Letteratura scientifica selezionata sul tema "VPN"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "VPN".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Articoli di riviste sul tema "VPN"

1

Kazén, Miguel. "Problemessen vs. Spaßessen." Zeitschrift für Gesundheitspsychologie 14, no. 2 (2006): 34–45. http://dx.doi.org/10.1026/0943-8149.14.2.34.

Testo completo
Abstract (sommario):
Zusammenfassung. Das Zusammenspiel von negativem Affekt und nachfolgender Affektregulation auf das Essverhalten wurde mit 70 Versuchspersonen (Vpn) experimentell untersucht. Nach einer Imaginationsinduktion von negativem Affekt wurden die Vpn in eine positive oder in eine negative Selbstaktivierungsgruppe eingeteilt. Die Diätintention der Probanden wurde durch eine “Neujahrsvorsatz-Methode“ erfasst. Es ergaben sich folgende Interaktionen zwischen Selbstaktivierung und Diätintention: (a) Vpn mit negativer Selbstaktivierung und niedriger Diätintention aßen mehr Schokolade als Vpn in allen andere
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Leutner, Detlev, Anke Barthel, and Beate Schreiber. "Studierende können lernen, sich selbst zum Lernen zu motivieren: Ein Trainingsexperiment." Zeitschrift für Pädagogische Psychologie 15, no. 3/4 (2001): 155–67. http://dx.doi.org/10.1024//1010-0652.15.34.155.

Testo completo
Abstract (sommario):
Zusammenfassung: Sechsundsechzig Studierende nahmen an einem computer-basierten Training motivationaler Lernstrategien teil. Gegenstand des Trainings war eine Strategie, eine Lernabsicht zu entwickeln, indem man sich den persönlichen Nutzen des zu erwerbenden Wissens verdeutlicht. Die Vpn erhielten (1) kein spezifisches Training, (2) nur ein Training der motivationalen Lernstrategie oder (3) ein kombiniertes Training der Lernstrategie und darauf bezogener Selbstregulation. Nach dem Training bearbeiteten die Vpn einen Lehrtext, den sie zuvor als weniger motivierend beurteilt hatten. Es wurde er
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Kempter, Guido, and Carsten Möller. "Beurteilung einzelner Stimuli des Ausdrucksverhaltens ohne ihre entsprechenden Kontext- und Begleitmerkmale." Zeitschrift für Sozialpsychologie 31, no. 2 (2000): 102–12. http://dx.doi.org/10.1024//0044-3514.31.2.102.

Testo completo
Abstract (sommario):
Zusammenfassung: Die Untersuchung galt der Frage, welche Bedeutung ausschließlich den Körper- und Gliederbewegungen des Menschen in face-to-face Situationen bei der Eigenschaftsattribution zukommt. Hierzu wurde das Verfahren der Skriptanimation eingesetzt, womit sich die entsprechenden Bewegungen von anderen normalerweise zur Verfügung stehenden Informationen isolieren und auf eine Computerpuppe übertragen lässt. Insgesamt 153 Versuchspersonen nahmen an drei Versuchsreihen teil und beurteilten nacheinander 12 verschiedene Fernsehakteure: 55 Vpn beurteilten die Originalaufzeichnung der Akteure;
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Anbalagan, Srivishnupriya, Elyse Cooper, Pat Klumper, Randy R. Simonson, and Ben M. Hause. "Whole genome analysis of epizootic hemorrhagic disease virus identified limited genome constellations and preferential reassortment." Journal of General Virology 95, no. 2 (2014): 434–41. http://dx.doi.org/10.1099/vir.0.059659-0.

Testo completo
Abstract (sommario):
Epizootic hemorrhagic disease virus (EHDV) is a Culicoides transmitted orbivirus that causes haemorrhagic disease in wild and domestic ruminants. A collection of 44 EHDV isolated from 2008 to 2012 was fully sequenced and analysed phylogenetically. Serotype 2 viruses were the dominant serotype all years except 2012 when serotype 6 viruses represented 63 % of the isolates. High genetic similarity (>94 % identity) between serotype 1 and 2 virus VP1, VP3, VP4, VP6, NS1, NS2 and NS3 segments prevented identification of reassortment events for these segments. Additionally, there was little geneti
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Fatimah, Abdulnabi Salman. "Implementation of IPsec-VPN Tunneling using GNS3." Indonesian Journal of Electrical Engineering and Computer Science 5, no. 1 (2017): 855–60. https://doi.org/10.11591/ijeecs.v7.i3.pp855-860.

