Academic literature on the topic 'Virtual private network servers'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Virtual private network servers.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Virtual private network servers"
Mohammed, Subhi Aswad. "Performance Analysis of Volume Loads of (Services and Transmission) Traffic in VPN Networks: A Comparative Study." Al-Nahrain Journal for Engineering Sciences 22, no. 4 (December 20, 2019): 283–93. http://dx.doi.org/10.29194/njes.22040283.
Full textRoşu, Marius, and George Drăgoi. "VPN solutions and network monitoring to support virtual teams work in virtual enterprises." Computer Science and Information Systems 8, no. 1 (2011): 1–26. http://dx.doi.org/10.2298/csis100127033r.
Full textHariyadi, I. Putu, and Akbar Juliansyah. "Analisa Penerapan Private Cloud Computing Berbasis Proxmox Virtual Environment Sebagai Media Pembelajaran Praktikum Manajemen Jaringan." MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 18, no. 1 (November 29, 2018): 1–12. http://dx.doi.org/10.30812/matrik.v18i1.329.
Full textKhizirova, M. A., Katipa Chezhimbayeva, Almira Mukhamejanova, Zhanat Manbetova, and Bulbul Ongar. "USING OF VIRTUAL PRIVATE NETWORK TECHNOLOGY FOR SIGNAL TRANSMISSION IN CORPORATE NETWORKS." Series of Geology and Technical Sciences 447, no. 3 (June 15, 2021): 100–103. http://dx.doi.org/10.32014/2021.2518-170x.69.
Full textSalim, Mikail Mohammed, Inyeung Kim, Umarov Doniyor, Changhoon Lee, and Jong Hyuk Park. "Homomorphic Encryption Based Privacy-Preservation for IoMT." Applied Sciences 11, no. 18 (September 20, 2021): 8757. http://dx.doi.org/10.3390/app11188757.
Full textQu, Liang Dong, Xin Yu Cui, and Xiao Nan Liu. "IPv6 in IPv4 Virtual Private Network Based on Virtual Devices in Vehicle Information System." Applied Mechanics and Materials 321-324 (June 2013): 2910–13. http://dx.doi.org/10.4028/www.scientific.net/amm.321-324.2910.
Full textSano, Albert Verasius Dian. "Simulasi Saham Berbasis Web dengan Teknologi Virtual Private Network di Portal Www.Kontan.Co.Id." ComTech: Computer, Mathematics and Engineering Applications 2, no. 2 (December 1, 2011): 946. http://dx.doi.org/10.21512/comtech.v2i2.2845.
Full textQu, Liang Dong, Xin Yu Cui, and Xiao Nan Liu. "A Route Handoff Method Based on Virtual Private Network in Vehicle Information Network." Applied Mechanics and Materials 475-476 (December 2013): 699–702. http://dx.doi.org/10.4028/www.scientific.net/amm.475-476.699.
Full textLizarti, Nora, and Wirta Agustin. "Aplikasi Network Traffic Monitoring Menggunakan Simple Network Management Protocol (SNMP) pada Jaringan Virtual Private Network (VPN)." SATIN - Sains dan Teknologi Informasi 1, no. 1 (June 23, 2015): 27. http://dx.doi.org/10.33372/stn.v1i1.17.
Full textUmaroh, Lia, and Machsun Rifauddin. "IMPLEMENTASI VIRTUAL PRIVATE NETWORK (VPN) DI PERPUSTAKAAN UNIVERSITAS ISLAM MALANG." BACA: JURNAL DOKUMENTASI DAN INFORMASI 41, no. 2 (December 11, 2020): 193. http://dx.doi.org/10.14203/j.baca.v41i2.531.
Full textDissertations / Theses on the topic "Virtual private network servers"
Bergvall, Ricardo. "Secure remote access to a work environment." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-45124.
Full textCelestino, Pedro. "Private virtual network." Universidade de Taubaté, 2005. http://www.bdtd.unitau.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=264.
