Academic literature on the topic 'IPsec IPsec protocol suite'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IPsec IPsec protocol suite.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "IPsec IPsec protocol suite"

1

Hadood, Ashraf Khalifa M. "Implementation of Site to Site IPsec VPN Tunnel using GNS3 Simulation." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 2302–7. https://doi.org/10.22214/ijraset.2024.65635.

Full text
Abstract:
Abstract: This paper focuses on the implementation of a site-to-site IPsec tunnel to establish a secure connected link over a public network between two sites. To do so, an IP addressing plan was created and a topology was drawn to replicate a local area network between different sites, i.e., LIBYA and TUNIS. After this, an IP tunnel was set up, secure communication was established in the replicating LAN, and all packets were transferred over an encrypted form between the two different sites correctly. The area of this study lies in the domains of network security and VPN. When discussing the
APA, Harvard, Vancouver, ISO, and other styles
2

Alhaj, Abdullah A. "Performance Evaluation of Secure Data Transmission Mechanism (SDTM) for Cloud Outsourced Data and Transmission Layer Security (TLS)." International Journal of Cloud Applications and Computing 4, no. 1 (2014): 45–49. http://dx.doi.org/10.4018/ijcac.2014010104.

Full text
Abstract:
The Cloud has become a significant topic in computing; however, the trend has established a new range of security issues that need to be addressed. In Cloud, the data and associated software are not under their control. In addition, with the growing demands for Cloud networks communication. With the increasing demand for computer communications the need for security is growing dramatically. The existing research related to security mechanisms focuses on security of the data transmission in the communication networks only. The authors developed specific Secure Data Transmission Mechanism (S SDT
APA, Harvard, Vancouver, ISO, and other styles
3

Elezi, Muhamed, and Bujar Raufi. "Conception of Virtual Private Networks Using IPsec Suite of Protocols, Comparative Analysis of Distributed Database Queries Using Different IPsec Modes of Encryption." Procedia - Social and Behavioral Sciences 195 (July 2015): 1938–48. http://dx.doi.org/10.1016/j.sbspro.2015.06.206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nikeshin, A. V., N. V. Pakulin, and V. Z. Shnitman. "Development of a test suite for the verification of implementations of the IPsec v2 security protocol." Programming and Computer Software 37, no. 1 (2011): 26–40. http://dx.doi.org/10.1134/s0361768811010038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tyshyk, Ivan. "CHOICE OF REMOTE ACCESS TECHNOLOGY FOR EFFECTIVE ORGANIZATION OF PROTECTION OF NETWORK CONNECTIONS." Cybersecurity: Education, Science, Technique 3, no. 19 (2023): 34–45. http://dx.doi.org/10.28925/2663-4023.2023.19.3445.

Full text
Abstract:
Modern methods and means of building a service of virtual private networks are considered, the ways of their realization with the help of hardware and software on the example of a private virtual network based on CISCO FlexVPN are analyzed. To implement this task, the key exchange protocol was used to ensure the security of interaction in IKEv2 virtual networks. It is noteworthy that FlexVPN in IOS by default requires minimal action from the system administrator to quickly configure the VPN. The so-called smart-defaults are intended for this (standard ikev2 proposal / policy / profile, ipsec p
APA, Harvard, Vancouver, ISO, and other styles
6

Said, Muhammad Ali, Setyorini ‏‏‎ ‏‏‎ Setyorini‏‏‎, and Erwid M. Jadied. "Analysis of IPSec Implementation on Dynamic Multipoint VPN Protocol Using Routing Border Gateway Protocol." Building of Informatics, Technology and Science (BITS) 4, no. 2 (2022): 595–605. http://dx.doi.org/10.47065/bits.v4i2.1836.

