Journal articles on the topic 'IPsec'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'IPsec.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Sridevi, Sridevi. "L2TP/IPsec Interworking." International Journal of Scientific Research 2, no. 8 (June 1, 2012): 89–91. http://dx.doi.org/10.15373/22778179/aug2013/28.
Full textSaid, Muhammad Ali, Setyorini Setyorini, and Erwid M. Jadied. "Analysis of IPSec Implementation on Dynamic Multipoint VPN Protocol Using Routing Border Gateway Protocol." Building of Informatics, Technology and Science (BITS) 4, no. 2 (September 22, 2022): 595–605. http://dx.doi.org/10.47065/bits.v4i2.1836.
Full textStreet, Derek. "IPSec Solution." EDPACS 38, no. 5 (November 4, 2008): 6–17. http://dx.doi.org/10.1080/07366980802379871.
Full textGengler, Barbara. "IPSec specification." Network Security 1999, no. 11 (November 1999): 5–6. http://dx.doi.org/10.1016/s1353-4858(00)80001-x.
Full textChen, Xiao Dan, Qiang Yue, and Li Min Su. "The Research and Design for IPSec Protocol Based on Embedded Linux OS over IPv6." Applied Mechanics and Materials 195-196 (August 2012): 1111–15. http://dx.doi.org/10.4028/www.scientific.net/amm.195-196.1111.
Full textFan, Ya Qin, Ling Lv, Mei Lin Liu, and Fei Xie. "Improvements Based on the IPSec VPN Secuirity." Advanced Materials Research 756-759 (September 2013): 2693–97. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2693.
Full textYessenzholov, Ulan, and Nurbol Kaliaskarov. "IMPLEMENTATION OF TRAFFIC PROTECTION BASED ON IPSEC VPN TECHNOLOGY AND NETWORK MODELING ON ENSP SOFTWARE ENVIRONMENT." Вестник КазАТК 126, no. 3 (June 19, 2023): 198–204. http://dx.doi.org/10.52167/1609-1817-2023-126-3-198-204.
Full textLiu, Tao. "Application and Study of Virtual Private Network Base on L2TP-IPSec." Advanced Materials Research 1044-1045 (October 2014): 1071–74. http://dx.doi.org/10.4028/www.scientific.net/amr.1044-1045.1071.
Full textFitrisia, Yuli, and Maruf Alfiando Setianto. "Implementasi GRE Over IPSec Tunnel VPN menggunakan Fortigate." Jurnal Komputer Terapan 9, no. 2 (December 22, 2023): 212–23. http://dx.doi.org/10.35143/jkt.v9i2.6097.
Full textHong, Sunghyuck. "Issues and Security on IPSec: Survey." Journal of Digital Convergence 12, no. 8 (August 28, 2014): 243–48. http://dx.doi.org/10.14400/jdc.2014.12.8.243.
Full textBENHADDAD, Omar Hocine, Mohamed SAOUDI, Amine DROUICHE, Mohamed RABIAI, and Boufeldja ALLAILOU. "Hardware Acceleration of AES Cryptographic Algorithm for IPSec." Malaysian Journal of Computing and Applied Mathematics 2, no. 2 (December 31, 2019): 1–7. http://dx.doi.org/10.37231/myjcam.2019.2.2.30.
Full textRhee, Yoon-Jung, Chul-Soo Kim, and Bong-Gyu Lee. "IPSec Key Recovery for IKEv2." Journal of the Korea Academia-Industrial cooperation Society 11, no. 4 (April 30, 2010): 1260–65. http://dx.doi.org/10.5762/kais.2010.11.4.1260.
Full textAlsaheel, Abdulellah A., and Ahmad S. Almogren. "A Powerful IPSec Multi-Tunnels Architecture." Journal of Advances in Computer Networks 2, no. 4 (2014): 274–78. http://dx.doi.org/10.7763/jacn.2014.v2.125.
Full textAriyadi, Tamsir, and Muhamad Agung Prabowo. "Perbandingan Kinerja Virtual Private Network Antara Vpn Tunnel Dan Internet Protocols Security." INOVTEK Polbeng - Seri Informatika 6, no. 1 (June 15, 2021): 80. http://dx.doi.org/10.35314/isi.v6i1.1698.
Full textZhang, Guo Fang. "The Solution and Management of VPN Based IPSec Technology." Applied Mechanics and Materials 686 (October 2014): 210–19. http://dx.doi.org/10.4028/www.scientific.net/amm.686.210.
Full textWang, Yan, and Ni Hong Wang. "Research on Secure Information Transmission Based on Internet of Things Numerical Control System." Key Engineering Materials 467-469 (February 2011): 1586–91. http://dx.doi.org/10.4028/www.scientific.net/kem.467-469.1586.
Full textKỷ, Phan Văn, and La Hữu Phúc. "Một giải pháp quản lý kết nối mật cho IPSec trên FPGA." Journal of Science and Technology on Information security 1, no. 13 (December 28, 2021): 3–11. http://dx.doi.org/10.54654/isj.v1i13.142.
