-
1
Literature Review on Using Internet Protocol Security (IPsec) on network Connectivity
Published 2024-12-01Subjects: “…ipsec…”
Get full text
Article -
2
Peningkatan Keamanan Jaringan Virtual Private Network Menggunakan Protokol IKE/IPSEC Berbasis Mikrotik
Published 2024-12-01Subjects: Get full text
Article -
3
Implementasi Jaringan VPN Menggunakan L2TP Dengan IP Sec Pada PT Datindo Infonet Prima
Published 2022-07-01Subjects: Get full text
Article -
4
-
5
Carrier-grade NTP clock synchronization scheme of SD-WAN network
Published 2022-08-01Subjects: Get full text
Article -
6
The Impact of Operating System on Bandwidth in Open VPN Technology
Published 2016-03-01Subjects: “…"VPN Technology, OpenVPN, IPSec, Interoperability, Bandwidth, Tcpdump, Jperf."…”
Get full text
Article -
7
Research on improving the registration success rate of VoWi-Fi under multiple equivalent path scenarios
Published 2019-01-01Subjects: Get full text
Article -
8
Secure data transmission in geographically distributed information systems in ophthalmology based on domestic equipment
Published 2022-12-01Subjects: Get full text
Article -
9
Implementasi VPN Antar Cabang Menggunakan Teknologi SDWAN dengan Metode Load Balance (Studi Kasus: PT. Mitra Solusi Infokom)
Published 2023-02-01“…Desain ulang ini menggunakan 2 jalur komunikasi antar site, salah satunya menggunakan jaringan internet yang dilapisi IPSec VPN dan pada jaringan utama MPLS juga dilapisi dengan IPSec VPN. …”
Get full text
Article -
10
Design on Cloud Computing Application Platform Based on CDMA VPDN
Published 2013-09-01“…Under the design principles of mobile integration, the terminal was installed on client edge to establish express IPSec tunnels for accessing the platform. The virtual cloud computing platform and physical server resources pool was integrated to achieve the mixed cloud model. …”
Get full text
Article -
11
HIPSCS:secure IP communication system based on HIP
Published 2012-11-01“…To make the host identity protocol(HIP)into practical use,a secure communication system basd on HIP named HIPSCS was designed and implemented.HIPSCS achieved the real-name identification of communications hosts by binding the HI with user's certificates,thus made the source of packets trustworthy from network.IPsec was used to encrypt communication data,so that the goal of secure IP communication was accomplished.The HIPSCS prototype was implemented in the laboratory environment,and experimental results show that HIPSCS has good usability and can support mobile communication well.…”
Get full text
Article -
12
Comparative analysis of VPN protocols
Published 2023-06-01“…The aim of the study was to check the performance of the set-up internet connection using the three VPN protocols: Wireguard, OpenVPN and L2TP / IPSec. The Docker applications were used for the tests, on which the VPN server configuration file was launched. …”
Get full text
Article -
13
Fault-injection attack on countermeasure algorithms of RSA-CRT cryptosystem
Published 2019-02-01“…As a widely-applied public-key cryptosystem in TLS,SSL and IPSec protocols,the security of RSA cryptosystem is of great importance.At FDTC 2014,Rauzy and Guilley proposed several improved countermeasure algorithms of RSA implementation based on Chinese remainder theorem,which were used to defeat fault-injection attacks.New fault-injection attacks on two of their countermeasure algorithms are proposed.During the RSA computation process,a permanent fault is injected and then a faulty RSA signature result is induced.The RSA private key can be obtained by using the faulty RSA signature and the correct result.Therefore,Rauzy and Guilley’s two countermeasure algorithms cannot resist our fault-injection attack.…”
Get full text
Article -
14
Sistem Informasi Manajemen VPN Remote Mikrotik Berbasis Codeigniter PHP Framework Di Desa Sawo
Published 2024-12-01“…Aplikasi sistem manajemen VPN berbasis website menggunakan mikrotik API dan jenis VPN yang digunakan hanya remote access site to site protocol L2TP/IPSec. Penelitian ini dapat meningkatkan produktivitas dalam mengelola akun VPN dan port forwading. …”
Get full text
Article -
15
IKEChecker: grammar-guided stateful fuzzer for IKE protocol implementions
Published 2024-08-01“…The internet key exchange (IKE) protocol, integral to the authentication and key negotiation process within the Internet Protocol Security (IPSec) framework, has been utilized for the protection of IP communications. …”
Get full text
Article -
16
Kombinasi Least Significant Bit (LSB-1) Dan Rivest Shamir Adleman (RSA) Dalam Kriptografi Citra Warna
Published 2022-05-01“…Algoritma kriptografi yang popular saat ini adalah Chiper Block Chaining (CBC), algoritma ini merupakan metode kriptografi yang cukup handal dan stabil Algoritma ini paling umum digunakan pada protocol internet TLS dan IPsec. Teknik steganografi juga bisa digunakan untuk menjaga keamanan dan kerahasiaan pesan. …”
Get full text
Article -
17
Research on Network Information Security Risk Analysis and Protection Strategy of LKJ Monitoring and Management Device
Published 2022-02-01“…According to the system security level protection requirements, this paper proposes a secure network topology, which uses firewall technology to construct vehicle-ground IPsecVPN virtual private transport channel at the network boundary, deploys security supervision and audit platform to monitor, alarm and trace network behavior in bypass, and adopts dual-path redundancy architecture at key network nodes to improve network robustness. …”
Get full text
Article