Testo completo
Abstract (sommario):
Virtual private networks (VPN) provide remotely secure connection for clients to exchange information with company networks. This paper deals with Site-to-site IPsec-VPN that connects the company intranets. IPsec-VPN network is implemented with security protocols for key management and exchange, authentication and integrity using GNS3 Network simulator. The testing and verification analyzing of data packets is done using both PING tool and Wireshark to ensure the encryption of data packets during data exchange between different sites belong to the same company.
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Fu, Chunle, Bailing Wang, Wei Wang, et al. "A Generic High-Performance Architecture for VPN Gateways." Electronics 13, no. 11 (2024): 2031. http://dx.doi.org/10.3390/electronics13112031.

Testo completo
Abstract (sommario):
Virtual private network (VPN) gateways are widely applied to provide secure end-to-end remote access and to relay reliable interconnected communication in cloud computing. As network convergence nodes, the performance of VPN gateways is limited by traditional methods of packet receiving and sending, the kernel protocol stack and the virtual network interface card. This paper proposes a generic high-performance architecture (GHPA) for VPN gateways in consideration of its generality and performance. In terms of generality, we redesign a generic VPN core framework by modeling a generic VPN commun
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Lee, Min-Seong, Jee-Tae Park, Ui-Jun Baek, Jung-Woo Choi, and Myung-Sup Kim. "Importance Analysis of Traffic Statistics Information for VPN/NoN-VPN Classification." Journal of Korean Institute of Communications and Information Sciences 47, no. 11 (2022): 1768–75. http://dx.doi.org/10.7840/kics.2022.47.11.1768.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Andini, Marisa Dika, Muhamad Amirullah, and Helitha Novianty Muchtar. "Penggunaan Aplikasi Virtual Private Network (VPN) Point To Point Tunneling Protocol (PPTP) Dalam Mengakses Situs Terblokir." Supremasi Hukum : Jurnal Penelitian Hukum 29, no. 2 (2020): 148–66. http://dx.doi.org/10.33369/jsh.29.2.148-166.

Testo completo
Abstract (sommario):
The discovery of a Virtual Private Network (VPN) makes it easy to access the internet wherever and whenever. Many service providers see the advantages of VPN being commercially usable, VPNs are very vulnerable to hacker attacks, cracking that supports data or information from VPN application users, this research offers to provide information about VPN security Point to Point Tunneling protocol (PPTP) and whether the VPN security system has been licensed and is in accordance with applicable law or not. This research is normative juridical. By using analytical descriptive analysis, this research
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Kher, Bhushan, Preeti Karmore, Nutan Sonwane, et al. "Apnavpn Project." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 1828–29. http://dx.doi.org/10.22214/ijraset.2022.41646.

Testo completo
Abstract (sommario):
Abstract: A VPN is an essential tool for securing your personal data and protecting your privacy online. We’ve put together the ultimate guide to VPNs to show you what a VPN does, how VPNs work, and how they protect you. Learn how to choose the right VPN, or secure your privacy right now by downloading our own powerful and lightning-fast VPN app. A VPN works by using encryption protocols to funnel all your internet traffic through an encrypted tunnel a virtual private network between your computer and a remote VPN server. This hides your IP address and secures your data, preventing others from
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Mardianto, Mardianto. "Analisis Quality Of Service (QoS) pada Jaringan VPN dan MPLS VPN Menggunakan GNS3." Jurnal Sains dan Informatika 5, no. 2 (2019): 98–107. http://dx.doi.org/10.34128/jsi.v5i2.191.