Full textCom as redes de computadores, surge também a possibilidade de administrar remotamente as organizações inteligentes, no entanto a troca de informações segura tornou-se um problema para as instituições que trafegam dados estruturados através das redes de computadores. Um dos maiores desafios é a busca de soluções economicamente viáveis e ao mesmo tempo seguras. Protocolos de segurança, algoritmos criptográficos meios de comunicação seguros, são itens essenciais para que a informação possa trafegar em ambientes livres de interferências externas. Uma das soluções é a Rede Virtual Privada. Neste trabalho, serão apresentados os principais destaques desta tecnologia, utilizando o protocolo IPSec, com o propósito de apresentar mais uma solução atrativa para as organizações, pois trata-se de uma solução economicamente viável e segura.
Samuelsson, Joakim, and Richard Sandsund. "Implementing a virtual private network." Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91933.
Full textCompanies of today want to give their employees the opportunity to work from home or while they travel. A common solution to accomplish this is to implement a VPN over top of the existing network. Using VPN gives the employees access to the company’s local area network from outside, via the internet. The VPN provides a secure channel for these employees to connect to the local services attached to the company’s network that they need to reach. Which VPN technology is most suitable to deliver a secure, fast, and reliable connection to theses employees? In this thesis examines we are taking a closer look at different VPN solutions. We describe different VPN-protocols like L2TP, IPSec and PPTP. How to authenticate users in a secure and flexible way and also methods used to make the VPN-connection secure. Lastly we will show the solution we have implemented at the company Confidence, for whom we made the solution. The difficulties in using existing products with the company’s infrastructure are described. Suggestions are offered for future work to address these problems.
Davis, Carlton R. "IPSec base virtual private network." Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33390.
Full textIkiz, Suheyla. "Performance Parameters Of Wireless Virtual Private Network." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607094/index.pdf.
Full textheyla Ms.c, Department of Information Systems Supervisor: Assoc. Prof. Dr. Nazife Baykal Co-Supervisor: Assist. Prof. Dr. Yusuf Murat Erten January 2006, 78 pages As the use of PC&rsquo
s and handheld devices increase, it expected that wireless communication would also grow. One of the major concerns in wireless communication is the security. Virtual Private Network (VPN) is the most secure solution that ensures three main aspect of security: authentication, accountability and encryption can use in wireless networks. Most VPNs have built on IP Security Protocol (IPSec) to support end-to-end secure data transmission. IPSec is a wellunderstood and widely used mechanism for wired network communication. Because, wireless networks have limited bandwidth and wireless devices have limited power and less capable CPU, the performance of the networks when VPN&rsquo
s are used is an important research area. We have investigated the use of VPNs in wireless LANs to provide end &ndash
to &ndash
end security. We have selected IPSec as the VPN protocol and investigated the effects of using IPSec on the throughput, packet loss, and delay of the wireless LANs. For this purpose, we have set up a test bed and based, our results on the actual measurements obtained from the experiments performed using the test bed. v The wireless LAN we have used is an 802.11g network and the results show that the performance of the network is adversely affected when VPN&rsquo
s are used but the degradation is not as bad as expected.
Norin, Anders, and Henrik Ohlsson. "VPN : Virtual Private Network i Windows 2000." Thesis, University West, Department of Informatics and Mathematics, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-483.
Full textLiang, Huan. "Minimal cost design of virtual private network." Thesis, University of Ottawa (Canada), 2003. http://hdl.handle.net/10393/26513.
Full textRüegg, Maurice. "Virtual private network provisioning in the hose model /." Zürich : ETH, Eidgenössische Technische Hochschule Zürich, Institut für Technische Informatik und Kommunikationsnetze, 2003. http://e-collection.ethbib.ethz.ch/show?type=dipl&nr=119.
Full textLin, Zhangxi. "Virtual private network traffic pricing : an exploratory study /." Digital version accessible at:, 1999. http://wwwlib.umi.com/cr/utexas/main.
Full textHabibovic, Sanel. "VIRTUAL PRIVATE NETWORKS : An Analysis of the Performance in State-of-the-Art Virtual Private Network solutions in Unreliable Network Conditions." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17844.
Full textBooks on the topic "Virtual private network servers"
Carmouche, James Henry. IPsec virtual private network fundamentals. Indianapolis, Ind: Cisco Press, 2007.
Find full textCarmouche, James Henry. IPsec virtual private network fundamentals. Indianapolis, Ind: Cisco Press, 2007.
Find full text(Corporation), NIIT, ed. Building a virtual private network. Cincinnati, Ohio: Premier Press, 2003.
