Academic literature on the topic 'Secure Socket Tunneling Protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secure Socket Tunneling Protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Secure Socket Tunneling Protocol"
Slameto, Andika Agus, and Rahmat Hidayat. "Comparative Analysis of PPPOE and SSTP Performance in Microtic(Analisis Perbandingan Kinerja PPPOE dan SSTP Pada Mikrotik)." Jurnal KomtekInfo 6, no. 2 (2019): 107–16. http://dx.doi.org/10.35134/komtekinfo.v6i2.49.
Full textLukman, Lukman, and Aiman Mukhlishah. "Analisis Perbandingan Kinerja Jaringan Secure Socket Tunneling Protocol (Sstp) Dan Layer Two Tunneling Protocol (L2tp) + Internet Protocol Security (Ipsec) Menggunakan Metode Quality Of Service (Qos)." Respati 15, no. 2 (2020): 16. http://dx.doi.org/10.35842/jtir.v15i2.344.
Full textRuslianto, Ikhwan. "Perancangan dan Implementasi Virtual Private Network (VPN) menggunakan Protokol SSTP (Secure Socket Tunneling Protocol) Mikrotik di Fakultas MIPA Universitas Tanjungpura." Computer Engineering, Science and System Journal 4, no. 1 (2019): 74. http://dx.doi.org/10.24114/cess.v4i1.11792.
Full textNur, Jabal, La Raufun La Raufun, and Muhtita Afifa. "SIMULASI VIRTUAL PRIVATE NETWORK (VPN) MENGGUNAKAN SECURE SOCKET TUNNELING PROTOCOL (SSTP) PADA JARINGAN KAMPUS UNIDAYAN BAUBAU." JURNAL INFORMATIKA 10, no. 1 (2021): 85. http://dx.doi.org/10.55340/jiu.v10i1.451.
Full textWa, Ode Zamalia, Fid Aksara L.M., and Yamin Muh. "ANALISIS PERBANDINGAN PERFORMA QOS, PPTP, L2TP, SSTP DAN IPSEC PADA JARINGAN VPN MENGGUNAKAN MIKROTIK." semanTIK 4, no. 2 (2018): 29–36. https://doi.org/10.5281/zenodo.1444898.
Full textHermanto, Dedy, and M. Syaiful Anam. "Implementasi Sistem Keamanan Hotspot Jaringan Menggunakan Metode OpenSSL (Secure Socket Layer)." Jurnal CoreIT: Jurnal Hasil Penelitian Ilmu Komputer dan Teknologi Informasi 6, no. 1 (2020): 57. http://dx.doi.org/10.24014/coreit.v6i1.8394.
Full textCharke, A. Ben, M. Chabi, and M. Fakir. "Contribution to the Security of the Information System." TELKOMNIKA Indonesian Journal of Electrical Engineering 16, no. 1 (2015): 154. http://dx.doi.org/10.11591/tijee.v16i1.1599.
Full textKhalil, Knaj Nouma. "IMPACT OF TUNNELING ON NETWORK CAPACITY." SYNCHROINFO JOURNAL 8, no. 4 (2022): 9–13. http://dx.doi.org/10.36724/2664-066x-2022-8-4-9-13.
Full textMonika and Shuchita Upadhyaya. "Secure Communication Using DNA Cryptography with Secure Socket Layer (SSL) Protocol in Wireless Sensor Networks." Procedia Computer Science 70 (2015): 808–13. http://dx.doi.org/10.1016/j.procs.2015.10.121.
Full textOhe, K., S. Kaihara, and T. Kiuchi. "Using a WWW-based Mail User Agent for Secure Electronic Mail Service for Health Care Users." Methods of Information in Medicine 37, no. 03 (1998): 247–53. http://dx.doi.org/10.1055/s-0038-1634539.
Full textBook chapters on the topic "Secure Socket Tunneling Protocol"
"Integrating Entanglement Swapping into Secure Socket Layer — Handshake Protocol." In International Conference on Future Computer and Communication, 3rd (ICFCC 2011). ASME Press, 2011. http://dx.doi.org/10.1115/1.859711.paper1.
Full textChen, Lei, Wen-Chen Hu, Ming Yang, and Lei Zhang. "Applied Cryptography in E-mail Services and Web Services." In Applied Cryptography for Cyber Security and Defense. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61520-783-1.ch005.
Full textRahnama, Behnam, Arif Sari, and Marwan Yassin Ghafour. "Countering RSA Vulnerabilities and Its Replacement by ECC." In Network Security Attacks and Countermeasures. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-8761-5.ch012.
Full textMogollon, Manuel. "TLS, SSL, and SET." In Cryptography and Security Services. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-837-6.ch012.
Full textAdibi, Sasan, Gordon B. Agnew, and Tom Tofigh. "End-to-End (E2E) Security Approach in WiMAX." In Handbook of Research on Wireless Security. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-899-4.ch047.
Full textConference papers on the topic "Secure Socket Tunneling Protocol"
Bhiogade, Mittal. "Secure Socket Layer." In 2002 Informing Science + IT Education Conference. Informing Science Institute, 2002. http://dx.doi.org/10.28945/2441.
Full textJha, Ritesh Kumar, and Farida Khurshid. "Performance analysis of enhanced secure socket layer protocol." In 2014 International Conference on Communication and Network Technologies (ICCNT). IEEE, 2014. http://dx.doi.org/10.1109/cnt.2014.7062777.
Full textDuddu, Siromani, Arigela Rishita sai, Ch L. S. Sowjanya, G. Ramakoteswara Rao, and KarthikSainadh Siddabattula. "Secure Socket Layer Stripping Attack Using Address Resolution Protocol Spoofing." In 2020 4th International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2020. http://dx.doi.org/10.1109/iciccs48265.2020.9120993.
Full textOtrok, H., R. Haraty, and A. N. El-Kassar. "Improving the Secure Socket Layer Protocol by modifying its Authentication function." In 2006 World Automation Congress. IEEE, 2006. http://dx.doi.org/10.1109/wac.2006.375755.
Full textHabibi, Jafar Alim, Rendy Munadi, and Leanna Vidya Yovita. "Analysis secure socket layer protocol with heartbleed bug and distributed denial-of-service." In 2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC). IEEE, 2016. http://dx.doi.org/10.1109/iccerec.2016.7814960.
Full textDunbar, DeJean. "Survey of Secure Network Protocols: United States Related Domains." In 3rd International Conference on Artificial Intelligence and Machine Learning (CAIML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121207.
Full textMurphree, Jay, Roark Weil, and John R. Wootton. "Emerging Trends in Intra Vehicle Networks for Data, Control and Power Distribution." In 2024 NDIA Michigan Chapter Ground Vehicle Systems Engineering and Technology Symposium. National Defense Industrial Association, 2024. http://dx.doi.org/10.4271/2024-01-3142.
Full textReports on the topic "Secure Socket Tunneling Protocol"
Cam-Winget, N., D. McGrew, J. Salowey, and H. Zhou. The Flexible Authentication via Secure Tunneling Extensible Authentication Protocol Method (EAP-FAST). RFC Editor, 2007. http://dx.doi.org/10.17487/rfc4851.
Full textCam-Winget, N., D. McGrew, J. Salowey, and H. Zhou. Dynamic Provisioning Using Flexible Authentication via Secure Tunneling Extensible Authentication Protocol (EAP-FAST). RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5422.
Full textCam-Winget, N., and H. Zhou. Basic Password Exchange within the Flexible Authentication via Secure Tunneling Extensible Authentication Protocol (EAP-FAST). RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5421.
Full text