Academic literature on the topic 'Virtual Private Network'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Virtual Private Network.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Virtual Private Network"

1

Kim, Kyung-Muk, and Hae-Sool Yang. "VPN (Virtual Private Network) SW's examination example analysis." Journal of the Korea Academia-Industrial cooperation Society 11, no. 8 (2010): 3012–20. http://dx.doi.org/10.5762/kais.2010.11.8.3012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Knapp, Laura. "Virtual Private Network Performance." EDPACS 28, no. 7 (2001): 1. http://dx.doi.org/10.1201/1079/43264.28.7.20010101/30378.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wright, Marie A. "Virtual Private Network Security." Network Security 2000, no. 7 (2000): 11–14. http://dx.doi.org/10.1016/s1353-4858(00)07018-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sudipti Banerjee. and Dr. Rajni Ranjan Singh Makwana. "Virtual Private Network: Survey and Research Challenges." International Journal of Latest Technology in Engineering Management & Applied Science 14, no. 6 (2025): 211–26. https://doi.org/10.51583/ijltemas.2025.140600028.

Full text
Abstract:
Abstract: The Virtual Private Network (VPN) is a rapidly developing technology that has a crucial function in guaranteeing the secure transfer of data. A virtual linkage is created among geographically distant individuals and networks that are linked through a common or public network, such as the Internet. Despite the fact that data is transmitted via a public network, a Virtual Private Network (VPN) signifies that the data is conveyed through a secure and private connection. Virtual Private Network (VPN) technology enables secure communication between two hosts by creating virtual tunnels. U
APA, Harvard, Vancouver, ISO, and other styles
5

Kennedy, Okokpujie, Shobayo Olamilekan, Noma-Osaghae Etinosa, Imhade Okokpujie, and Okoyeigbo Obinna. "Performance of MPLS-based Virtual Private Networks and Classic Virtual Private Networks Using Advanced Metrics." TELKOMNIKA Telecommunication, Computing, Electronics and Control 16, no. 5 (2018): 2073–81. https://doi.org/10.12928/TELKOMNIKA.v16i5.7326.

Full text
Abstract:
Multiprotocol Label Switching (MPLS) is effective in managing and utilizing available network bandwidth. It has advanced security features and a lower time delay. The existing literature has covered the performance of MPLS-based networks in relation to conventional Internet Protocol (IP) networks. But, too few literatures exist on the performance of MPLS-based Virtual Private Networks (VPN) in relation to traditional VPN networks. In this paper, a comparison is made between the effectiveness of the MPLSVPN network and a classic VPN network using simulation studies done on OPNET® . The perf
APA, Harvard, Vancouver, ISO, and other styles
6

Scott, Charlie, Paul Wolfe, and Mike Erwin. "Virtual Private Networks: Turning the Internet into Your Private Network." EDPACS 27, no. 2 (1999): 16. http://dx.doi.org/10.1201/1079/43248.27.2.19990801/30263.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Anggie Maulia, Aldi Fadilla Ramadhan, Andi Purwanto, Apipah Apipah, and Didik Aribowo. "Simulasi Virtual Private Network Dengan Topologi Star." Jurnal Penelitian Teknologi Informasi dan Sains 2, no. 2 (2024): 54–66. http://dx.doi.org/10.54066/jptis.v2i2.1865.

Full text
Abstract:
Virtual Private Network (VPN) is a form of private network through a public network by focusing on the security of the encrypted data in it. This research uses Cisco Packet Tracere software as a computer network technology simulation tool. Cisco Packet Tracker is a device in network technology simulation that functions for creation and development in networks. The purpose of this research is to create a VPN simulation using a star topology with Cisco Packet Tracer software. Star topology is a star-shaped topology, where each node is to the centre. The method used is a qualitative method with d
APA, Harvard, Vancouver, ISO, and other styles
8

Khizirova, M. A., Katipa Chezhimbayeva, Almira Mukhamejanova, Zhanat Manbetova, and Bulbul Ongar. "USING OF VIRTUAL PRIVATE NETWORK TECHNOLOGY FOR SIGNAL TRANSMISSION IN CORPORATE NETWORKS." Series of Geology and Technical Sciences 447, no. 3 (2021): 100–103. http://dx.doi.org/10.32014/2021.2518-170x.69.

