Showing 1 - 17 results of 17 for search '"IPsec"', query time: 0.24s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    The Impact of Operating System on Bandwidth in Open VPN Technology by Baghdad Science Journal

    Published 2016-03-01
    Subjects: “…"VPN Technology, OpenVPN, IPSec, Interoperability, Bandwidth, Tcpdump, Jperf."…”
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Implementasi VPN Antar Cabang Menggunakan Teknologi SDWAN dengan Metode Load Balance (Studi Kasus: PT. Mitra Solusi Infokom) by Muhammad Fikri, Muhammad Rifqi

    Published 2023-02-01
    “…Desain ulang ini menggunakan 2 jalur komunikasi antar site, salah satunya menggunakan jaringan internet yang dilapisi IPSec VPN dan pada jaringan utama MPLS juga dilapisi dengan IPSec VPN. …”
    Get full text
    Article
  10. 10

    Design on Cloud Computing Application Platform Based on CDMA VPDN by Min Cai

    Published 2013-09-01
    “…Under the design principles of mobile integration, the terminal was installed on client edge to establish express IPSec tunnels for accessing the platform. The virtual cloud computing platform and physical server resources pool was integrated to achieve the mixed cloud model. …”
    Get full text
    Article
  11. 11

    HIPSCS:secure IP communication system based on HIP by Min ZHOU, Ming CHEN, Chang-you XING, Pei-cheng JIANG

    Published 2012-11-01
    “…To make the host identity protocol(HIP)into practical use,a secure communication system basd on HIP named HIPSCS was designed and implemented.HIPSCS achieved the real-name identification of communications hosts by binding the HI with user's certificates,thus made the source of packets trustworthy from network.IPsec was used to encrypt communication data,so that the goal of secure IP communication was accomplished.The HIPSCS prototype was implemented in the laboratory environment,and experimental results show that HIPSCS has good usability and can support mobile communication well.…”
    Get full text
    Article
  12. 12

    Comparative analysis of VPN protocols by Jerzy Antoniuk, Małgorzata Plechawska-Wójcik

    Published 2023-06-01
    “…The aim of the study was to check the performance of the set-up internet connection using the three VPN protocols: Wireguard, OpenVPN and L2TP / IPSec. The Docker applications were used for the tests, on which the VPN server configuration file was launched. …”
    Get full text
    Article
  13. 13

    Fault-injection attack on countermeasure algorithms of RSA-CRT cryptosystem by Fanyu KONG, Yong QIAO, Pengtao LIU, Xiaodong LIU, Dashui ZHOU

    Published 2019-02-01
    “…As a widely-applied public-key cryptosystem in TLS,SSL and IPSec protocols,the security of RSA cryptosystem is of great importance.At FDTC 2014,Rauzy and Guilley proposed several improved countermeasure algorithms of RSA implementation based on Chinese remainder theorem,which were used to defeat fault-injection attacks.New fault-injection attacks on two of their countermeasure algorithms are proposed.During the RSA computation process,a permanent fault is injected and then a faulty RSA signature result is induced.The RSA private key can be obtained by using the faulty RSA signature and the correct result.Therefore,Rauzy and Guilley’s two countermeasure algorithms cannot resist our fault-injection attack.…”
    Get full text
    Article
  14. 14

    Sistem Informasi Manajemen VPN Remote Mikrotik Berbasis Codeigniter PHP Framework Di Desa Sawo by Poerbaningtyas E, Achmad Riyan Adi

    Published 2024-12-01
    “…Aplikasi sistem manajemen VPN berbasis website menggunakan mikrotik API dan jenis VPN yang digunakan hanya remote access site to site protocol L2TP/IPSec. Penelitian ini dapat meningkatkan produktivitas dalam mengelola akun VPN dan port forwading. …”
    Get full text
    Article
  15. 15

    IKEChecker: grammar-guided stateful fuzzer for IKE protocol implementions by ZHENG Yonghui, ZHAO Dongliang, GU Chunxiang, ZHANG Xieli

    Published 2024-08-01
    “…The internet key exchange (IKE) protocol, integral to the authentication and key negotiation process within the Internet Protocol Security (IPSec) framework, has been utilized for the protection of IP communications. …”
    Get full text
    Article
  16. 16

    Kombinasi Least Significant Bit (LSB-1) Dan Rivest Shamir Adleman (RSA) Dalam Kriptografi Citra Warna by Christy Atika Sari, Wellia Shinta Sari

    Published 2022-05-01
    “…Algoritma kriptografi yang popular saat ini adalah Chiper Block Chaining (CBC), algoritma ini merupakan metode kriptografi yang cukup handal dan stabil Algoritma ini paling umum digunakan pada protocol internet TLS dan IPsec. Teknik steganografi juga bisa digunakan untuk menjaga keamanan dan kerahasiaan pesan. …”
    Get full text
    Article
  17. 17

    Research on Network Information Security Risk Analysis and Protection Strategy of LKJ Monitoring and Management Device by XIAO Lizhi, TANG Zilin, YANG Yibin

    Published 2022-02-01
    “…According to the system security level protection requirements, this paper proposes a secure network topology, which uses firewall technology to construct vehicle-ground IPsecVPN virtual private transport channel at the network boundary, deploys security supervision and audit platform to monitor, alarm and trace network behavior in bypass, and adopts dual-path redundancy architecture at key network nodes to improve network robustness. …”
    Get full text
    Article