The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for IPSec with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1996-2000 (28) 2001 (21) 2002 (28) 2003 (46) 2004 (50) 2005 (84) 2006 (53) 2007 (47) 2008 (39) 2009 (34) 2010 (26) 2011 (17) 2012-2013 (22) 2014-2015 (20) 2016-2017 (16) 2018-2019 (24) 2020-2021 (16) 2022-2023 (16)
Publication types (Num. hits)
article(154) incollection(8) inproceedings(424) phdthesis(1)
Venues (Conferences, Journals, ...)
RFC(54) LCN(10) SAINT Workshops(9) Security Protocols Workshop(9) ESORICS(8) ISCC(8) AINA(7) SECRYPT(7) CCS(6) NDSS(6) ARES(5) CoRR(5) IACR Cryptol. ePrint Arch.(5) ICC(5) IEEE Access(5) NETWORKING(5) More (+10 of total 334)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 447 occurrences of 240 keywords

Results
Found 587 publication records. Showing 587 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
36María-Dolores Cano, Juan A. Romero, Fernando Cerdán Experimental Tests on SCTP over IPSec. Search on Bibsonomy NPC Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IPSec, SCTP, multihoming, security association, IKE
35Roja Kiran Basukala, Kyu Jin Park, Dong-You Choi, Seung Jo Han Secure Mobile IP Communication in Residential Networks. Search on Bibsonomy AINA Workshops The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Residential Network, Integration of Mobile IP and IPSec, Mobile IP, IPSec, Residential Gateway
33Steffen Schulz 0001, Ahmad-Reza Sadeghi Secure VPNs for Trusted Computing Environments. Search on Bibsonomy TRUST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
33Paul Fleischer, Lars Michael Kristensen Formal Specification and Validation of Secure Connection Establishment in a Generic Access Network Scenario. Search on Bibsonomy Petri Nets The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Haixin Wang, Guoqiang Bai 0001, Hongyi Chen Zodiac: System architecture implementation for a high-performance Network Security Processor. Search on Bibsonomy ASAP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Bo Mao, Dan Feng 0001, Suzhen Wu, Jianxi Chen, Lingfang Zeng Performance-Directed iSCSI Security with Parallel Encryption. Search on Bibsonomy AINA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Haesun Byun, Meejeong Lee Network Architecture and Protocols for BGP/MPLS Based Mobile VPN. Search on Bibsonomy ICOIN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Yu-Ching Hsu, Pai-Feng Tsai A Practical Mechanism for Vertical Handoff in WLAN/3G Integrated Networks. Search on Bibsonomy VTC Spring The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Henric Johnson, B. Qaisrani, Markus Fiedler, Arne A. Nilsson, Shyhtsun Felix Wu Hierarchical Defense Structure for Mitigating DoS Attacks. Search on Bibsonomy ICN/ICONS/MCL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Joel Sing, Ben Soh A Critical Analysis of Multilayer IP Security Protocol. Search on Bibsonomy ICITA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Hyungmo Kang, Youngsong Mun Authentication in Fast Handover of Mobile IPv6 Applying AAA by Using Hash Value. Search on Bibsonomy MSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Yoon-Jung Rhee Secure Initialization Vector Transmission on IP Security. Search on Bibsonomy ICN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Yi-Neng Lin, Chiuan-Hung Lin, Ying-Dar Lin, Yuan-Cheng Lai VPN Gateways over Network Processors: Implementation and Evaluation. Search on Bibsonomy IEEE Real-Time and Embedded Technology and Applications Symposium The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Weiping Liu, Wandong Cai Study on Security iSCSI Based on SSH. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Athanasios Kakarountas, Haralambos Michail, Athanasios Milidonis, Costas E. Goutis, George Theodoridis High-Speed FPGA Implementation of Secure Hash Algorithm for IPSec and VPN Applications. Search on Bibsonomy J. Supercomput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF high-speed performance, Security, FPGA, hash function, hardware implementation
29Nicola Bonelli, Stefano Giordano, Stefano Lucetti, Giuseppe Risi, Andrea Tomasi Automatic IPSec Security Association Negotiation in Mobile-Oriented IPv6 Networks. Search on Bibsonomy SAINT Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Chi-Lan Chang, Yun-Peng Chiu, Chin-Laung Lei Automatic Generation of Conflict-Free IPsec Policies. Search on Bibsonomy FORTE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Hanno Scharwächter, David Kammler, Andreas Wieferink, Manuel Hohenauer, Kingshuk Karuri, Jianjiang Ceng, Rainer Leupers, Gerd Ascheid, Heinrich Meyr ASIP Architecture Exploration for Efficient Ipsec Encryption: A Case Study. Search on Bibsonomy SCOPES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Serge Vaudenay Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS .... Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
