Dissertations / Theses on the topic 'IPsec'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'IPsec.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Schreiber, Alexander, and Holm Sieber. "VPN/IPSec." Universitätsbibliothek Chemnitz, 2002. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200200982.
Full textAgar, Christopher D. "Dynamic parameterization of IPSEC." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA401378.
Full textThesis Advisor (s): Irvine, Cynthia E. "December 2001." Includes bibliographical references (p. 311-313). Also available online.
Xu, Chen, and chen8002004@hotmail com. "Building mobile L2TP/IPsec tunnels." RMIT University. Electrical and Computer Engineering, 2010. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20100329.160455.
Full textDavis, Carlton R. "IPSec base virtual private network." Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33390.
Full textJones, Chad F. (Chad Frederick) 1975. "An application level emulation of IPSEC." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/50051.
Full textIncludes bibliographical references (leaves 38-39).
by Chad F. Jones.
M.Eng.
Falconi, Aritana Pinheiro. "Uso dinâmico de IPSEC com IPV6." Instituto Nacional de Pesquisas Espaciais, 2004. http://urlib.net/sid.inpe.br/jeferson/2005/01.07.10.46.
Full textThe objective of this work is to propose a methodology of use of the security platform IP Security - IPSec - with the Internet Protocol Version 6 - IPv6 - in order to evaluate and increase the performance of the communication between machines connected by a network computer. The proposition is enabling IPSec only when strictly necessary, without keeping an encryption tunnel during the whole communication between machines. This is made by the applications having access directly to the IPSec security policies database and modifying some policies. The POP3 and FTP services had been used to evaluate the IPSec use only during the transference of an application user password. After that, the IPSec is disabled during the same TCP session.
Hiran, Vaishali Rahul. "Usability evaluation of IPsec configuring components." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-122423.
Full textKavun, Elif Bilge. "A Compact Cryptographic Processor For Ipsec Applications." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12612439/index.pdf.
Full textJutvik, Vilhelm. "IPsec and IKEv2 for the Contiki Operating System." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-229574.
Full textУльянік, О. М. "Графічний інтерфейс налаштування набору технологій DMVPN(Multipoint GRE+NHRP) over IPsec." Master's thesis, Сумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/82385.
Full textHorn, John F. "IPSec-based dynamic security services for the MYSEA environment." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FHorn.pdf.
Full textThesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 107-109). Also available online.
Sherwood, Nicholas. "An IPsec Compatible Implementation of DBRA and IP-ABR." Digital WPI, 2005. https://digitalcommons.wpi.edu/etd-theses/738.
Full textПавленко, Є. Р., Дмитро Володимирович Великодний, Дмитрий Владимирович Великодный, and Dmytro Volodymyrovych Velykodnyi. "Мережева безпека на основі протоколів IPsec і SSL VPN." Thesis, Сумський державний університет, 2017. http://essuir.sumdu.edu.ua/handle/123456789/65678.
Full textПавленко, Є. Р., Дмитро Володимирович Великодний, Дмитрий Владимирович Великодный, and Dmytro Volodymyrovych Velykodnyi. "Мережева безпека на основі протоколів IPsec і SSL VPN." Thesis, Сумський державний університет, 2017. http://essuir.sumdu.edu.ua/handle/123456789/64400.
Full textHayatnagarkar, Abhijit N. "On realizing traffic-driven security association establishment for IPSec." Raleigh, NC : North Carolina State University, 1999. http://www.lib.ncsu.edu/etd/public/etd-2754151749911361/etd.pdf.
Full textManfredsson, Alexander. "Spårbarhet i ett nätverk : En jämförelse mellan IPsec och 802.1x." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-23777.
Full textSingh, Mankaran. "Connectivity Between Two Distant Sites with Automatic Failover to IPsec." Thesis, California State University, Long Beach, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10262849.
