Showing 1 - 13 results of 13 for search '"IPsec"', query time: 0.03s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Implementasi VPN Antar Cabang Menggunakan Teknologi SDWAN dengan Metode Load Balance (Studi Kasus: PT. Mitra Solusi Infokom) by Muhammad Fikri, Muhammad Rifqi

    Published 2023-02-01
    “…Desain ulang ini menggunakan 2 jalur komunikasi antar site, salah satunya menggunakan jaringan internet yang dilapisi IPSec VPN dan pada jaringan utama MPLS juga dilapisi dengan IPSec VPN. …”
    Get full text
    Article
  9. 9

    Design on Cloud Computing Application Platform Based on CDMA VPDN by Min Cai

    Published 2013-09-01
    “…Under the design principles of mobile integration, the terminal was installed on client edge to establish express IPSec tunnels for accessing the platform. The virtual cloud computing platform and physical server resources pool was integrated to achieve the mixed cloud model. …”
    Get full text
    Article
  10. 10

    HIPSCS:secure IP communication system based on HIP by Min ZHOU, Ming CHEN, Chang-you XING, Pei-cheng JIANG

    Published 2012-11-01
    “…To make the host identity protocol(HIP)into practical use,a secure communication system basd on HIP named HIPSCS was designed and implemented.HIPSCS achieved the real-name identification of communications hosts by binding the HI with user's certificates,thus made the source of packets trustworthy from network.IPsec was used to encrypt communication data,so that the goal of secure IP communication was accomplished.The HIPSCS prototype was implemented in the laboratory environment,and experimental results show that HIPSCS has good usability and can support mobile communication well.…”
    Get full text
    Article
  11. 11

    Fault-injection attack on countermeasure algorithms of RSA-CRT cryptosystem by Fanyu KONG, Yong QIAO, Pengtao LIU, Xiaodong LIU, Dashui ZHOU

    Published 2019-02-01
    “…As a widely-applied public-key cryptosystem in TLS,SSL and IPSec protocols,the security of RSA cryptosystem is of great importance.At FDTC 2014,Rauzy and Guilley proposed several improved countermeasure algorithms of RSA implementation based on Chinese remainder theorem,which were used to defeat fault-injection attacks.New fault-injection attacks on two of their countermeasure algorithms are proposed.During the RSA computation process,a permanent fault is injected and then a faulty RSA signature result is induced.The RSA private key can be obtained by using the faulty RSA signature and the correct result.Therefore,Rauzy and Guilley’s two countermeasure algorithms cannot resist our fault-injection attack.…”
    Get full text
    Article
  12. 12

    IKEChecker: grammar-guided stateful fuzzer for IKE protocol implementions by ZHENG Yonghui, ZHAO Dongliang, GU Chunxiang, ZHANG Xieli

    Published 2024-08-01
    “…The internet key exchange (IKE) protocol, integral to the authentication and key negotiation process within the Internet Protocol Security (IPSec) framework, has been utilized for the protection of IP communications. …”
    Get full text
    Article
  13. 13

    STUDY OF COMPATIBILITY OF METHODS AND TECHNOLOGIES OF HIGH-LEVEL PROTOCOLS AND ERROR-CORRECTING CODES by Vladyslav Sharov, Olena Nikulina

    Published 2024-12-01
    “…Enhanced encryption protocols such as IPsec and OpenVPN became widespread, supported by innovations in cryptography. …”
    Get full text
    Article