29Pawel Chodowiec, Kris Gaj, Peter Bellows, Brian Schott Experimental Testing of the Gigabit IPSec-Compliant Implementations of Rijndael and Triple DES Using SLAAC-1V FPGA Accelerator Board. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
29Radia J. Perlman, Charlie Kaufman Key Exchange in IPSec: Analysis of IKE. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
29Shyhtsun Felix Wu Sleepy Network-Layer Authentication Service for IPSEC. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
28Jose Oscar Fajardo, Jon Ander Picó, Alejandro Muñoz New Tunneling Capabilities for BGP/MPLS IP VPN in GNU/Linux. Search on Bibsonomy ICN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF BGP/MPLS IP VPN, GNU/Linux, GRE and IPsec, tunneling capabilities
28José Carlos Brustoloni Laboratory experiments for network security instruction. Search on Bibsonomy ACM J. Educ. Resour. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF certifying authority, security, education, experiment, fingerprinting, Certificate, password, firewall, IPsec, VPN, SSL, dictionary attack, course, eavesdropping, SSH, port scanning, man-in-the-middle
28Norka B. Lucena, Grzegorz Lewandowski, Steve J. Chapin Covert Channels in IPv6. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2005 DBLP  DOI  BibTeX  RDF active warden, IPv6, IPsec, covert channel, stateful, stateless
28Charlie Kaufman, Radia J. Perlman, Bill Sommerfeld DoS protection for UDP-based protocols. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF buffer exhaustion, network security, DoS, denial of service, fragmentation, IPsec, protocol design, IKE
28Chip Elliott, David Pearson, Gregory D. Troxel Quantum cryptography in practice. Search on Bibsonomy SIGCOMM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF secure networks, cryptographic protocols, error correction, IPsec, quantum cryptography, key agreement protocols, privacy amplification, quantum key distribution
28Lina Alchaal, Vincent Roca, Ayman El-Sayed, Michel Habert A VPRN Solution for Fully Secure and Efficient Group Communications. Search on Bibsonomy ISCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF VPRN, Security, Multicast, Group Communications, IPSec, VPN
28MyungSik Choi, Dong Jin Kwak, Sang-Jae Moon A Proposal for DoS-Defensive Internet Key Exchange. Search on Bibsonomy ICCSA (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Internet Key Exchange, Authentication and Key Agreement, Denial of Service, IPsec
28Austin Godber, Partha Dasgupta Secure wireless gateway. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2002 DBLP  DOI  BibTeX  RDF wireless LAN, IPSec, 802.11b
28Jörg Schwenk, Tobias Martin, Erik Neumann From pay-tv to pay-streaming: similarities and differences. Search on Bibsonomy MM&Sec The full citation details ... 2001 DBLP  DOI  BibTeX  RDF re-keying, streaming, encryption, key management, IPsec, mpeg-2, IP multicast, pay-tv, DVB
28Manuel Günter, Torsten Braun, Ibrahim Khalil An Architecture for Managing QoS-Enabled VPNs over the Internet. Search on Bibsonomy LCN The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Quality-of-Service, Internet, Differentiated Services, IPSec, Service Management, Virtual Private Networks, Bandwidth Broker
22Jaroslaw Paduch, Jamie Levy, Bilal Khan Using a secure permutational covert channel to detect local and wide area interposition attacks. Search on Bibsonomy IWCMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ARP, interposition, protocols, covert channels, DNS