Full text
Abstract:
Dynamic Multipoint Virtual Private Network (DMVPN) technology is one of Cisco's solutions to overcome the limitations of VPN scalability. DMVPN has a combination of components: Next hop resolution protocol (NHRP), Multipoint Generic Routing Encapsulation (mGRE) and Routing protocol. This research implements a simple network consisting of Hub, Spoke1, Spoke2, Lan1, Lan2 and Lan3 using the GNS3 simulator. This study compares the performance of IPSec and without IPsec on DMVPN using the BGP Routing protocol on performance parameters namely delay, throughput, jitter and packet loss to evaluate the
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Xiao Dan, Qiang Yue, and Li Min Su. "The Research and Design for IPSec Protocol Based on Embedded Linux OS over IPv6." Applied Mechanics and Materials 195-196 (August 2012): 1111–15. http://dx.doi.org/10.4028/www.scientific.net/amm.195-196.1111.

Full text
Abstract:
The paper analyzes the principle and key technique of IPSec protocol, researches the security policy and processing flow of IPSec, presents the design ideal and implementation scheme of IPSec based on embedded Linux Operation System. The realization of IPSec mainly consists of five modules. In addition, every module function is discussed in detail.
APA, Harvard, Vancouver, ISO, and other styles
8

Ali, Twana. "Literature Review on Using Internet Protocol Security (IPsec) on network Connectivity." Sulaimani Journal for Engineering Sciences 11, no. 1 (2024): 111–19. https://doi.org/10.17656/sjes.10183.

Full text
Abstract:
Internet Protocol Security (IPsec) is a widely used implementation process for Virtual Private Networks (VPNs). IPsec, introduced by the Internet Engineering Task Force (IETF), is a common tunneling technology for Virtual Private Networks that enhances the security features of the network layer, allowing several segments of a private network to function as a single segment. This research analyzes the overheads associated with IPsec. The results of this review paper demonstrate that IPsec remains within appropriate operating ranges even when additional packets are inserted. IPsec consists of tw
APA, Harvard, Vancouver, ISO, and other styles
9

Fan, Ya Qin, Ling Lv, Mei Lin Liu, and Fei Xie. "Improvements Based on the IPSec VPN Secuirity." Advanced Materials Research 756-759 (September 2013): 2693–97. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2693.

Full text
Abstract:
In this paper, through specific description of the concept of virtual private network VPN, operating principles and the IPSec protocol, and using the OPNET software for performance simulation of IPSec VPN network, we get the result of IPSec VPN throughput of the network, which is unstable. o though IPSec VPN has improved the safety performance of data transmission, it at the same time affects the transmission efficiency. By analyzing the problems of IPSec VPN, in terms of improving safety performance, the combination of PKI and IPSec VPN program was proposed. Theoretical analysis shows that su
APA, Harvard, Vancouver, ISO, and other styles
10

Rahman, Ikhwanul Kurnia, and L. N. Harnaningrum. "Analisa Quality of Service (QoS) Pada Jaringan L2TP IPSec Dan Wireguard VPN untuk mengamankan VoIP." Jurnal RESISTOR (Rekayasa Sistem Komputer) 7, no. 1 (2024): 10–20. http://dx.doi.org/10.31598/jurnalresistor.v7i1.1553.

Full text
Abstract:
Voice Over Internet Protocol (VOIP) merupakan teknologi yang memanfaatkan Internet Protocol untuk menyediakan komunikasi voice secara elektronis dan real-time. Keamanan data dalam penggunaan layanan VoIP sangat penting untuk mencegah kebocoran informasi yang sensitive. sehingga dibutuhkan teknologi VPN yang dapat mengamankan agar terhindar dari penyadapan. Pada penelitian ini membuktikan bahwa penggunaan VPN L2TP IPSec dan Wireguard berhasil mengamankan komunikasi data VoIP dari penyadapan. Adapun hasil pengujian delay didapati bahwa L2TP IPSec memiliki rata-rata delay 19,9997ms sedangkan wire
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "IPsec IPsec protocol suite"

1

Ульянік, О. М. "Графічний інтерфейс налаштування набору технологій DMVPN(Multipoint GRE+NHRP) over IPsec". Master's thesis, Сумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/82385.

Full text
Abstract:
Розроблена веб-орієнтована інформаційна система, графічний інтерфейс якої дозволяє вибрати необхідні налаштування, автоматично конфігурувати інтерфейси роутера, налаштувати на маршрутизаторах конфігурацію захищених мереж DMVPN over IPsec. Система дозволяє зручно перенести згенерований код налаштувань роутера в налаштування реального мережевого обладнання. Система має пояснювальну записку щодо отриманих команд, а також має захист від невірно введених початкових даних. Систему реалізовано у формі веб-додатку з використанням мови програмування JavaScript.
APA, Harvard, Vancouver, ISO, and other styles
2

Bani-Hani, Raed M. "Enhancing the IKE preshared key authentication method." Diss., Columbia, Mo. : University of Missouri-Columbia, 2006. http://hdl.handle.net/10355/4406.

Full text
Abstract:
Thesis (Ph. D.) University of Missouri-Columbia, 2006.<br>The entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file (viewed on July 31, 2007) Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
3

Horn, John F. "IPSec-based dynamic security services for the MYSEA environment." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FHorn.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2005.<br>Thesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 107-109). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
4

Mohan, Raj. "XML based adaptive IPsec policy management in a trust management context /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FMohan.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science and M.S. in Information Technology Management)--Naval Postgraduate School, September 2002.<br>Thesis advisor(s): Cynthia E. Irvine, Timothy E. Levin. Includes bibliographical references (p. 71-72). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
5

Hellsing, Mattias, and Odervall Albin. "Efficient Multi-Core Implementation of the IPsec Encapsulating Security Payload Protocol for a Single Security Association." Thesis, Linköpings universitet, Programvara och system, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-151984.

Full text
Abstract:
As the mobile Internet traffic increases, the workload of the base stations processing this traffic increases with it. To cope with this, the telecommunication providers responsible for the systems deployed in these base stations have looked to parallelism. This, together with the fact that these providers have a vested interest in protecting their users' data from potential attackers, means that there is a need for efficient parallel packet processing software which handles encryption as well as authentication. A well known protocol for encryption and authentication of IP packets is the Encap
APA, Harvard, Vancouver, ISO, and other styles
6

Izadinia, Vafa Dario. "Fingerprinting Encrypted Tunnel Endpoints." Diss., University of Pretoria, 2005. http://hdl.handle.net/2263/25351.

Full text
Abstract:
Operating System fingerprinting is a reconnaissance method used by Whitehats and Blackhats alike. Current techniques for fingerprinting do not take into account tunneling protocols, such as IPSec, SSL/TLS, and SSH, which effectively `wrap` network traffic in a ciphertext mantle, thus potentially rendering passive monitoring ineffectual. Whether encryption makes VPN tunnel endpoints immune to fingerprinting, or yields the encrypted contents of the VPN tunnel entirely indistinguishable, is a topic that has received modest coverage in academic literature. This study addresses these question by ta
APA, Harvard, Vancouver, ISO, and other styles
7

Valverde, Lionel J., and Romelo B. Nafarrette. "Secure wireless handoff." Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/943.

Full text
Abstract:
Approved for public release, distribution is unlimited<br>With the rapidly growing demand for portable devices such as laptops, handheld computers and Personal Digital Assistants (PDAs) with wireless networking capabilities, the need for reliable wireless data network communication has also increased. Just like in mobile voice communication, users demand uninterrupted, secure wireless data communication as they move from place to place. Mobile IP satisfies some of these demands - it enables mobile devices with fixed IP addresses to be permanently reachable even as their point of attachment to
APA, Harvard, Vancouver, ISO, and other styles
8

Duarte, Coscia Bruno Marcel. "Evaluation of Network-Layer Security Technologies for Cloud Platforms." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-290293.

