Academic literature on the topic 'Tunneling protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Tunneling protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Tunneling protocol"
Arifwidodo, Bongga. "PERFORMANSI EOIP-PPTP DENGAN EOIP-L2TP PADA ROUTER MIKROTIK." Journal of Telecommunication, Electronics, and Control Engineering (JTECE) 2, no. 1 (2020): 01–07. http://dx.doi.org/10.20895/jtece.v2i1.104.
Full textM. Khofikur R.A, Fauzan Prasetyo Eka Putra, Moh Wahid Ridho G, and Valentino Huda. "Analisis Kinerja dan Keamanan Protokol PPTP dan L2TP/IPSec VPN pada Jaringan MikroTik." Infotek: Jurnal Informatika dan Teknologi 8, no. 2 (2025): 334–44. https://doi.org/10.29408/jit.v8i2.30230.
Full textSilvia Anggraeni, Nico Setyo Triwibowo, Muhammad Fahrurizqi Ilham, Irfan Rizki Arip, and Rubio Azza Arafah. "Perbandingan Quality of Service antara VPN Point-to-Point Tunneling Protocol Dan Layer Two Tunneling Protocol Di Fakultas Teknik Universitas Pembangunan Nasional Veteran Jakarta." JE-Unisla 9, no. 2 (2024): 195–204. https://doi.org/10.30736/je-unisla.v9i2.1320.
Full textGunawan, Muhammad Alvin, and Sukma Wardhana. "Implementasi dan Perbandingan Keamanan PPTP dan L2TP/IPsec VPN (Virtual Private Network)." RESISTOR (Elektronika Kendali Telekomunikasi Tenaga Listrik Komputer) 6, no. 1 (2023): 69. http://dx.doi.org/10.24853/resistor.6.1.69-78.
Full textMirdan, Syahid Mulya Sudrajat, Perdana Doan, and Muldina Negara Ridha. "Performance Analysis of VXLAN and NVGRE Tunneling Protocol on Virtual Network." Bulletin of Electrical Engineering and Informatics 6, no. 3 (2017): 295–300. https://doi.org/10.11591/eei.v6i3.622.
Full textSlameto, Andika Agus, and Rahmat Hidayat. "Comparative Analysis of PPPOE and SSTP Performance in Microtic(Analisis Perbandingan Kinerja PPPOE dan SSTP Pada Mikrotik)." Jurnal KomtekInfo 6, no. 2 (2019): 107–16. http://dx.doi.org/10.35134/komtekinfo.v6i2.49.
Full textAndini, Marisa Dika, Muhamad Amirullah, and Helitha Novianty Muchtar. "Penggunaan Aplikasi Virtual Private Network (VPN) Point To Point Tunneling Protocol (PPTP) Dalam Mengakses Situs Terblokir." Supremasi Hukum : Jurnal Penelitian Hukum 29, no. 2 (2020): 148–66. http://dx.doi.org/10.33369/jsh.29.2.148-166.
Full textKhalil, Knaj Nouma. "IMPACT OF TUNNELING ON NETWORK CAPACITY." SYNCHROINFO JOURNAL 8, no. 4 (2022): 9–13. http://dx.doi.org/10.36724/2664-066x-2022-8-4-9-13.
Full textSamad, Mustaffa. "Design and Testing of an Experimental IPv4-to-IPv6 Transition Network." Scientific Research Journal 3, no. 1 (2006): 27. http://dx.doi.org/10.24191/srj.v3i1.5673.
Full textSamad, Mustaffa. "Design and Testing of an Experimental IPv4-to-IPv6 Transition Network." Scientific Research Journal 3, no. 1 (2006): 27. http://dx.doi.org/10.24191/srj.v3i1.9337.
Full textDissertations / Theses on the topic "Tunneling protocol"
Стьопа, Дмитро Олександрович, та Dmytro Stiopa. "Методи захисту інформаційно-телекомунікаційних систем та мереж від несанкціонованого доступу з використанням технології VPN". Master's thesis, ТНТУ, 2021. http://elartu.tntu.edu.ua/handle/lib/36970.
Full textRODRIGUES, Moisés Bezerra Estrela. "Towards Improvements in resource management for content delivert networks." Universidade Federal de Pernambuco, 2016. https://repositorio.ufpe.br/handle/123456789/18367.
