
Full textCorcoran, L., and M. Jenkins. Commercial National Security Algorithm (CNSA) Suite Cryptography for Internet Protocol Security (IPsec). RFC Editor, 2022. http://dx.doi.org/10.17487/rfc9206.
Full textLaw, L., and J. Solinas. Suite B Cryptographic Suites for IPsec. RFC Editor, 2007. http://dx.doi.org/10.17487/rfc4869.
Full textLaw, L., and J. Solinas. Suite B Cryptographic Suites for IPsec. RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6379.
Full textKalyani, G., Y. Nir, Y. Sheffer, and D. Zhang. Protocol Support for High Availability of IKEv2/IPsec. Edited by R. Singh. RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6311.
Full textPatel, B., B. Aboba, S. Kelly, and V. Gupta. Dynamic Host Configuration Protocol (DHCPv4) Configuration of IPsec Tunnel Mode. RFC Editor, 2003. http://dx.doi.org/10.17487/rfc3456.
Full textBellovin, S., J. Ioannidis, A. Keromytis, and R. Stewart. On the Use of Stream Control Transmission Protocol (SCTP) with IPsec. RFC Editor, 2003. http://dx.doi.org/10.17487/rfc3554.
Full textPauly, T., and V. Smyslov. TCP Encapsulation of Internet Key Exchange Protocol (IKE) and IPsec Packets. RFC Editor, 2022. http://dx.doi.org/10.17487/rfc9329.
Full textDomagalski, Joshua E. Internet Protocol Security (IPSEC): Testing and Implications on IPv4 and IPv6 Networks. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada526644.
Full textNir, Y. ChaCha20, Poly1305, and Their Use in the Internet Key Exchange Protocol (IKE) and IPsec. RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7634.
Full text