Full text
Abstract:
With the emergence of cloud-native applications, the need to secure networks and services creates new requirements concerning automation, manageability, and scalability across data centers. Several solutions have been developed to overcome the limitations of the conventional and well established IPsec suite as a secure tunneling solution. One strategy to meet these new requirements has been the design of software-based overlay networks. In this thesis, we assess the deployment of a traditional IPsec VPN solution against a new secure overlay mesh network called Nebula. We conduct a case study b
APA, Harvard, Vancouver, ISO, and other styles
9

Schlake, Farimehr. "Optimal Consumer-Centric Delay-Efficient Security Management in Multi-Agent Networks: A Game and Mechanism Design Theoretic Approach." Diss., Virginia Tech, 2012. http://hdl.handle.net/10919/77362.

Full text
Abstract:
The main aspiration behind the contributions of this research work is the achievement of simultaneuos delay-efficiency, autonomy, and security through innovative protocol design to address complex real-life problems. To achieve this, we take a holistic approach. We apply theoretical mathematical modeling implementing implications of social-economic behavioral characteristics to propose a cross-layer network security protocol. We further complement this approach by a layer-specific focus with implementations at two lower OSI layers. For the cross-layer design, we suggest the use of game and mec
APA, Harvard, Vancouver, ISO, and other styles
10

Konstantaras, Dimitrios, and Mustafa Tahir. "Securing Network Connected Applications with Proposed Security Models." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2022.

Full text
Abstract:
<p>In today’s society, serious organizations need protection against both internal and external attacks. There are many different technologies available that organizations can incorporate into their organization in order to enhance security for their networking applications. Unfortunately, security is way to often considered as an afterthought and therefore implemented as an external part of the applications. This is usually performed by introducing general security models and technologies.</p><p>However, an already developed, well structured and considered security approach – with proper impl
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "IPsec IPsec protocol suite"

1

Frankel, Sheila. Demystifying the IPsec puzzle. Artech House, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Carmouche, James Henry. IPsec virtual private network fundamentals. Cisco Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Carmouche, James Henry. IPsec virtual private network fundamentals. Cisco Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bollapragada, Vijay, Scott Wainner, and Mohamed Khalid. IPSec VPN Design. Cisco Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bollapragada, Vijay, Scott Wainner, and Mohamed Khalid. IPSec VPN Design. Pearson Education, Limited, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

IPSec: Securing VPNs. Osborne/McGraw-Hill, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Carmouche, James Henry. IPsec Virtual Private Network Fundamentals. Cisco Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

IPSec Virtual Private Network Fundamentals. Pearson Education, Limited, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

IPsec virtual private network fundamentals. Cisco Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tiller, James S. Technical Guide to Ipsec Virtual Private Networks. Taylor & Francis Group, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "IPsec IPsec protocol suite"

1

Bhutta, Muhammad Nasir Mumtaz, and Haitham Cruickshank. "A New Dynamic Multilayer IPSec Protocol." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36787-8_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kiraly, Csaba, Simone Teofili, Giuseppe Bianchi, Renato Lo Cigno, Matteo Nardelli, and Emanuele Delzeri. "Traffic Flow Confidentiality in IPsec: Protocol and Implementation." In The Future of Identity in the Information Society. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-79026-8_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kumar, Jayendra, Mohit Kumar, Deepak Kumar Pandey, and Rishikesh Raj. "Encryption and Authentication of Data Using the IPSEC Protocol." In Lecture Notes in Electrical Engineering. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5546-6_71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tian, Kai, Fushan Wei, Chunxiang Gu, and Yanan Shi. "Analysis of Vulnerability of IPsec Protocol Implementation Based on Differential Fuzzing." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96791-8_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hau, Kwan-Leong, Amelia Lane, Rosellina Guarascio, and Michael E. Cheetham. "Eye on a Dish Models to Evaluate Splicing Modulation." In Methods in Molecular Biology. Springer US, 2022. http://dx.doi.org/10.1007/978-1-0716-2010-6_16.

Full text
Abstract:
AbstractInherited retinal dystrophies, such as Leber congenital amaurosis, Stargardt disease, and retinitis pigmentosa, are characterized by photoreceptor dysfunction and death and currently have few treatment options. Recent technological advances in induced pluripotent stem cell (iPSC) technology and differentiation methods mean that human photoreceptors can now be studied in vitro. For example, retinal organoids provide a platform to study the development of the human retina and mechanisms of diseases in the dish, as well as being a potential source for cell transplantation. Here, we descri
APA, Harvard, Vancouver, ISO, and other styles
6

Bhattacharjya, Aniruddha, Xiaofeng Zhong, Jing Wang, and Xing Li. "CoAP—Application Layer Connection-Less Lightweight Protocol for the Internet of Things (IoT) and CoAP-IPSEC Security with DTLS Supporting CoAP." In Internet of Things. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-18732-3_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Alhaj, Abdullah A. "Performance Evaluation of Secure Data Transmission Mechanism (SDTM) for Cloud Outsourced Data and Transmission Layer Security (TLS)." In Cloud Technology. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6539-2.ch038.

Full text
Abstract:
The Cloud has become a significant topic in computing; however, the trend has established a new range of security issues that need to be addressed. In Cloud, the data and associated software are not under their control. In addition, with the growing demands for Cloud networks communication. With the increasing demand for computer communications the need for security is growing dramatically. The existing research related to security mechanisms focuses on security of the data transmission in the communication networks only. The authors developed specific Secure Data Transmission Mechanism (S SDT
APA, Harvard, Vancouver, ISO, and other styles
8

Loshin, Pete. "The IP Security Protocol (IPsec)." In IPv6. Elsevier, 2004. http://dx.doi.org/10.1016/b978-155860810-8/50009-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Stackpole, William. "IP Security Protocol Working Group (IPSec)." In Encyclopedia of Information Assurance. CRC Press, 2010. http://dx.doi.org/10.1081/e-eia-120046372.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mujinga, M., Hippolyte Muyingi, Alfredo Terzoli, and G. S. V. Radha Krishna Rao. "IPSec Overhead in Dual Stack IPv4/IPv6 Transition Mechanisms." In Web Services Security and E-Business. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59904-168-1.ch019.

Full text
Abstract:
Internet protocol version 6 (IPv6) is the next generation Internet protocol proposed by the Internet Engineering Task Force (IETF) to supplant the current Internet protocol version 4 (IPv4). Lack of security below the application layer in IPv4 is one of the reasons why there is a need for a new IP. IPv6 has built-in support for the Internet protocol security protocol (IPSec). This chapter reports work done to evaluate implications of compulsory use of IPSec on dual stack IPv4/IPv6 environment.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "IPsec IPsec protocol suite"

1

Korona, Mateusz, Krzysztof Skowron, Mateusz Trzepinski, and Mariusz Rawski. "FPGA implementation of IPsec protocol suite for multigigabit networks." In 2017 International Conference on Systems, Signals and Image Processing (IWSSIP). IEEE, 2017. http://dx.doi.org/10.1109/iwssip.2017.7965619.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Coutinho, Murilo, Iago Passos, Rafael T. de Sousa Jr., and Fábio Borges. "Improving the Security of ChaCha against Differential-Linear Cryptanalysis." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg.2020.19224.

