Academic literature on the topic 'Virtual private networks (VPN)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Virtual private networks (VPN).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Virtual private networks (VPN)"

1

Kennedy, Okokpujie, Shobayo Olamilekan, Noma-Osaghae Etinosa, Imhade Okokpujie, and Okoyeigbo Obinna. "Performance of MPLS-based Virtual Private Networks and Classic Virtual Private Networks Using Advanced Metrics." TELKOMNIKA Telecommunication, Computing, Electronics and Control 16, no. 5 (2018): 2073–81. https://doi.org/10.12928/TELKOMNIKA.v16i5.7326.

Full text
Abstract:
Multiprotocol Label Switching (MPLS) is effective in managing and utilizing available network bandwidth. It has advanced security features and a lower time delay. The existing literature has covered the performance of MPLS-based networks in relation to conventional Internet Protocol (IP) networks. But, too few literatures exist on the performance of MPLS-based Virtual Private Networks (VPN) in relation to traditional VPN networks. In this paper, a comparison is made between the effectiveness of the MPLSVPN network and a classic VPN network using simulation studies done on OPNET® . The perf
APA, Harvard, Vancouver, ISO, and other styles
2

Khizirova, M. A., Katipa Chezhimbayeva, Almira Mukhamejanova, Zhanat Manbetova, and Bulbul Ongar. "USING OF VIRTUAL PRIVATE NETWORK TECHNOLOGY FOR SIGNAL TRANSMISSION IN CORPORATE NETWORKS." Series of Geology and Technical Sciences 447, no. 3 (2021): 100–103. http://dx.doi.org/10.32014/2021.2518-170x.69.

Full text
Abstract:
This paper discusses some modes of signal transmission for corporate systems using the technology of virtual private networks VPN. A very important property of tunnels is the ability to differentiate different types of traffic and assign them the necessary service priorities. In this work, research has been carried out and comparative characteristics of signal transmission modes using virtual networks have been obtained to identify the effectiveness of the network in various modes of organizing a virtual network, and to optimize a virtual network in order to identify an effective method for or
APA, Harvard, Vancouver, ISO, and other styles
3

Sudipti Banerjee. and Dr. Rajni Ranjan Singh Makwana. "Virtual Private Network: Survey and Research Challenges." International Journal of Latest Technology in Engineering Management & Applied Science 14, no. 6 (2025): 211–26. https://doi.org/10.51583/ijltemas.2025.140600028.

Full text
Abstract:
Abstract: The Virtual Private Network (VPN) is a rapidly developing technology that has a crucial function in guaranteeing the secure transfer of data. A virtual linkage is created among geographically distant individuals and networks that are linked through a common or public network, such as the Internet. Despite the fact that data is transmitted via a public network, a Virtual Private Network (VPN) signifies that the data is conveyed through a secure and private connection. Virtual Private Network (VPN) technology enables secure communication between two hosts by creating virtual tunnels. U
APA, Harvard, Vancouver, ISO, and other styles
4

Nay, Thaker. "Securing Virtual Private Networks Against Cyber Threats Using Feedforward Neural Networks." Babylonian Journal of Networking 2025 (July 21, 2025): 97–105. https://doi.org/10.58496/bjn/2025/008.

Full text
Abstract:
The virtual private communication channels are now commonly used over the internet and the overall trend of internet growth is also used as a server to carry the clients of VPN. Virtual Private Networks (VPN's) are central to secure and encrypted communication over both public and private networks. Nonetheless, conventional VPNs lack the ability of detecting and coping with advanced cyber-attacks. In this paper, we propose a new architecture that combines with FFNN architecture in the VPN system to improve VPN based on cyber-event real-time detection and reaction to the threat and intrusion de
APA, Harvard, Vancouver, ISO, and other styles
5

Kim, Kyung-Muk, and Hae-Sool Yang. "VPN (Virtual Private Network) SW's examination example analysis." Journal of the Korea Academia-Industrial cooperation Society 11, no. 8 (2010): 3012–20. http://dx.doi.org/10.5762/kais.2010.11.8.3012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fu, Chunle, Bailing Wang, Hongri Liu, and Wei Wang. "Software-Defined Virtual Private Network for SD-WAN." Electronics 13, no. 13 (2024): 2674. http://dx.doi.org/10.3390/electronics13132674.

