Academic literature on the topic 'Virtual Private Network (VPN)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Virtual Private Network (VPN).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Virtual Private Network (VPN)"

1

Kennedy, Okokpujie, Shobayo Olamilekan, Noma-Osaghae Etinosa, Imhade Okokpujie, and Okoyeigbo Obinna. "Performance of MPLS-based Virtual Private Networks and Classic Virtual Private Networks Using Advanced Metrics." TELKOMNIKA Telecommunication, Computing, Electronics and Control 16, no. 5 (2018): 2073–81. https://doi.org/10.12928/TELKOMNIKA.v16i5.7326.

Full text
Abstract:
Multiprotocol Label Switching (MPLS) is effective in managing and utilizing available network bandwidth. It has advanced security features and a lower time delay. The existing literature has covered the performance of MPLS-based networks in relation to conventional Internet Protocol (IP) networks. But, too few literatures exist on the performance of MPLS-based Virtual Private Networks (VPN) in relation to traditional VPN networks. In this paper, a comparison is made between the effectiveness of the MPLSVPN network and a classic VPN network using simulation studies done on OPNET® . The perf
APA, Harvard, Vancouver, ISO, and other styles
2

Kim, Kyung-Muk, and Hae-Sool Yang. "VPN (Virtual Private Network) SW's examination example analysis." Journal of the Korea Academia-Industrial cooperation Society 11, no. 8 (2010): 3012–20. http://dx.doi.org/10.5762/kais.2010.11.8.3012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fu, Chunle, Bailing Wang, Hongri Liu, and Wei Wang. "Software-Defined Virtual Private Network for SD-WAN." Electronics 13, no. 13 (2024): 2674. http://dx.doi.org/10.3390/electronics13132674.

Full text
Abstract:
Software-Defined Wide Area Networks (SD-WANs) are an emerging Software-Defined Network (SDN) technology to reinvent Wide Area Networks (WANs) for ubiquitous network interconnections in cloud computing, edge computing, and the Internet of Everything. The state-of-the-art overlay-based SD-WANs are simply conjunctions of Virtual Private Network (VPN) and SDN architecture to leverage the controllability and programmability of SDN, which are only applicable for specific platforms and do not comply with the extensibility of SDN. This paper motivates us to refactor traditional VPNs with SDN architect
APA, Harvard, Vancouver, ISO, and other styles
4

Khizirova, M. A., Katipa Chezhimbayeva, Almira Mukhamejanova, Zhanat Manbetova, and Bulbul Ongar. "USING OF VIRTUAL PRIVATE NETWORK TECHNOLOGY FOR SIGNAL TRANSMISSION IN CORPORATE NETWORKS." Series of Geology and Technical Sciences 447, no. 3 (2021): 100–103. http://dx.doi.org/10.32014/2021.2518-170x.69.

Full text
Abstract:
This paper discusses some modes of signal transmission for corporate systems using the technology of virtual private networks VPN. A very important property of tunnels is the ability to differentiate different types of traffic and assign them the necessary service priorities. In this work, research has been carried out and comparative characteristics of signal transmission modes using virtual networks have been obtained to identify the effectiveness of the network in various modes of organizing a virtual network, and to optimize a virtual network in order to identify an effective method for or
APA, Harvard, Vancouver, ISO, and other styles
5

Anggie Maulia, Aldi Fadilla Ramadhan, Andi Purwanto, Apipah Apipah, and Didik Aribowo. "Simulasi Virtual Private Network Dengan Topologi Star." Jurnal Penelitian Teknologi Informasi dan Sains 2, no. 2 (2024): 54–66. http://dx.doi.org/10.54066/jptis.v2i2.1865.

Full text
Abstract:
Virtual Private Network (VPN) is a form of private network through a public network by focusing on the security of the encrypted data in it. This research uses Cisco Packet Tracere software as a computer network technology simulation tool. Cisco Packet Tracker is a device in network technology simulation that functions for creation and development in networks. The purpose of this research is to create a VPN simulation using a star topology with Cisco Packet Tracer software. Star topology is a star-shaped topology, where each node is to the centre. The method used is a qualitative method with d
APA, Harvard, Vancouver, ISO, and other styles
6

Sari, Yosi Nofita, Dedy Irfan, and Asrul Huda. "Network Security Analysis Using Virtual Private Network in Vocational School." Jurnal Paedagogy 9, no. 3 (2022): 582. http://dx.doi.org/10.33394/jp.v9i3.5346.

Full text
Abstract:
Every organization chooses a virtual private network (VPN) as their top option since it is a practical and secure solution. Through the use of a virtual private network, this study seeks to evaluate the network in SMK (VPN). The descriptive qualitative research used in this study was carried out at the lab of SMK Negeri 1 Ampek Angkek. Data were gathered through observation, interviews, and document analysis studies. The method of data analysis employed descriptive analysis. The results of this study indicate that the activity on the VPN network is better than the Non-VPN because the activitie
APA, Harvard, Vancouver, ISO, and other styles
7

Anwar, Rian Septian, and Nani Agustina. "Implementasi dan Analisa Kinerja Jaringan Wide Area Network dengan Open VPN-Access Server." INFORMATICS FOR EDUCATORS AND PROFESSIONAL : Journal of Informatics 4, no. 2 (2020): 143. http://dx.doi.org/10.51211/itbi.v4i2.1307.

Full text
Abstract:
Abstrak: Meningkatnya penggunaan internet di dunia, membuat trafik internet menjadi tinggi. Kebutuhan akan interkoneksi antar jaringan yang meningkat terutama pada perusahaan yang mempunyai banyak cabang. Oleh karena itu perusahaan dituntut untuk mengeluarkan budget lebih banyak lagi. Untuk meredam pengeluaran yang terlalu berlebih maka dibutuhkan dibutuhkan sebuah jaringan Virtual Private Network (VPN). Dengan memanfaatkan Open VPN-Access Server biaya yang dikeluarkan lebih murah dibandingkan dengan sewa VPN-IP yang relatif lebih mahal biayanya. Untuk jaringan yang lebih baik, maka harus dito
APA, Harvard, Vancouver, ISO, and other styles
8

Abdulazeez, Adnan Mohsin, Baraa Wasfi Salim, Diyar Qader Zeebaree, and Dana Doghramachi. "Comparison of VPN Protocols at Network Layer Focusing on Wire Guard Protocol." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 18 (2020): 157. http://dx.doi.org/10.3991/ijim.v14i18.16507.

Full text
Abstract:
The key point of this paper is to assess and look over the top of the line network layer-based VPN (Virtual Private Network) protocols because data link layer is hardly ever found to be in use in organizations, the reason is because of its exceedingly high charge. Virtual Private Network (VPN) is commonly used in business situations to provide secure communication channels over public infrastructure such as Internet. Virtual Private Networks (VPNs) provide a secure encrypted communication between remote networks worldwide by using Internet Protocol (IP) tunnels and a shared medium like the Int
APA, Harvard, Vancouver, ISO, and other styles
9

Lizarti, Nora, and Wirta Agustin. "Aplikasi Network Traffic Monitoring Menggunakan Simple Network Management Protocol (SNMP) pada Jaringan Virtual Private Network (VPN)." SATIN - Sains dan Teknologi Informasi 1, no. 1 (2015): 27. http://dx.doi.org/10.33372/stn.v1i1.17.

Full text
Abstract:
Aplikasi Sistem Informasi yang ada di SMK Labor Binaan FKIP UNRI telah dapat menunjang proses keputusan yang akurat. Aplikasi Sistem Informasi tersebut bisa di akses melalui internet secara private dengan teknologi VPN ( Virtual Private Network), tetapi penggunaannya belum bisa di pantau secara spesifik oleh administrator jaringan, sehiingga perlu untuk membangunkan suatu sistem traffic monitoring dengan menggunakan Simple Network Management Protocol (SNMP) dalam mengimplementasikan aplikasi untuk melakukan pengamatan penggunaan lalu lintas data internet dari parameter yang ada pada jaringan V
APA, Harvard, Vancouver, ISO, and other styles
10

Novanto, Mukhammad Rizki, Joseph Dedy Irawan, and F. X. Ariwibisono. "RANCANG BANGUN PANEL VIRTUAL PRIVATE NETWORK (VPN) BERBASIS WEB." JATI (Jurnal Mahasiswa Teknik Informatika) 6, no. 1 (2022): 259–66. http://dx.doi.org/10.36040/jati.v6i1.4615.