Testo completo
Abstract (sommario):
The ever-increasing internet is an ISP challenge for the future of the expected global computer network traffic and QoS needs. To maintain competitive ISPs in Indonesia with the development of internet usage, the demand for QoS must be increased. MPLS VPN networks combine layer 2 switching technology with layer 3 routing technology. MPLS VPN networks have emerged as technologies that meet VPN requirements such as private IP, and the ability to support overlapping addresses in resolving speed and QoS problems. The method used is experimental research. From the measurement results obtained by VP
Gli stili APA, Harvard, Vancouver, ISO e altri
Più fonti

Tesi sul tema "VPN"

1

Козолуп, І. М. "Інформаційна технологія проєктування сучасних віртуальних приватних мереж". Master's thesis, Сумський державний університет, 2021. https://essuir.sumdu.edu.ua/handle/123456789/86666.

Testo completo
Abstract (sommario):
Змодельовано VPN мережу за допомогою протоколу IPSec. В роботі були проаналізовані основні команди, які використовуються при її конфігурації. На основі цього аналізу було розроблено веб-інтерфейс, який генерує код налаштувань для заданих адрес роутерів. Згенерований код можна використовувати при роботі з мереживим обладнанням. Розроблена програма була написана з використанням мови програмування JavaScript та була успішно протестована.
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Rehman, Sheikh Riaz Ur. "Investigation of different VPN Solutions." Thesis, Blekinge Tekniska Högskola, Avdelningen för telekommunikationssystem, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3364.

Testo completo
Abstract (sommario):
Abstract The rapid growth of e-business in past few years has improved companies efficiency and revenue growth. E-business applications such as e-commerce, remote access has enabled companies to manage processes, lower operating costs and increased customer satisfaction. Also the need rises for the scalable networks that accommodate voice, video, and data traffic. With the increased dependability of networks the security issues are raised and networks become more and more vulnerable to different types of security threats. To overcome security issues different security technologies are in actio
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Fabiánek, Ondřej. "VPN kontrolér." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-403195.

Testo completo
Abstract (sommario):
Tato práce se zabývá návrhem architektury a implementací flexibilního, škálovatelného a bezpečného systému pro správu virtuálních privátních sítích, který by umožnil propojení jinak nedostupných routerů a zařízení v jejich lokálních sítích. Ačkoli je systém primárně určen pro použití s routery od výrobce Advantech, podpora jiných zařízení může být později přidána.
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Schreiber, Alexander, and Holm Sieber. "VPN/IPSec." Universitätsbibliothek Chemnitz, 2002. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200200982.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Samuelsson, Joakim, and Richard Sandsund. "Implementing a virtual private network." Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91933.

Testo completo
Abstract (sommario):
Dagens företag vill ge anställda möjlighet att jobba hemifrån eller på resande fot. En vanlig lösning för att möjliggöra detta är virtual private network (VPN). VPN ger en användare tillgång till interna resurser på företaget från ett externt nät, exempelvis via Internet. Detta gör att användare kan komma åt de interna resurserna på ett säkert sätt. Vilken VPN-teknik är då att föredra för att få en så snabb, säker och pålitlig anslutning som möjligt? Detta examensarbete tar upp olika VPN-tekniker. Vi beskriver vanliga VPN-protokoll som L2TP, IPSec och PPTP. Hur användare autentiseras på ett sä
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Hurtig, Andreas, Thomas Gisslar, and Alexander Karlsson. "Vilken mjukvarubaserad fjärranslutningslösning är passande för ett mindre företag?" Thesis, University of Kalmar, School of Communication and Design, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hik:diva-1974.

Testo completo
Abstract (sommario):
<p> </p><p>Syftet med denna undersökning är att ta reda på vilken mjukvarubaserad fjärranslutningslösning som passar för ett mindre företag, då de har mindre ekonomiska tillgångar än ett större företag behöver de vara mer noggranna med sina produktval. Arbetet är utfört med litteraturstudier och en enkätundersökning till ett tiotal mindre företag, samt en laborationsmiljö där tester av de olika fjärranslutningslösningarnas egenskaper har utförts.</p><p>Område valdes då ämnet fjärranslutning knappt behandlads under utbildningstiden, och fördjupar sig därför inom området.</p><p>Resultatet visar
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Dahlberg, Axel, and Jonas Francén. "IPv6-adresshantering och prefixdelegering i MPLS VPN-nät." Thesis, KTH, Data- och elektroteknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-123805.

