Sciweavers

111 search results - page 5 / 23
» IPsec
Sort
View
AINA
2003
IEEE
14 years 23 days ago
Design, Implementation and Performance Evaluation of IP-VPN
Network security has always been a significant issue, but a recognized priority today due to the popular of internet. The issue is not if security should be implemented on a netwo...
Jin-Cherng Lin, Ching-Tien Chang, Wei-Tao Chung
IPPS
1999
IEEE
13 years 11 months ago
An Approach for Measuring IP Security Performance in a Distributed Environment
Abstract. The Navy needs to use Multi Level Security (MLS) techniques in an environment with increasing amount of real time computation brought about by increased automation requir...
Brett L. Chappell, David T. Marlow, Philip M. Irey...
ICC
2009
IEEE
107views Communications» more  ICC 2009»
14 years 2 months ago
Towards a Denial-of-Service Resilient Design of Complex IPsec Overlays
— By monitoring the exchanged IPsec traffic an adversary can usually easily discover the layout of virtual private networks (VPNs). Of even worse extend is the disclosure if com...
Michael Brinkmeier, Michael Rossberg, Guenter Scha...
IPOM
2009
Springer
14 years 1 days ago
An IPSec Mediation Approach for Safe Establishment of Inter-domain VPNs
In this paper we propose a new solution to increase the security of BGP/MPLS IP VPNs established across multiple domains. In general, layer 3 VPNs already present a number of secur...
Alexandre Matos, Fernando Matos, Paulo Simõ...
ESORICS
2004
Springer
14 years 25 days ago
Hindering Eavesdropping via IPv6 Opportunistic Encryption
This paper presents an opportunistic encryption scheme strictly layered on top of IPv6. Assuming that a node needs to send data toward another node, our proposal enables the dynami...
Claude Castelluccia, Gabriel Montenegro, Julien La...