Full textThis project presents simulation results on the connectivity, data transfer protocols, reliability, and recovery from failure between two Local Area Networks (LANs), which can be at two geographically distant locations, and are connected through a Wide Area Network (WAN). Connectivity within the WAN is provided by the Border Gateway Protocol (BGP) whereas communication within each of the LANs is based on Enhanced Interior Gateway Routing Protocol (EIGRP). Simulation results show that the network is successful in: (1) establishing communication between the LANs using the BGP protocol, and (2) providing recovery from failure through redundancy by using two BGP links within the WAN and a third Internet Protocol Security (IPsec) link. If one of the BGP link fails, the second one will take over, and if the second link fails, the traffic automatically shifts over to the Internet Protocol Security (IPsec) link.
Tryggvason, Thorir. "Analysis of the PPTP and IPSec protocols in Virtual Private Networks." Thesis, University of Skövde, Department of Computer Science, 2000. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-415.
Full textToday increasing numbers of individuals are working away from the ordinary workplace while still requiring access to the server located at the workplace. New technology is meeting this demand allowing for safe and secure transmission of the data over the Internet. The aim of this project is to analyse two protocols that are used within the Virtual Private Network (VPN) structure today, with the focus on installation, transmission speed on both Local Area Networks (LAN) and via telephone line and security aspects of the protocols.
The results show that it is quite complicated to setup a VPN network and to get operational. The results also show that there are security compromises within the VPN structure that indicate that if proper precaution is not taken it may give a false sense of security, where the user believes that it is a secure communication when in reality it is not.
Akinola, Azeez Paul, and zhang chong. "Tunnel comparison between Generic Routing Encapsulation (GRE) and IP Security (IPSec)." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-17610.
Full textReimers, Erik. "On the security of TLS and IPsec : Mitigation through physical constraints." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-119357.
Full textMohan, Raj. "XML based adaptive IPsec policy management in a trust management context." Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/4824.
Full textTCP/IP provided the impetus for the growth of the Internet and the IPsec protocol now promises to add to it the desired security strength. IPsec provides users with a mechanism to enforce a range of security services for both confidentiality and integrity, enabling them to securely pass information across networks. Dynamic parameterization of IPsec further enables security mechanisms to adjust the level of security service "on-the-fly" to respond to changing network and operational conditions. The IPsec implementation in OpenBSD works in conjunction with the Trust Management System, KeyNote, to achieve this. However the KeyNote engine requires that an IPsec policy be defined in the KeyNote specification syntax. Defining a security policy in the KeyNote Specification language is, however, extremely difficult and the complexity of the language could lead to incorrect specification of the desired policy, thus degrading the security of the network. This thesis looks into an alternative XML representation of this language and a graphical user interface to evolve a consistent and correct security policy. The interface has the simplicity of a simple menu-driven editor that not only provides KeyNote with a policy in the specified syntax but also integrates techniques for correctness verification and validation.
Mohan, Raj. "XML based adaptive IPsec policy management in a trust management context /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FMohan.pdf.
Full textThesis advisor(s): Cynthia E. Irvine, Timothy E. Levin. Includes bibliographical references (p. 71-72). Also available online.
Varadarajan, Prabhakar. "ENABLING END-TO-END SECURITY USING IPSEC IN WIRELESS SENSOR NETWORKS." OpenSIUC, 2013. https://opensiuc.lib.siu.edu/theses/1306.
Full textPalomares, Velasquez Daniel. "Study of mechanisms ensuring service continuity for IKEv2 and IPsec protocols." Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00939092.
Full textPalomares, Velasquez Daniel. "Study of mechanisms ensuring service continuity for IKEv2 and IPsec protocols." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2013. http://www.theses.fr/2013TELE0025.