Testo completo
Abstract (sommario):
För full migrering till IPv6 behöver utbudet av datakommuniktionsstjänster anpassas för den nyagenerationens IP-protokoll med bevarad eller utökad funktionalitet. Detta examensarbetes mål äratt ta fram en eller flera lösningar som möter krav och tekniska förutsättningar för att utöka företagetDGC:s tjänst IP-VPN för IPv6. Detta innefattar adresstilldelningstekniker som prefixdelegeringoch automatisk adresskonfigurering i befintlig nätinfrastruktur.Lösningarna presenteras i sex framtagna scenarier som har undersökts utifrån tester, analys ocherfarna problem som uppstått. Undersökningen formade
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Krigh, Oskar, and Markus Lewin. "Mobil klientsäkerhet." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-9494.

Testo completo
Abstract (sommario):
Denna rapport har i syfte att öka förståelsen om hur man kan öka säkerheten på ett företag som använder sig av mobila klienter. Att arbeta på distans blir allt vanligare, och med de så ställs allt högre krav på tekniken som tillhandahåller möjligheterna för detta. När ny teknik utvecklas kommer ofta säkerheten i andra hand, det man fokuserar på är funktionaliteten. Frågorna man då ställer sig och vilket läsaren kommer skaffa sig mer kunskap om under rapprotens gång är: Hur skall en klient kunna hållas uppdaterad när den är utanför företagets väggar? Hur skall kommunikation kunna ske med företa
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Miliauskas, Edvinas. "Naujos generacijos intelektualių tinklų orientuotų IMS architektūrai demonstracinės paslaugos kūrimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2010. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2010~D_20100826_110105-35324.

Testo completo
Abstract (sommario):
Susipažinti su telekomunikacijų sritimi, sukurti jai paslaugą. Paslauga veikia „Mobicents“ JSLEE platformoje. Realizuota paslauga – VPN (angl. Virtual private numbering). Vartotojas savo ilgam numeriui (pvz. 5866694112234) gali nusistatyti trumpą (pvz. 555). Skambinant trumpu numeriu, paslauga suranda siekiamo adresato tikrąjį numerį ir su juo sujungia. Atlikti tyrimai ir matavimai įvertinti paslaugos tobulinimo galimybes, jos įtaką platformos darbui.<br>During course of this project we developed an telecommunications service - virtual private numbering. It allows users to create, manage and b
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Ховріна, М. А. "VPN технології для реалізації концепції високозахищеного віддаленого доступу". Master's thesis, Сумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/82257.

Testo completo
Abstract (sommario):
Pозглянуто основні характеристики та класифікацію VPN, проаналізовано основні протоколи VPN на різних рівнях моделі OSI, порівняно технології побудови VPN мережі, визначено способи підсилення захисту мережі. Розроблено модель найбільш захищеного доступу віддалених співробітників до корпоративної мережі з розподіленими офісами за допомогою IPSec VPN та SSL VPN.
Gli stili APA, Harvard, Vancouver, ISO e altri
Più fonti

Libri sul tema "VPN"

1

Pepelnjak, Ivan. MPLS and VPN architectures. Cisco Press, 2002.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Hicks, Richard M. Implementing Always On VPN. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7741-6.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Ivan, Pepelnjak, ed. MPLS and VPN architecture. Cisco Press, 2001.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Luo, Wei, ed. Layer 2 VPN architectures. Cisco Press, 2005.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Guichard, Jim. MPLS and VPN architectures. Cisco Press, 2001.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Peter, Giannoulis, and Hay Keli, eds. Nokia firewall, VPN, and IPSO configuration guide. Syngress Pub., 2009.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Lipp, Manfred. VPN - Virtuelle Private Netzwerke: Aufbau und Sicherheit. Addison-Wesley, 2001.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Lipp, Manfred. Virtuelle private Netzwerke: VPN ; Aufbau und Sicherheit. Addison-Wesley, 2006.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Hooper, Howard. CCNP security VPN: 642-647 official cert guide. Cisco Press, 2012.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Wade, Edwards, ed. CCSP: Secure PIX and secure VPN study guide. SYBEX, 2004.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Più fonti

Capitoli di libri sul tema "VPN"

1

Perez, André. "Ethernet VPN." In Network Security. John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781119043942.ch8.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Li, Zhenbin, Zhibo Hu, and Cheng Li. "SRv6 VPN." In SRv6 Network Programming. CRC Press, 2021. http://dx.doi.org/10.1201/9781003179399-5.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Lin, Weyde. "Tunneling and VPN." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_26.

