StrongSwan

Results: 61



#Item
51Network architecture / Internet Key Exchange / IPsec / Extensible Authentication Protocol / Cisco IOS / Dynamic Multipoint Virtual Private Network / Cisco Systems / StrongSwan / Cryptographic protocols / Computing / Data

FlexVPN and Internet Key Exchange Version 2 Configuration Guide, Cisco IOS XE Release 3S Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive

Add to Reading List

Source URL: www.cisco.com

Language: English
52Computer network security / Tunneling protocols / Windows Server / Cryptographic protocols / Virtual private networks / IPsec / Hyper-V / StrongSwan / Comparison of firewalls / System software / Computing / Software

Data sheet HP IMC IPSec/VPN Manager software Key features

Add to Reading List

Source URL: h20195.www2.hp.com

Language: English
53Cyberwarfare / Virtual private network / Cisco Systems VPN Client / UT-VPN / StrongSwan / Computer network security / Computing / Computer security

Secure VPN Login On and Off Campus Keeping Sensitive Data Safe Every month, UNC-Chapel Hill network firewalls block more than 375 million unwanted attempts to connect to University systems.

Add to Reading List

Source URL: ccinfo.unc.edu

Language: English - Date: 2014-07-08 09:29:18
54Network architecture / Internet Key Exchange / IPsec / StrongSwan / Cryptographic nonce / Trusted computing base / Cryptographic protocols / Data / Information

IKEv2 Separation: Extraction of security critical components into a Trusted Computing Base (TCB) Reto Bürki, Adrian-Ken Rüegsegger

Add to Reading List

Source URL: www.codelabs.ch

Language: English - Date: 2013-02-04 11:05:01
55Data / Network architecture / Virtual private networks / Internet protocols / Computer network security / Internet Key Exchange / IPsec / StrongSwan / Internet Security Association and Key Management Protocol / Cryptographic protocols / Computing / Tunneling protocols

IKEv2&VPN&with&OpenBSD&iked(8) EuroBSDCon&2010@10@09,&Karlsruhe Reyk&Flöter&([removed])

Add to Reading List

Source URL: www.openbsd.org

Language: English - Date: 2012-12-20 07:31:37
56Data / Network architecture / Virtual private networks / Internet protocols / Computer network security / Internet Key Exchange / IPsec / StrongSwan / Internet Security Association and Key Management Protocol / Cryptographic protocols / Computing / Tunneling protocols

OpenIKED,  AsiaBSDCon  2013 Reyk  Flöter  ([removed]) Agenda Why  another  VPN  protocol?

Add to Reading List

Source URL: www.openbsd.org

Language: English - Date: 2013-04-02 16:02:23
57Trusted Platform Module / Trusted Computing Group / Trusted Execution Technology / StrongSwan / Rapperswil / Next-Generation Secure Computing Base / Computer security / Trusted computing / Cryptography

A Root of Trust for Measurement

Add to Reading List

Source URL: security.hsr.ch

Language: English - Date: 2011-06-19 04:27:15
58Cryptographic protocols / Unified Modeling Language / User-mode Linux / StrongSwan / Executable UML / Internet Key Exchange / Network address translation / Operating system-level virtualization / IPsec / System software / Computing / Software

Advanced Network Simulation under User-Mode Linux Andreas Steffen*, Eric Marchionni†, Patrik Rayo†

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2005-10-06 08:23:18
59Information / StrongSwan / Internet Key Exchange / IPsec / FreeS/WAN / Openswan / Security association / Virtual private network / Daemon / Cryptographic protocols / Computing / Data

strongSwan VPNs scalable and modularized!

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2008-05-05 12:09:19
60Cryptography / Internet Key Exchange / StrongSwan / IPsec / Opportunistic encryption / NAT traversal / NAT-T / Virtual private network / Openswan / Cryptographic protocols / Computing / Data

strongSwan The new IKEv2 VPN Solution

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2007-05-26 10:12:50
UPDATE