Search

Your search keyword '"IPsec"' showing total 2,501 results

Search Constraints

Start Over You searched for: Descriptor "IPsec" Remove constraint Descriptor: "IPsec"
2,501 results on '"IPsec"'

Search Results

1. A BiGRU Model Based on the DBO Algorithm for Cloud-Edge Communication Networks.

2. 基于高性能FPGA的超高速IPSec安全设备设计与实现.

3. 多通道10G 网络安全设备的设计与实现.

4. Guidance for securing Microsoft Windows XP for IT Professionals : a NIST security configuration checklist : recommendations of the National Institute of Standards and Technology

5. IoT IP Overlay Network Security Performance Analysis with Open Source Infrastructure Deployment

6. IoT IP Overlay Network Security Performance Analysis with Open Source Infrastructure Deployment.

7. Wireless and Fiber-Based Post-Quantum-Cryptography-Secured IPsec Tunnel.

8. Overlay and Virtual Private Networks Security Performances Analysis with Open Source Infrastructure Deployment.

9. IoT: Security and Mobility in IPv6

10. An Overview of Secure Communications for the Internet of Things.

11. A BiGRU Model Based on the DBO Algorithm for Cloud-Edge Communication Networks

12. 基于红黑隔离架构的网络安全设备设计.

13. Overlay and Virtual Private Networks Security Performances Analysis with Open Source Infrastructure Deployment

15. Quantum-Resistant MACsec and IPsec for Virtual Private Networks

16. A Performance Evaluation of IPsec with Post-Quantum Cryptography

17. Evaluación del Rendimiento de una red IPv6 utilizando IPSec en Modo Túnel

18. The Potential of Digitalization to Improve the Skills of Agri-Food Market Participants: Technical and Economic Opportunities of Multicasting and Internet Television.

19. INTEGRASI SERVER ON-PREMISE DENGAN SERVER CLOUD MENGGUNAKAN CLOUD VPN DAN MIKROTIK IPSEC UNTUK PENINGKATAN KEAMANAN KONEKSI.

20. A Hardware Architecture of NIST Lightweight Cryptography Applied in IPSec to Secure High-Throughput Low-Latency IoT Networks

23. Analysis of Vulnerability of IPsec Protocol Implementation Based on Differential Fuzzing

24. Evaluating Performances of VPN Tunneling Protocols Based on Application Service Requirements

25. NoPASARAN: a Novel Platform for Analysing Semi-Active elements in Routes Across a Network

29. On Federated Cyber Range Network Interconnection

30. SCADA Testbed Implementation, Attacks, and Security Solutions

34. Performance Evaluation of the Update Messages of Locator Identifier Split Protocols Using an IP Paging Mechanism at the End Networks

35. Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2

37. Securing InfiniBand Networks with the Bluefield-2 Data Processing Unit.

38. A VPN Performances Analysis of Constrained Hardware Open Source Infrastructure Deploy in IoT Environment.

39. S-SDS: A Framework for Security Deployment as Service in Software Defined Networks

40. Cryptographic Algorithm Invocation in IPsec: Guaranteeing the Communication Security in the Southbound Interface of SDN Networks

41. Proposition of a Model for Securing the Neighbor Discovery Protocol (NDP) in IPv6 Environment

42. SD-WAN tunnel technology and network constuction

43. NoPASARAN: a Novel Platform for Analysing Semi-Active elements in Routes Across a Network.

44. IPsec Cryptographic Algorithm Invocation Considering Performance and Security for SDN Southbound Interface Communication

45. P4-IPsec: Site-to-Site and Host-to-Site VPN With IPsec in P4-Based SDN

46. IPv6 Security Issues—A Systematic Review

47. Software Optimizations for DES

48. Research on the Protocols of VPN

49. Two Are Better than One: Software Optimizations for AES-GCM over Short Messages

Catalog

Books, media, physical & digital resources