نتایج جستجو برای: labview و vpn

تعداد نتایج: 763406  

2012
Christos Xenakis Lazaros Merakos

The Mobile Internet requires enhanced security services available to all mobile subscribers in a dynamic fashion. A network-wide Virtual Private Network (VPN) deployment scenario over the General Packet Radio Service (GPRS) is proposed and analyzed from a security viewpoint. The proposed security scheme improves the level of protection that is currently supported in GPRS and facilitates the rea...

2011
Fouzi Harrag Abdulmalik Salman Al-Salman

صلاخلا ـ ة : ُّ دعتُ ل ثم ةيعيبطلا تاغللا ةجلاعم تاقيبطت نم ديدعلل ايساسأ انوكم ةيعوضوملا ةئزجتلا قيبطت تامولعملا عاجرتساو صوصنلا صيخلت . نم فدهلا وه ثحبلا اذ ه قت و مي ةيعوضوملا ة ئزجتلا تا يمزراوخ ة يلاعف ضوملا دودحلا ى لع فرعتلا يف ة يبرعلا صوصنلا لخاد ةيعو . م تو قايس لا اذ ه يف ة فلتخم رداصم نم ةيبرع صوصن ةسمخ لخاد اهنوظحلاي يتلا ةركفلا وأ عوضوملا تاريغت ىلع فرعتلل ةيبرعلا ةغللا ءارق نم ة...

2000
Seung-Jin Baek Moon-Sang Jeong Jong-Tae Park Tai-Myung Chung

Using IP-based Virtual Private Network (IP-VPN) technology, a company can establish its virtual private network over public networks. Recently, IP-VPN emerges as one of main technologies for increasing business competitiveness with reasonable costs. The standards for IP-VPN are currently being developed by Internet Engineering Task Forces (IETF) and others. In this paper, we identify the limita...

2009
Boulbaba Thabti Habib Youssef

A Virtual Private Network (VPN) is an overlay network defined over a public network infrastructure like the Internet. A VPN provides customers with a secure, low cost, and more flexible communication environment than leased lines. The allocation of bandwidth for VPNs to meet the requirements specified by customers is an important traffic engineering research issue. A VPN workload model called h...

2014
Mushtaq Ahmed Abdul Basit

With increasing popularity and ever emerging business needs there was an immense focus to improve the Internet world and to provide guarantee for service delivery. Simplest example for this case is VoIP where two subscribers make a voice call through MPLS based backbone. The end subscribers should have similar quality as that of POTS. Subscribers will expect a real time conversation with limite...

2012
Ki Hyun Kim Jang - Hee Yoo Kyo Il Chung

This paper proposes a VPN Accelerator Board (VPN-AB), a virtual private network (VPN) protocol designed for trust channel security system (TCSS). TCSS supports safety communication channel between security nodes in internet. It furnishes authentication, confidentiality, integrity, and access control to security node to transmit data packets with IPsec protocol. TCSS consists of internet key exc...

2012
Marsh Ray Jacob Appelbaum Karl Koscher Ian Finder

User-accessed Virtual Private Network systems allow authorized users remote access to protected or otherwise privileged networks while avoiding dependence on ISPs along the route for data confidentiality and integrity. This direct expression of the internet’s end-to-end principle of security is generally accepted as a highly successful design. VPN services and technology advertising censorship ...

Journal: :EAI Endorsed Trans. Collaborative Computing 2014
Pierre St. Juste Kyuho Jeong Heungsik Eom Corey Baker Renato J. O. Figueiredo

Virtual private networking (VPN) has become an increasingly important component of a collaboration environment because it ensures private, authenticated communication among participants, using existing collaboration tools, where users are distributed across multiple institutions and can be mobile. The majority of current VPN solutions are based on a centralized VPN model, where all IP traffic i...

2009
Mark Reitblatt

The purpose of this thesis is to present a prototype system for the verification of LabVIEW programs using ACL2. LabVIEW is a graphical data-flow programming language commonly used in data acquisition and control application. ACL2 is a programming language, formal logic and theorem prover that has seen broad use in the verification of industrial hardware and software systems. I will present an ...

برهان جلائیان حسین مهربان جهرمی عباس مهربان جهرمی محسن مصلی نژاد,

 در سالهای اخیر، رشد سریع شبکه‌های ارتباطی و فناوری مخابراتی فرصتهای مهم و چالشهای زیادی در خصوص ارتباط بی درنگ ، مانیتوررینگ و کنترل سیستم ‌ها از راه دور ایجاد کرده است. در این مقاله بعد از بررسی سایر تحقیقات پیشین در این زمینه، به معرفی و توسعه کنترل و مانیتورینگ تحت شبکه های کامپیوتری در خصوص امنیت، نظارت و حفاظت مراکز حساس تجاری، نظامی و ... از راه دور پرداخته و در ادامه گامهای طراحی این سی...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید