Sciweavers

111 search results - page 11 / 23
» IPsec
Sort
View
GI
2001
Springer
13 years 12 months ago
Access of Mobile IP Users to Firewall Protected VPNs
: The paper describes an architecture allowing Mobile IP hosts to access to a virtual private network that is protected by a firewall from the public Internet. The implementation b...
Marc Danzeisen, Torsten Braun
COMCOM
2004
96views more  COMCOM 2004»
13 years 7 months ago
Privacy issues in virtual private networks
The term "private" in virtual private network is sometimes taken for granted, and people can be too distracted by the "virtual" and "network" to real...
W. Timothy Strayer
ICC
2009
IEEE
13 years 5 months ago
Selecting Concurrent Network Architectures at Runtime
The current Internet architecture nicely structures functionality into layers of protocols. While this reduces complexity, many tweaks have emerged because of the architecture'...
Lars Völker, Denis Martin, Christoph Werle, M...
POPL
2005
ACM
14 years 7 months ago
Formal prototyping in early stages of protocol design
Network protocol design is usually an informal process where debugging is based on successive iterations of a prototype implementation. The feedback provided by a prototype can be...
Alwyn Goodloe, Carl A. Gunter, Mark-Oliver Stehr
SRDS
2008
IEEE
14 years 1 months ago
An Empirical Study of Denial of Service Mitigation Techniques
We present an empirical study of the resistance of several protocols to denial of service (DoS) attacks on client-server communication. We show that protocols that use authenticat...
Gal Badishi, Amir Herzberg, Idit Keidar, Oleg Roma...