Full textDuring 2012, the global mobile traffic represented 70\% more than 2011. The arrival of the 4G technology introduced 19 times more traffic than non-4G sessions, and in 2013 the number of mobile-connected to the Internet exceeded the number of human beings on earth. This scenario introduces great pressure towards the Internet service providers (ISPs), which are called to ensure access to the network and maintain its QoS. At short/middle term, operators will relay on alternative access networks in order to maintain the same performance characteristics. Thus, the traffic of the clients might be offloaded from RANs to some other available access networks. However, the same security level is not ensured by those wireless access networks. Femtocells, WiFi or WiMAX (among other wireless technologies), must rely on some mechanism to secure the communications and avoid untrusted environments. Operators are mainly using IPsec to extend a security domain over untrusted networks. This introduces new challenges in terms of performance and connectivity for IPsec. This thesis concentrates on the study of the mechanism considering improving the IPsec protocol in terms of continuity of service. The continuity of service, also known as resilience, becomes crucial when offloading the traffic from RANs to other access networks. This is why we first concentrate our effort in defining the protocols ensuring an IP communication: IKEv2 and IPsec. Then, we present a detailed study of the parameters needed to keep a VPN session alive, and we demonstrate that it is possible to dynamically manage a VPN session between different gateways. Some of the reasons that justify the management of VPN sessions is to provide high availability, load sharing or load balancing features for IPsec connections. These mechanisms increase the continuity of service of IPsec-based communication. For example, if for some reason a failure occurs to a security gateway, the ISP should be able to overcome this situation and to provide mechanisms to ensure continuity of service to its clients. Some new mechanisms have recently been implemented to provide High Availability over IPsec. The open source VPN project, StrongSwan, implemented a mechanism called ClusterIP in order to create a cluster of IPsec gateways. We merged ClusterIP with our own developments in order to define two architectures: High Availability and Context Management over Mono-LAN and Multi-LAN environments. We called Mono-LAN those architectures where the cluster of security gateways is configured under a single IP address, whereas Multi-LAN concerns those architectures where different security gateways are configured with different IP addresses. Performance measurements throughout the thesis show that transferring a VPN session between different gateways avoids re-authentication delays and reduce the amount of CPU consumption and calculation of cryptographic material. From an ISP point of view, this could be used to avoid overloaded gateways, redistribution of the load, better network performances, improvements of the QoS, etc. The idea is to allow a peer to enjoy the continuity of a service while maintaining the same security level that it was initially proposed
Bani-Hani, Raed M. "Enhancing the IKE preshared key authentication method." Diss., Columbia, Mo. : University of Missouri-Columbia, 2006. http://hdl.handle.net/10355/4406.
Full textThe entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file (viewed on July 31, 2007) Includes bibliographical references.
Amso, Julian, and Achille Faienza. "IPsec Intrusion Detection Analysis : Using data from an Ericsson Ethernet Interface Board." Thesis, KTH, Kommunikationssystem, CoS, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91865.
Full textIP security (IPsec) is commonly used for protection in Virtual Private Networks (VPN). It is also used for the protection of traffic between nodes in third generation (3G) mobile networks. The main duty of telecommunication operators is to assure the quality of service and availability of the network for their users. Therefore knowledge of threats that could affect these requirements is of relevance. Denial of Service (DoS) and other attacks could constitute serious threats in 3G networks and, if successful, they could lead to financial and reputation damage for the telecommunication operator. One of the goals of each telecommunications vendor is to produce equipment and software in such a way as to reduce the risk of successful attacks upon networks built using their equipment and software. This master’s thesis aims to identify the classes of attacks that could affect the regular operation of an IPsec-protected network. Therefore, the IPsec protocol and its possible weaknesses are explained. As practical demonstration of these ideas, an Intrusion Detection Analyzer prototype for an Ericsson Ethernet Interface board was developed to detect anomalous IPsec-protected traffic.
Schmalen, Daniel. "Security Concept for VPN IPsec Site-to-Site Connections to Third Parties." Thesis, California State University, Long Beach, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10688606.
Full textVPN (Virtual Private Network) connections between two companies are a very common method to pair networks with each other to facilitate the access to specific resources for both sides of the connection. However, the security aspect for such a pairing has not been thoroughly researched either by academic or industrial organizations. Nevertheless, screening this topic from a security perspective is crucial to give companies a recommendation.
This thesis covers every key facet of such a VPN connection and therefore, all components are researched individually to discover the key findings for each part. Furthermore, the findings are applied to create a practical, enterprise-close security concept that is both complete and comprehensible.
