نتایج جستجو برای: virtual private network

تعداد نتایج: 890394  

2017
Jonathan K. Yoder JONATHAN K. YODER

Public damage abatement and compensation programs may be used to alter private incentives for damage abatement and habitat provision. A model is developed that explains the economic logic behind prevalent characteristics of public wildlife damage programs. The model is supported with an examination of a broad cross-section of wildlife agency policy and law. The model can be used by wildlife man...

2004
Yoshihiro Hara Hiroyuki Ohsaki Makoto Imase Yoshitake Tajima Masahiro Maruyoshi Junichi Murayama

In our previous work, we have proposed a new VPN architecture for enabling user-based multiply associated VPNs [1]. Almost all existing VPN technologies assume that users never simultaneously access more than a single VPN. Thus, for realizing a new VPN service allowing users to simultaneously join multiple VPNs, several fundamental mechanisms, such as dynamically changing user’s VPN association...

2015
John J. Horton Leonard N. Stern Joseph M. Golden

Average public feedback scores given to sellers have increased strongly over time in an online marketplace. Changes in marketplace composition or improved seller performance cannot fully explain this trend. We propose that two factors inflated reputations: (1) it costs more to give bad feedback than good feedback when feedback is public because buyers fear retaliation and (2) this cost is incre...

2011
Kamil Koltys Krzysztof Pienkosz Eugeniusz Toczylowski

We consider the resource allocation problem related to Virtual Private Networks (VPNs). VPN provides connections between geographically dispersed endpoints over a shared network. To realize VPN service, sufficient amount of bandwidth of network resources must be reserved for any traffic demand specified by a customer. We assume that there are many customers that want to purchase VPN services, a...

Journal: :J. Information Security 2011
Tarek S. Sobh Yasser Aly

A Virtual Private Network (VPN) allows the provisioning of private network services for an organization over a public network such as the Internet. In other words a VPN can transform the characteristics of a public which may be non-secure network into those of a private secure network through using encrypted tunnels. This work customized a standard VPN to a newly one called EEVPN (Effective Ext...

Journal: :CoRR 2014
Saman Feghhi Douglas J. Leith

We introduce an attack against encrypted web traffic that makes use only of packet timing information on the uplink. This attack is therefore impervious to existing packet padding defences. In addition, unlike existing approaches this timing-only attack does not require knowledge of the start/end of web fetches and so is effective against traffic streams. We demonstrate the effectiveness of the...

Journal: :JNW 2012
Jun Zheng Jiantao Gu Jiansheng Gao

With the continuous deepening of China's educational reform, “multi-campus” school system has become a common phenomenon in China colleges. It is a burning question that how to improve the efficiency of the financial management. Not only is VPN (Virtual Private Network) technology provide effective solutions for “isolated island” of financial information among campus but also VPN is a safe, rel...

Journal: :Computer and Information Science 2009
Farok Azmat Md Ikhwan Hamdan Jusoff Hj. Kamaruzaman

Virtual Private Network (VPN) can be implemented by corporate and public user in a few methods. The methods included proprietary or open source solutions. It has shown great potential due to its encrypted traffic flow which gives it a secure environment. With a good reception of internet in Malaysia it is unfortunate that the major Internet Service Providers (ISPs) have imposed packet filtering...

2005
Ahmed Obied

Broadcast encryption is an interesting application of cryptography which allows one to broadcast a secret to a changing group of intended recipients in such a way that no one outside this group can view the secret. Interest in using broadcast encryption techniques has grown considerably in recent years and such techniques have been integrated in many applications and technologies such as virtua...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید