Security assessment and evaluation of VPNs: a comprehensive survey
The use of Virtual Private Networks (VPNs) has witnessed an outstanding rise as they aim to
provide confidentiality and anonymity to communication. Despite this enormous and …
provide confidentiality and anonymity to communication. Despite this enormous and …
Comparison of VPN Protocols at Network Layer Focusing on Wire Guard Protocol
The key point of this paper is to assess and look over the top of the line network layer-based
VPN (Virtual Private Network) protocols because data link layer is hardly ever found to be in …
VPN (Virtual Private Network) protocols because data link layer is hardly ever found to be in …
Application specific tunneling protocol selection for Virtual Private Networks
The application scope of VPN is increasing day by day as the organizations are creating
private networks through public Internet using VPN tunneling instead of leased line. VPN …
private networks through public Internet using VPN tunneling instead of leased line. VPN …
[HTML][HTML] Information security for big data using the NTRUEncrypt method
Cloud computing processes vast quantities of data and offers a variety of flexible, secure, on-
demand, and cost-effective collaboration options for consumers. Due to the increasing …
demand, and cost-effective collaboration options for consumers. Due to the increasing …
Common vulnerabilities exposed in VPN–A survey
R Bansode, A Girdhar - Journal of Physics: Conference Series, 2021 - iopscience.iop.org
Abstract In COVID-19 Pandemic, Internet traffic has been increased by up to 90%. Work-from-
home culture is initiated by almost every organization. The technology adapted to access the …
home culture is initiated by almost every organization. The technology adapted to access the …
Virtual private network as a service—A need for discrete cloud architecture
Cloud Computing in recent years has become a buzz word in the world of information
technology. Cloud computing also referred as on demand computing has been extensively …
technology. Cloud computing also referred as on demand computing has been extensively …
A survey on VPN: Taxonomy, roles, trends and future directions
J Li, B Feng, H Zheng - Computer Networks, 2024 - Elsevier
Abstract The Virtual Private Network (VPN) originated as a cost-effective alternative to
dedicated lines, primarily utilized by Internet Service Providers (ISPs) and large …
dedicated lines, primarily utilized by Internet Service Providers (ISPs) and large …
A study of cloud-based VPN establishment using network function virtualization technique
S Santhanamahalingam, S Alagarsamy… - … on Smart Electronics …, 2022 - ieeexplore.ieee.org
Network Function Virtualization is the process of moving networking functions like Firewall,
Load Balancing, Virtual Private networks (VPN), Gateway Antivirus, etc. away from …
Load Balancing, Virtual Private networks (VPN), Gateway Antivirus, etc. away from …
[PDF][PDF] Security investigation on remote access methods of virtual private network
PS Nyakomitta, SO Abeka - Global journal of computer science and …, 2020 - academia.edu
Remote access is one of the prevalent business trends in today's computing pervasive
business environments. The ease of access to internal private networks over the internet by …
business environments. The ease of access to internal private networks over the internet by …
Secure Cloud Approach Based on Okamoto-Uchiyama Cryptosystem.
SW KAREEM - Journal of Applied Computer Science & …, 2020 - search.ebscohost.com
The enormous data performed within Cloud computing because of its strength to present
users among adjustable, safe, on-demand, and low-cost co-operation. Among the rising …
users among adjustable, safe, on-demand, and low-cost co-operation. Among the rising …