The security concept may play a significant role in the overall understanding of the given use-case, a VPN IPsec (Internet Protocol Security) Site-to-Site connection to a third-party company, to avoid security leaks in the owner’s network. Furthermore, the VPN itself has to be secured against outsider adversaries such as eavesdroppers.
Hadjichristofi, George Costa. "IPSec Overhead in Wireline and Wireless Networks for Web and Email Applications." Thesis, Virginia Tech, 2001. http://hdl.handle.net/10919/35710.
Full textMaster of Science
Ховріна, М. А. "VPN технології для реалізації концепції високозахищеного віддаленого доступу." Master's thesis, Сумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/82257.
Full textMarleta, Marcelo Honorato. "Projeto de uma VPN(Rede Privada Virtual) baseada em computação reconfigurável e aplicada a robôs móveis." Universidade de São Paulo, 2007. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-18062007-101411/.
Full textThis work designs a system that implements a VPN using FPGA (Field Programmable Gate Array) reprogrammable circuits, which are the basis of reconfigurable computing. VPNs use cryptography to allow private communication between parts. In this manner, the computational cost of the cryptography is handled by the hardware, achieving great performance and allowing its usage on embedded systems applications. The system proposed in this thesis has been used to establish secure communication between a PC and a mobile robot (that is in development at Reconfigurable Computing Laboratory - LCR of Institute of Mathematics and Computer Science of Univesity of São Paulo). The use of VPN in robotics will allow a communication, either wired or wireless, using Internet?s infrastructure with the robot (and in the future among robots), in a secure and trustable manner. The reconfigurable hardware used in this work allows flexibility in the implementation, making possible its usage in situations that requires high performance. Furthermore, the proposed architecture allows part of applications executing in software (using ?Clinux operating system and tools to establish the VPN) and other parts in hardware (a cryptographic coprocessor AES). The main software tools are the ipsec-tools that were developed to execute with native Kernel IPSec?s implementation and were properly ported to ?Clinux
Wikström, Alexander, Mark Thomson, and Lolita Mageramova. "Virtual Private Networks: : A feasibility study of secure communications between remote locations." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-24550.
Full textTorres, Sánchez David. "INTRODUCCIÓN Y CONFIGURACIÓN DEL PROTOCOLO IPV6." Tesis de Licenciatura, Universidad Autonoma del Estado de México, 2017. http://hdl.handle.net/20.500.11799/82865.
Full textActualmente, es fundamental la coexistencia de las redes en las telecomunicaciones, puesto que sería una gran catástrofe si dejasen de funcionar, ya que como ha de suponerse es uno de los pilares que mantiene la comunicación a nivel mundial en la actualidad. No obstante, es importante resaltar que uno de los factores más esenciales para el funcionamiento de las redes y por ende el éxito de las comunicaciones es el Protocolo de Internet (IP), específicamente en su cuarta versión o mejor conocido como IPv4. Además, a partir de su creación e implementación desde la década de 1970, se convirtió en uno de los protocolos más utilizados mundialmente.
Florin, Snöarve Jonathan, and Filip Nilsson. "IPv6 : en nulägesstudie." Thesis, Högskolan Kristianstad, Sektionen för hälsa och samhälle, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-15570.
Full textVyshnavi, Bandaru. "Virtual VPN in the Cloud : Design and Modelling of an IPSec VPN in Virtualized Environment." Thesis, Blekinge Tekniska Högskola, Institutionen för kommunikationssystem, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-10801.
Full textKuna, Vignesh. "Performance Analysis of end-to-end DTLS and IPsec based communication in IoT systems : Security and Privacy ~ Distributed Systems Security." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-15497.
Full textBudda, Shiva Tarun. "Performance Analysis of Proxy based Encrypted communication in IoT environments : Security and Privacy ~ Distributed Systems Security." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-15500.
Full textHia, Henry Erik. "Secure SNMP-Based Network Management in Low Bandwidth Networks." Thesis, Virginia Tech, 2001. http://hdl.handle.net/10919/32126.