Full text
Abstract:
This paper discusses some modes of signal transmission for corporate systems using the technology of virtual private networks VPN. A very important property of tunnels is the ability to differentiate different types of traffic and assign them the necessary service priorities. In this work, research has been carried out and comparative characteristics of signal transmission modes using virtual networks have been obtained to identify the effectiveness of the network in various modes of organizing a virtual network, and to optimize a virtual network in order to identify an effective method for or
APA, Harvard, Vancouver, ISO, and other styles
9

TAKEDA, T., R. MATSUZAKI, I. INOUE, and S. URUSHIDANI. "Network Design Scheme for Virtual Private Network Services." IEICE Transactions on Communications E89-B, no. 11 (2006): 3046–54. http://dx.doi.org/10.1093/ietcom/e89-b.11.3046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sobh, Tarek S., and Yasser Aly. "Effective and Extensive Virtual Private Network." Journal of Information Security 02, no. 01 (2011): 39–49. http://dx.doi.org/10.4236/jis.2011.21004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Virtual Private Network"

1

Celestino, Pedro. "Private virtual network." Universidade de Taubaté, 2005. http://www.bdtd.unitau.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=264.

Full text
Abstract:
Along with the computers networks emerges the possibility of managing remotely the intelligent organizations although the safe change of information has become a problem to the institutions which transport structured data through nets of computers. One of the largest challenges is the search for safe and economically viable solutions. Protocols of safety, cryptographic algorithms, safe means of communication are essential items so that the information can travel in environmentals free of external interferences. One of the alternatives is the Virtual Private Networks. In this work, the main pro
APA, Harvard, Vancouver, ISO, and other styles
2

Samuelsson, Joakim, and Richard Sandsund. "Implementing a virtual private network." Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91933.

Full text
Abstract:
Dagens företag vill ge anställda möjlighet att jobba hemifrån eller på resande fot. En vanlig lösning för att möjliggöra detta är virtual private network (VPN). VPN ger en användare tillgång till interna resurser på företaget från ett externt nät, exempelvis via Internet. Detta gör att användare kan komma åt de interna resurserna på ett säkert sätt. Vilken VPN-teknik är då att föredra för att få en så snabb, säker och pålitlig anslutning som möjligt? Detta examensarbete tar upp olika VPN-tekniker. Vi beskriver vanliga VPN-protokoll som L2TP, IPSec och PPTP. Hur användare autentiseras på ett sä
APA, Harvard, Vancouver, ISO, and other styles
3

Davis, Carlton R. "IPSec base virtual private network." Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33390.

Full text
Abstract:
The Internet evolved from an experiential packet-switching network called the ARPANET. This network has grown exponentially since its conversion from an experimental to an operational network in 1975. However, the need for confidential and secure data channel has dissuaded many enterprises from using this ubiquitous public infrastructure. The IPSec protocol suite developed by the Internet Engineering Task Force (IETF) makes it possible to implement secure communication channels or virtual private network (VPN) over the Internet. Corporations can benefit from substantial financial savings by ut
APA, Harvard, Vancouver, ISO, and other styles
4

Habibovic, Sanel. "VIRTUAL PRIVATE NETWORKS : An Analysis of the Performance in State-of-the-Art Virtual Private Network solutions in Unreliable Network Conditions." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17844.

Full text
Abstract:
This study aimed to identify the differences between state-of-the-art VPN solutions on different operating systems. It was done because a novel VPN protocol is in the early stages of release and a comparison of it, to other current VPN solutions is interesting. It is interesting because current VPN solutions are well established and have existed for a while and the new protocol stirs the pot in the VPN field. Therefore a contemporary comparison between them could aid system administrators when choosing which VPN to implement. To choose the right VPN solution for the occasion could increase per
APA, Harvard, Vancouver, ISO, and other styles
5

Norin, Anders, and Henrik Ohlsson. "VPN : Virtual Private Network i Windows 2000." Thesis, University West, Department of Informatics and Mathematics, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-483.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ikiz, Suheyla. "Performance Parameters Of Wireless Virtual Private Network." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607094/index.pdf.

Full text
Abstract:
ABSTRACT PERFORMANCE PARAMETERS OF WIRELESS VIRTUAL PRIVATE NETWORK KZ, S&uuml<br>heyla Ms.c, Department of Information Systems Supervisor: Assoc. Prof. Dr. Nazife Baykal Co-Supervisor: Assist. Prof. Dr. Yusuf Murat Erten January 2006, 78 pages As the use of PC&rsquo<br>s and handheld devices increase, it expected that wireless communication would also grow. One of the major concerns in wireless communication is the security. Virtual Private Network (VPN) is the most secure solution that ensures three main aspect of security: authentication, accountability and encryption can use in wireless ne
APA, Harvard, Vancouver, ISO, and other styles
7

Liang, Huan. "Minimal cost design of virtual private network." Thesis, University of Ottawa (Canada), 2003. http://hdl.handle.net/10393/26513.

