Works matching DE "IPSEC (Computer network protocol)"
Results: 13
EVALUAREA SECURITĂTII RETELELOR DE CALCULATOARE SI SOLUTII PRACTICE DE ADMINISTRARE.
- Published in:
- Studii şi Cercetări de Calcul Economic şi Cibernetică Economică, 2011, v. 45, n. 1/2, p. 95
- By:
- Publication type:
- Article
FASiRec: A Fast Session Recovery Scheme for Large-scale VPNs Using IPSec.
- Published in:
- Journal of Information Science & Engineering, 2008, v. 24, n. 5, p. 1329
- By:
- Publication type:
- Article
Introducing emergent technologies in tactical and disaster recovery networks.
- Published in:
- International Journal of Communication Systems, 2006, v. 19, n. 9, p. 1045, doi. 10.1002/dac.802
- By:
- Publication type:
- Article
Survey of Internet Protocol Version 6 Link Local Communication Security Vulnerability and Mitigation Methods.
- Published in:
- IETE Technical Review, 2013, v. 30, n. 1, p. 64, doi. 10.4103/0256-4602.107341
- By:
- Publication type:
- Article
Specification, implementation and performance evaluation of the QoS-friendly encapsulating security payload (Q-ESP) protocol.
- Published in:
- Security & Communication Networks, 2011, v. 4, n. 12, p. 1387, doi. 10.1002/sec.268
- By:
- Publication type:
- Article
Two-Dimensional Packet Classification and Filter Conflict Resolution in the Internet.
- Published in:
- Theory of Computing Systems, 2009, v. 44, n. 3, p. 289, doi. 10.1007/s00224-007-9050-5
- By:
- Publication type:
- Article
Automatic multicast IPsec by using a proactive IPsec discovery protocol and a group key management.
- Published in:
- Journal of Telecommunications & Information Technology, 2008, v. 2008, n. 2, p. 77, doi. 10.26636/jtit.2008.2.875
- By:
- Publication type:
- Article
IMPLEMENTACIÓN DE LA SEGURIDAD DEL PROTOCOLO DE INTERNET VERSIÓN 6.
- Published in:
- Gerencia Tecnologica Informatica, 2012, v. 11, n. 29, p. 35
- By:
- Publication type:
- Article
Techniques for improving the security and manageability of IPsec policy.
- Published in:
- International Journal of Information Security, 2005, v. 4, n. 3, p. 209, doi. 10.1007/s10207-004-0064-6
- By:
- Publication type:
- Article
ROI-Driven Cyber Risk Mitigation Using Host Compliance and Network Configuration.
- Published in:
- Journal of Network & Systems Management, 2017, v. 25, n. 4, p. 759, doi. 10.1007/s10922-017-9428-x
- By:
- Publication type:
- Article
High-Speed FPGA Implementation of Secure Hash Algorithm for IPSec and VPN Applications.
- Published in:
- Journal of Supercomputing, 2006, v. 37, n. 2, p. 179, doi. 10.1007/s11227-006-5682-5
- By:
- Publication type:
- Article
Solutions for Network Traffic Security: VPN through IPsec and PKI.
- Published in:
- International Journal of Information Security & Cybercrime, 2017, v. 6, n. 2, p. 40, doi. 10.19107/IJISC.2017.02.06
- By:
- Publication type:
- Article
ANALYTICAL MODEL OF IPSEC PROCESS THROUGHPUT.
- Published in:
- Advances in Electrical & Electronic Engineering, 2012, v. 10, n. 3, p. 162, doi. 10.15598/aeee.v10i3.681
- By:
- Publication type:
- Article