Добірка наукової літератури з теми "Virtual Private Network"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Virtual Private Network".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Virtual Private Network":

1

Kim, Kyung-Muk, and Hae-Sool Yang. "VPN (Virtual Private Network) SW's examination example analysis." Journal of the Korea Academia-Industrial cooperation Society 11, no. 8 (August 31, 2010): 3012–20. http://dx.doi.org/10.5762/kais.2010.11.8.3012.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Knapp, Laura. "Virtual Private Network Performance." EDPACS 28, no. 7 (January 2001): 1. http://dx.doi.org/10.1201/1079/43264.28.7.20010101/30378.4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Wright, Marie A. "Virtual Private Network Security." Network Security 2000, no. 7 (July 2000): 11–14. http://dx.doi.org/10.1016/s1353-4858(00)07018-5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Scott, Charlie, Paul Wolfe, and Mike Erwin. "Virtual Private Networks: Turning the Internet into Your Private Network." EDPACS 27, no. 2 (August 1999): 16. http://dx.doi.org/10.1201/1079/43248.27.2.19990801/30263.5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Khizirova, M. A., Katipa Chezhimbayeva, Almira Mukhamejanova, Zhanat Manbetova, and Bulbul Ongar. "USING OF VIRTUAL PRIVATE NETWORK TECHNOLOGY FOR SIGNAL TRANSMISSION IN CORPORATE NETWORKS." Series of Geology and Technical Sciences 447, no. 3 (June 15, 2021): 100–103. http://dx.doi.org/10.32014/2021.2518-170x.69.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This paper discusses some modes of signal transmission for corporate systems using the technology of virtual private networks VPN. A very important property of tunnels is the ability to differentiate different types of traffic and assign them the necessary service priorities. In this work, research has been carried out and comparative characteristics of signal transmission modes using virtual networks have been obtained to identify the effectiveness of the network in various modes of organizing a virtual network, and to optimize a virtual network in order to identify an effective method for organizing a VPN. Also, the work analyzes the specifics of the work of corporate information systems and networks intended for their maintenance, showed that for building a corporate network it is advisable to use virtual private network (VPN) technology, which makes it possible to ensure the fulfillment of the basic requirements for the security and quality of customer service and applications and the current state and direction of development of VPN technology when creating new generation corporate networks, while highlighting the main tasks that need to be addressed when creating a network. Some features of setting up an IPSec VPN server for corporate networks are considered.
6

TAKEDA, T., R. MATSUZAKI, I. INOUE, and S. URUSHIDANI. "Network Design Scheme for Virtual Private Network Services." IEICE Transactions on Communications E89-B, no. 11 (November 1, 2006): 3046–54. http://dx.doi.org/10.1093/ietcom/e89-b.11.3046.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Sobh, Tarek S., and Yasser Aly. "Effective and Extensive Virtual Private Network." Journal of Information Security 02, no. 01 (2011): 39–49. http://dx.doi.org/10.4236/jis.2011.21004.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Crocetti, P., S. Fotedar, L. Fratta, G. Gallassi, and M. Gerla. "ATM virtual private network design alternatives." Computer Communications 18, no. 1 (January 1995): 24–31. http://dx.doi.org/10.1016/0140-3664(94)00748-7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Su, Y., Y. Tian, E. Wong, N. Nadarajah, and C. C. K. Chan. "All-optical virtual private network in passive optical networks." Laser & Photonics Review 2, no. 6 (December 11, 2008): 460–79. http://dx.doi.org/10.1002/lpor.200810021.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

., Ekwe O. A. "VIRTUAL PRIVATE NETWORK: A VERITABLE TOOL FOR NETWORK SECURITY." International Journal of Research in Engineering and Technology 03, no. 05 (May 25, 2014): 319–22. http://dx.doi.org/10.15623/ijret.2014.0305060.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Virtual Private Network":

1

Celestino, Pedro. "Private virtual network." Universidade de Taubaté, 2005. http://www.bdtd.unitau.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=264.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Along with the computers networks emerges the possibility of managing remotely the intelligent organizations although the safe change of information has become a problem to the institutions which transport structured data through nets of computers. One of the largest challenges is the search for safe and economically viable solutions. Protocols of safety, cryptographic algorithms, safe means of communication are essential items so that the information can travel in environmentals free of external interferences. One of the alternatives is the Virtual Private Networks. In this work, the main prominences of this technology will be presented using the protocol IPSec with the purpose of presenting a more atractive tool to the organizations due to its safety and economical viability.
Com as redes de computadores, surge também a possibilidade de administrar remotamente as organizações inteligentes, no entanto a troca de informações segura tornou-se um problema para as instituições que trafegam dados estruturados através das redes de computadores. Um dos maiores desafios é a busca de soluções economicamente viáveis e ao mesmo tempo seguras. Protocolos de segurança, algoritmos criptográficos meios de comunicação seguros, são itens essenciais para que a informação possa trafegar em ambientes livres de interferências externas. Uma das soluções é a Rede Virtual Privada. Neste trabalho, serão apresentados os principais destaques desta tecnologia, utilizando o protocolo IPSec, com o propósito de apresentar mais uma solução atrativa para as organizações, pois trata-se de uma solução economicamente viável e segura.
2

Samuelsson, Joakim, and Richard Sandsund. "Implementing a virtual private network." Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91933.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Dagens företag vill ge anställda möjlighet att jobba hemifrån eller på resande fot. En vanlig lösning för att möjliggöra detta är virtual private network (VPN). VPN ger en användare tillgång till interna resurser på företaget från ett externt nät, exempelvis via Internet. Detta gör att användare kan komma åt de interna resurserna på ett säkert sätt. Vilken VPN-teknik är då att föredra för att få en så snabb, säker och pålitlig anslutning som möjligt? Detta examensarbete tar upp olika VPN-tekniker. Vi beskriver vanliga VPN-protokoll som L2TP, IPSec och PPTP. Hur användare autentiseras på ett säkert och smidigt sätt samt metoder att göra sin VPN-anslutning säker. Vi redovisar också den lösning vi har implementerat hos Confidence, för vilka arbetet utfördes. Problemen med att använda de produkter som redan fanns på företaget beskrivs. Förslag på lösningar ges för att lösa dessa problem i framtida arbeten.
Companies of today want to give their employees the opportunity to work from home or while they travel. A common solution to accomplish this is to implement a VPN over top of the existing network. Using VPN gives the employees access to the company’s local area network from outside, via the internet. The VPN provides a secure channel for these employees to connect to the local services attached to the company’s network that they need to reach. Which VPN technology is most suitable to deliver a secure, fast, and reliable connection to theses employees? In this thesis examines we are taking a closer look at different VPN solutions. We describe different VPN-protocols like L2TP, IPSec and PPTP. How to authenticate users in a secure and flexible way and also methods used to make the VPN-connection secure. Lastly we will show the solution we have implemented at the company Confidence, for whom we made the solution. The difficulties in using existing products with the company’s infrastructure are described. Suggestions are offered for future work to address these problems.
3

Davis, Carlton R. "IPSec base virtual private network." Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33390.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The Internet evolved from an experiential packet-switching network called the ARPANET. This network has grown exponentially since its conversion from an experimental to an operational network in 1975. However, the need for confidential and secure data channel has dissuaded many enterprises from using this ubiquitous public infrastructure. The IPSec protocol suite developed by the Internet Engineering Task Force (IETF) makes it possible to implement secure communication channels or virtual private network (VPN) over the Internet. Corporations can benefit from substantial financial savings by utilizing VPN for inter-company or intra-company communications rather than using expensive lease or privately own network infrastructure with its associated high maintenance costs. In this thesis, we will discuss the architecture, design and use of IPSec base VPN.
4

Habibovic, Sanel. "VIRTUAL PRIVATE NETWORKS : An Analysis of the Performance in State-of-the-Art Virtual Private Network solutions in Unreliable Network Conditions." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17844.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This study aimed to identify the differences between state-of-the-art VPN solutions on different operating systems. It was done because a novel VPN protocol is in the early stages of release and a comparison of it, to other current VPN solutions is interesting. It is interesting because current VPN solutions are well established and have existed for a while and the new protocol stirs the pot in the VPN field. Therefore a contemporary comparison between them could aid system administrators when choosing which VPN to implement. To choose the right VPN solution for the occasion could increase performance for the users and save costs for organizations who wish to deploy VPNs. With the remote workforce increasing issues of network reliability also increases, due to wireless connections and networks beyond the control of companies. This demands an answer to the question how do VPN solutions differ in performance with stable and unstable networks? This work attempted to answer this question. This study is generally concerning VPN performance but mainly how the specific solutions perform under unreliable network conditions.It was achieved by researching past comparisons of VPN solutions to identify what metrics to analyze and which VPN solutions have been recommended. Then a test bed was created in a lab network to control the network when testing, so the different VPN implementations and operating systems have the same premise. To establish baseline results, performance testing was done on the network without VPNs, then the VPNs were tested under reliable network conditions and then with unreliable network conditions. The results of that were compared and analyzed. The results show a difference in the performance of the different VPNs, also there is a difference on what operating system is used and there are also differences between the VPNs with the unreliability aspects switched on. The novel VPN protocol looks promising as it has overall good results, but it is not conclusive as the current VPN solutions can be configured based on what operating system and settings are chosen. With this set-up, VPNs on Linux performed much better under unreliable network conditions when compared to setups using other operating systems. The outcome of this work is that there is a possibility that the novel VPN protocol is performing better and that certain combinations of VPN implementation and OS are better performing than others when using the default configuration. This works also pointed out how to improve the testing and what aspects to consider when comparing VPN implementations.
5

Norin, Anders, and Henrik Ohlsson. "VPN : Virtual Private Network i Windows 2000." Thesis, University West, Department of Informatics and Mathematics, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-483.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Ikiz, Suheyla. "Performance Parameters Of Wireless Virtual Private Network." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607094/index.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
ABSTRACT PERFORMANCE PARAMETERS OF WIRELESS VIRTUAL PRIVATE NETWORK KZ, Sü
heyla Ms.c, Department of Information Systems Supervisor: Assoc. Prof. Dr. Nazife Baykal Co-Supervisor: Assist. Prof. Dr. Yusuf Murat Erten January 2006, 78 pages As the use of PC&rsquo
s and handheld devices increase, it expected that wireless communication would also grow. One of the major concerns in wireless communication is the security. Virtual Private Network (VPN) is the most secure solution that ensures three main aspect of security: authentication, accountability and encryption can use in wireless networks. Most VPNs have built on IP Security Protocol (IPSec) to support end-to-end secure data transmission. IPSec is a wellunderstood and widely used mechanism for wired network communication. Because, wireless networks have limited bandwidth and wireless devices have limited power and less capable CPU, the performance of the networks when VPN&rsquo
s are used is an important research area. We have investigated the use of VPNs in wireless LANs to provide end &ndash
to &ndash
end security. We have selected IPSec as the VPN protocol and investigated the effects of using IPSec on the throughput, packet loss, and delay of the wireless LANs. For this purpose, we have set up a test bed and based, our results on the actual measurements obtained from the experiments performed using the test bed. v The wireless LAN we have used is an 802.11g network and the results show that the performance of the network is adversely affected when VPN&rsquo
s are used but the degradation is not as bad as expected.
7

Liang, Huan. "Minimal cost design of virtual private network." Thesis, University of Ottawa (Canada), 2003. http://hdl.handle.net/10393/26513.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
VPN technology is an attractive cost-effective solution for the support of the networking needs of enterprises. In this work, we review current issues in the development of VPN technology. We then focus our research on minimal cost design, used by network-based IP VPN service providers. The interest in such solutions is generated by both customers seeking to reduce support costs and by Internet Service Providers (ISPs) seeking new revenue sources. Solving the cost minimization would allow ISPs to define and deploy new VPN services. In this thesis, Multicommodity Min-Cost Flows (MMCF) formulations are applied to the resource allocation in network-based IP VPN, in order to develop a cost-effective routing proposal. Compared with RFC 2676, one of the Open Shortest Path First (OSPF) algorithms, various improvements in routing costs are obtained corresponding to different proposed network topologies.
8

Rüegg, Maurice. "Virtual private network provisioning in the hose model /." Zürich : ETH, Eidgenössische Technische Hochschule Zürich, Institut für Technische Informatik und Kommunikationsnetze, 2003. http://e-collection.ethbib.ethz.ch/show?type=dipl&nr=119.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Lin, Zhangxi. "Virtual private network traffic pricing : an exploratory study /." Digital version accessible at:, 1999. http://wwwlib.umi.com/cr/utexas/main.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Bazama, Muneer I. "Investigation into Layer 3 Multicast Virtual Private Network Schemes." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22653.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The need of multicast applications such as Internet Protocol Television (IPTV) and dependent financial services require more scalable and reliable MVPN infrastructures. This diversity and breadth of services pose a challenge for operators to create an infrastructure that supports Layer 2 (ATM/Frame relay/Ethernet/PPP) and Layer 3(IPv4/IPv6) Virtual Private Networks. The difficulty is particularly true for virtual services that require complex control and data plane operations. Another challenge is to support emerging multicast applications incrementally on top of the existing Layer 3 VPN infrastructure without adding operational complexity. In this thesis, we investigate and analyze several implementation methods of Multicast Virtual Private Network (MVPN) schemes by carrying out tests in a research testbed environment. These schemes are intended for offering multicast services over layer 3 VPN. However, some of these technologies can be tuned to offer multicast services over layer 2 VPN as well. We also provide tools and tactics on how to implement and evaluate the scalability and performance of two MPVN schemes in IP/MPLS core networks such as Rosen scheme and NG MVPN.

Книги з теми "Virtual Private Network":

1

Carmouche, James Henry. IPsec virtual private network fundamentals. Indianapolis, Ind: Cisco Press, 2007.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Carmouche, James Henry. IPsec virtual private network fundamentals. Indianapolis, Ind: Cisco Press, 2007.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Carmouche, James Henry. IPsec virtual private network fundamentals. Indianapolis, Ind: Cisco Press, 2007.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Gupta, Meeta. Building a virtual private network. Cincinnati, Ohio: Premier Press, 2003.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Scott, Charlie. Virtual Private Networks. 2nd ed. Beijing [China]: O'Reilly, 1999.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Scott, Charlie. Virtual Private Networks. Sebastopol, CA: O'Reilly, 1998.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Kosiur, David R. Building and managing virtual private networks. New York: Wiley, 1998.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Tiller, Jim S. A technical guide to IPSec virtual private networks. Boca Raton, FL: Auerbach, 2001.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Information Systems Audit and Control Foundation. Virtual private networking: New issues for network security. Rolling Meadows, IL: Information Systems Audit and Control Foundation, 2001.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Covill, Randall J. Implementing extranets: The Internet as a virtual private network. Boston: Digital Press, 1998.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Virtual Private Network":

1

Bök, Patrick-Benjamin, Andreas Noack, Marcel Müller, and Daniel Behnke. "Virtual Private Network (VPN)." In Computernetze und Internet of Things, 211–24. Wiesbaden: Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29409-0_11.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Masuda, Mineyoshi, Yutaka Yoshimura, Toshiaki Tarui, Toni Shonai, and Mamoru Sugie. "VPDC: Virtual Private Data Center." In Integrated Network Management VIII, 473–76. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35674-7_47.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Sinha, Sanjib. "Virtual Private Network or VPN." In Beginning Ethical Hacking with Python, 185–89. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2541-7_28.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Prenn, Caroline, and Paul van Marcke. "Value-chain, virtual private network (VPN)." In Projektkompass eLogistik, 235–40. Wiesbaden: Vieweg+Teubner Verlag, 2002. http://dx.doi.org/10.1007/978-3-322-84977-9_16.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Cabianca, Dario. "Implementing Virtual Private Cloud Instances." In Google Cloud Platform (GCP) Professional Cloud Network Engineer Certification Companion, 87–180. Berkeley, CA: Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9354-6_3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Wang, Lina, Ge Yu, Guoren Wang, Xiaochun Yang, Dan Wang, Xiaomei Dong, Daling Wang, and Zhe Mei. "A Virtual Private Network for Virtual Enterprise Information Systems." In Web-Age Information Management, 165–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-45151-x_16.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Gali, Alex, and Stefan Covaci. "Active Virtual Private Network Services on Demand." In Next Generation Networks. Networks and Services for the Information Society, 160–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-40019-2_14.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Brehon, Yannick, Daniel Kofman, and Augusto Casaca. "Virtual Private Network to Spanning Tree Mapping." In NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, 703–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-72606-7_60.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Eisenbrand, Friedrich, Fabrizio Grandoni, Gianpaolo Oriolo, and Martin Skutella. "New Approaches for Virtual Private Network Design." In Automata, Languages and Programming, 1151–62. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11523468_93.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Ezra, Paul Joan, Sanjay Misra, Akshat Agrawal, Jonathan Oluranti, Rytis Maskeliunas, and Robertas Damasevicius. "Secured Communication Using Virtual Private Network (VPN)." In Lecture Notes on Data Engineering and Communications Technologies, 309–19. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-3961-6_27.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Virtual Private Network":

1

Benzid, Djedjiga, and Michel Kadoch. "Virtual Private Network over Wireless Mesh Networks." In 2014 2nd International Conference on Future Internet of Things and Cloud (FiCloud). IEEE, 2014. http://dx.doi.org/10.1109/ficloud.2014.60.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Gupta, Anupam, Jon Kleinberg, Amit Kumar, Rajeev Rastogi, and Bulent Yener. "Provisioning a virtual private network." In the thirty-third annual ACM symposium. New York, New York, USA: ACM Press, 2001. http://dx.doi.org/10.1145/380752.380830.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Takeda, Tomonori. "Layer 1 Virtual Private Network." In OFC/NFOEC 2007 - 2007 Conference on Optical Fiber Communication and the National Fiber Optic Engineers Conference. IEEE, 2007. http://dx.doi.org/10.1109/ofc.2007.4348578.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Nawej, Claude Mukatshung, and Shengzhi Du. "Virtual Private Network’s Impact on Network Performance." In 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC). IEEE, 2018. http://dx.doi.org/10.1109/iconic.2018.8601281.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Su, Yikai. "All-Optical Virtual-Private-Network in Access Networks." In LEOS 2007 - IEEE Lasers and Electro-Optics Society Annual Meeting. IEEE, 2007. http://dx.doi.org/10.1109/leos.2007.4382651.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Varvello, Matteo, Inigo Querejeta Azurmendi, Antonio Nappa, Panagiotis Papadopoulos, Goncalo Pestana, and Benjamin Livshits. "VPN-Zero: A Privacy-Preserving Decentralized Virtual Private Network." In 2021 IFIP Networking Conference (IFIP Networking). IEEE, 2021. http://dx.doi.org/10.23919/ifipnetworking52078.2021.9472843.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Jaha, Ahmed A., Fathi Ben Shatwan, and Majdi Ashibani. "Proper Virtual Private Network (VPN) Solution." In 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies. IEEE, 2008. http://dx.doi.org/10.1109/ngmast.2008.18.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Hernandez, Harold, and Ping-Tsai Chung. "Case study of virtual private network." In ITCom 2001: International Symposium on the Convergence of IT and Communications, edited by Anura P. Jayasumana and V. Chandrasekar. SPIE, 2001. http://dx.doi.org/10.1117/12.434430.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Kang, Sunyoung, and Seungae Kang. "Virtual Private Network for Wellness Sports Information." In 2013 International Conference on IT Convergence and Security (ICITCS). IEEE, 2013. http://dx.doi.org/10.1109/icitcs.2013.6717897.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Kim, Jaehoon, Myeong-wuk Jang, Byoung-Joon Lee, and Kiho Kim. "Content Centric Network-based Virtual Private Community." In 2011 IEEE International Conference on Consumer Electronics (ICCE). IEEE, 2011. http://dx.doi.org/10.1109/icce.2011.5722896.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Virtual Private Network":

1

Andersson, L., and T. Madsen. Provider Provisioned Virtual Private Network (VPN) Terminology. RFC Editor, March 2005. http://dx.doi.org/10.17487/rfc4026.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Bocci, M., S. Boutros, and A. Sajassi. Applicability of Ethernet Virtual Private Network (EVPN) to Network Virtualization over Layer 3 (NVO3) Networks. Edited by J. Rabadan. RFC Editor, September 2023. http://dx.doi.org/10.17487/rfc9469.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Rosen, E., Y. Cai, and A. Boers. Multicast Virtual Private Network (MVPN): Using Bidirectional P-Tunnels. RFC Editor, July 2015. http://dx.doi.org/10.17487/rfc7582.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Schliesser, B., and T. Nadeau. Definition of Textual Conventions for Virtual Private Network (VPN) Management. RFC Editor, November 2005. http://dx.doi.org/10.17487/rfc4265.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Gont, F. Layer 3 Virtual Private Network (VPN) Tunnel Traffic Leakages in Dual-Stack Hosts/Networks. RFC Editor, August 2014. http://dx.doi.org/10.17487/rfc7359.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Adrangi, F., and H. Levkowetz, eds. Problem Statement: Mobile IPv4 Traversal of Virtual Private Network (VPN) Gateways. RFC Editor, August 2005. http://dx.doi.org/10.17487/rfc4093.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Nadeau, T., and H. van, eds. MPLS/BGP Layer 3 Virtual Private Network (VPN) Management Information Base. RFC Editor, February 2006. http://dx.doi.org/10.17487/rfc4382.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

De, J., D. Ooms, M. Carugi, and F. Le. BGP-MPLS IP Virtual Private Network (VPN) Extension for IPv6 VPN. RFC Editor, September 2006. http://dx.doi.org/10.17487/rfc4659.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Baker, F., and P. Bose. Quality of Service (QoS) Signaling in a Nested Virtual Private Network. RFC Editor, August 2007. http://dx.doi.org/10.17487/rfc4923.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Takeda, T., ed. Applicability Statement for Layer 1 Virtual Private Network (L1VPN) Basic Mode. RFC Editor, July 2008. http://dx.doi.org/10.17487/rfc5253.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

До бібліографії