Full textČížek, Michal. "Tunelovací a kryptografické protokoly jako ochrana soukromí na regulovaném internetu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-218840.
Full textRawat, Priyanka. "Improving efficiency of tunneling mechanisms over IP networks." Télécom Bretagne, 2010. http://www.theses.fr/2010TELB0131.
Full textBESIERS, PARAYRE FRANCOISE. "Prevention des accidents dysbariques sur le chantier du metro toulousain : selection medicale et protocoles de securite." Toulouse 3, 1991. http://www.theses.fr/1991TOU31002.
Full text"Validity and accuracy issues in electronic commerce with specific reference to VPN's." Thesis, 2012. http://hdl.handle.net/10210/5494.
Full textVon, Gordon Albert Fredrich Johannes. "The design of a software architectural framework for tunnelling metering protocols over TCP/IP and low bandwidth packet switched networks with support for proprietary addressing." Diss., 2007. http://hdl.handle.net/2263/29032.
Full textBooks on the topic "Tunneling protocol"
Zubairy, M. Suhail. Quantum Mechanics for Beginners. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198854227.001.0001.
Full textBook chapters on the topic "Tunneling protocol"
Collins, Jeff. "GPRS Tunneling Protocol (GTP)." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-642-27739-9_1522-1.
Full textCollins, Jeff. "GPRS Tunneling Protocol (GTP)." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_1522.
Full textLin, Weyde. "Tunneling and VPN." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_26.
Full textOpmane, Inara, Leo Truksans, Guntis Barzdins, Adrians Heidens, Rihards Balodis, and Pavel Merzlyakov. "ZERO: An Efficient Ethernet-Over-IP Tunneling Protocol." In Inter-cooperative Collective Intelligence: Techniques and Applications. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35016-0_13.
Full textViswa Bharathy, A. M., and V. Chandrasekar. "A Novel Virtual Tunneling Protocol for Underwater Wireless Sensor Networks." In Advances in Intelligent Systems and Computing. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-3600-3_27.
Full textFischer, Marc, Moritz Walker, Philipp A. Neher, Michael Neubauer, Armin Lechler, and Alexander Verl. "EtherCAT Tunneling Through Time-Sensitive Networks: An Experimental Evaluation." In ARENA2036. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-88831-1_13.
Full textAkter, Happy, Sohely Jahan, Sajeeb Saha, Rahat Hossain Faisal, and Shariful Islam. "Evaluating Performances of VPN Tunneling Protocols Based on Application Service Requirements." In Proceedings of the Third International Conference on Trends in Computational and Cognitive Engineering. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7597-3_36.
Full textSathu, Hira, Mohib A. Shah, and Kathiravelu Ganeshan. "Performance Comparison of Video Protocols Using Dual-Stack and Tunnelling Mechanisms." In Advances in Computing and Communications. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22726-4_52.
Full textProwell, Stacy, Rob Kraus, and Mike Borkin. "Protocol Tunneling." In Seven Deadliest Network Attacks. Elsevier, 2010. http://dx.doi.org/10.1016/b978-1-59749-549-3.00004-3.
Full text"Network Tunneling Protocol." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_300640.
Full textConference papers on the topic "Tunneling protocol"
Ilias, Irma Syarlina Che, Sera Syarmila Sameon, Muhammad Zaqwan Ezzad Zulkifli, and Mohammad Zahir Mat Salleh. "Optimizing VPN Security in Financial Services: Implementing 256-Bit Encryption and Tunneling Protocols for Secure Data Transmission." In 2025 19th International Conference on Ubiquitous Information Management and Communication (IMCOM). IEEE, 2025. https://doi.org/10.1109/imcom64595.2025.10857544.
Full textUgwuanyi, Stephen, Kinan Ghanem, and Ibrahim Abdulhadi. "Implementing Secure Layer 2 Tunneling Protocols for IEC 61850-90-5 Based Routable and Non-Routable GOOSE and SV Messages." In 2024 IEEE PES Innovative Smart Grid Technologies Europe (ISGT EUROPE). IEEE, 2024. https://doi.org/10.1109/isgteurope62998.2024.10863237.
Full textAn, Hailin, Wanming Luo, Xingfeng Li, Xinchang Zhang, and Baoping Yan. "A New IPv6 Tunneling Protocol: Escort." In 2009 International Symposium on Computer Network and Multimedia Technology (CNMT 2009). IEEE, 2009. http://dx.doi.org/10.1109/cnmt.2009.5374781.
