Virtual Network Computing

Results: 3536



#Item
131Computing / Network architecture / Local area networks / Network protocols / Computer architecture / Emerging technologies / Ethernet / Network function virtualization / Open vSwitch / Virtual LAN / OpenFlow / Forwarding plane

E2: A Framework for NFV Applications Shoumik Palkar ∗ Chang Lan∗ Sangjin Han

Add to Reading List

Source URL: info.iet.unipi.it

Language: English - Date: 2015-10-02 06:50:42
132Computing / Cryptography / Network architecture / IPsec / Cryptographic protocols / Computer network security / Virtual private networks / Cryptographic software / StrongSwan / Internet Key Exchange / Opportunistic encryption / NAT traversal

Advanced Features of Linux strongSwan the OpenSource VPN Solution Institute of Internet Technologies and Applications Hochschule für Technik Rapperswil, Schweiz The powerful advanced features of the Linux strongSwan VPN

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2006-04-27 10:23:08
133Technology / Computer network security / Computing / Digital media / Cultural globalization / Internet / New media / Telegraphy / Virtual reality / Firewall / Hotspot / Targeted advertising

RaGaPa Hotspot Monetization Datasheet The RaGaPa Monetization solution provides an income producing model for businesses offering internet access to their patrons.

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2014-09-10 13:35:25
134Computing / Network architecture / Internet / Network protocols / Ethernet / Transmission Control Protocol / Cache / Packet processing / Virtual LAN / Ethernet frame / Internet Protocol / Network switch

The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention Nicholas Weaver Vern Paxson

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:02
135Computing / Cryptography / Computer network security / Computer security / IPsec / Virtual private networks / Cryptographic protocols / Cryptographic software / StrongSwan / Internet Key Exchange / RADIUS / Extensible Authentication Protocol

The Open Source VPN Solution for Mixed Platforms  Secure password login using IKEv2 EAP methods.  User credentials on Active Directory or FreeRadius.  strongSwan VPN Gateway scales up to 10‘000 clients.

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2010-06-11 08:24:10
136Computing / Cryptography / Computer network security / Network architecture / IPsec / Cryptographic protocols / Virtual private networks / Tunneling protocols / StrongSwan / Internet Key Exchange

VPN with Mobile Devices revisited 55. DFN Betriebstagung Oktober 2011 Berlin Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications HSR Hochschule für Technik Rapperswil

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2011-10-24 00:14:43
137Computing / Cryptography / IPsec / Network architecture / Cryptographic protocols / Computer network security / Virtual private networks / Cryptographic software / Internet Key Exchange / StrongSwan / Opportunistic encryption / NAT traversal

strongSwan The new IKEv2 VPN Solution Andreas Steffen Copyright © 2007 by Andreas Steffen

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2007-05-26 10:12:50
138Computing / Network architecture / Network protocols / Computer networking / Network performance / Networking hardware / Bandwidth / Network switch / Throughput / Router / Virtual private network / Synchronous optical networking

1 UltraScience Net: Network Testbed for Large-Scale Science Applications Nageswara S. V. Rao

Add to Reading List

Source URL: www.csm.ornl.gov

Language: English - Date: 2005-03-10 15:30:57
139Computing / Network architecture / Computer networking / Networking hardware / Internet protocols / Cryptographic protocols / 6WIND / Data Plane Development Kit / Open vSwitch / IPv6 / Network function virtualization / Virtual Router Redundancy Protocol

S P E E DS E R I E S TurboAppliances Ÿ Throughput for cost-effec ve rou ng and

Add to Reading List

Source URL: www.6wind.com

Language: English - Date: 2015-12-18 16:04:59
140Computing / Network architecture / Computer architecture / Virtual private networks / Computer network security / Internet privacy / Crypto-anarchism / Quality of service / Differentiated services / SoftEther VPN / Mobile virtual private network

Microsoft Word - Dokument2

Add to Reading List

Source URL: www.kutter-fonds.ethz.ch

Language: English - Date: 2010-05-16 10:11:22
UPDATE