Security assessment and evaluation of VPNs: a comprehensive survey

H Abbas, N Emmanuel, MF Amjad, T Yaqoob… - ACM Computing …, 2023 - dl.acm.org
The use of Virtual Private Networks (VPNs) has witnessed an outstanding rise as they aim to
provide confidentiality and anonymity to communication. Despite this enormous and …

Comparison of VPN Protocols at Network Layer Focusing on Wire Guard Protocol

A Abdulazeez, B Salim, D Zeebaree, D Doghramachi - 2020 - learntechlib.org
The key point of this paper is to assess and look over the top of the line network layer-based
VPN (Virtual Private Network) protocols because data link layer is hardly ever found to be in …

Application specific tunneling protocol selection for Virtual Private Networks

S Jahan, MS Rahman, S Saha - 2017 international conference …, 2017 - ieeexplore.ieee.org
The application scope of VPN is increasing day by day as the organizations are creating
private networks through public Internet using VPN tunneling instead of leased line. VPN …

[HTML][HTML] Information security for big data using the NTRUEncrypt method

MK Yousif, ZE Dallalbashi, SW Kareem - Measurement: Sensors, 2023 - Elsevier
Cloud computing processes vast quantities of data and offers a variety of flexible, secure, on-
demand, and cost-effective collaboration options for consumers. Due to the increasing …

Common vulnerabilities exposed in VPN–A survey

R Bansode, A Girdhar - Journal of Physics: Conference Series, 2021 - iopscience.iop.org
Abstract In COVID-19 Pandemic, Internet traffic has been increased by up to 90%. Work-from-
home culture is initiated by almost every organization. The technology adapted to access the …

Virtual private network as a service—A need for discrete cloud architecture

AZ Bhat, DK Al Shuaibi, AV Singh - 2016 5th International …, 2016 - ieeexplore.ieee.org
Cloud Computing in recent years has become a buzz word in the world of information
technology. Cloud computing also referred as on demand computing has been extensively …

A survey on VPN: Taxonomy, roles, trends and future directions

J Li, B Feng, H Zheng - Computer Networks, 2024 - Elsevier
Abstract The Virtual Private Network (VPN) originated as a cost-effective alternative to
dedicated lines, primarily utilized by Internet Service Providers (ISPs) and large …

A study of cloud-based VPN establishment using network function virtualization technique

S Santhanamahalingam, S Alagarsamy… - … on Smart Electronics …, 2022 - ieeexplore.ieee.org
Network Function Virtualization is the process of moving networking functions like Firewall,
Load Balancing, Virtual Private networks (VPN), Gateway Antivirus, etc. away from …

[PDF][PDF] Security investigation on remote access methods of virtual private network

PS Nyakomitta, SO Abeka - Global journal of computer science and …, 2020 - academia.edu
Remote access is one of the prevalent business trends in today's computing pervasive
business environments. The ease of access to internal private networks over the internet by …

Secure Cloud Approach Based on Okamoto-Uchiyama Cryptosystem.

SW KAREEM - Journal of Applied Computer Science & …, 2020 - search.ebscohost.com
The enormous data performed within Cloud computing because of its strength to present
users among adjustable, safe, on-demand, and low-cost co-operation. Among the rising …