Sciweavers

Share
COMCOM
2004
120views more  COMCOM 2004»
8 years 10 months ago
IPsec-based end-to-end VPN deployment over UMTS
Next generation mobile users require flexible security mechanisms, which provide customized security services to data traffic, take into account end-user mobility and mobile netwo...
Christos Xenakis, Lazaros F. Merakos
APNOMS
2006
Springer
9 years 1 months ago
Mixing Heterogeneous Address Spaces in a Single Edge Network
The growth of IPv4 Internet has been facing the infamous IP address depletion barrier. In practice, typical IPv4 Internet edge networks can be expanded by incorporating private add...
Ilhwan Kim, Heon Young Yeom
INFOCOM
2003
IEEE
9 years 3 months ago
Integrity for Virtual Private Routed Networks
Abstract— The term Virtual Private Network (VPN) encompasses a wide array of diverse technologies and network architectures. All VPNs should provide users with the isolation and ...
Randy Bush, Timothy Griffin
NOMS
2008
IEEE
107views Communications» more  NOMS 2008»
9 years 4 months ago
A Framework for the establishment of inter-domain, on-demand VPNs
– Virtual Private Networks (VPNs) are a popular and cost-effective means to build wide-area corporate networks, since they provide bandwidth, privacy and security for a fraction ...
Alexandre Matos, Fernando Matos, Paulo Simõ...
books