Full text
Abstract:
Tidak bisa dipungkiri semenjak pandemi virus Covid-19 kegiatan internet terus menjadi bertambah. Semacam halnya bekerja dari rumah memakai internet, belajar daring memakai internet, komunikasi social media memakai internet, belanja online di pasar online dengan internet, sampai mencari data lewat internet. Kebutuhan internet terus menjadi bertambah, tidak hanya harga virtual private server yang disediakan provider lokal relatif mahal serta instalasi sampai operasional membutuhkan banyak tahapan, semacam wajib menginstal script guna berjalannya protocol pada VPS sehingga dibutuhkannya sesuatu s
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Virtual Private Network (VPN)"

1

Samuelsson, Joakim, and Richard Sandsund. "Implementing a virtual private network." Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91933.

Full text
Abstract:
Dagens företag vill ge anställda möjlighet att jobba hemifrån eller på resande fot. En vanlig lösning för att möjliggöra detta är virtual private network (VPN). VPN ger en användare tillgång till interna resurser på företaget från ett externt nät, exempelvis via Internet. Detta gör att användare kan komma åt de interna resurserna på ett säkert sätt. Vilken VPN-teknik är då att föredra för att få en så snabb, säker och pålitlig anslutning som möjligt? Detta examensarbete tar upp olika VPN-tekniker. Vi beskriver vanliga VPN-protokoll som L2TP, IPSec och PPTP. Hur användare autentiseras på ett sä
APA, Harvard, Vancouver, ISO, and other styles
2

Norin, Anders, and Henrik Ohlsson. "VPN : Virtual Private Network i Windows 2000." Thesis, University West, Department of Informatics and Mathematics, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-483.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Habibovic, Sanel. "VIRTUAL PRIVATE NETWORKS : An Analysis of the Performance in State-of-the-Art Virtual Private Network solutions in Unreliable Network Conditions." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17844.

Full text
Abstract:
This study aimed to identify the differences between state-of-the-art VPN solutions on different operating systems. It was done because a novel VPN protocol is in the early stages of release and a comparison of it, to other current VPN solutions is interesting. It is interesting because current VPN solutions are well established and have existed for a while and the new protocol stirs the pot in the VPN field. Therefore a contemporary comparison between them could aid system administrators when choosing which VPN to implement. To choose the right VPN solution for the occasion could increase per
APA, Harvard, Vancouver, ISO, and other styles
4

Soler, Avellén Carl Richard. "Virtual Private Network Communication over a session layer socket protocol (SOCKS)." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-66277.

Full text
Abstract:
SYSTeam is an IT solutions supplier company that wants to develop a product which permits users to communicate with each other, over the Internet, in a secure way. The solution creates communication between two subnets which are connected through a Virtual Private Network (VPN) Gateway. The security of the communication is implemented at the application layer by using the Secure Socket Layer (SSL) protocol which carries, encrypted within it, a session layer technology called Sock-et-s (SOCKS). The communication prototype is developed in a Linux platform with the Integrated Development Environm
APA, Harvard, Vancouver, ISO, and other styles
5

Lukaszewski, Daniel. "Multipath transport for virtual private networks." Thesis, Monterey, California: Naval Postgraduate School, 2017. http://hdl.handle.net/10945/53013.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>Virtual Private Networks (VPNs) are designed to use the Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) to establish secure communication tunnels over public Internet. Multipath TCP (MPTCP) extends TCP to allow data to be delivered over multiple network paths simultaneously. This thesis first builds a testbed and investigates the potential of using MPTCP tunnels to increase the goodput of VPN communications and support seamless mobility. Based on the empirical results and an analysis of the MPTCP design in Linux kern
APA, Harvard, Vancouver, ISO, and other styles
6

Ögren, Niklas. "Selecting/realization of Virtual Private Networks with Multiprotocol Label Switching or Virtual Local Area Networks." Thesis, KTH, Mikroelektronik och Informationsteknik, IMIT, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-93211.