22Aref Meddeb, Enis Elgueder, Issam Harrathi, Habib Youssef Benefits of a pure layer 2 security approach in Metro Ethernet. Search on Bibsonomy ISCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Ronald Marx, Tobias Wahl, Kpatcha M. Bayarou Security Concept for Distributed Service Execution Environments. Search on Bibsonomy WCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Gal Badishi, Amir Herzberg, Idit Keidar, Oleg Romanov, Avital Yachin An Empirical Study of Denial of Service Mitigation Techniques. Search on Bibsonomy SRDS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Ming-Yang Su, Jia-Feng Chang An Efficient and Secured Internet Key Exchange Protocol Design. Search on Bibsonomy CNSR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Shervin Erfani Tutorial 4: Wireless and Wireline Security Management. Search on Bibsonomy ISCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Lee Toderick, Philip J. Lunsford II Using VPN technology to remove physical barriers in linux lab experiments. Search on Bibsonomy SIGITE Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF distance education computer labs, openSwan VPN, secure remote labs, linux operating system
22Naoyuki Fujita, Hirofumi Ohkawa Bandwidth challenge - Secure file sharing. Search on Bibsonomy SC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Hirofumi Akashi, Hajime Tokura, Hirofumi Ohnishi, Kenji Nishikage, Tokuzo Yamaguchi, Kazuyoku Saijo, Takahiko Shinmi, Masahiro Nakamura, Masashi Nakayama, Haruyuki Tatsumi Establishment and Assessment of Wide Area Medical Information Network System in Hokkaido. Search on Bibsonomy Human.Society@Internet The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Youngsong Mun, Sehoon Jang A Study on the Performance Improvement to AAA Authentication in Mobile IPv4 Using Low Latency Handoff. Search on Bibsonomy ICCSA (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Fan Hong, Liang Hong, Cai Fu Secure OLSR. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Reen-Cheng Wang, R. I. Chen, Han-Chieh Chao AAA architecture for mobile IPv6 based on WLAN. Search on Bibsonomy Int. J. Netw. Manag. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF TCP/IP
22Claude Castelluccia, Gabriel Montenegro, Julien Laganier, Christoph Neumann 0001 Hindering Eavesdropping via IPv6 Opportunistic Encryption. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Shoichi Sakane, Nobuo Okabe, Kenichi Kamada, Hiroshi Esaki Applying Kerberos to the Communication Environment for Information Appliances. Search on Bibsonomy SAINT Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Shuang-Yi Tang, Ying-Ping Lu, David Hung-Chang Du Performance Study of Software-Based iSCSI Security. Search on Bibsonomy IEEE Security in Storage Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22José Carlos Brustoloni, Juan A. Garay Application-Independent End-to-End Security in Shared-Link Access Networks. Search on Bibsonomy NETWORKING The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
18José Antonio Parra Espín, Rafael Marín López, Gabriel López Millán, Fernando Pereñíguez-Garcia, Óscar Cánovas SDN-based automated rekey of IPsec security associations: Design and practical validations. Search on Bibsonomy Comput. Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Frederik Hauser, Marco Häberle, Michael Menth P4sec: Automated Deployment of 802.1X, IPsec, and MACsec Network Protection in P4-Based SDN. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Sy-Nam Tran, Van-Thuc Hoang, Duy-Hieu Bui A Hardware Architecture of NIST Lightweight Cryptography Applied in IPSec to Secure High-Throughput Low-Latency IoT Networks. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Gabriel López Millán, Rafael Marín López, Fernando Pereñíguez-Garcia, Óscar Cánovas, José Antonio Parra Espín Analysis and practical validation of a standard SDN-based framework for IPsec management. Search on Bibsonomy Comput. Stand. Interfaces The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Paul Wouters, Sahana Prasad Labeled IPsec Traffic Selector Support for the Internet Key Exchange Protocol Version 2 (IKEv2). Search on Bibsonomy RFC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Vinay Gugueoth LPMLP-Based Framework for Secure IPsec VPN Cloud Gateway with Advanced Network Monitoring and Issue Resolution. Search on Bibsonomy CloudNet The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Stefan-Lukas Gazdag, Sophia Grundner-Culemann, Tobias Heider, Daniel Herzinger, Felix Schärtl, Joo Yeon Cho, Tobias Guggemos, Daniel Loebenberger Quantum-Resistant MACsec and IPsec for Virtual Private Networks. Search on Bibsonomy SSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Qi Song, Jia Liu, Caipu Zhang, Zhen Wang, Pengcheng Ma Research on High Performance IPSec VPN Technology Based on National Cryptographic Algorithms. Search on Bibsonomy CECCT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Amaldeep S, Sriram Sankaran Cross Protocol Attack on IPSec-based VPN. Search on Bibsonomy ISDFS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Qianran Wang, Jinhua Wang, Chengbin Huang The Optimization of IPSec VPN in 5G Mobile Communication Network. Search on Bibsonomy CNCIT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Tran Sy Nam, Van-Thuc Hoang, Nguyen Van Long A High-Throughput Hardware Implementation of NAT Traversal For IPSEC VPN. Search on Bibsonomy Int. J. Commun. Networks Inf. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Tommy Pauly, Valery Smyslov TCP Encapsulation of Internet Key Exchange Protocol (IKE) and IPsec Packets. Search on Bibsonomy RFC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Laura Corcoran, Michael Jenkins Commercial National Security Algorithm (CNSA) Suite Cryptography for Internet Protocol Security (IPsec). Search on Bibsonomy RFC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Lam The Nguyen, Huy Duc Nguyen, Linh Duc Nguyen, Nam Huu Tien Chu, Vuong Van Ngo High Availability Solution for IPsec in IP Multimedia Subsystem. Search on Bibsonomy ICTC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Seungyeon Bae, Yousung Chang, Hyeongjin Park, Minseo Kim, Youngjoo Shin A Performance Evaluation of IPsec with Post-Quantum Cryptography. Search on Bibsonomy ICISC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Kinan Ghanem, Stephen Ugwuanyi, Jidapa Hansawangkit, Ross McPherson, Rabia Khan, James Irvine 0001 Security vs Bandwidth: Performance Analysis Between IPsec and OpenVPN in Smart Grid. Search on Bibsonomy ISNCC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Emir Dervisevic, Miralem Mehic Overview of Quantum Key Distribution Technique within IPsec Architecture. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
18Rafael Marín López, Gabriel López Millán, Fernando Pereñíguez-Garcia A YANG Data Model for IPsec Flow Protection Based on Software-Defined Networking (SDN). Search on Bibsonomy RFC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
18Jiaxing Guo, Chunxiang Gu, Xi Chen 0045, Siqi Lu, Fushan Wei Automated State-Machine-Based Analysis of Hostname Verification in IPsec Implementations. Search on Bibsonomy Inf. Technol. Control. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
18Daniel Herzinger, Stefan-Lukas Gazdag, Daniel Loebenberger Real-World Quantum-Resistant IPsec. Search on Bibsonomy SIN The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
18Abdullah Soliman Alshra'a, Jochen Seitz 0001 Towards Applying IPSec between Edge Switches and End Users to Counter DDoS Attacks in SDNs. Search on Bibsonomy HPCC/DSS/SmartCity/DependSys The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
18Emir Dervisevic, Miralem Mehic Overview of Quantum Key Distribution Technique within IPsec Architecture. Search on Bibsonomy ISCRAM The full citation details ... 2021 DBLP  BibTeX  RDF
18Bharat S. Rawal, Sai Tarun Gollapudi No-Sum IPsec Lite: Simplified and lightweight Internet security protocol for IoT devices. Search on Bibsonomy CSCloud/EdgeCom The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
18Ximin Yang, Deqiang Wang, Wan Tang, Wei Feng, Cuitao Zhu IPsec Cryptographic Algorithm Invocation Considering Performance and Security for SDN Southbound Interface Communication. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
18Sami Ullah, Joontae Choi, Heekuck Oh IPsec for high speed network links: Performance analysis and enhancements. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
18Michael Pfeiffer 0006, Franz Girlich, Michael Rossberg, Guenter Schaefer Vector packet encapsulation: the case for a scalable IPsec encryption protocol. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
18Jie Luo, Qingbing Ji Password Acquisition and Traffic Decryption Based on L2TP/IPSec. Search on Bibsonomy ICCT The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
18Yong Zhu, Dapeng Zhou Security Technology of Wireless Sensor Network Based on IPSEC. Search on Bibsonomy CSIA (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
18Won Seok Choi, Jang-Hyeon Jeong, Seong Gon Choi Implementation of Software IPsec Communication using ARIA Cipher Algorithm in SDN. Search on Bibsonomy ICTC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
18Jiaqi Li, Min Zhou Research on VPN in Experimental Simulation Environment Based on GRE and IPSec. Search on Bibsonomy ICRAI The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
18Carlos Figuera, Eduardo Morgado, Esteban Municio, Javier Simó-Reigadas A low complexity mechanism for congestion notification in rural IPSec-enabled heterogeneous backhaul networks. Search on Bibsonomy Int. J. Commun. Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
18Prabhu K. Thiruvasagam, K. Jijo George, Sivabalan Arumugam, Anand R. Prasad IPSec: Performance Analysis in IPv4 and IPv6. Search on Bibsonomy J. ICT Stand. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
18Håkon Gunleifsen, Thomas Kemmerich, Vasileios Gkioulos Dynamic setup of IPsec VPNs in service function chaining. Search on Bibsonomy Comput. Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
18Jiaxing Guo, Chunxiang Gu, Xi Chen 0045, Fushan Wei Model Learning and Model Checking of IPSec Implementations for Internet of Things. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
18Markku Vajaranta, Arto Oinonen, Timo D. Hämäläinen, Vili Viitamäki, Jouni Markunmäki, Ari Kulmala Feasibility of FPGA accelerated IPsec on cloud. Search on Bibsonomy Microprocess. Microsystems The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
18Gabriel López Millán, Rafael Marín López, Fernando Pereñíguez-Garcia Towards a standard SDN-based IPsec management framework. Search on Bibsonomy Comput. Stand. Interfaces The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
18Lamia Ben Azzouz, Imen Aouini A lightweight IPsec-based energy home area networks. Search on Bibsonomy Trans. Emerg. Telecommun. Technol. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
18Kiki Rizki, Argyro Lamproudi, Marco Tiloca, Shahid Raza Group-IKEv2 for multicast IPsec in the internet of things. Search on Bibsonomy Int. J. Secur. Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
18Ida Nurhaida, Ngadiyono Quality of Service for Traffic Monitoring System based on Static Routing using EoIP Tunnel over IPSec. Search on Bibsonomy APIT The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
18Muzaffar Rao, Thomas Newe, Edin Omerdic, Gerard Dooly, Elfed Lewis, Daniel Toal An efficient implementation of FPGA based high speed IPSec (AH/ESP) core. Search on Bibsonomy Int. J. Internet Protoc. Technol. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Abdullah Abdulrahman Al-khatib, Rosilah Hassan Impact of IPSec Protocol on the Performance of Network Real-Time Applications: A Review. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2018 DBLP  BibTeX  RDF
18Ximin Yang, Deqiang Wang, Wei Feng, Jingjing Wu, Wan Tang Cryptographic Algorithm Invocation Based on Software-Defined Everything in IPsec. Search on Bibsonomy Wirel. Commun. Mob. Comput. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Huqing Wang, Zhixin Sun Compression Method for IPSec over 6LoWPAN. Search on Bibsonomy KSII Trans. Internet Inf. Syst. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Bernardo C. V. Camilo, Rodrigo S. Couto 0001, Luís Henrique M. K. Costa Assessing the impacts of IPsec cryptographic algorithms on a virtual network embedding problem. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Stefan Marksteiner, Benjamin Rainer, Oliver Maurhart On the Resilience of a QKD Key Synchronization Protocol for IPsec. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
18Santiago Aragon, Marco Tiloca, Max Maass, Matthias Hollick, Shahid Raza ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
18Guanqun Wang, Yunxiao Sun, Qinggang He, Guodong Xin, Bailing Wang A Content Auditing Method of IPsec VPN. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Amirisetti Sushma, Teerapat Sanguankotchakorn Implementation of IPsec VPN with SIP Softphones using GNS3. Search on Bibsonomy ICNCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Santiago Aragon, Marco Tiloca, Max Maass, Matthias Hollick, Shahid Raza ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control. Search on Bibsonomy CNS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Markku Vajaranta, Vili Viitamäki, Arto Oinonen, Timo D. Hämäläinen, Ari Kulmala, Jouni Markunmäki Feasibility of FPGA Accelerated IPsec on Cloud. Search on Bibsonomy DSD The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Dennis Felsch, Martin Grothe, Jörg Schwenk, Adam Czubak, Marcin Szymanek The Dangers of Key Reuse: Practical Attacks on IPsec IKE. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
18Deqiang Wang, Wan Tang, Ximin Yang, Wei Feng Cryptographic Algorithm Invocation in IPsec: Guaranteeing the Communication Security in the Southbound Interface of SDN Networks. Search on Bibsonomy ChinaCom The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 587 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license