Find full textVirtual private networking: New issues for network security. Rolling Meadows, IL: Information Systems Audit and Control Foundation, 2001.
Find full textCovill, Randall J. Implementing extranets: The Internet as a virtual private network. Boston: Digital Press, 1998.
Find full textPaul, Wolfe, and Erwin Mike 1969-, eds. Virtual Private Networks. 2nd ed. Beijing [China]: O'Reilly, 1999.
Find full text1969-, Erwin Mike, and Wolfe Paul, eds. Virtual Private Networks. Sebastopol, CA: O'Reilly, 1998.
Find full textNg, Walfrey. MIBlet approach to virtual private network management: Design, applications and implementation. Ottawa: National Library of Canada, 1999.
Find full textA technical guide to IPSec virtual private networks. Boca Raton, FL: Auerbach, 2001.
Find full textBook chapters on the topic "Virtual private network servers"
Bök, Patrick-Benjamin, Andreas Noack, Marcel Müller, and Daniel Behnke. "Virtual Private Network (VPN)." In Computernetze und Internet of Things, 211–24. Wiesbaden: Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29409-0_11.
Full textMasuda, Mineyoshi, Yutaka Yoshimura, Toshiaki Tarui, Toni Shonai, and Mamoru Sugie. "VPDC: Virtual Private Data Center." In Integrated Network Management VIII, 473–76. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35674-7_47.
Full textSinha, Sanjib. "Virtual Private Network or VPN." In Beginning Ethical Hacking with Python, 185–89. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2541-7_28.
Full textPrenn, Caroline, and Paul van Marcke. "Value-chain, virtual private network (VPN)." In Projektkompass eLogistik, 235–40. Wiesbaden: Vieweg+Teubner Verlag, 2002. http://dx.doi.org/10.1007/978-3-322-84977-9_16.
Full textWang, Lina, Ge Yu, Guoren Wang, Xiaochun Yang, Dan Wang, Xiaomei Dong, Daling Wang, and Zhe Mei. "A Virtual Private Network for Virtual Enterprise Information Systems." In Web-Age Information Management, 165–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-45151-x_16.
Full textAugot, Daniel, Françoise Levy-dit-Vehel, and Abdullatif Shikfa. "A Storage-Efficient and Robust Private Information Retrieval Scheme Allowing Few Servers." In Cryptology and Network Security, 222–39. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12280-9_15.
Full textEisenbrand, Friedrich, Fabrizio Grandoni, Gianpaolo Oriolo, and Martin Skutella. "New Approaches for Virtual Private Network Design." In Automata, Languages and Programming, 1151–62. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11523468_93.
Full textBrehon, Yannick, Daniel Kofman, and Augusto Casaca. "Virtual Private Network to Spanning Tree Mapping." In NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, 703–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-72606-7_60.
Full textGali, Alex, and Stefan Covaci. "Active Virtual Private Network Services on Demand." In Next Generation Networks. Networks and Services for the Information Society, 160–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-40019-2_14.
Full textLakshmi, M. L. S. N. S., and Naga Venkata Sai Sudheer Bandaru. "Configuring MPLS Cloud Providers with Virtual Private Network." In Lecture Notes in Electrical Engineering, 817–26. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2256-7_76.
Full textConference papers on the topic "Virtual private network servers"
Pavlicek, Antonin, and Frantisek Sudzina. "Use of virtual private networks (VPN) and proxy servers: Impact of personality and demographics." In 2018 Thirteenth International Conference on Digital Information Management (ICDIM). IEEE, 2018. http://dx.doi.org/10.1109/icdim.2018.8846991.
Full textChen, Qian, Xuefeng Sun, and Zhihong Shangguan. "A Utility Model of Environmental Radiation Online Monitoring System of Nuclear Power Plants." In 2013 21st International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/icone21-16842.
Full textTakeda, Tomonori. "Layer 1 Virtual Private Network." In OFC/NFOEC 2007 - 2007 Conference on Optical Fiber Communication and the National Fiber Optic Engineers Conference. IEEE, 2007. http://dx.doi.org/10.1109/ofc.2007.4348578.