Full text
Abstract:
Many reports have been written about the techniques behind Virtual Private Networks (VPN) and Multi Protocol Label Switching (MPLS). They usually deal with the low level design of the software implementing a specific technique. The initial products are usually not mature enough to run in a large network or have to be adjusted in some way to fit. This report investigates the different ways of implementing strict layer 2 Virtual Private Networks in an existing nation-wide Gigabit Ethernet. The infrastructure in use, as well as the hardware, has to be used without major changes. Since 1998/1999,
APA, Harvard, Vancouver, ISO, and other styles
7

Tryggvason, Thorir. "Analysis of the PPTP and IPSec protocols in Virtual Private Networks." Thesis, University of Skövde, Department of Computer Science, 2000. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-415.

Full text
Abstract:
<p>Today increasing numbers of individuals are working away from the ordinary workplace while still requiring access to the server located at the workplace. New technology is meeting this demand allowing for safe and secure transmission of the data over the Internet. The aim of this project is to analyse two protocols that are used within the Virtual Private Network (VPN) structure today, with the focus on installation, transmission speed on both Local Area Networks (LAN) and via telephone line and security aspects of the protocols.</p><p>The results show that it is quite complicated to setup
APA, Harvard, Vancouver, ISO, and other styles
8

Wikström, Alexander, Mark Thomson, and Lolita Mageramova. "Virtual Private Networks: : A feasibility study of secure communications between remote locations." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-24550.

Full text
Abstract:
Virtual Private Networks (VPNs) are an integral part of protecting company communications from unauthorized viewing, replication or manipulation. In order for employees to remotely conduct business in an effective and secure manner from a branch location or while traveling, Virtual Private Networks can be viewed as an absolute necessity.   Starting with a certain set of network communication requirements, our project's hypothesis was that the most suitable VPN implementation for Cheap Flats (a fictitious company we created) would be an IPSec client VPN. Included in the report are basic definit
APA, Harvard, Vancouver, ISO, and other styles
9

Ikiz, Suheyla. "Performance Parameters Of Wireless Virtual Private Network." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607094/index.pdf.

Full text
Abstract:
ABSTRACT PERFORMANCE PARAMETERS OF WIRELESS VIRTUAL PRIVATE NETWORK KZ, S&uuml<br>heyla Ms.c, Department of Information Systems Supervisor: Assoc. Prof. Dr. Nazife Baykal Co-Supervisor: Assist. Prof. Dr. Yusuf Murat Erten January 2006, 78 pages As the use of PC&rsquo<br>s and handheld devices increase, it expected that wireless communication would also grow. One of the major concerns in wireless communication is the security. Virtual Private Network (VPN) is the most secure solution that ensures three main aspect of security: authentication, accountability and encryption can use in wireless ne
APA, Harvard, Vancouver, ISO, and other styles
10

Corfiati, Matteo. "Valutazione sperimentale di tecnologie per la creazione di VPN in ambito LAN/WAN." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/4548/.

Full text
Abstract:
Il documento riporta, con prove sperimentali, un confronto tra le prestazioni che diverse tecnologie VPN hanno all'interno dello scenari wired e wireless. Il protocollo di tunneling utilizzato per la creazione delle VPN incide in modo particolare sulle performance della rete. L'obiettivo è proprio quello di valutare il protocollo che fornisce una qualità migliore a livello prestazionale, il tutto tramite un insieme mirato di test.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Virtual Private Network (VPN)"

1

Mohamed, Khalid, and Wainner Scott, eds. IPSec VPN design: The definitive design and deployment guide for secure virtual private networks. Cisco Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Frahim, Jazib. SSL and Remote Access VPNs: An introduction to designing and configuring SSL virtual private networks. Cisco Systems, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Telecom Regulatory Authority of India., ed. Consultation paper on application of principle of non-discrimination in tariff schemes like CUG (closed user group), VPN (virtual private network), F&F (friends & family) etc. Telecom Regulatory Authority of India, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Brian, Hatch, ed. Building Linux Virtual Private Networks (VPNs). New Riders, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Carmouche, James Henry. IPsec virtual private network fundamentals. Cisco Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Carmouche, James Henry. IPsec virtual private network fundamentals. Cisco Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

