Search

Your search keyword '"IPsec"' showing total 2,419 results

Search Constraints

Start Over You searched for: Descriptor "IPsec" Remove constraint Descriptor: "IPsec"
2,419 results on '"IPsec"'

Search Results

1. Wireless and Fiber-Based Post-Quantum-Cryptography-Secured IPsec Tunnel.

2. Overlay and Virtual Private Networks Security Performances Analysis with Open Source Infrastructure Deployment.

3. Guidance for securing Microsoft Windows XP for IT Professionals : a NIST security configuration checklist : recommendations of the National Institute of Standards and Technology

4. IoT: Security and Mobility in IPv6

5. An Overview of Secure Communications for the Internet of Things.

6. 基于红黑隔离架构的网络安全设备设计.

7. Overlay and Virtual Private Networks Security Performances Analysis with Open Source Infrastructure Deployment

8. The Potential of Digitalization to Improve the Skills of Agri-Food Market Participants: Technical and Economic Opportunities of Multicasting and Internet Television.

9. INTEGRASI SERVER ON-PREMISE DENGAN SERVER CLOUD MENGGUNAKAN CLOUD VPN DAN MIKROTIK IPSEC UNTUK PENINGKATAN KEAMANAN KONEKSI.

11. Quantum-Resistant MACsec and IPsec for Virtual Private Networks

12. A Performance Evaluation of IPsec with Post-Quantum Cryptography

13. Evaluación del Rendimiento de una red IPv6 utilizando IPSec en Modo Túnel

14. A Hardware Architecture of NIST Lightweight Cryptography Applied in IPSec to Secure High-Throughput Low-Latency IoT Networks

17. Analysis of Vulnerability of IPsec Protocol Implementation Based on Differential Fuzzing

18. Evaluating Performances of VPN Tunneling Protocols Based on Application Service Requirements

19. NoPASARAN: a Novel Platform for Analysing Semi-Active elements in Routes Across a Network

23. On Federated Cyber Range Network Interconnection

24. SCADA Testbed Implementation, Attacks, and Security Solutions

26. A VPN Performances Analysis of Constrained Hardware Open Source Infrastructure Deploy in IoT Environment.

27. Securing InfiniBand Networks with the Bluefield-2 Data Processing Unit.

30. Performance Evaluation of the Update Messages of Locator Identifier Split Protocols Using an IP Paging Mechanism at the End Networks

31. Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2

33. NoPASARAN: a Novel Platform for Analysing Semi-Active elements in Routes Across a Network.

34. S-SDS: A Framework for Security Deployment as Service in Software Defined Networks

35. Cryptographic Algorithm Invocation in IPsec: Guaranteeing the Communication Security in the Southbound Interface of SDN Networks

36. Proposition of a Model for Securing the Neighbor Discovery Protocol (NDP) in IPv6 Environment

37. IPsec Cryptographic Algorithm Invocation Considering Performance and Security for SDN Southbound Interface Communication

38. P4-IPsec: Site-to-Site and Host-to-Site VPN With IPsec in P4-Based SDN

39. Overhead effects of data encryption on TCP throughput across IPSEC secured network

40. IPv6 Security Issues—A Systematic Review

41. Software Optimizations for DES

42. Research on the Protocols of VPN

43. Two Are Better than One: Software Optimizations for AES-GCM over Short Messages

45. A VPN Performances Analysis of Constrained Hardware Open Source Infrastructure Deploy in IoT Environment

46. Authenticated encryption in theory and in practice

47. A study of securing in-vehicle communication using IPSEC protocol.

48. A Technique to Reduce Problem of Delay in Key Rekeying in Mobile Networks

Catalog

Books, media, physical & digital resources