Full textChoi, Cheong Hyeon. "Study on WP-IBE compliant Mobile IPSec." Journal of Korean Society for Internet Information 14, no. 5 (October 31, 2013): 11–26. http://dx.doi.org/10.7472/jksii.2013.14.5.11.
Full textMan Li. "Policy-baseD IPsec management." IEEE Network 17, no. 6 (November 2003): 36–43. http://dx.doi.org/10.1109/mnet.2003.1248659.
Full textSeitz, Jochen. "Demystifying the IPsec Puzzle." Computer Standards & Interfaces 24, no. 1 (March 2002): 87. http://dx.doi.org/10.1016/s0920-5489(01)00096-4.
Full textChoi, Heesook, Hui Song, Guohong Cao, and Thomas F. La Porta. "Mobile multi-layered IPsec." Wireless Networks 14, no. 6 (March 8, 2007): 895–913. http://dx.doi.org/10.1007/s11276-007-0031-z.
Full textHuang, Lian Fen, and Hang Liu. "Research and Implementation of IPSEC Based on TD-LTE System." Applied Mechanics and Materials 427-429 (September 2013): 2783–86. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2783.
Full textSun, Yunxiao, Bailing Wang, Hongri Liu, Yuliang Wei, Di Wu, and Jing Wang. "Detecting IKEv1 Man-in-the-Middle Attack with Message-RTT Analysis." Wireless Communications and Mobile Computing 2022 (June 14, 2022): 1–7. http://dx.doi.org/10.1155/2022/2605684.
Full textSulistiyono, Sulistiyono. "PERANCANGAN JARINGAN VIRTUAL PRIVATE NETWORK BERBASIS IP SECURITY MENGGUNAKAN ROUTER MIKROTIK." PROSISKO: Jurnal Pengembangan Riset dan Observasi Sistem Komputer 7, no. 2 (September 1, 2020): 150–64. http://dx.doi.org/10.30656/prosisko.v7i2.2523.
Full textAurisch, Thorsten, Tobias Ginzler, Peter Martini, Roger Ogden, Trung Tran, and Hartmut Seifert. "Automatic multicast IPsec by using a proactive IPsec discovery protocol and a group key management." Journal of Telecommunications and Information Technology, no. 2 (June 25, 2023): 77–83. http://dx.doi.org/10.26636/jtit.2008.2.875.
Full textCường, Vũ Tá, and La Hữu Phúc. "Xây dựng giải pháp trao đổi khóa IKEv2 sử dụng NIOS II trên FPGA." Journal of Science and Technology on Information security 1, no. 13 (December 28, 2021): 62–70. http://dx.doi.org/10.54654/isj.v1i13.138.
Full textJara, Antonio J., David Fernandez, Pablo Lopez, Miguel A. Zamora, and Antonio F. Skarmeta. "Lightweight MIPv6 with IPSec Support." Mobile Information Systems 10, no. 1 (2014): 37–77. http://dx.doi.org/10.1155/2014/563274.
Full textAffan, Usman Ibnu, Khairan Marzuki, and Lalu Zazuli Azhar Mardedi. "Bandwith Optimization on Hotspot using PCQ Method And L2tp VPN Routing for Online Game Latency." International Journal of Engineering and Computer Science Applications (IJECSA) 1, no. 2 (September 30, 2022): 65–76. http://dx.doi.org/10.30812/ijecsa.v1i2.2379.
Full textA.A. Adas, A. A. Adas. "Simulation of Cryptographic Algorithms in IPSec on Ad-Hoc Networks." journal of King Abdulaziz University Engineering Sciences 28, no. 1 (January 3, 2017): 31–46. http://dx.doi.org/10.4197/eng.28-1.3.
Full textMartynenkov, I. V. "THE MAIN STAGES OF DEVELOPMENT OF THE CRYPTOGRAPHIC PROTOCOLS SSL/TLS AND IPsec." Prikladnaya Diskretnaya Matematika, no. 51 (2021): 31–67. http://dx.doi.org/10.17223/20710410/51/2.
Full textKumar, Manoj, and Amit Kishor. "Network Traffic Encryption by IPSec." International Journal of Computer Sciences and Engineering 7, no. 5 (May 31, 2019): 912–15. http://dx.doi.org/10.26438/ijcse/v7i5.912915.
Full textDunbar, Neil. "IPsec Networking Standards — An Overview." Information Security Technical Report 6, no. 1 (March 2001): 35–48. http://dx.doi.org/10.1016/s1363-4127(01)00106-6.
Full textRowan, Tom. "VPN technology: IPSEC vs SSL." Network Security 2007, no. 12 (December 2007): 13–17. http://dx.doi.org/10.1016/s1353-4858(07)70104-6.