(Corporation), NIIT, ed. Building a virtual private network. Premier Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kosiur, David R. Building and managing virtual private networks. Wiley, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Covill, Randall J. Implementing extranets: The Internet as a virtual private network. Digital Press, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ng, Walfrey. MIBlet approach to virtual private network management: Design, applications and implementation. National Library of Canada, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Virtual Private Network (VPN)"

1

Bök, Patrick-Benjamin, Andreas Noack, Marcel Müller, and Daniel Behnke. "Virtual Private Network (VPN)." In Computernetze und Internet of Things. Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29409-0_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sinha, Sanjib. "Virtual Private Network or VPN." In Beginning Ethical Hacking with Python. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2541-7_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kappes, Martin. "Virtual Private Networks (VPN)." In Netzwerk- und Datensicherheit. Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-16127-9_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kappes, Martin. "Virtual Private Networks (VPN)." In Netzwerk- und Datensicherheit. Springer Fachmedien Wiesbaden, 2013. http://dx.doi.org/10.1007/978-3-8348-8612-5_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lin, Weyde. "Tunneling and VPN." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_26.

Full text
Abstract:
AbstractTunneling is a technique used to transport data packets over a network. The original data packets, with a protocol not supported by the host network, are encapsulated within another packet and then transported through the network. While tunneling is often used in a virtual private network, virtual private network, and tunneling are technically not the same, and there are virtual private networks without tunneling. However, tunneling is essential for securing a remote resource as an integral part of most VPN implementations. Without such encrypted tunnels, the traffic to this remote resource would be unencrypted and potentially taped by a malicious third party.
APA, Harvard, Vancouver, ISO, and other styles
6

Prenn, Caroline, and Paul van Marcke. "Value-chain, virtual private network (VPN)." In Projektkompass eLogistik. Vieweg+Teubner Verlag, 2002. http://dx.doi.org/10.1007/978-3-322-84977-9_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ezra, Paul Joan, Sanjay Misra, Akshat Agrawal, Jonathan Oluranti, Rytis Maskeliunas, and Robertas Damasevicius. "Secured Communication Using Virtual Private Network (VPN)." In Lecture Notes on Data Engineering and Communications Technologies. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-3961-6_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sombatruang, Nissy, Tan Omiya, Daisuke Miyamoto, M. Angela Sasse, Youki Kadobayashi, and Michelle Baddeley. "Attributes Affecting User Decision to Adopt a Virtual Private Network (VPN) App." In Information and Communications Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61078-4_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bayless, S., J. Backes, D. DaCosta, et al. "Debugging Network Reachability with Blocked Paths." In Computer Aided Verification. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81688-9_39.

Full text
Abstract:
AbstractIn this industrial case study we describe a new network troubleshooting analysis used by VPC Reachability Analyzer, an SMT-based network reachability analysis and debugging tool. Our troubleshooting analysis uses a formal model of AWS Virtual Private Cloud (VPC) semantics to identify whether a destination is reachable from a source in a given VPC configuration. In the case where there is no feasible path, our analysis derives a blocked path: an infeasible but otherwise complete path that would be feasible if a corresponding set of VPC configuration settings were adjusted.Our blocked path analysis differs from other academic and commercial offerings that either rely on packet probing (e.g., tcptrace) or provide only partial paths terminating at the first component that rejects the packet. By providing a complete (but infeasible) path from the source to destination, we identify for a user all the configuration settings they will need to alter to admit that path (instead of requiring them to repeatedly re-run the analysis after making partial changes). This allows users to refine their query so that the blocked path is aligned with their intended network behavior before making any changes to their VPC configuration.
APA, Harvard, Vancouver, ISO, and other styles
10

Masuda, Mineyoshi, Yutaka Yoshimura, Toshiaki Tarui, Toni Shonai, and Mamoru Sugie. "VPDC: Virtual Private Data Center." In Integrated Network Management VIII. Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35674-7_47.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Virtual Private Network (VPN)"

