Journal articles on the topic 'Secure Socket Tunneling Protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Secure Socket Tunneling Protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Slameto, Andika Agus, and Rahmat Hidayat. "Comparative Analysis of PPPOE and SSTP Performance in Microtic(Analisis Perbandingan Kinerja PPPOE dan SSTP Pada Mikrotik)." Jurnal KomtekInfo 6, no. 2 (2019): 107–16. http://dx.doi.org/10.35134/komtekinfo.v6i2.49.
Full textLukman, Lukman, and Aiman Mukhlishah. "Analisis Perbandingan Kinerja Jaringan Secure Socket Tunneling Protocol (Sstp) Dan Layer Two Tunneling Protocol (L2tp) + Internet Protocol Security (Ipsec) Menggunakan Metode Quality Of Service (Qos)." Respati 15, no. 2 (2020): 16. http://dx.doi.org/10.35842/jtir.v15i2.344.
Full textRuslianto, Ikhwan. "Perancangan dan Implementasi Virtual Private Network (VPN) menggunakan Protokol SSTP (Secure Socket Tunneling Protocol) Mikrotik di Fakultas MIPA Universitas Tanjungpura." Computer Engineering, Science and System Journal 4, no. 1 (2019): 74. http://dx.doi.org/10.24114/cess.v4i1.11792.
Full textNur, Jabal, La Raufun La Raufun, and Muhtita Afifa. "SIMULASI VIRTUAL PRIVATE NETWORK (VPN) MENGGUNAKAN SECURE SOCKET TUNNELING PROTOCOL (SSTP) PADA JARINGAN KAMPUS UNIDAYAN BAUBAU." JURNAL INFORMATIKA 10, no. 1 (2021): 85. http://dx.doi.org/10.55340/jiu.v10i1.451.
Full textWa, Ode Zamalia, Fid Aksara L.M., and Yamin Muh. "ANALISIS PERBANDINGAN PERFORMA QOS, PPTP, L2TP, SSTP DAN IPSEC PADA JARINGAN VPN MENGGUNAKAN MIKROTIK." semanTIK 4, no. 2 (2018): 29–36. https://doi.org/10.5281/zenodo.1444898.
Full textHermanto, Dedy, and M. Syaiful Anam. "Implementasi Sistem Keamanan Hotspot Jaringan Menggunakan Metode OpenSSL (Secure Socket Layer)." Jurnal CoreIT: Jurnal Hasil Penelitian Ilmu Komputer dan Teknologi Informasi 6, no. 1 (2020): 57. http://dx.doi.org/10.24014/coreit.v6i1.8394.
Full textCharke, A. Ben, M. Chabi, and M. Fakir. "Contribution to the Security of the Information System." TELKOMNIKA Indonesian Journal of Electrical Engineering 16, no. 1 (2015): 154. http://dx.doi.org/10.11591/tijee.v16i1.1599.
Full textKhalil, Knaj Nouma. "IMPACT OF TUNNELING ON NETWORK CAPACITY." SYNCHROINFO JOURNAL 8, no. 4 (2022): 9–13. http://dx.doi.org/10.36724/2664-066x-2022-8-4-9-13.
Full textMonika and Shuchita Upadhyaya. "Secure Communication Using DNA Cryptography with Secure Socket Layer (SSL) Protocol in Wireless Sensor Networks." Procedia Computer Science 70 (2015): 808–13. http://dx.doi.org/10.1016/j.procs.2015.10.121.
Full textOhe, K., S. Kaihara, and T. Kiuchi. "Using a WWW-based Mail User Agent for Secure Electronic Mail Service for Health Care Users." Methods of Information in Medicine 37, no. 03 (1998): 247–53. http://dx.doi.org/10.1055/s-0038-1634539.
Full textAhmad, Malik Basit, and Parul Agarwal. "Viability of Adaptive Network Security Exercising Tradeoff between Performance and Security." Recent Advances in Computer Science and Communications 13, no. 5 (2020): 893–900. http://dx.doi.org/10.2174/2213275912666190628100621.
Full textThiel, A., T. Tolxdorff, and J. Bernarding. "Realization of Security Concepts for DICOM-based Distributed Medical Services." Methods of Information in Medicine 39, no. 04/05 (2000): 348–52. http://dx.doi.org/10.1055/s-0038-1634446.