Full textMaster of Science
Loutocký, Tomáš. "Hardwarové kryptografické moduly pro zabezpečení LAN." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217282.
Full textThunström, Robert. "Jämförelse av autentisering i SIP och H.323." Thesis, University of Gävle, Department of Mathematics, Natural and Computer Sciences, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-625.
Full textH.323 och Session Initiation Protocol är två olika protokoll som kan användas t ex för att koppla upp röstsamtal eller videosamtal via Internet. Det är ofta önskvärt i en uppkoppling mellan två personer att personerna kan autentisera sig för varandra. Denna autentisering är avsedd att garantera identiteten på deltagarna i kommunikationen. Den här undersökningen jämför protokollens struktur vid autentiseringen och visar skillnader i säkerhetssynpunkt. Autentisering finns i 3 skikt i de båda protokollen. I applikationsskiktet skiljer sig protokollen åt då SIP använder sig av lösenord för autentisering medan H.323 både kan använda lösenord och en PKI-baserad lösning med utbyte av nyckelcertifikat. I transportskiktet och nätverksskiktet kan båda protokollen använda TLS och IPSec för autentisering och därmed är det ingen större skillnad på protokollen i dessa skikt.
Rocha, Natalia Ezagui Garcia. "Avaliação do desempenho do sistema GATELINK para PHM utilizando métodos de segurança WPA-2 e IPsec." Instituto Tecnológico de Aeronáutica, 2009. http://www.bd.bibl.ita.br/tde_busca/arquivo.php?codArquivo=1277.
Full textHellsing, Mattias, and Odervall Albin. "Efficient Multi-Core Implementation of the IPsec Encapsulating Security Payload Protocol for a Single Security Association." Thesis, Linköpings universitet, Programvara och system, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-151984.
Full textWu, Xiao. "SIP on an Overlay Network." Thesis, KTH, Kommunikationssystem, CoS, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91491.
Full textMed utvecklingen av mobil (specifikt: wide area cellulär telefoni)-teknik, har användarnas krav ändras från den grundläggande röst-tjänst som bygger på krets kopplad teknik till att vilja ha hög-hastighets paket baserade dataöverföringstjänster. Voice over IP (VoIP) som vinner allt mer uppmärksamhet på grund av sin höga prestanda och låga kostnader är en paket baserad telefon tjänst. Däremot fungerar VoIP inte bra i alla situationer. Network address translation (NAT) har blivit det största hinder för en framtida användning av VoIP. I denna avhandling analyserar vi och jämför nuvarande NAT lösningar. Efter detta inför vi en VoIP över IPSec (VOIPSec) lösning (dvs. ett VoIP över IPSec Virtual Private Network (VPN) system) och en utvidgad VOIPSec lösnings mekanism. Dessa två lösningar testas och jämfördes för att mäta prestationer i förhållande till en version av samma SIP User Agent som körs utan IPSec. I den föreslagna lösningen VOIPSec ansluter IPSec en VPN-tunnel till varje SIP-klient och SIP-server, vilket gör att alla de potentiella SIP deltagarna kan nås, dvs eventuella NAT problem löses. All SIP-signalering och media trafik för VoIP-samtal överförs via denna etablerade tunnel. Denna VPN-tunnel ger allmänna medel för VoIP-trafik att passera NAT utrustningen. Dessutom ger IPSec VPN också garanterad säkerheten för VoIP-samtal på IP-nivå. För att förbättra skyddsnivån för mediaströmmar med VOIPSec, skapade vi och utvärderade en utsträckt VOIPSec lösning som innehåller end-to-end skydd av realtids media trafik. I denna utökade VOIPSec lösning, använde vi SRTP stället för RTP för att bära medieinnehåll. Denna utvidgade metod visade sig ge alla fördelar VOIPSec och SRTP kunde erbjuda utan ytterligare dröjsmål för media trafiken (jämfört med VoIPSec lösningen). Observera att den lösning som föreslås i denna avhandling kan vara av begränsad praktisk betydelse i framtiden då fler NAT lösningar blir VoIP kapabla, men lösningen är idag nödvändigt för att underlätta den ökande användningen av VoIP-system i praktiken. För VoIP-samtal som inte behöver end to end säkerhet rekommenderar vi användning av VOIPSec lösningen som ett sätt att lösa NAT problem och för att skydda trafiken på IP-nivå. När end to end säkerhet inte behövs föredrar vi VOIPSec lösningen av följande skäl: (1) våra testresultat visar att tiden för samtal inställning för det förlängda VOIPSec lösningen är dubbelt den tid som krävs för VOIPSec lösningen och den utökade VOIPSec lösningen kräver användning av användarprogram som stödjer SRTP. Medan VOIPSec lösningen inte kräver en speciell användar agent och alla VoIP-klienter på marknaden är kompatibla med denna lösning. Men när fler SIP användaragenter får stöd för SRTP, kommer den förlängda VOIPSec lösning tillämpas för användare av dessa SIP användarprogram.
Normark, Vendela. "SharkNet : Cooperation with service providers outside the secure infrastructure." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3895.
Full textI detta magisterarbete beskrivs hur autentisering går till i två vanligt förekommande protokoll. Det är en undersökning av autentiseringen i IPsec och TLS där teknikerna har jämförts utifrån litterära studier och praktiska tester. Resultaten i arbetet ska användas som delargument i den fortsatta utvecklingen av samarbeten mellan mobiltelefonoperatörer som använder Ericssons betalningssystem och externa leverantörer.
Izadinia, Vafa Dario. "Fingerprinting Encrypted Tunnel Endpoints." Diss., University of Pretoria, 2005. http://hdl.handle.net/2263/25351.
Full textDissertation (MSc (Computer Science))--University of Pretoria, 2005.
Computer Science
unrestricted
Van, Quang Đao Dupeyrat Gérard Wei-Liu Anne. "Contribution à l'étude de la qualité de service pour les protocoles sécurisés de télécommunications application à IPSec /." Créteil : Université de Paris-Val-de-Marne, 2005. http://doxa.scd.univ-paris12.fr:80/theses/th0231084.pdf.
Full textVan, Quang Đao. "Contribution à l'étude de la qualité de service pour les protocoles sécurisés de télécommunications : application à IPSec." Paris 12, 2005. https://athena.u-pec.fr/primo-explore/search?query=any,exact,990002310840204611&vid=upec.
Full textIf the IPSec protocol reinforces the security of the traffics in IP network, it causes a degradation of the performance. This thesis aims (i) to analyze the performance of the IPSec protocol by modeling, (ii) to evaluate the degradation of the IPSec protocol by simulation, in particular for the real-times traffics, (iii) to propose solutions to improve the performance of these real-time traffics. Initially, we specify the disadvantages of IPSec in time necessary for the secure operations and in additional headers required by the encapsulation of IP packets. These two treatments degrade the performance of the networks and in many cases, it becomes difficult to ensure the Quality of Service. Three types of traffics : the video, the voice and the data will be considered. Then we use the analystical models to model the behaviors of these traffics with IPSec and IPv4. The estimation of performance are done in terms of end-to-end delau and packet loss. We compare the performances between IPSec and IPv4 by modeling and simulation. The results obtained show that the performance of the voice, the video and the data is reduced significantly because of IPSec. To ensure the security and the QoS, we propose two methods : the compression of the additional headers and an additional negociation in IPSec. These two methods make it possible to obtain a better compromise between a minimal security and a minimal QoS
Migault, Daniel. "Naming and security in a mobile, multihomed and multiple interfaces environement." Phd thesis, Institut National des Télécommunications, 2012. http://tel.archives-ouvertes.fr/tel-01016686.
Full textSchindler, Vladimír. "Problematika optimální šířky přenosového pásma pro přenos medicinských obrazových dat." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-233631.
Full textNovotňák, Jiří. "Hardwarová akcelerace šifrování síťového provozu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2010. http://www.nusl.cz/ntk/nusl-237117.
Full text