Full text
Abstract:
VPN technology is an attractive cost-effective solution for the support of the networking needs of enterprises. In this work, we review current issues in the development of VPN technology. We then focus our research on minimal cost design, used by network-based IP VPN service providers. The interest in such solutions is generated by both customers seeking to reduce support costs and by Internet Service Providers (ISPs) seeking new revenue sources. Solving the cost minimization would allow ISPs to define and deploy new VPN services. In this thesis, Multicommodity Min-Cost Flows (MMCF) formulati
APA, Harvard, Vancouver, ISO, and other styles
8

Rüegg, Maurice. "Virtual private network provisioning in the hose model /." Zürich : ETH, Eidgenössische Technische Hochschule Zürich, Institut für Technische Informatik und Kommunikationsnetze, 2003. http://e-collection.ethbib.ethz.ch/show?type=dipl&nr=119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lin, Zhangxi. "Virtual private network traffic pricing : an exploratory study /." Digital version accessible at:, 1999. http://wwwlib.umi.com/cr/utexas/main.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bazama, Muneer I. "Investigation into Layer 3 Multicast Virtual Private Network Schemes." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22653.

Full text
Abstract:
The need of multicast applications such as Internet Protocol Television (IPTV) and dependent financial services require more scalable and reliable MVPN infrastructures. This diversity and breadth of services pose a challenge for operators to create an infrastructure that supports Layer 2 (ATM/Frame relay/Ethernet/PPP) and Layer 3(IPv4/IPv6) Virtual Private Networks. The difficulty is particularly true for virtual services that require complex control and data plane operations. Another challenge is to support emerging multicast applications incrementally on top of the existing Layer 3 VPN infra
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Virtual Private Network"

1

Carmouche, James Henry. IPsec virtual private network fundamentals. Cisco Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Carmouche, James Henry. IPsec virtual private network fundamentals. Cisco Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

(Corporation), NIIT, ed. Building a virtual private network. Premier Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kosiur, David R. Building and managing virtual private networks. Wiley, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Covill, Randall J. Implementing extranets: The Internet as a virtual private network. Digital Press, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ng, Walfrey. MIBlet approach to virtual private network management: Design, applications and implementation. National Library of Canada, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Raud, Matthieu. A study of virtual private network technologies and analysis of the implementations. Oxford Brookes University, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Frahim, Jazib. SSL and Remote Access VPNs: An introduction to designing and configuring SSL virtual private networks. Cisco Systems, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

1969-, Erwin Mike, and Wolfe Paul, eds. Virtual Private Networks. O'Reilly, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Inc, NetLibrary, ed. Virtual private networks. McGraw-Hill, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Virtual Private Network"

1

Bök, Patrick-Benjamin, Andreas Noack, Marcel Müller, and Daniel Behnke. "Virtual Private Network (VPN)." In Computernetze und Internet of Things. Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29409-0_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Masuda, Mineyoshi, Yutaka Yoshimura, Toshiaki Tarui, Toni Shonai, and Mamoru Sugie. "VPDC: Virtual Private Data Center." In Integrated Network Management VIII. Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35674-7_47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sinha, Sanjib. "Virtual Private Network or VPN." In Beginning Ethical Hacking with Python. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2541-7_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Prenn, Caroline, and Paul van Marcke. "Value-chain, virtual private network (VPN)." In Projektkompass eLogistik. Vieweg+Teubner Verlag, 2002. http://dx.doi.org/10.1007/978-3-322-84977-9_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cabianca, Dario. "Implementing Virtual Private Cloud Instances." In Google Cloud Platform (GCP) Professional Cloud Network Engineer Certification Companion. Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9354-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Lina, Ge Yu, Guoren Wang, et al. "A Virtual Private Network for Virtual Enterprise Information Systems." In Web-Age Information Management. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-45151-x_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gali, Alex, and Stefan Covaci. "Active Virtual Private Network Services on Demand." In Next Generation Networks. Networks and Services for the Information Society. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-40019-2_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Brehon, Yannick, Daniel Kofman, and Augusto Casaca. "Virtual Private Network to Spanning Tree Mapping." In NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-72606-7_60.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Eisenbrand, Friedrich, Fabrizio Grandoni, Gianpaolo Oriolo, and Martin Skutella. "New Approaches for Virtual Private Network Design." In Automata, Languages and Programming. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11523468_93.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ezra, Paul Joan, Sanjay Misra, Akshat Agrawal, Jonathan Oluranti, Rytis Maskeliunas, and Robertas Damasevicius. "Secured Communication Using Virtual Private Network (VPN)." In Lecture Notes on Data Engineering and Communications Technologies. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-3961-6_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Virtual Private Network"