Full text
Abstract:
The stream cipher ChaCha has received a lot of attention and recently is being used as a new cipher suite in TLS 1.3, as a random number generator for operating systems (Linux, FreeBSD, OpenBSD, NetBSD, and DragonFly BSD), a proposed standardization in RFC 7634 for use IKE and IPsec, and by the WireGuard VPN protocol. Because of that, it is very important to understand and study the security of this algorithm. Previous works showed that it is possible to break up to 7 of the 20 rounds of ChaCha. In this paper, we show that a simple modification in the algorithm, namely changing the rotation di
APA, Harvard, Vancouver, ISO, and other styles
3

Dhall, Hitesh, Dolly Dhall, Sonia Batra, and Pooja Rani. "Implementation of IPSec Protocol." In Communication Technologies (ACCT). IEEE, 2012. http://dx.doi.org/10.1109/acct.2012.64.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Song, Mei, and Zhitang Li. "One Improved IPSec Protocol Supporting Multicast Communication." In Second International Conference on Digital Telecommunications, ICDT 2007. IEEE, 2007. http://dx.doi.org/10.1109/icdt.2007.26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

S, Amaldeep, and Sriram Sankaran. "Cross Protocol Attack on IPSec-based VPN." In 2023 11th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2023. http://dx.doi.org/10.1109/isdfs58141.2023.10131787.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Xin Wen, Changqiao Xu, Jianfeng Guan, Wei Su, and Hongke Zhang. "Performance investigation of IPsec protocol over IPv6 network." In 2010 International Conference on Advanced Intelligence and Awareness Internet (AIAI 2010). IET, 2010. http://dx.doi.org/10.1049/cp.2010.0747.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tran, Trung. "Proactive Multicast-Based IPSEC Discovery Protocol and Multicast Extension." In MILCOM 2006. IEEE, 2006. http://dx.doi.org/10.1109/milcom.2006.302252.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wu, Jianwu. "Implementation of Virtual Private Network Based on IPSec Protocol." In 2009 ETP International Conference on Future Computer and Communication (FCC). IEEE, 2009. http://dx.doi.org/10.1109/fcc.2009.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lastinec, Jan, and Ladislav Hudec. "A performance analysis of IPSec/AH protocol for automotive environment." In the 16th International Conference. ACM Press, 2015. http://dx.doi.org/10.1145/2812428.2812434.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Su, Rui-dan, Xiang-quan Che, Shao-feng Fu, Long-hai Li, and Li-hua Zhou. "Protocol-Based Hidden Key Recovery: IBE Approach and IPSec Case." In 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009). IEEE, 2009. http://dx.doi.org/10.1109/nswctc.2009.137.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "IPsec IPsec protocol suite"

1

Burgin, K., and M. Peck. Suite B Profile for Internet Protocol Security (IPsec). RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6380.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Corcoran, L., and M. Jenkins. Commercial National Security Algorithm (CNSA) Suite Cryptography for Internet Protocol Security (IPsec). RFC Editor, 2022. http://dx.doi.org/10.17487/rfc9206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Law, L., and J. Solinas. Suite B Cryptographic Suites for IPsec. RFC Editor, 2007. http://dx.doi.org/10.17487/rfc4869.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Law, L., and J. Solinas. Suite B Cryptographic Suites for IPsec. RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6379.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kalyani, G., Y. Nir, Y. Sheffer, and D. Zhang. Protocol Support for High Availability of IKEv2/IPsec. Edited by R. Singh. RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6311.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Patel, B., B. Aboba, S. Kelly, and V. Gupta. Dynamic Host Configuration Protocol (DHCPv4) Configuration of IPsec Tunnel Mode. RFC Editor, 2003. http://dx.doi.org/10.17487/rfc3456.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bellovin, S., J. Ioannidis, A. Keromytis, and R. Stewart. On the Use of Stream Control Transmission Protocol (SCTP) with IPsec. RFC Editor, 2003. http://dx.doi.org/10.17487/rfc3554.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pauly, T., and V. Smyslov. TCP Encapsulation of Internet Key Exchange Protocol (IKE) and IPsec Packets. RFC Editor, 2022. http://dx.doi.org/10.17487/rfc9329.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Domagalski, Joshua E. Internet Protocol Security (IPSEC): Testing and Implications on IPv4 and IPv6 Networks. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada526644.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nir, Y. ChaCha20, Poly1305, and Their Use in the Internet Key Exchange Protocol (IKE) and IPsec. RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7634.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!