IPsec

Results: 686



#Item
221Internet protocols / Cryptographic protocols / Computer network security / Tunneling protocols / Domain name system / IPsec / Internet Key Exchange / NAT traversal / Virtual private network / Network architecture / Computing / Internet

Experiences with Host-to-Host IPsec Tuomas Aura, Michael Roe, and Anish Mohammed Microsoft Research Abstract. This paper recounts some lessons that we learned from the deployment of host-to-host IPsec in a large corporat

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:25:05
222Data / Tunneling protocols / Internet protocols / Computer network security / Virtual private networks / Internet Key Exchange / IPsec / OpenVPN / Internet Security Association and Key Management Protocol / Cryptographic protocols / Computing / Network architecture

OpenIKED Reyk Floeter () February 2013 Abstract This paper introduces the OpenIKED project[14], the latest portable subproject of OpenBSD[13].

Add to Reading List

Source URL: www.openbsd.dk

Language: English - Date: 2013-04-02 16:02:23
223Network architecture / Computer architecture / Virtual private networks / Internet protocols / IPsec / Network Extrusion / VoIP VPN / Computer network security / Computing / Internet privacy

Virtual Private Network (VPN) Policy A virtual private network is used to provide secure, encrypted communication between a network and a remote host or other remote networks over the public Internet. VPNs allow the esta

Add to Reading List

Source URL: www.fpweb.net

Language: English - Date: 2014-12-23 16:56:42
224Computer network security / Network protocols / IPv6 / Cyberwarfare / Mobile IP / Proxy Mobile IPv6 / IP address spoofing / Transmission Control Protocol / IPsec / Network architecture / Computing / Internet Protocol

Security of Internet Location Management Tuomas Aura and Michael Roe Microsoft Research 7 J J Thomson Avenue, Cambridge CB3 0FB, UK {tuomaura,mroe}@microsoft.com Abstract

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:21
225Computer network security / Routers / Cisco Catalyst / Cisco Systems / TACACS+ / Cisco IOS / TACACS / FIPS 140 / IPsec / Computing / Network architecture / Data

Microsoft Word - 3850_3650_Security_Policy.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-20 12:34:19
226Internet standards / Tunneling protocols / Internet protocols / Differentiated services / Traffic congestion / Transmission Control Protocol / Incentive / IPsec / Network architecture / Internet / Computing

Microsoft PowerPoint - refb_sigcomm05_briscoetmp.ppt

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2005-08-26 17:46:40
227Network protocols / IPv6 / Tunneling protocols / Mobile IP / Proxy Mobile IPv6 / Care-of address / Network layer / IPsec / IP address / Network architecture / Internet Protocol / Computing

Designing the Mobile IPv6 Security Protocol Tuomas Aura, Michael Roe April 2006 Technical Report MSR±TR±2006±42

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2006-04-12 13:50:14
228Data / Tunneling protocols / Internet protocols / Computer network security / Virtual private networks / Internet Key Exchange / IPsec / OpenVPN / Internet Security Association and Key Management Protocol / Cryptographic protocols / Computing / Network architecture

OpenIKED Reyk Floeter () February 2013 Abstract This paper introduces the OpenIKED project[14], the latest portable subproject of OpenBSD[13].

Add to Reading List

Source URL: www.obsd.si

Language: English - Date: 2013-04-02 16:02:23
229Data / Network architecture / Virtual private networks / Internet protocols / Computer network security / Internet Key Exchange / IPsec / StrongSwan / Internet Security Association and Key Management Protocol / Cryptographic protocols / Computing / Tunneling protocols

IKEv2&VPN&with&OpenBSD&iked(8) EuroBSDCon&2010@10@09,&Karlsruhe Reyk&Flöter&() Agenda • Why&another&VPN&protocol?

Add to Reading List

Source URL: www.obsd.si

Language: English - Date: 2012-12-20 07:31:37
230Data / Network architecture / Virtual private networks / Internet protocols / Computer network security / Internet Key Exchange / IPsec / StrongSwan / Internet Security Association and Key Management Protocol / Cryptographic protocols / Computing / Tunneling protocols

IKEv2&VPN&with&OpenBSD&iked(8) EuroBSDCon&2010@10@09,&Karlsruhe Reyk&Flöter&() Agenda • Why&another&VPN&protocol?

Add to Reading List

Source URL: www.openbsd.dk

Language: English - Date: 2012-12-20 07:31:37
UPDATE