Full textMarkham, Tom, and Chuck Williams. "Key Recovery Header for IPSEC." Computers & Security 19, no. 1 (January 2000): 86–90. http://dx.doi.org/10.1016/s0167-4048(00)86367-1.
Full textMcClure, Ben. "IPSec for communities of interest." Computers & Security 17, no. 3 (January 1998): 225–26. http://dx.doi.org/10.1016/s0167-4048(98)80328-3.
Full textMeyer, Helen. "Making IPSec work for you." Computers & Security 18, no. 2 (January 1999): 154. http://dx.doi.org/10.1016/s0167-4048(99)80049-2.
Full textAl-Hawamde, Al-Muthanna, Adil Khan, and M. Sikander Hayat Khiyal. "IPSec Based Bluetooth Security Architecture." Information Technology Journal 6, no. 4 (May 1, 2007): 478–89. http://dx.doi.org/10.3923/itj.2007.478.489.
Full textTisovský, Adam, and Ivan Baroňák. "Methodology for Benchmarking IPsec Gateways." International Journal of Computer Network and Information Security 4, no. 9 (August 14, 2012): 1–9. http://dx.doi.org/10.5815/ijcnis.2012.09.01.
Full textIshkuvatov, S. "Method and Algorithm for Determining the Type of Traffic in an Encrypted Communication Channel." Proceedings of Telecommunication Universities 8, no. 4 (January 10, 2023): 109–18. http://dx.doi.org/10.31854/1813-324x-2022-8-4-109-118.
Full textSalman, Fatimah A. "Implementation of IPsec-VPN Tunneling using GNS3." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 3 (September 1, 2017): 855. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp855-860.
Full textGuo, Jiaxing, Chunxiang Gu, Xi Chen, Siqi Lu, and Fushan Wei. "Automated State-Machine-Based Analysis of Hostname Verification in IPsec Implementations." Information Technology and Control 50, no. 3 (September 24, 2021): 570–87. http://dx.doi.org/10.5755/j01.itc.50.3.27844.
Full textDiamond`, Noah, Scott Graham, and Gilbert Clark. "Securing InfiniBand Networks with the Bluefield-2 Data Processing Unit." International Conference on Cyber Warfare and Security 17, no. 1 (March 2, 2022): 459–68. http://dx.doi.org/10.34190/iccws.17.1.58.
Full textHendradi, Prionggo. "PENERAPAN METODE IPSEC UNTUK OPTIMALISASI KONEKSI JARINGAN di PT. OTO MULTIARTHA." JURNAL SATYA INFORMATIKA 1, no. 1 (August 13, 2023): 35–46. http://dx.doi.org/10.59134/jsk.v1i1.422.
Full textHendradi, Prionggo. "PENERAPAN METODE IPSEC UNTUK OPTIMALISASI KONEKSI JARINGAN di PT. OTO MULTIARTHA." JURNAL SATYA INFORMATIKA 1, no. 1 (August 13, 2023): 35–46. http://dx.doi.org/10.59134/jsk.v1i1.422.
Full textВерховський, Ігор, and Віталій Ткачов. "МЕТОДИ ПОБУДОВИ ВІРТУАЛЬНИХ ТУНЕЛІВ EXTRANET-СИСТЕМ." Scientific review 4, no. 89 (August 27, 2023): 22. http://dx.doi.org/10.26886/2311-4517.4(89)2023.2.
Full textJeong, Won Ho, Lan-Mi Hwang, Bong-Gu Yeo, Ki-Hong Kim, Sang-Hyun Park, Sang-Woon Yang, Jeong-Seok Lim, and Kyung-Seok Kim. "Effect Analysis of a Authentication Algorithm in IPsec VPN Satellite Communication." Journal of The Institute of Internet, Broadcasting and Communication 15, no. 5 (October 31, 2015): 147–54. http://dx.doi.org/10.7236/jiibc.2015.15.5.147.
Full textStanton, Ray. "Securing VPNs: comparing SSL and IPsec." Computer Fraud & Security 2005, no. 9 (September 2005): 17–19. http://dx.doi.org/10.1016/s1361-3723(05)70254-2.
Full textZimmerman, Mark. "IPSec bake off in San José." Infosecurity Today 2, no. 5 (September 2005): 17. http://dx.doi.org/10.1016/s1742-6847(05)70319-0.
Full textMao-Yin Wang and Cheng-Wen Wu. "A Mesh-Structured Scalable IPsec Processor." IEEE Transactions on Very Large Scale Integration (VLSI) Systems 18, no. 5 (May 2010): 725–31. http://dx.doi.org/10.1109/tvlsi.2009.2016102.
Full textJarmakiewicz, Jacek, Mariusz Bednarczyk, and Jarosław Krygier. "The tactical Intranet IPSec security concept." Journal of Telecommunications and Information Technology, no. 4 (December 30, 2003): 14–18. http://dx.doi.org/10.26636/jtit.2003.4.206.
Full text