메뉴 건너뛰기




Volumn 55, Issue 8, 2011, Pages 1684-1699

A survey on automatic configuration of virtual private networks

Author keywords

Automation; Configuration; Management; Virtual private networks

Indexed keywords

AUTO-CONFIGURATION; AUTOMATIC CONFIGURATION; CONFIGURATION; DENIAL OF SERVICE; DYNAMIC BEHAVIORS; FUTURE DIRECTIONS; PUBLIC NETWORKS; SECURE DATA; VIRTUAL PRIVATE NETWORKS;

EID: 79955762557     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2011.01.003     Document Type: Article
Times cited : (27)

References (80)
  • 3
    • 79955747841 scopus 로고    scopus 로고
    • BWI Informationstechnik GmbH, 2.400 Bundeswehr-Mitarbeiter kommen jetzt zur BWI, Statement to the Press, German
    • J. Reinhardt, BWI Informationstechnik GmbH, 2.400 Bundeswehr-Mitarbeiter kommen jetzt zur BWI, Statement to the Press, German. , 2007.
    • Reinhardt, J.1
  • 7
    • 79955775413 scopus 로고    scopus 로고
    • VPN (The Easy Way) V24+
    • VPN (The Easy Way) V24+. , 2009.
    • (2009)
  • 11
    • 79955767751 scopus 로고    scopus 로고
    • Paranoid penguin: Rehabilitating clear-text network applications with stunnel
    • M. Bauer, Paranoid penguin: rehabilitating clear-text network applications with stunnel, Linux Journal, 2004.
    • (2004) Linux Journal
    • Bauer, M.1
  • 23
  • 26
    • 34547969527 scopus 로고    scopus 로고
    • The new front line: Estonia under Cyberassault
    • M. Lesk The new front line: estonia under Cyberassault IEEE Security and Privacy 5 4 2007 76 79
    • (2007) IEEE Security and Privacy , vol.5 , Issue.4 , pp. 76-79
    • Lesk, M.1
  • 27
    • 0034315111 scopus 로고    scopus 로고
    • Key exchange in IPSec: analysis of IKE
    • DOI 10.1109/4236.895016
    • R. Perlman, and C. Kaufman Key exchange in IPSec: analysis of IKE IEEE Internet Computing 4 6 2000 50 56 (Pubitemid 32085790)
    • (2000) IEEE Internet Computing , vol.4 , Issue.6 , pp. 50-56
    • Perlman, R.1    Kaufman, C.2
  • 28
    • 84949938425 scopus 로고    scopus 로고
    • DOS-Resistant Authentication with Client Puzzles
    • Security Protocols
    • T. Aura, P. Nikander, and J. Leiwo DOS-resistant authentication with client puzzles Security Protocols 2001 Springer Berlin/Heidelberg 170 177 (Pubitemid 33347515)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2133 , pp. 170-177
    • Aura, T.1    Nikander, P.2    Leiwo, J.3
  • 30
    • 79955747449 scopus 로고    scopus 로고
    • Network Security Technologies and Solutions
    • first ed. Cisco Press
    • Y. Bhaiji Network Security Technologies and Solutions first ed. Part III: Data Privacy 2008 Cisco Press
    • (2008) Part III: Data Privacy
    • Bhaiji, Y.1
  • 41
    • 79955777463 scopus 로고    scopus 로고
    • 2 Security: An Overview
    • 2 Security: An Overview. , 2009.
    • (2009)
  • 47
    • 51549095567 scopus 로고    scopus 로고
    • Catching up with Kaminsky
    • D. Kaminsky Catching up with Kaminsky Network Security 2008 9 2008 4 7
    • (2008) Network Security , vol.2008 , Issue.9 , pp. 4-7
    • Kaminsky, D.1
  • 48
    • 4243100597 scopus 로고    scopus 로고
    • Is hierarchical public-key certification the next target for hackers?
    • M. Burmester, and Y. Desmedt Is hierarchical public-key certification the next target for hackers? Communications of the ACM 47 8 2004 68 74
    • (2004) Communications of the ACM , vol.47 , Issue.8 , pp. 68-74
    • Burmester, M.1    Desmedt, Y.2
  • 49
    • 19744372039 scopus 로고    scopus 로고
    • Techniques for improving the security and manageability of IPsec policy
    • DOI 10.1007/s10207-004-0064-6
    • J. Trostle, and B. Gossman Techniques for improving the security and manageability of IPsec policy International Journal of Information Security 4 3 2005 209 226 (Pubitemid 40743366)
    • (2005) International Journal of Information Security , vol.4 , Issue.3 , pp. 209-226
    • Trostle, J.1    Gossman, B.2
  • 55
    • 49949094800 scopus 로고    scopus 로고
    • N2N: A layer two peer-to-peer VPN
    • Springer Berlin/Heidelberg
    • L. Deri, and R. Andrews N2N: a layer two peer-to-peer VPN Resilient Networks and Services 2008 Springer Berlin/Heidelberg 53 64
    • (2008) Resilient Networks and Services , pp. 53-64
    • Deri, L.1    Andrews, R.2
  • 62
    • 35248872561 scopus 로고    scopus 로고
    • Cryptographically generated addresses (CGA)
    • Springer Berlin/Heidelberg
    • T. Aura Cryptographically generated addresses (CGA) Information Security 2003 Springer Berlin/Heidelberg 29 43
    • (2003) Information Security , pp. 29-43
    • Aura, T.1
  • 63
    • 70350752058 scopus 로고    scopus 로고
    • Analysis and optimization of cryptographically generated addresses
    • Springer Berlin/Heidelberg
    • J.W. Bos, O. Özen, and J.-P. Hubaux Analysis and optimization of cryptographically generated addresses Information Security 2009 Springer Berlin/Heidelberg 17 32
    • (2009) Information Security , pp. 17-32
    • Bos, J.W.1    Özen, O.2    Hubaux, J.-P.3
  • 72
    • 26444467030 scopus 로고    scopus 로고
    • Cryptanalysis of two variants of PCBC mode when used for message integrity
    • Information Security and Privacy: 10th Australasian Conference, ACISP 2005. Proceedings
    • C.J. Mitchell Cryptanalysis of two variants of PCBC mode when used for message integrity Information Security and Privacy 2003 Springer Berlin/Heidelberg 560 571 (Pubitemid 41431811)
    • (2005) Lecture Notes in Computer Science , vol.3574 , pp. 560-571
    • Mitchell, C.J.1
  • 76
    • 67650327060 scopus 로고    scopus 로고
    • Decentralized bootstrapping of P2P systems: A practical view
    • J. Dinger, O.P. Waldhorst, Decentralized bootstrapping of P2P systems: a practical view, in: Proceedings of Networking 2009, 2009, pp. 703-715.
    • (2009) Proceedings of Networking 2009 , pp. 703-715
    • Dinger, J.1    Waldhorst, O.P.2
  • 77
    • 0035428324 scopus 로고    scopus 로고
    • Autoconfiguration, registration, and mobility management for pervasive computing
    • DOI 10.1109/98.944000
    • A. Misra, S. Das, A. Mcauley, and S.K. Das Autoconfiguration registration and mobility management for pervasive computing IEEE Personal Communications Systems Magazine 8 2001 24 31 (Pubitemid 33060764)
    • (2001) IEEE Personal Communications , vol.8 , Issue.4 , pp. 24-31
    • Misra, A.1    Das, S.2    McAuley, A.3    Das, S.K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.