1

Garg, Mohan, S. Senthurya, Jagtej Singh, Anila Bajpai, Nakul S. Sharma, and K. Yuvaraj. "Investigating the Use of Virtual Private Networks on ATM Network Security." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724957.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Saad, Muhammad, Waseem Ahmed, and Muhammad Mubashir Khan. "Design and Analysis of Quantum Safe Virtual Private Network." In 2024 4th International Conference on Innovations in Computer Science (ICONICS). IEEE, 2024. https://doi.org/10.1109/iconics64289.2024.10824365.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shim, Hyoungsub, Bongho Kang, Haejung Im, Duhyun Jeon, and Seok-min Kim. "Virtual Private Network (VPN) with Post-Quantum Cryptography (PQC)." In 2024 15th International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2024. https://doi.org/10.1109/ictc62082.2024.10827179.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Xu, Dahua Zhang, Ziqing Lin, et al. "Research on Security Risk Assessment Model for Power 5G Virtual Private Network." In 2024 International Conference on Artificial Intelligence and Power Systems (AIPS). IEEE, 2024. http://dx.doi.org/10.1109/aips64124.2024.00100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Guoyi, Hailong Zhu, Junyi Xie, Jiaqi Hu, Yu Huang, and Tianyu Chen. "Research on Terminal Multi-Operator Network Access and Switching Control Technology Based on 5G Power Virtual Private Network." In 2024 IEEE 4th International Conference on Data Science and Computer Application (ICDSCA). IEEE, 2024. https://doi.org/10.1109/icdsca63855.2024.10859952.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhu, Hailong, Guoyi Zhang, Junyi Xie, Jiaqi Hu, Yu Huang, and Tianyu Chen. "Intelligent Management and Control of Massive Terminal Access Based on 5G Power Virtual Private Network." In 2024 IEEE 4th International Conference on Data Science and Computer Application (ICDSCA). IEEE, 2024. https://doi.org/10.1109/icdsca63855.2024.10860110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Benzid, Djedjiga, and Michel Kadoch. "Virtual Private Network over Wireless Mesh Networks." In 2014 2nd International Conference on Future Internet of Things and Cloud (FiCloud). IEEE, 2014. http://dx.doi.org/10.1109/ficloud.2014.60.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gupta, Anupam, Jon Kleinberg, Amit Kumar, Rajeev Rastogi, and Bulent Yener. "Provisioning a virtual private network." In the thirty-third annual ACM symposium. ACM Press, 2001. http://dx.doi.org/10.1145/380752.380830.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Takeda, Tomonori. "Layer 1 Virtual Private Network." In OFC/NFOEC 2007 - 2007 Conference on Optical Fiber Communication and the National Fiber Optic Engineers Conference. IEEE, 2007. http://dx.doi.org/10.1109/ofc.2007.4348578.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nawej, Claude Mukatshung, and Shengzhi Du. "Virtual Private Network’s Impact on Network Performance." In 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC). IEEE, 2018. http://dx.doi.org/10.1109/iconic.2018.8601281.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Virtual Private Network"

1

Andersson, L., and T. Madsen. Provider Provisioned Virtual Private Network (VPN) Terminology. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Daggett, David. Analyzing Risks of Virtual Private Network Connections. Office of Scientific and Technical Information (OSTI), 2024. https://doi.org/10.2172/2483602.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bocci, M., S. Boutros, and A. Sajassi. Applicability of Ethernet Virtual Private Network (EVPN) to Network Virtualization over Layer 3 (NVO3) Networks. Edited by J. Rabadan. RFC Editor, 2023. http://dx.doi.org/10.17487/rfc9469.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rosen, E., Y. Cai, and A. Boers. Multicast Virtual Private Network (MVPN): Using Bidirectional P-Tunnels. RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7582.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Schliesser, B., and T. Nadeau. Definition of Textual Conventions for Virtual Private Network (VPN) Management. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4265.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gont, F. Layer 3 Virtual Private Network (VPN) Tunnel Traffic Leakages in Dual-Stack Hosts/Networks. RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7359.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Adrangi, F., and H. Levkowetz, eds. Problem Statement: Mobile IPv4 Traversal of Virtual Private Network (VPN) Gateways. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4093.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nadeau, T., and H. van, eds. MPLS/BGP Layer 3 Virtual Private Network (VPN) Management Information Base. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

De, J., D. Ooms, M. Carugi, and F. Le. BGP-MPLS IP Virtual Private Network (VPN) Extension for IPv6 VPN. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4659.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Baker, F., and P. Bose. Quality of Service (QoS) Signaling in a Nested Virtual Private Network. RFC Editor, 2007. http://dx.doi.org/10.17487/rfc4923.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!