Full textHawedi, Hadya S., Omran Ali Bentaher, and Kaled E. I. Abodhir. "REMOTE ACCESS TO A ROUTER SECURELY USING SSH." Journal of the Academic Forum 5, no. 1 (2021): 174–89. https://doi.org/10.59743/jaf.v5i1.177.
Full textTambunan, Alexander Theo Philus, Adi Prijuna Lubis, and Syartika Anggraini. "Perancangan Sistem Keamanan File Transfer Protocol Dengan Secure Socket Layer Pada Server Centos 7." J-Com (Journal of Computer) 1, no. 2 (2021): 95–102. http://dx.doi.org/10.33330/j-com.v2i1.1206.
Full textJoy, Shyam P., and Priya Chandran. "Towards a Secure Development Environment for Collaborative Applications." International Journal of e-Collaboration 15, no. 1 (2019): 1–20. http://dx.doi.org/10.4018/ijec.2019010101.
Full textWu, Yuxuan, and Tuosheng Jiao. "A Survey on Packet Capture: Tool Introduction and Security Vulnerability Description." Applied and Computational Engineering 8, no. 1 (2023): 251–58. http://dx.doi.org/10.54254/2755-2721/8/20230149.
Full textDunbar, DeJean, Patrick Hill, and Yu-Ju Lin. "Survey of United States Related Domains: Secure Network Protocol Analysis." International Journal of Network Security & Its Applications 14, no. 5 (2022): 25–38. http://dx.doi.org/10.5121/ijnsa.2022.14503.
Full textDeJean, Dunbar, Hill Patrick, and Lin Yu-Ju. "SURVEY OF UNITED STATES RELATED DOMAINS: SECURE NETWORK PROTOCOL ANALYSIS." International Journal of Network Security & Its Applications (IJNSA) 14, no. 5 (2022): 25–38. https://doi.org/10.5281/zenodo.7196824.
Full textPlesowicz, Przemyslaw. "A15: Secure signal tunneling for SCADA and PLCs using SSH protocol." IFAC Proceedings Volumes 37, no. 20 (2004): 88–93. http://dx.doi.org/10.1016/s1474-6670(17)30576-1.
Full textDr. K. Kungumaraj. "An Enhanced Load Balancing Methodology with Bio-Metric Feature." International Journal of Advanced Networking and Applications 16, no. 05 (2025): 6578–82. https://doi.org/10.35444/ijana.2025.16506.
Full textPurwoko, Gesang, and Irmayani Irmayani. "IMPLEMENTASI SECURE SOCKET LAYER PADA VIRTUAL PRIVATE NETWORK UNTUK PENGAMANAN KOMUNIKASI VIDEO CONFERENCE." SINUSOIDA 22, no. 2 (2020): 45–57. http://dx.doi.org/10.37277/s.v22i2.698.
Full textSeniman, Seniman, Baihaqi Siregar, Rani Masyithah Pelle, and Fahmi Fahmi. "Securing sensor data transmission with ethernet elliptic curve cryptography secure socket layer on STM32F103 device." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (2021): 507. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp507-515.
Full textSeniman, Seniman, Baihaqi Siregar, Rani Masyithah Pelle, and Fahmi Fahm. "Securing sensor data transmission with ethernet elliptic curve cryptography secure socket layer on STM32F103 device." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (2021): 507–15. https://doi.org/10.11591/ijeecs.v22.i1.pp507-515.
Full textAlaidi, Abdul Hadi M. "Enhanced a TCP security protocol by using optional fields in TCP header." Journal of Education College Wasit University 1, no. 24 (2016): 485–502. http://dx.doi.org/10.31185/eduj.vol1.iss24.189.
Full textPatel, Raj Kumar, and Dr Lalan Kumar Singh. "Cloud Based VPN Using IP Tunneling for Remote Site Interface." International Journal for Research in Applied Science and Engineering Technology 11, no. 2 (2023): 1565–70. http://dx.doi.org/10.22214/ijraset.2023.48722.