Full textAkbar, M., N. Javaid, S. Yousaf, et al. "TRP: Tunneling Routing Protocol for WSNs." In 2014 IEEE 28th International Conference on Advanced Information Networking and Applications (AINA). IEEE, 2014. http://dx.doi.org/10.1109/aina.2014.68.
Full textPrisantama, Alfadoni, Widyawan, and I. Wayan Mustika. "Tunneling 6LoWPAN protocol stack in IPv6 network." In PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON SYNCHROTRON RADIATION INSTRUMENTATION – SRI2015. Author(s), 2016. http://dx.doi.org/10.1063/1.4958501.
Full textLamali, Mohamed Lamine, Simon Lassourreuille, Stephan Kunne, and Johanne Cohen. "A stack-vector routing protocol for automatic tunneling." In IEEE INFOCOM 2019 - IEEE Conference on Computer Communications. IEEE, 2019. http://dx.doi.org/10.1109/infocom.2019.8737536.
Full textLi, Yu, Fei Wang, and Shuhui Chen. "VPN Traffic Identification Based on Tunneling Protocol Characteristics." In 2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET). IEEE, 2022. http://dx.doi.org/10.1109/ccet55412.2022.9906397.
Full textSchneier, Bruce, and Mudge. "Cryptanalysis of Microsoft's point-to-point tunneling protocol (PPTP)." In the 5th ACM conference. ACM Press, 1998. http://dx.doi.org/10.1145/288090.288119.
Full textJahan, Sohely, Md Saifur Rahman, and Sajeeb Saha. "Application specific tunneling protocol selection for Virtual Private Networks." In 2017 International Conference on Networking, Systems and Security (NSysS). IEEE, 2017. http://dx.doi.org/10.1109/nsyss.2017.7885799.
Full textPutra, Chrystia Aji, Yisti Vita Via, and Wahyu SJ Saputra. "Point to Point Protocol Tunneling VPN Simulation and Analysis on Sniffing." In Proceedings of the International Conference on Science and Technology (ICST 2018). Atlantis Press, 2018. http://dx.doi.org/10.2991/icst-18.2018.220.
Full textReports on the topic "Tunneling protocol"
Townsley, W., A. Valencia, A. Rubens, G. Pall, G. Zorn, and B. Palter. Layer Two Tunneling Protocol "L2TP". RFC Editor, 1999. http://dx.doi.org/10.17487/rfc2661.
Full textHamzeh, K., G. Pall, W. Verthein, J. Taarud, W. Little, and G. Zorn. Point-to-Point Tunneling Protocol (PPTP). RFC Editor, 1999. http://dx.doi.org/10.17487/rfc2637.
Full textLau, J., M. Townsley, and I. Goyret, eds. Layer Two Tunneling Protocol - Version 3 (L2TPv3). RFC Editor, 2005. http://dx.doi.org/10.17487/rfc3931.
Full textPalter, W., and W. Townsley. Layer-Two Tunneling Protocol Extensions for PPP Link Control Protocol Negotiation. RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3437.
Full textRawat, V., R. Tio, S. Nanji, and R. Verma. Layer Two Tunneling Protocol (L2TP) over Frame Relay. RFC Editor, 2001. http://dx.doi.org/10.17487/rfc3070.
Full textCalhoun, P., W. Luo, D. McPherson, and K. Peirce. Layer Two Tunneling Protocol (L2TP) Differentiated Services Extension. RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3308.
Full textCaves, E., P. Calhoun, and R. Wheeler. Layer Two Tunneling Protocol "L2TP" Management Information Base. RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3371.
Full textTownsley, M., G. Wilkie, S. Booth, S. Bryant, and J. Lau. Frame Relay over Layer 2 Tunneling Protocol Version 3 (L2TPv3). RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4591.
Full textTownsley, M., C. Pignataro, S. Wainner, T. Seely, and J. Young. Encapsulation of MPLS over Layer 2 Tunneling Protocol Version 3. RFC Editor, 2007. http://dx.doi.org/10.17487/rfc4817.
Full textJain, V., ed. Fail Over Extensions for Layer 2 Tunneling Protocol (L2TP) "failover". RFC Editor, 2007. http://dx.doi.org/10.17487/rfc4951.
Full text