Full text
Abstract:
Software-Defined Wide Area Networks (SD-WANs) are an emerging Software-Defined Network (SDN) technology to reinvent Wide Area Networks (WANs) for ubiquitous network interconnections in cloud computing, edge computing, and the Internet of Everything. The state-of-the-art overlay-based SD-WANs are simply conjunctions of Virtual Private Network (VPN) and SDN architecture to leverage the controllability and programmability of SDN, which are only applicable for specific platforms and do not comply with the extensibility of SDN. This paper motivates us to refactor traditional VPNs with SDN architect
APA, Harvard, Vancouver, ISO, and other styles
7

Peng, Kai. "Construction and Exploration of Corporate Virtual Private Networks." Advanced Engineering Forum 6-7 (September 2012): 964–67. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.964.

Full text
Abstract:
With the further development of Internet, VPN technology would provide high-quality and low-cost wide-area data network, and would be safer than the majority of corporate special network. Main purpose of VPN technology is to save communication expenses for enterprises, especially replace existing special lines of enterprises and reduce communication cost. With constant mergers and acquisitions of enterprises and the occurrence of new relationship between enterprises and employees, traditional corporate network mode faces challenges. One solution is to use virtual private network when construct
APA, Harvard, Vancouver, ISO, and other styles
8

Mixon-Baca, Benjamin, Jeffrey Knockel, Diwen Xue, et al. "Attacking Connection Tracking Frameworks as used by Virtual Private Networks." Proceedings on Privacy Enhancing Technologies 2024, no. 3 (2024): 109–26. http://dx.doi.org/10.56553/popets-2024-0070.

Full text
Abstract:
VPNs (Virtual Private Networks) have become an essential privacy-enhancing technology, particularly for at-risk users like dissidents, journalists, NGOs, and others vulnerable to targeted threats. While previous research investigating VPN security has focused on cryptographic strength or traffic leakages, there remains a gap in understanding how lower-level primitives fundamental to VPN operations, like connection tracking, might undermine the security and privacy that VPNs are intended to provide. In this paper, we examine the connection tracking frameworks used in common operating systems, i
APA, Harvard, Vancouver, ISO, and other styles
9

Anggie Maulia, Aldi Fadilla Ramadhan, Andi Purwanto, Apipah Apipah, and Didik Aribowo. "Simulasi Virtual Private Network Dengan Topologi Star." Jurnal Penelitian Teknologi Informasi dan Sains 2, no. 2 (2024): 54–66. http://dx.doi.org/10.54066/jptis.v2i2.1865.

Full text
Abstract:
Virtual Private Network (VPN) is a form of private network through a public network by focusing on the security of the encrypted data in it. This research uses Cisco Packet Tracere software as a computer network technology simulation tool. Cisco Packet Tracker is a device in network technology simulation that functions for creation and development in networks. The purpose of this research is to create a VPN simulation using a star topology with Cisco Packet Tracer software. Star topology is a star-shaped topology, where each node is to the centre. The method used is a qualitative method with d
APA, Harvard, Vancouver, ISO, and other styles
10

Abdulazeez, Adnan Mohsin, Baraa Wasfi Salim, Diyar Qader Zeebaree, and Dana Doghramachi. "Comparison of VPN Protocols at Network Layer Focusing on Wire Guard Protocol." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 18 (2020): 157. http://dx.doi.org/10.3991/ijim.v14i18.16507.