1

Shim, Hyoungsub, Bongho Kang, Haejung Im, Duhyun Jeon, and Seok-min Kim. "Virtual Private Network (VPN) with Post-Quantum Cryptography (PQC)." In 2024 15th International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2024. https://doi.org/10.1109/ictc62082.2024.10827179.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Trabelsi, Rahma, Ghofrane Fersi, and Mohamed Jmaiel. "A fog and blockchain-based distributed Virtual Private Networks (VPN)." In 2024 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT). IEEE, 2024. http://dx.doi.org/10.1109/dcoss-iot61029.2024.00028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Parmar, Yuvraj, Satish Kumar R, V. Karthikeyan, Gaurav Shukla, Yuvraj Parmar, and Debahuti Mishra. "Challenges and Solutions for Securing Cloud-Based Virtual Private Networks (VPNs)." In 2025 International Conference on Automation and Computation (AUTOCOM). IEEE, 2025. https://doi.org/10.1109/autocom64127.2025.10956351.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Saad, Muhammad, Waseem Ahmed, and Muhammad Mubashir Khan. "Design and Analysis of Quantum Safe Virtual Private Network." In 2024 4th International Conference on Innovations in Computer Science (ICONICS). IEEE, 2024. https://doi.org/10.1109/iconics64289.2024.10824365.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Garg, Mohan, S. Senthurya, Jagtej Singh, Anila Bajpai, Nakul S. Sharma, and K. Yuvaraj. "Investigating the Use of Virtual Private Networks on ATM Network Security." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724957.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Xu, Dahua Zhang, Ziqing Lin, et al. "Research on Security Risk Assessment Model for Power 5G Virtual Private Network." In 2024 International Conference on Artificial Intelligence and Power Systems (AIPS). IEEE, 2024. http://dx.doi.org/10.1109/aips64124.2024.00100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jaha, Ahmed A., Fathi Ben Shatwan, and Majdi Ashibani. "Proper Virtual Private Network (VPN) Solution." In 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies. IEEE, 2008. http://dx.doi.org/10.1109/ngmast.2008.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Varvello, Matteo, Inigo Querejeta Azurmendi, Antonio Nappa, Panagiotis Papadopoulos, Goncalo Pestana, and Benjamin Livshits. "VPN-Zero: A Privacy-Preserving Decentralized Virtual Private Network." In 2021 IFIP Networking Conference (IFIP Networking). IEEE, 2021. http://dx.doi.org/10.23919/ifipnetworking52078.2021.9472843.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Irsyad, Irfan Dhia, and Eueung Mulyana. "A Survey on Designs and Implementations of Virtual Private Network (VPN)." In 2023 International Conference on Electrical Engineering and Informatics (ICEEI). IEEE, 2023. http://dx.doi.org/10.1109/iceei59426.2023.10346627.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Qin, Yang, Krishna M. Sivalingam, and Bo Li. "QoS for virtual private networks (VPN) over optical WDM networks." In Opticom 2000, edited by Imrich Chlamtac. SPIE, 2000. http://dx.doi.org/10.1117/12.401836.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Virtual Private Network (VPN)"

1

Andersson, L., and T. Madsen. Provider Provisioned Virtual Private Network (VPN) Terminology. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

De, J., D. Ooms, M. Carugi, and F. Le. BGP-MPLS IP Virtual Private Network (VPN) Extension for IPv6 VPN. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4659.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Schliesser, B., and T. Nadeau. Definition of Textual Conventions for Virtual Private Network (VPN) Management. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4265.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Adrangi, F., and H. Levkowetz, eds. Problem Statement: Mobile IPv4 Traversal of Virtual Private Network (VPN) Gateways. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4093.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nadeau, T., and H. van, eds. MPLS/BGP Layer 3 Virtual Private Network (VPN) Management Information Base. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gont, F. Layer 3 Virtual Private Network (VPN) Tunnel Traffic Leakages in Dual-Stack Hosts/Networks. RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7359.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ramanujan, Ranga S., Doug Harper, Maher Kaddoura, David Baca, John Wu, and Kevin Millikin. Organic Techniques for Protecting Virtual Private Network (VPN) Services from Access Link Flooding Attacks. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada436292.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Boutros, S., A. Sajassi, S. Salam, J. Drake, and J. Rabadan. Virtual Private Wire Service Support in Ethernet VPN. RFC Editor, 2017. http://dx.doi.org/10.17487/rfc8214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rosen, E., and Y. Rekhter. BGP/MPLS IP Virtual Private Networks (VPNs). RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4364.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rosen, E. Applicability Statement for BGP/MPLS IP Virtual Private Networks (VPNs). RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4365.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!