Full textNadeem, Malik Muhammad, Yousaf Raza, Ahthasham Sajid, Hamza Razzaq, Rida Malik, and Sugandima Vidanagamachchi. "Review Analysis of Web Socket Security: Case Study." IETI Transactions on Data Analysis and Forecasting (iTDAF) 2, no. 2 (2024): 56–75. http://dx.doi.org/10.3991/itdaf.v2i2.51015.
Full textPurchina, Olga, Anna Poluyan, and Dmitry Fugarov. "Securing an Information System via the SSL Protocol." International Journal of Safety and Security Engineering 12, no. 5 (2022): 563–68. http://dx.doi.org/10.18280/ijsse.120503.
Full textRazumov, Pavel, Larissa Cherckesova, Elena Revyakina, Sergey Morozov, Dmitry Medvedev, and Andrei Lobodenko. "Ensuring the security of web applications operating on the basis of the SSL/TLS protocol." E3S Web of Conferences 402 (2023): 03028. http://dx.doi.org/10.1051/e3sconf/202340203028.
Full textJia, Xi, and Meng Zhang. "Encrypted Packet Inspection Based on Oblivious Transfer." Security and Communication Networks 2022 (August 24, 2022): 1–13. http://dx.doi.org/10.1155/2022/4743078.
Full textNycz, Mariusz, Mirosław Hajder, and Sara Nienajadlo. "Methods for increasing security of web servers." Annales Universitatis Mariae Curie-Sklodowska, sectio AI – Informatica 16, no. 2 (2017): 39. http://dx.doi.org/10.17951/ai.2016.16.2.39.
Full textPurchina, Оlga, Аnna Poluyan, and Dmitry Fugarov. "Improving the security level of the information system using the SSL protocol." E3S Web of Conferences 371 (2023): 03067. http://dx.doi.org/10.1051/e3sconf/202337103067.
Full textES-SAID, AMMAR. "NETWORK IMPLEMENTATION AND OPTIMIZATION FOR QUALITY OF SERVICE MANAGEMENT BASED ON SEMANTIC INTENTIONS." International Research Journal of Computer Science 8, no. 12 (2021): 283–88. http://dx.doi.org/10.26562/irjcs.2021.v0812.003.
Full textSuwayeb, Abdulaziz Mahmud, and Mahmoud Mohamed Elsaghayer. "Using Elliptic-Curve to Implements SSL Certificate Derives from CSR to Make Secure Connection between Server and Client." International Science and Technology Journal 36, no. 1 (2025): 1–11. https://doi.org/10.62341/amuc1218.
Full textAqilla Fadia Haya, Hafizh Al Karim, Muhammad Rizky Perdana, Ahmad Nur Ihsan Purwanto, and Mutiara Persada Pulungane. "BUILDING A LINUX-BASED VPN SERVER USING POINT TO POINT TUNNELING PROTOCOL (PPTP)." Jurnal ilmiah Sistem Informasi dan Ilmu Komputer 1, no. 2 (2021): 11–17. http://dx.doi.org/10.55606/juisik.v1i2.316.
Full textFachrur Rozi, Nurwan Reza, Ade Nurhayati, and Seandy Arandiant Rozano. "Implementation OSPFv3 For Internet Protocol Verses 6 (IPv6) Based On Juniper Routers Use Emulator Virtual Engine – Next Generation (Eve-NG)." International Journal of Engineering Continuity 3, no. 1 (2023): 1–11. http://dx.doi.org/10.58291/ijec.v3i1.141.
Full textKabiru, D. Ibrahim, M. M. Ibrahim, Idris Yusuf, Bello Adamu, and S. A. Kassim. "MapReduce Model: A Paradigm for Large Data Processing." Global Journal of Research in Humanities & Cultural Studies 3, no. 2 (2023): 1–7. https://doi.org/10.5281/zenodo.7819069.
Full textPutra, Dwi Prastantio. "ANALISIS KEAMANAN VOICE OVER INTERNET PROTOCOL (VOIP) OVER VIRTUAL PRIVATE NETWORK (VPN)." Jurnal Informatika dan Rekayasa Perangkat Lunak 2, no. 3 (2021): 324–33. http://dx.doi.org/10.33365/jatika.v2i3.1232.