Testo completo
Abstract (sommario):
AbstractTunneling is a technique used to transport data packets over a network. The original data packets, with a protocol not supported by the host network, are encapsulated within another packet and then transported through the network. While tunneling is often used in a virtual private network, virtual private network, and tunneling are technically not the same, and there are virtual private networks without tunneling. However, tunneling is essential for securing a remote resource as an integral part of most VPN implementations. Without such encrypted tunnels, the traffic to this remote res
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Hoogendoorn, Iwan. "NSX-T VPN." In Multi-Site Network and Security Services with NSX-T. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7083-7_6.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Matsuura, Hiroshi, and Naotaka Morita. "Layer 1 VPN NMS Based on Each VPN Customer." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88623-5_2.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Hicks, Richard M. "Always On VPN Overview." In Implementing Always On VPN. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7741-6_1.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Bök, Patrick-Benjamin, Andreas Noack, Marcel Müller, and Daniel Behnke. "Virtual Private Network (VPN)." In Computernetze und Internet of Things. Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29409-0_11.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Kappes, Martin. "Virtual Private Networks (VPN)." In Netzwerk- und Datensicherheit. Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-16127-9_10.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Schreiner, Rüdiger. "VPN – virtuelle private Netzwerke." In Computernetzwerke. Carl Hanser Verlag GmbH & Co. KG, 2014. http://dx.doi.org/10.3139/9783446441545.007.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Kappes, Martin. "Virtual Private Networks (VPN)." In Netzwerk- und Datensicherheit. Springer Fachmedien Wiesbaden, 2013. http://dx.doi.org/10.1007/978-3-8348-8612-5_10.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Atti di convegni sul tema "VPN"

1

Sharma, Kaustubh, Mohit P. Tahiliani, and Vishal J. Rathod. "Design and Development of an Emulation Model for VPN and VPN Bonding." In 2024 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT). IEEE, 2024. http://dx.doi.org/10.1109/conecct62155.2024.10677267.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Chen, Yungui, Qian Li, Liwei Tian, and Yuxiao Jiang. "Navigating the VPN Landscape: A Comparative Study of L2TP, IPSec, and MPLS VPN Technologies." In 2024 4th International Conference on Electronic Information Engineering and Computer Science (EIECS). IEEE, 2024. https://doi.org/10.1109/eiecs63941.2024.10800571.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Alamleh, Amneh, Ola Nasir, Ayman Abu Hannoun, et al. "Real-Time VPN Anomaly Detection System." In 2024 25th International Arab Conference on Information Technology (ACIT). IEEE, 2024. https://doi.org/10.1109/acit62805.2024.10877255.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Kulkarni, Divya, Pramila B. Shinde, Vaishnavi Y. Wani, Ashwini S. Gidge, Pradya B. Sasane, and Chetan D. Bawankar. "VPN Browser." In 2023 4th International Conference on Computation, Automation and Knowledge Management (ICCAKM). IEEE, 2023. http://dx.doi.org/10.1109/iccakm58659.2023.10449535.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Mao, Huaqing, Li Zhu, and Hang Qin. "A Comparative Research on SSL VPN and IPSec VPN." In 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2012. http://dx.doi.org/10.1109/wicom.2012.6478270.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Figueiredo, Francisco José Candeias, and Paulo Lício de Geus. "Acesso remoto em firewalls e topologia para gateways VPN." In Workshop em Segurança de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2001. http://dx.doi.org/10.5753/sbseg.2001.21292.

Testo completo
Abstract (sommario):
VPNs are being hailed as the solution for several situations involved in the Internet these days. Firewalls have seen a decade of evolution and sophistication to deal with specific problems. However, we are also seeing the proliferation of VPN configurations on otherwise secure networks based on firewalls. This paper discusses the security problems incurred by the adoption of VPN gateways in standard firewalls. It also suggests more secure topology solutions for the standard VPN uses, as well as for the remote access client. We also propose an implementation based on freely available software
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Sawalmeh, Hanan, Manar Malayshi, Sujood Ahmad, and Ahmed Awad. "VPN Remote Access OSPF-based VPN Security Vulnerabilities and Counter Measurements." In 2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT). IEEE, 2021. http://dx.doi.org/10.1109/3ict53449.2021.9581512.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Diab, Wafaa Bou, Samir Tohme, and Carole Bassil. "VPN Analysis and New Perspective for Securing Voice over VPN Networks." In Fourth International Conference on Networking and Services (icns 2008). IEEE, 2008. http://dx.doi.org/10.1109/icns.2008.8.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Popa, Alin-Bogdan. "QGP-VPN: QKD enhanced VPN solution for general-purpose encrypted communications." In 2023 22nd RoEduNet Conference: Networking in Education and Research (RoEduNet). IEEE, 2023. http://dx.doi.org/10.1109/roedunet60162.2023.10274931.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Britto, Júlia Macedo de, and Rita Maira Zanine. "Os achados da colposcopia no rastreio das lesões precursoras do carcinoma cervical uterino: experiência em um hospital universitário." In 45º Congresso da SGORJ XXIV Trocando Ideias. Zeppelini Editorial e Comunicação, 2021. http://dx.doi.org/10.5327/jbg-0368-1416-20211311070.

Testo completo
Abstract (sommario):
Introdução: O presente estudo tem por objetivo principal determinar a acurácia dos achados colposcópicos no diagnóstico das lesões intraepiteliais de colo uterino. Como objetivos secundários: determinar a acurácia da citologia oncótica no diagnóstico das lesões intraepiteliais de colo uterino; determinar a sensibilidade (S), a especificidade (E), o valor preditivo positivo (VPP) e o valor preditivo negativo (VPN) da citologia e da colposcopia em relação ao exame histopatológico. Métodos: Trata-se de um estudo analítico, retrospectivo, transversal e observacional, baseado na análise de prontuár
Gli stili APA, Harvard, Vancouver, ISO e altri

Rapporti di organizzazioni sul tema "VPN"

1

De, J., D. Ooms, M. Carugi, and F. Le. BGP-MPLS IP Virtual Private Network (VPN) Extension for IPv6 VPN. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4659.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Litkowski, S., K. Patel, Z. Zhang, R. Kebler, and J. Haas. Multicast VPN State Damping. Edited by T. Morin. RFC Editor, 2016. http://dx.doi.org/10.17487/rfc7899.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Zhang, Z., and H. Tsunoda. L2L3 VPN Multicast MIB. RFC Editor, 2018. http://dx.doi.org/10.17487/rfc8502.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Fraser, Laurie, Kathryn Roose, and Greg Nix. IPSec VPN Capabilities and Interoperability. Defense Technical Information Center, 2006. http://dx.doi.org/10.21236/ada451929.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Papadimitriou, D., R. Rabbat, and L. Berger. Layer 1 VPN Basic Mode. Edited by D. Fedyk and Y. Rekhter. RFC Editor, 2008. http://dx.doi.org/10.17487/rfc5251.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Sajassi, A., R. Aggarwal, J. Uttaro, N. Bitar, W. Henderickx, and A. Isaac. Requirements for Ethernet VPN (EVPN). RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7209.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Aggarwal, R., N. Bitar, A. Isaac, J. Uttaro, J. Drake, and W. Henderickx. BGP MPLS-Based Ethernet VPN. Edited by A. Sajassi. RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7432.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Morin, T., R. Kebler, and G. Mirsky, eds. Multicast VPN Fast Upstream Failover. RFC Editor, 2021. http://dx.doi.org/10.17487/rfc9026.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Muthukrishnan, K., and A. Malis. A Core MPLS IP VPN Architecture. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2917.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Subramanian, K., and Z. Zhang. Ingress Replication Tunnels in Multicast VPN. Edited by E. Rosen. RFC Editor, 2016. http://dx.doi.org/10.17487/rfc7988.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!