Academic literature on the topic 'VPN'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'VPN.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "VPN"

1

Kazén, Miguel. "Problemessen vs. Spaßessen." Zeitschrift für Gesundheitspsychologie 14, no. 2 (2006): 34–45. http://dx.doi.org/10.1026/0943-8149.14.2.34.

Full text
Abstract:
Zusammenfassung. Das Zusammenspiel von negativem Affekt und nachfolgender Affektregulation auf das Essverhalten wurde mit 70 Versuchspersonen (Vpn) experimentell untersucht. Nach einer Imaginationsinduktion von negativem Affekt wurden die Vpn in eine positive oder in eine negative Selbstaktivierungsgruppe eingeteilt. Die Diätintention der Probanden wurde durch eine “Neujahrsvorsatz-Methode“ erfasst. Es ergaben sich folgende Interaktionen zwischen Selbstaktivierung und Diätintention: (a) Vpn mit negativer Selbstaktivierung und niedriger Diätintention aßen mehr Schokolade als Vpn in allen andere
APA, Harvard, Vancouver, ISO, and other styles
2

Leutner, Detlev, Anke Barthel, and Beate Schreiber. "Studierende können lernen, sich selbst zum Lernen zu motivieren: Ein Trainingsexperiment." Zeitschrift für Pädagogische Psychologie 15, no. 3/4 (2001): 155–67. http://dx.doi.org/10.1024//1010-0652.15.34.155.

Full text
Abstract:
Zusammenfassung: Sechsundsechzig Studierende nahmen an einem computer-basierten Training motivationaler Lernstrategien teil. Gegenstand des Trainings war eine Strategie, eine Lernabsicht zu entwickeln, indem man sich den persönlichen Nutzen des zu erwerbenden Wissens verdeutlicht. Die Vpn erhielten (1) kein spezifisches Training, (2) nur ein Training der motivationalen Lernstrategie oder (3) ein kombiniertes Training der Lernstrategie und darauf bezogener Selbstregulation. Nach dem Training bearbeiteten die Vpn einen Lehrtext, den sie zuvor als weniger motivierend beurteilt hatten. Es wurde er
APA, Harvard, Vancouver, ISO, and other styles
3

Kempter, Guido, and Carsten Möller. "Beurteilung einzelner Stimuli des Ausdrucksverhaltens ohne ihre entsprechenden Kontext- und Begleitmerkmale." Zeitschrift für Sozialpsychologie 31, no. 2 (2000): 102–12. http://dx.doi.org/10.1024//0044-3514.31.2.102.

Full text
Abstract:
Zusammenfassung: Die Untersuchung galt der Frage, welche Bedeutung ausschließlich den Körper- und Gliederbewegungen des Menschen in face-to-face Situationen bei der Eigenschaftsattribution zukommt. Hierzu wurde das Verfahren der Skriptanimation eingesetzt, womit sich die entsprechenden Bewegungen von anderen normalerweise zur Verfügung stehenden Informationen isolieren und auf eine Computerpuppe übertragen lässt. Insgesamt 153 Versuchspersonen nahmen an drei Versuchsreihen teil und beurteilten nacheinander 12 verschiedene Fernsehakteure: 55 Vpn beurteilten die Originalaufzeichnung der Akteure;
APA, Harvard, Vancouver, ISO, and other styles
4

Anbalagan, Srivishnupriya, Elyse Cooper, Pat Klumper, Randy R. Simonson, and Ben M. Hause. "Whole genome analysis of epizootic hemorrhagic disease virus identified limited genome constellations and preferential reassortment." Journal of General Virology 95, no. 2 (2014): 434–41. http://dx.doi.org/10.1099/vir.0.059659-0.

Full text
Abstract:
Epizootic hemorrhagic disease virus (EHDV) is a Culicoides transmitted orbivirus that causes haemorrhagic disease in wild and domestic ruminants. A collection of 44 EHDV isolated from 2008 to 2012 was fully sequenced and analysed phylogenetically. Serotype 2 viruses were the dominant serotype all years except 2012 when serotype 6 viruses represented 63 % of the isolates. High genetic similarity (>94 % identity) between serotype 1 and 2 virus VP1, VP3, VP4, VP6, NS1, NS2 and NS3 segments prevented identification of reassortment events for these segments. Additionally, there was little geneti
APA, Harvard, Vancouver, ISO, and other styles
5

Fatimah, Abdulnabi Salman. "Implementation of IPsec-VPN Tunneling using GNS3." Indonesian Journal of Electrical Engineering and Computer Science 5, no. 1 (2017): 855–60. https://doi.org/10.11591/ijeecs.v7.i3.pp855-860.

Full text
Abstract:
Virtual private networks (VPN) provide remotely secure connection for clients to exchange information with company networks. This paper deals with Site-to-site IPsec-VPN that connects the company intranets. IPsec-VPN network is implemented with security protocols for key management and exchange, authentication and integrity using GNS3 Network simulator. The testing and verification analyzing of data packets is done using both PING tool and Wireshark to ensure the encryption of data packets during data exchange between different sites belong to the same company.
APA, Harvard, Vancouver, ISO, and other styles
6

Fu, Chunle, Bailing Wang, Wei Wang, et al. "A Generic High-Performance Architecture for VPN Gateways." Electronics 13, no. 11 (2024): 2031. http://dx.doi.org/10.3390/electronics13112031.

Full text
Abstract:
Virtual private network (VPN) gateways are widely applied to provide secure end-to-end remote access and to relay reliable interconnected communication in cloud computing. As network convergence nodes, the performance of VPN gateways is limited by traditional methods of packet receiving and sending, the kernel protocol stack and the virtual network interface card. This paper proposes a generic high-performance architecture (GHPA) for VPN gateways in consideration of its generality and performance. In terms of generality, we redesign a generic VPN core framework by modeling a generic VPN commun
APA, Harvard, Vancouver, ISO, and other styles
7

Lee, Min-Seong, Jee-Tae Park, Ui-Jun Baek, Jung-Woo Choi, and Myung-Sup Kim. "Importance Analysis of Traffic Statistics Information for VPN/NoN-VPN Classification." Journal of Korean Institute of Communications and Information Sciences 47, no. 11 (2022): 1768–75. http://dx.doi.org/10.7840/kics.2022.47.11.1768.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Andini, Marisa Dika, Muhamad Amirullah, and Helitha Novianty Muchtar. "Penggunaan Aplikasi Virtual Private Network (VPN) Point To Point Tunneling Protocol (PPTP) Dalam Mengakses Situs Terblokir." Supremasi Hukum : Jurnal Penelitian Hukum 29, no. 2 (2020): 148–66. http://dx.doi.org/10.33369/jsh.29.2.148-166.

Full text
Abstract:
The discovery of a Virtual Private Network (VPN) makes it easy to access the internet wherever and whenever. Many service providers see the advantages of VPN being commercially usable, VPNs are very vulnerable to hacker attacks, cracking that supports data or information from VPN application users, this research offers to provide information about VPN security Point to Point Tunneling protocol (PPTP) and whether the VPN security system has been licensed and is in accordance with applicable law or not. This research is normative juridical. By using analytical descriptive analysis, this research
APA, Harvard, Vancouver, ISO, and other styles
9

Kher, Bhushan, Preeti Karmore, Nutan Sonwane, et al. "Apnavpn Project." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 1828–29. http://dx.doi.org/10.22214/ijraset.2022.41646.

Full text
Abstract:
Abstract: A VPN is an essential tool for securing your personal data and protecting your privacy online. We’ve put together the ultimate guide to VPNs to show you what a VPN does, how VPNs work, and how they protect you. Learn how to choose the right VPN, or secure your privacy right now by downloading our own powerful and lightning-fast VPN app. A VPN works by using encryption protocols to funnel all your internet traffic through an encrypted tunnel a virtual private network between your computer and a remote VPN server. This hides your IP address and secures your data, preventing others from
APA, Harvard, Vancouver, ISO, and other styles
10

Mardianto, Mardianto. "Analisis Quality Of Service (QoS) pada Jaringan VPN dan MPLS VPN Menggunakan GNS3." Jurnal Sains dan Informatika 5, no. 2 (2019): 98–107. http://dx.doi.org/10.34128/jsi.v5i2.191.

Full text
Abstract:
The ever-increasing internet is an ISP challenge for the future of the expected global computer network traffic and QoS needs. To maintain competitive ISPs in Indonesia with the development of internet usage, the demand for QoS must be increased. MPLS VPN networks combine layer 2 switching technology with layer 3 routing technology. MPLS VPN networks have emerged as technologies that meet VPN requirements such as private IP, and the ability to support overlapping addresses in resolving speed and QoS problems. The method used is experimental research. From the measurement results obtained by VP
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "VPN"

1

Козолуп, І. М. "Інформаційна технологія проєктування сучасних віртуальних приватних мереж". Master's thesis, Сумський державний університет, 2021. https://essuir.sumdu.edu.ua/handle/123456789/86666.

Full text
Abstract:
Змодельовано VPN мережу за допомогою протоколу IPSec. В роботі були проаналізовані основні команди, які використовуються при її конфігурації. На основі цього аналізу було розроблено веб-інтерфейс, який генерує код налаштувань для заданих адрес роутерів. Згенерований код можна використовувати при роботі з мереживим обладнанням. Розроблена програма була написана з використанням мови програмування JavaScript та була успішно протестована.
APA, Harvard, Vancouver, ISO, and other styles
2

Rehman, Sheikh Riaz Ur. "Investigation of different VPN Solutions." Thesis, Blekinge Tekniska Högskola, Avdelningen för telekommunikationssystem, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3364.

Full text
Abstract:
Abstract The rapid growth of e-business in past few years has improved companies efficiency and revenue growth. E-business applications such as e-commerce, remote access has enabled companies to manage processes, lower operating costs and increased customer satisfaction. Also the need rises for the scalable networks that accommodate voice, video, and data traffic. With the increased dependability of networks the security issues are raised and networks become more and more vulnerable to different types of security threats. To overcome security issues different security technologies are in actio
APA, Harvard, Vancouver, ISO, and other styles
3

Fabiánek, Ondřej. "VPN kontrolér." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-403195.

Full text
Abstract:
Tato práce se zabývá návrhem architektury a implementací flexibilního, škálovatelného a bezpečného systému pro správu virtuálních privátních sítích, který by umožnil propojení jinak nedostupných routerů a zařízení v jejich lokálních sítích. Ačkoli je systém primárně určen pro použití s routery od výrobce Advantech, podpora jiných zařízení může být později přidána.
APA, Harvard, Vancouver, ISO, and other styles
4

Schreiber, Alexander, and Holm Sieber. "VPN/IPSec." Universitätsbibliothek Chemnitz, 2002. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200200982.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Samuelsson, Joakim, and Richard Sandsund. "Implementing a virtual private network." Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91933.

Full text
Abstract:
Dagens företag vill ge anställda möjlighet att jobba hemifrån eller på resande fot. En vanlig lösning för att möjliggöra detta är virtual private network (VPN). VPN ger en användare tillgång till interna resurser på företaget från ett externt nät, exempelvis via Internet. Detta gör att användare kan komma åt de interna resurserna på ett säkert sätt. Vilken VPN-teknik är då att föredra för att få en så snabb, säker och pålitlig anslutning som möjligt? Detta examensarbete tar upp olika VPN-tekniker. Vi beskriver vanliga VPN-protokoll som L2TP, IPSec och PPTP. Hur användare autentiseras på ett sä
APA, Harvard, Vancouver, ISO, and other styles
6

Hurtig, Andreas, Thomas Gisslar, and Alexander Karlsson. "Vilken mjukvarubaserad fjärranslutningslösning är passande för ett mindre företag?" Thesis, University of Kalmar, School of Communication and Design, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hik:diva-1974.

Full text
Abstract:
<p> </p><p>Syftet med denna undersökning är att ta reda på vilken mjukvarubaserad fjärranslutningslösning som passar för ett mindre företag, då de har mindre ekonomiska tillgångar än ett större företag behöver de vara mer noggranna med sina produktval. Arbetet är utfört med litteraturstudier och en enkätundersökning till ett tiotal mindre företag, samt en laborationsmiljö där tester av de olika fjärranslutningslösningarnas egenskaper har utförts.</p><p>Område valdes då ämnet fjärranslutning knappt behandlads under utbildningstiden, och fördjupar sig därför inom området.</p><p>Resultatet visar
APA, Harvard, Vancouver, ISO, and other styles
7

Dahlberg, Axel, and Jonas Francén. "IPv6-adresshantering och prefixdelegering i MPLS VPN-nät." Thesis, KTH, Data- och elektroteknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-123805.

Full text
Abstract:
För full migrering till IPv6 behöver utbudet av datakommuniktionsstjänster anpassas för den nyagenerationens IP-protokoll med bevarad eller utökad funktionalitet. Detta examensarbetes mål äratt ta fram en eller flera lösningar som möter krav och tekniska förutsättningar för att utöka företagetDGC:s tjänst IP-VPN för IPv6. Detta innefattar adresstilldelningstekniker som prefixdelegeringoch automatisk adresskonfigurering i befintlig nätinfrastruktur.Lösningarna presenteras i sex framtagna scenarier som har undersökts utifrån tester, analys ocherfarna problem som uppstått. Undersökningen formade
APA, Harvard, Vancouver, ISO, and other styles
8

Krigh, Oskar, and Markus Lewin. "Mobil klientsäkerhet." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-9494.

Full text
Abstract:
Denna rapport har i syfte att öka förståelsen om hur man kan öka säkerheten på ett företag som använder sig av mobila klienter. Att arbeta på distans blir allt vanligare, och med de så ställs allt högre krav på tekniken som tillhandahåller möjligheterna för detta. När ny teknik utvecklas kommer ofta säkerheten i andra hand, det man fokuserar på är funktionaliteten. Frågorna man då ställer sig och vilket läsaren kommer skaffa sig mer kunskap om under rapprotens gång är: Hur skall en klient kunna hållas uppdaterad när den är utanför företagets väggar? Hur skall kommunikation kunna ske med företa
APA, Harvard, Vancouver, ISO, and other styles
9

Miliauskas, Edvinas. "Naujos generacijos intelektualių tinklų orientuotų IMS architektūrai demonstracinės paslaugos kūrimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2010. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2010~D_20100826_110105-35324.

Full text
Abstract:
Susipažinti su telekomunikacijų sritimi, sukurti jai paslaugą. Paslauga veikia „Mobicents“ JSLEE platformoje. Realizuota paslauga – VPN (angl. Virtual private numbering). Vartotojas savo ilgam numeriui (pvz. 5866694112234) gali nusistatyti trumpą (pvz. 555). Skambinant trumpu numeriu, paslauga suranda siekiamo adresato tikrąjį numerį ir su juo sujungia. Atlikti tyrimai ir matavimai įvertinti paslaugos tobulinimo galimybes, jos įtaką platformos darbui.<br>During course of this project we developed an telecommunications service - virtual private numbering. It allows users to create, manage and b
APA, Harvard, Vancouver, ISO, and other styles
10

Ховріна, М. А. "VPN технології для реалізації концепції високозахищеного віддаленого доступу". Master's thesis, Сумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/82257.

Full text
Abstract:
Pозглянуто основні характеристики та класифікацію VPN, проаналізовано основні протоколи VPN на різних рівнях моделі OSI, порівняно технології побудови VPN мережі, визначено способи підсилення захисту мережі. Розроблено модель найбільш захищеного доступу віддалених співробітників до корпоративної мережі з розподіленими офісами за допомогою IPSec VPN та SSL VPN.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "VPN"

1

Pepelnjak, Ivan. MPLS and VPN architectures. Cisco Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hicks, Richard M. Implementing Always On VPN. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7741-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ivan, Pepelnjak, ed. MPLS and VPN architecture. Cisco Press, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Luo, Wei, ed. Layer 2 VPN architectures. Cisco Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Guichard, Jim. MPLS and VPN architectures. Cisco Press, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Peter, Giannoulis, and Hay Keli, eds. Nokia firewall, VPN, and IPSO configuration guide. Syngress Pub., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lipp, Manfred. VPN - Virtuelle Private Netzwerke: Aufbau und Sicherheit. Addison-Wesley, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lipp, Manfred. Virtuelle private Netzwerke: VPN ; Aufbau und Sicherheit. Addison-Wesley, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hooper, Howard. CCNP security VPN: 642-647 official cert guide. Cisco Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wade, Edwards, ed. CCSP: Secure PIX and secure VPN study guide. SYBEX, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "VPN"

1

Perez, André. "Ethernet VPN." In Network Security. John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781119043942.ch8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Zhenbin, Zhibo Hu, and Cheng Li. "SRv6 VPN." In SRv6 Network Programming. CRC Press, 2021. http://dx.doi.org/10.1201/9781003179399-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lin, Weyde. "Tunneling and VPN." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_26.

Full text
Abstract:
AbstractTunneling is a technique used to transport data packets over a network. The original data packets, with a protocol not supported by the host network, are encapsulated within another packet and then transported through the network. While tunneling is often used in a virtual private network, virtual private network, and tunneling are technically not the same, and there are virtual private networks without tunneling. However, tunneling is essential for securing a remote resource as an integral part of most VPN implementations. Without such encrypted tunnels, the traffic to this remote res
APA, Harvard, Vancouver, ISO, and other styles
4

Hoogendoorn, Iwan. "NSX-T VPN." In Multi-Site Network and Security Services with NSX-T. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7083-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Matsuura, Hiroshi, and Naotaka Morita. "Layer 1 VPN NMS Based on Each VPN Customer." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88623-5_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hicks, Richard M. "Always On VPN Overview." In Implementing Always On VPN. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7741-6_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bök, Patrick-Benjamin, Andreas Noack, Marcel Müller, and Daniel Behnke. "Virtual Private Network (VPN)." In Computernetze und Internet of Things. Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29409-0_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kappes, Martin. "Virtual Private Networks (VPN)." In Netzwerk- und Datensicherheit. Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-16127-9_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Schreiner, Rüdiger. "VPN – virtuelle private Netzwerke." In Computernetzwerke. Carl Hanser Verlag GmbH & Co. KG, 2014. http://dx.doi.org/10.3139/9783446441545.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kappes, Martin. "Virtual Private Networks (VPN)." In Netzwerk- und Datensicherheit. Springer Fachmedien Wiesbaden, 2013. http://dx.doi.org/10.1007/978-3-8348-8612-5_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "VPN"

1

Sharma, Kaustubh, Mohit P. Tahiliani, and Vishal J. Rathod. "Design and Development of an Emulation Model for VPN and VPN Bonding." In 2024 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT). IEEE, 2024. http://dx.doi.org/10.1109/conecct62155.2024.10677267.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Yungui, Qian Li, Liwei Tian, and Yuxiao Jiang. "Navigating the VPN Landscape: A Comparative Study of L2TP, IPSec, and MPLS VPN Technologies." In 2024 4th International Conference on Electronic Information Engineering and Computer Science (EIECS). IEEE, 2024. https://doi.org/10.1109/eiecs63941.2024.10800571.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Alamleh, Amneh, Ola Nasir, Ayman Abu Hannoun, et al. "Real-Time VPN Anomaly Detection System." In 2024 25th International Arab Conference on Information Technology (ACIT). IEEE, 2024. https://doi.org/10.1109/acit62805.2024.10877255.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kulkarni, Divya, Pramila B. Shinde, Vaishnavi Y. Wani, Ashwini S. Gidge, Pradya B. Sasane, and Chetan D. Bawankar. "VPN Browser." In 2023 4th International Conference on Computation, Automation and Knowledge Management (ICCAKM). IEEE, 2023. http://dx.doi.org/10.1109/iccakm58659.2023.10449535.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mao, Huaqing, Li Zhu, and Hang Qin. "A Comparative Research on SSL VPN and IPSec VPN." In 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2012. http://dx.doi.org/10.1109/wicom.2012.6478270.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Figueiredo, Francisco José Candeias, and Paulo Lício de Geus. "Acesso remoto em firewalls e topologia para gateways VPN." In Workshop em Segurança de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2001. http://dx.doi.org/10.5753/sbseg.2001.21292.

Full text
Abstract:
VPNs are being hailed as the solution for several situations involved in the Internet these days. Firewalls have seen a decade of evolution and sophistication to deal with specific problems. However, we are also seeing the proliferation of VPN configurations on otherwise secure networks based on firewalls. This paper discusses the security problems incurred by the adoption of VPN gateways in standard firewalls. It also suggests more secure topology solutions for the standard VPN uses, as well as for the remote access client. We also propose an implementation based on freely available software
APA, Harvard, Vancouver, ISO, and other styles
7

Sawalmeh, Hanan, Manar Malayshi, Sujood Ahmad, and Ahmed Awad. "VPN Remote Access OSPF-based VPN Security Vulnerabilities and Counter Measurements." In 2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT). IEEE, 2021. http://dx.doi.org/10.1109/3ict53449.2021.9581512.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Diab, Wafaa Bou, Samir Tohme, and Carole Bassil. "VPN Analysis and New Perspective for Securing Voice over VPN Networks." In Fourth International Conference on Networking and Services (icns 2008). IEEE, 2008. http://dx.doi.org/10.1109/icns.2008.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Popa, Alin-Bogdan. "QGP-VPN: QKD enhanced VPN solution for general-purpose encrypted communications." In 2023 22nd RoEduNet Conference: Networking in Education and Research (RoEduNet). IEEE, 2023. http://dx.doi.org/10.1109/roedunet60162.2023.10274931.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Britto, Júlia Macedo de, and Rita Maira Zanine. "Os achados da colposcopia no rastreio das lesões precursoras do carcinoma cervical uterino: experiência em um hospital universitário." In 45º Congresso da SGORJ XXIV Trocando Ideias. Zeppelini Editorial e Comunicação, 2021. http://dx.doi.org/10.5327/jbg-0368-1416-20211311070.

Full text
Abstract:
Introdução: O presente estudo tem por objetivo principal determinar a acurácia dos achados colposcópicos no diagnóstico das lesões intraepiteliais de colo uterino. Como objetivos secundários: determinar a acurácia da citologia oncótica no diagnóstico das lesões intraepiteliais de colo uterino; determinar a sensibilidade (S), a especificidade (E), o valor preditivo positivo (VPP) e o valor preditivo negativo (VPN) da citologia e da colposcopia em relação ao exame histopatológico. Métodos: Trata-se de um estudo analítico, retrospectivo, transversal e observacional, baseado na análise de prontuár
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "VPN"

1

De, J., D. Ooms, M. Carugi, and F. Le. BGP-MPLS IP Virtual Private Network (VPN) Extension for IPv6 VPN. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4659.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Litkowski, S., K. Patel, Z. Zhang, R. Kebler, and J. Haas. Multicast VPN State Damping. Edited by T. Morin. RFC Editor, 2016. http://dx.doi.org/10.17487/rfc7899.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Z., and H. Tsunoda. L2L3 VPN Multicast MIB. RFC Editor, 2018. http://dx.doi.org/10.17487/rfc8502.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fraser, Laurie, Kathryn Roose, and Greg Nix. IPSec VPN Capabilities and Interoperability. Defense Technical Information Center, 2006. http://dx.doi.org/10.21236/ada451929.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Papadimitriou, D., R. Rabbat, and L. Berger. Layer 1 VPN Basic Mode. Edited by D. Fedyk and Y. Rekhter. RFC Editor, 2008. http://dx.doi.org/10.17487/rfc5251.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sajassi, A., R. Aggarwal, J. Uttaro, N. Bitar, W. Henderickx, and A. Isaac. Requirements for Ethernet VPN (EVPN). RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Aggarwal, R., N. Bitar, A. Isaac, J. Uttaro, J. Drake, and W. Henderickx. BGP MPLS-Based Ethernet VPN. Edited by A. Sajassi. RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7432.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Morin, T., R. Kebler, and G. Mirsky, eds. Multicast VPN Fast Upstream Failover. RFC Editor, 2021. http://dx.doi.org/10.17487/rfc9026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Muthukrishnan, K., and A. Malis. A Core MPLS IP VPN Architecture. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2917.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Subramanian, K., and Z. Zhang. Ingress Replication Tunnels in Multicast VPN. Edited by E. Rosen. RFC Editor, 2016. http://dx.doi.org/10.17487/rfc7988.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!