|
|
|
Zhonghang Sui, Hui Shu, Fei Kang, Yuyao Huang and Guoyu Huo
Tunnels, a key technology of traffic obfuscation, are increasingly being used to evade censorship. While providing convenience to users, tunnel technology poses a hidden danger to cybersecurity due to its concealment and camouflage capabilities. In contr...
ver más
|
|
|
|
|
|
|
Antonio Francesco Gentile, Davide Macrì, Floriano De Rango, Mauro Tropea and Emilio Greco
Virtual private network (VPN) represents an HW/SW infrastructure that implements private and confidential communication channels that usually travel through the Internet. VPN is currently one of the most reliable technologies to achieve this goal, also b...
ver más
|
|
|
|
|
|
|
Adnan Mohsin Abdulazeez,Baraa Wasfi Salim,Diyar Qader Zeebaree,Dana Doghramachi
Pág. pp. 157 - 177
The key point of this paper is to assess and look over the top of the line network layer-based VPN (Virtual Private Network) protocols because data link layer is hardly ever found to be in use in organizations, the reason is because of its exceedingly hi...
ver más
|
|
|
|
|
|
|
Håkon Gunleifsen, Thomas Kemmerich and Vasileios Gkioulos
Contemporary Service Function Chaining (SFC), and the requirements arising from privacy concerns, call for the increasing integration of security features such as encryption and isolation across Network Function Virtualisation (NFV) domains. Therefore, s...
ver más
|
|
|
|
|
|
|
Junta Zeniarja,Adhitya Nugraha,Muhammad Joyo Satrio
Pág. 279 - 284
Seiring dengan peningkatan pengguna internet, kebutuhan pengalamatan Internet Protocol versi 4(IPv4) semakin meningkat sehingga dikhawatirkan ketersediaannya akan semakin berkurang dan habis. Kehadiran Internet Protocol versi 6 (IPv6) yang merupakan prot...
ver más
|
|
|
|
|
|
|
Jorge Luis Lugo Rosero, Oscar Andrés Pérez Acuña, Nancy Y. García
Pág. 19 - 32
Resumen Autores/asDescargasCómo citar
|
|
|
|