Full text
Abstract:
The key point of this paper is to assess and look over the top of the line network layer-based VPN (Virtual Private Network) protocols because data link layer is hardly ever found to be in use in organizations, the reason is because of its exceedingly high charge. Virtual Private Network (VPN) is commonly used in business situations to provide secure communication channels over public infrastructure such as Internet. Virtual Private Networks (VPNs) provide a secure encrypted communication between remote networks worldwide by using Internet Protocol (IP) tunnels and a shared medium like the Int
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Virtual private networks (VPN)"

1

Lukaszewski, Daniel. "Multipath transport for virtual private networks." Thesis, Monterey, California: Naval Postgraduate School, 2017. http://hdl.handle.net/10945/53013.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>Virtual Private Networks (VPNs) are designed to use the Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) to establish secure communication tunnels over public Internet. Multipath TCP (MPTCP) extends TCP to allow data to be delivered over multiple network paths simultaneously. This thesis first builds a testbed and investigates the potential of using MPTCP tunnels to increase the goodput of VPN communications and support seamless mobility. Based on the empirical results and an analysis of the MPTCP design in Linux kern
APA, Harvard, Vancouver, ISO, and other styles
2

Samuelsson, Joakim, and Richard Sandsund. "Implementing a virtual private network." Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91933.

Full text
Abstract:
Dagens företag vill ge anställda möjlighet att jobba hemifrån eller på resande fot. En vanlig lösning för att möjliggöra detta är virtual private network (VPN). VPN ger en användare tillgång till interna resurser på företaget från ett externt nät, exempelvis via Internet. Detta gör att användare kan komma åt de interna resurserna på ett säkert sätt. Vilken VPN-teknik är då att föredra för att få en så snabb, säker och pålitlig anslutning som möjligt? Detta examensarbete tar upp olika VPN-tekniker. Vi beskriver vanliga VPN-protokoll som L2TP, IPSec och PPTP. Hur användare autentiseras på ett sä
APA, Harvard, Vancouver, ISO, and other styles
3

Tryggvason, Thorir. "Analysis of the PPTP and IPSec protocols in Virtual Private Networks." Thesis, University of Skövde, Department of Computer Science, 2000. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-415.

Full text
Abstract:
<p>Today increasing numbers of individuals are working away from the ordinary workplace while still requiring access to the server located at the workplace. New technology is meeting this demand allowing for safe and secure transmission of the data over the Internet. The aim of this project is to analyse two protocols that are used within the Virtual Private Network (VPN) structure today, with the focus on installation, transmission speed on both Local Area Networks (LAN) and via telephone line and security aspects of the protocols.</p><p>The results show that it is quite complicated to setup
APA, Harvard, Vancouver, ISO, and other styles
4

Norin, Anders, and Henrik Ohlsson. "VPN : Virtual Private Network i Windows 2000." Thesis, University West, Department of Informatics and Mathematics, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-483.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ögren, Niklas. "Selecting/realization of Virtual Private Networks with Multiprotocol Label Switching or Virtual Local Area Networks." Thesis, KTH, Mikroelektronik och Informationsteknik, IMIT, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-93211.

Full text
Abstract:
Many reports have been written about the techniques behind Virtual Private Networks (VPN) and Multi Protocol Label Switching (MPLS). They usually deal with the low level design of the software implementing a specific technique. The initial products are usually not mature enough to run in a large network or have to be adjusted in some way to fit. This report investigates the different ways of implementing strict layer 2 Virtual Private Networks in an existing nation-wide Gigabit Ethernet. The infrastructure in use, as well as the hardware, has to be used without major changes. Since 1998/1999,
APA, Harvard, Vancouver, ISO, and other styles
6

Wikström, Alexander, Mark Thomson, and Lolita Mageramova. "Virtual Private Networks: : A feasibility study of secure communications between remote locations." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-24550.

Full text
Abstract:
Virtual Private Networks (VPNs) are an integral part of protecting company communications from unauthorized viewing, replication or manipulation. In order for employees to remotely conduct business in an effective and secure manner from a branch location or while traveling, Virtual Private Networks can be viewed as an absolute necessity.   Starting with a certain set of network communication requirements, our project's hypothesis was that the most suitable VPN implementation for Cheap Flats (a fictitious company we created) would be an IPSec client VPN. Included in the report are basic definit
APA, Harvard, Vancouver, ISO, and other styles
7

Habibovic, Sanel. "VIRTUAL PRIVATE NETWORKS : An Analysis of the Performance in State-of-the-Art Virtual Private Network solutions in Unreliable Network Conditions." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17844.

Full text
Abstract:
This study aimed to identify the differences between state-of-the-art VPN solutions on different operating systems. It was done because a novel VPN protocol is in the early stages of release and a comparison of it, to other current VPN solutions is interesting. It is interesting because current VPN solutions are well established and have existed for a while and the new protocol stirs the pot in the VPN field. Therefore a contemporary comparison between them could aid system administrators when choosing which VPN to implement. To choose the right VPN solution for the occasion could increase per
APA, Harvard, Vancouver, ISO, and other styles
8

Perez, Fridrich Shane. "A Framework for the Performance Analysis and Tuning of Virtual Private Networks." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/6867.

Full text
Abstract:
With the rising trend of personal devices like laptops and smartphones being used in businesses and significant enterprises, the concern for preserving security arises. In addition to preserving security measures in outside devices, the network speed and performance capable by these devices need to be balanced with the security aspect to avoid slowing down virtual private network (VPN) activity. Performance tests have been done in the past to evaluate available software, hardware, and network security protocol options that will best benefit an entity according to its specific needs. With a var
APA, Harvard, Vancouver, ISO, and other styles
9

Soler, Avellén Carl Richard. "Virtual Private Network Communication over a session layer socket protocol (SOCKS)." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-66277.

Full text
Abstract:
SYSTeam is an IT solutions supplier company that wants to develop a product which permits users to communicate with each other, over the Internet, in a secure way. The solution creates communication between two subnets which are connected through a Virtual Private Network (VPN) Gateway. The security of the communication is implemented at the application layer by using the Secure Socket Layer (SSL) protocol which carries, encrypted within it, a session layer technology called Sock-et-s (SOCKS). The communication prototype is developed in a Linux platform with the Integrated Development Environm
APA, Harvard, Vancouver, ISO, and other styles
10

Liyanage, M. (Madhusanka). "Enhancing security and scalability of Virtual Private LAN Services." Doctoral thesis, Oulun yliopisto, 2016. http://urn.fi/urn:isbn:9789526213767.

Full text
Abstract:
Abstract Ethernet based VPLS (Virtual Private LAN Service) is a transparent, protocol independent, multipoint L2VPN (Layer 2 Virtual Private Network) mechanism to interconnect remote customer sites over IP (Internet Protocol) or MPLS (Multiprotocol Label Switching) based provider networks. VPLS networks are now becoming attractive in many Enterprise applications, such as DCI (data center interconnect), voice over IP (VoIP) and videoconferencing services due to their simple, protocol-independent and cost efficient operation. However, these new VPLS applications demand additional requirements, s
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Virtual private networks (VPN)"

1

Brian, Hatch, ed. Building Linux Virtual Private Networks (VPNs). New Riders, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mohamed, Khalid, and Wainner Scott, eds. IPSec VPN design: The definitive design and deployment guide for secure virtual private networks. Cisco Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Frahim, Jazib. SSL and Remote Access VPNs: An introduction to designing and configuring SSL virtual private networks. Cisco Systems, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

1979-, Huang Qiang, and Cisco Systems Inc, eds. SSL and Remote Access VPNs: An introduction to designing and configuring SSL virtual private networks. Cisco Systems, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Telecom Regulatory Authority of India., ed. Consultation paper on application of principle of non-discrimination in tariff schemes like CUG (closed user group), VPN (virtual private network), F&F (friends & family) etc. Telecom Regulatory Authority of India, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

1969-, Erwin Mike, and Wolfe Paul, eds. Virtual Private Networks. O'Reilly, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Inc, NetLibrary, ed. Virtual private networks. McGraw-Hill, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Paul, Wolfe, and Erwin Mike 1969-, eds. Virtual Private Networks. 2nd ed. O'Reilly, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kosiur, David R. Building and managing virtual private networks. Wiley, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Carmouche, James Henry. IPsec virtual private network fundamentals. Cisco Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Virtual private networks (VPN)"

1

Kappes, Martin. "Virtual Private Networks (VPN)." In Netzwerk- und Datensicherheit. Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-16127-9_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kappes, Martin. "Virtual Private Networks (VPN)." In Netzwerk- und Datensicherheit. Springer Fachmedien Wiesbaden, 2013. http://dx.doi.org/10.1007/978-3-8348-8612-5_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bök, Patrick-Benjamin, Andreas Noack, Marcel Müller, and Daniel Behnke. "Virtual Private Network (VPN)." In Computernetze und Internet of Things. Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29409-0_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lin, Weyde. "Tunneling and VPN." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_26.

Full text
Abstract:
AbstractTunneling is a technique used to transport data packets over a network. The original data packets, with a protocol not supported by the host network, are encapsulated within another packet and then transported through the network. While tunneling is often used in a virtual private network, virtual private network, and tunneling are technically not the same, and there are virtual private networks without tunneling. However, tunneling is essential for securing a remote resource as an integral part of most VPN implementations. Without such encrypted tunnels, the traffic to this remote res
APA, Harvard, Vancouver, ISO, and other styles
5

Sinha, Sanjib. "Virtual Private Network or VPN." In Beginning Ethical Hacking with Python. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2541-7_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Prenn, Caroline, and Paul van Marcke. "Value-chain, virtual private network (VPN)." In Projektkompass eLogistik. Vieweg+Teubner Verlag, 2002. http://dx.doi.org/10.1007/978-3-322-84977-9_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ezra, Paul Joan, Sanjay Misra, Akshat Agrawal, Jonathan Oluranti, Rytis Maskeliunas, and Robertas Damasevicius. "Secured Communication Using Virtual Private Network (VPN)." In Lecture Notes on Data Engineering and Communications Technologies. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-3961-6_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sombatruang, Nissy, Tan Omiya, Daisuke Miyamoto, M. Angela Sasse, Youki Kadobayashi, and Michelle Baddeley. "Attributes Affecting User Decision to Adopt a Virtual Private Network (VPN) App." In Information and Communications Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61078-4_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Opitz, Alek, Torsten Mielke, and Hartmut Koenig. "Virtual Private Components." In Smart Networks. Springer US, 2002. http://dx.doi.org/10.1007/978-0-387-35584-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rao, Umesh Hodeghatta, and Umesha Nayak. "Virtual Private Networks." In The InfoSec Handbook. Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6383-8_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Virtual private networks (VPN)"

1

Trabelsi, Rahma, Ghofrane Fersi, and Mohamed Jmaiel. "A fog and blockchain-based distributed Virtual Private Networks (VPN)." In 2024 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT). IEEE, 2024. http://dx.doi.org/10.1109/dcoss-iot61029.2024.00028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shim, Hyoungsub, Bongho Kang, Haejung Im, Duhyun Jeon, and Seok-min Kim. "Virtual Private Network (VPN) with Post-Quantum Cryptography (PQC)." In 2024 15th International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2024. https://doi.org/10.1109/ictc62082.2024.10827179.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Parmar, Yuvraj, Satish Kumar R, V. Karthikeyan, Gaurav Shukla, Yuvraj Parmar, and Debahuti Mishra. "Challenges and Solutions for Securing Cloud-Based Virtual Private Networks (VPNs)." In 2025 International Conference on Automation and Computation (AUTOCOM). IEEE, 2025. https://doi.org/10.1109/autocom64127.2025.10956351.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hu, Zhangfeng, Siqing Sun, Yao Chen, Mufei Zhang, Yanjun Li, and Qiuzheng Ren. "Incorporating Bare Metal Server into VXLAN-Based Virtual Private Cloud." In 2024 IEEE 12th International Conference on Information, Communication and Networks (ICICN). IEEE, 2024. https://doi.org/10.1109/icicn62625.2024.10761711.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Garg, Mohan, S. Senthurya, Jagtej Singh, Anila Bajpai, Nakul S. Sharma, and K. Yuvaraj. "Investigating the Use of Virtual Private Networks on ATM Network Security." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724957.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jaha, Ahmed A., Fathi Ben Shatwan, and Majdi Ashibani. "Proper Virtual Private Network (VPN) Solution." In 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies. IEEE, 2008. http://dx.doi.org/10.1109/ngmast.2008.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Qin, Yang, Krishna M. Sivalingam, and Bo Li. "QoS for virtual private networks (VPN) over optical WDM networks." In Opticom 2000, edited by Imrich Chlamtac. SPIE, 2000. http://dx.doi.org/10.1117/12.401836.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Varvello, Matteo, Inigo Querejeta Azurmendi, Antonio Nappa, Panagiotis Papadopoulos, Goncalo Pestana, and Benjamin Livshits. "VPN-Zero: A Privacy-Preserving Decentralized Virtual Private Network." In 2021 IFIP Networking Conference (IFIP Networking). IEEE, 2021. http://dx.doi.org/10.23919/ifipnetworking52078.2021.9472843.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yedilkhan, Amirgaliyev, Amanzholova Saule, Kalizhanova Aliya, Zamanova Saule, and Kozbakova Ainur. "Using the ez-cryptosystem for data transmission in virtual private networks (Vpn)." In 2015 Twelve International Conference on Electronics Computer and Computation (ICECCO). IEEE, 2015. http://dx.doi.org/10.1109/icecco.2015.7416910.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nichols, Kelvin F., Susan Best, and Larry Schneider. "Making Wireless Networks Secure for NASA Mission Critical Applications using Virtual Private Network (VPN) Technology." In Space OPS 2004 Conference. American Institute of Aeronautics and Astronautics, 2004. http://dx.doi.org/10.2514/6.2004-390-223.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Virtual private networks (VPN)"

1

Andersson, L., and T. Madsen. Provider Provisioned Virtual Private Network (VPN) Terminology. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

De, J., D. Ooms, M. Carugi, and F. Le. BGP-MPLS IP Virtual Private Network (VPN) Extension for IPv6 VPN. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4659.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gont, F. Layer 3 Virtual Private Network (VPN) Tunnel Traffic Leakages in Dual-Stack Hosts/Networks. RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7359.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rosen, E., and Y. Rekhter. BGP/MPLS IP Virtual Private Networks (VPNs). RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4364.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Schliesser, B., and T. Nadeau. Definition of Textual Conventions for Virtual Private Network (VPN) Management. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4265.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Adrangi, F., and H. Levkowetz, eds. Problem Statement: Mobile IPv4 Traversal of Virtual Private Network (VPN) Gateways. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4093.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nadeau, T., and H. van, eds. MPLS/BGP Layer 3 Virtual Private Network (VPN) Management Information Base. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rosen, E. Applicability Statement for BGP/MPLS IP Virtual Private Networks (VPNs). RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4365.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ramanujan, Ranga S., Doug Harper, Maher Kaddoura, David Baca, John Wu, and Kevin Millikin. Organic Techniques for Protecting Virtual Private Network (VPN) Services from Access Link Flooding Attacks. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada436292.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Behringer, M. Analysis of the Security of BGP/MPLS IP Virtual Private Networks (VPNs). RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4381.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!