Full textAngelina Azels, Wilona, Theresia Ghozali, and Marsul Siregar. "Optimizing Secure Communication in Distributed Corporate Networks through PPTP and IPSec VPN Protocols." Jurnal Elektro 15, no. 2 (2024): 56–67. http://dx.doi.org/10.25170/jurnalelektro.v15i2.5111.
Full textKennedy, Nicholas I., Erik Therrien, Robert G. Marx, Michael J. Stuart, and Bruce A. Levy. "Posterolateral Corner Reconstruction Using Double Femoral Fixation With Adjustable Loop Cortical Suspension and Interference Screw." Video Journal of Sports Medicine 2, no. 5 (2022): 263502542211148. http://dx.doi.org/10.1177/26350254221114890.
Full textH.G., Shashidhar, Sanket Dessai, and Shilpa Chaudhari. "Design of Secure Transmission of Multimedia Data Using SRTP on Linux Platform." International Journal of Reconfigurable and Embedded Systems (IJRES) 4, no. 2 (2015): 71. http://dx.doi.org/10.11591/ijres.v4.i2.pp71-81.
Full textAref, Yazan, and Abdelkader Ouda. "HSM4SSL: Leveraging HSMs for Enhanced Intra-Domain Security." Future Internet 16, no. 5 (2024): 148. http://dx.doi.org/10.3390/fi16050148.
Full textDr., Smitha Kurian, Pradhan Abhisek, Bhatt Anurag, .B Jayapradha, and Maidul Islam Syed. "Advancements in Drone Navigation: A Comprehensive Survey on ML-Based NavICNavigation Systems." Research and Reviews: Advancement in Robotics 7, no. 2 (2024): 18–28. https://doi.org/10.5281/zenodo.10884918.
Full textAmadi, Dwi Nor, Arief Budiman, and Pradityo Utomo. "Analysis of the effectiveness of VPN and PPTP Protocol in E-Link Health Report Application Using NDLC Method." Journal of Information Systems and Informatics 6, no. 2 (2024): 949–58. http://dx.doi.org/10.51519/journalisi.v6i2.746.
Full textGustiawan, Mokhamad, and Ali Akbar Rismayadi. "Remote Access Virtual Private Network Menggunakan Layer 2 Tunneling Protocol Berbasis Mikrotik." Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) 5, no. 4 (2022): 674–84. http://dx.doi.org/10.32672/jnkti.v5i4.4612.
Full textFlores-Vargas, Antonio, and Marvin Llerena. "Análisis de Protocolos Transport Layer Security y Secure Socket Layer como mecanismos de seguridad y competitividad en las organizaciones digitales." Technological Innovations Journal 3, no. 4 (2024): 25–37. https://doi.org/10.35622/j.ti.2024.04.002.
Full textMufreni, Sadr Lufti, Danur Wijayanto, and Sri Maryani. "Implementasi SSL untuk Keamanan Data pada Sistem Inventaris." INFORMAL: Informatics Journal 9, no. 1 (2024): 80. http://dx.doi.org/10.19184/isj.v9i1.40398.
Full textHadood, Ashraf Khalifa M. "Implementation of Site to Site IPsec VPN Tunnel using GNS3 Simulation." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 2302–7. https://doi.org/10.22214/ijraset.2024.65635.
Full textM, Umaselvi, S. Leena Maria, Sridevi M.J., Gayathri B, and Khaled A. A. Alloush. "REVOLUTIONIZING VANETS WITH GRAPH NEURAL NETWORKS USING DYNAMIC TRAFFIC MANAGEMENT." ICTACT Journal on Communication Technology 15, no. 2 (2024): 3217–22. http://dx.doi.org/10.21917/ijct.2024.0479.
Full textReza, Md Masum, and Jairo Gutierrez. "An Enhanced Lightweight Security Gateway Protocol for the Edge Layer." Technologies 11, no. 5 (2023): 140. http://dx.doi.org/10.3390/technologies11050140.
Full textDawood, Muhammad, Chunagbai Xiao, Shanshan Tu, Faiz Abdullah Alotaibi, Mrim M. Alnfiai, and Muhammad Farhan. "Intelligent model for the detection and classification of encrypted network traffic in cloud infrastructure." PeerJ Computer Science 10 (May 27, 2024): e2027. http://dx.doi.org/10.7717/peerj-cs.2027.
Full text