Full textGupta, Anupam, Jon Kleinberg, Amit Kumar, Rajeev Rastogi, and Bulent Yener. "Provisioning a virtual private network." In the thirty-third annual ACM symposium. New York, New York, USA: ACM Press, 2001. http://dx.doi.org/10.1145/380752.380830.
Full textKim, Kangseok, Marlon E. Pierce, and Rajarshi Guha. "SQMD: Architecture for Scalable, Distributed Database System Built on Virtual Private Servers." In 2008 IEEE Fourth International Conference on eScience (eScience). IEEE, 2008. http://dx.doi.org/10.1109/escience.2008.35.
Full textJaha, Ahmed A., Fathi Ben Shatwan, and Majdi Ashibani. "Proper Virtual Private Network (VPN) Solution." In 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies. IEEE, 2008. http://dx.doi.org/10.1109/ngmast.2008.18.
Full textHernandez, Harold, and Ping-Tsai Chung. "Case study of virtual private network." In ITCom 2001: International Symposium on the Convergence of IT and Communications, edited by Anura P. Jayasumana and V. Chandrasekar. SPIE, 2001. http://dx.doi.org/10.1117/12.434430.
Full textBenzid, Djedjiga, and Michel Kadoch. "Virtual Private Network over Wireless Mesh Networks." In 2014 2nd International Conference on Future Internet of Things and Cloud (FiCloud). IEEE, 2014. http://dx.doi.org/10.1109/ficloud.2014.60.
Full textKang, Sunyoung, and Seungae Kang. "Virtual Private Network for Wellness Sports Information." In 2013 International Conference on IT Convergence and Security (ICITCS). IEEE, 2013. http://dx.doi.org/10.1109/icitcs.2013.6717897.
Full textKim, Jaehoon, Myeong-wuk Jang, Byoung-Joon Lee, and Kiho Kim. "Content Centric Network-based Virtual Private Community." In 2011 IEEE International Conference on Consumer Electronics (ICCE). IEEE, 2011. http://dx.doi.org/10.1109/icce.2011.5722896.
Full textReports on the topic "Virtual private network servers"
Andersson, L., and T. Madsen. Provider Provisioned Virtual Private Network (VPN) Terminology. RFC Editor, March 2005. http://dx.doi.org/10.17487/rfc4026.
Full textRosen, E., Y. Cai, and A. Boers. Multicast Virtual Private Network (MVPN): Using Bidirectional P-Tunnels. RFC Editor, July 2015. http://dx.doi.org/10.17487/rfc7582.
Full textSchliesser, B., and T. Nadeau. Definition of Textual Conventions for Virtual Private Network (VPN) Management. RFC Editor, November 2005. http://dx.doi.org/10.17487/rfc4265.
Full textBaker, F., and P. Bose. Quality of Service (QoS) Signaling in a Nested Virtual Private Network. RFC Editor, August 2007. http://dx.doi.org/10.17487/rfc4923.
Full textTakeda, T., ed. Applicability Statement for Layer 1 Virtual Private Network (L1VPN) Basic Mode. RFC Editor, July 2008. http://dx.doi.org/10.17487/rfc5253.
Full textNadeau, T., and H. van, eds. MPLS/BGP Layer 3 Virtual Private Network (VPN) Management Information Base. RFC Editor, February 2006. http://dx.doi.org/10.17487/rfc4382.
Full textDe, J., D. Ooms, M. Carugi, and F. Le. BGP-MPLS IP Virtual Private Network (VPN) Extension for IPv6 VPN. RFC Editor, September 2006. http://dx.doi.org/10.17487/rfc4659.
Full textAdrangi, F., and H. Levkowetz, eds. Problem Statement: Mobile IPv4 Traversal of Virtual Private Network (VPN) Gateways. RFC Editor, August 2005. http://dx.doi.org/10.17487/rfc4093.
Full textSathappan, S., K. Nagaraj, and W. Lin. Propagation of ARP/ND Flags in an Ethernet Virtual Private Network (EVPN). Edited by J. Rabadan. RFC Editor, June 2021. http://dx.doi.org/10.17487/rfc9047.
Full textLuo, W. Layer 2 Virtual Private Network (L2VPN) Extensions for Layer 2 Tunneling Protocol (L2TP). RFC Editor, September 2006. http://dx.doi.org/10.17487/rfc4667.
Full text