The realization of a cryptographically secured Virtual Private Network (VPN) layer was the topic of this thesis. Although the implementation was done for UNIX hosts, interoperability with other platforms was required. The prototype had to provide transparency for users and applications and state-of-the art cryptographic security. It was integrated into the CIPRESS system developed at the Fraunhofer Institute for Computer Graphics. First an analysis of possible solutions for the cryptographic processing as well as for the network integration was carried out. Among other possible solutions, e. g. the design of a custom cryptographic protocol, the use of the well tested Secure Socket Layer (SSL) protocol was figured out to be the best choice. ...
This dissertation describes the development of a new system whereby the Public Switch Telephone Netw...
SYSTeam is an IT solutions supplier company that wants to develop a product which permits users to c...
Security of computer systems is becoming more important, because more users in more ways use more in...
The thesis deal with the problems of virtual private network (VPN). The first part of the thesis is ...
In this paper we describe the architecture and performance characteristics of a transparent, secure ...
An enhancement to TCP (Transmission Control Protocol) is proposed to give additional security betwee...
AbstractThe world of Internet as such is open and insecure by nature. Companies and organizations ex...
Abstract-- The use of security increased consistently day by day. Huge amount of network requires la...
Recent work in the area of network security, such as IPsec, provides mechanisms for securing the tra...
This paper describes methods for implementing Virtual Private Networks (VPN) with IP Security (IPSec...
This paper discusses the security-set used in communication networks. It contains a brief overview o...
Since the development of telecommunication systems the secure transmission of sensible information h...
Bohacek, Stephan K.This project focuses on utilizing Virtual Extensible Local Area Network (VXLAN), ...
In order to electronically exchange information between network users in the web of data, different ...
OF THE MASTER'S THESIS Author and name of the thesis: Timo Aalto: A UNIX STREAMS Implementation...
This dissertation describes the development of a new system whereby the Public Switch Telephone Netw...
SYSTeam is an IT solutions supplier company that wants to develop a product which permits users to c...
Security of computer systems is becoming more important, because more users in more ways use more in...
The thesis deal with the problems of virtual private network (VPN). The first part of the thesis is ...
In this paper we describe the architecture and performance characteristics of a transparent, secure ...
An enhancement to TCP (Transmission Control Protocol) is proposed to give additional security betwee...
AbstractThe world of Internet as such is open and insecure by nature. Companies and organizations ex...
Abstract-- The use of security increased consistently day by day. Huge amount of network requires la...
Recent work in the area of network security, such as IPsec, provides mechanisms for securing the tra...
This paper describes methods for implementing Virtual Private Networks (VPN) with IP Security (IPSec...
This paper discusses the security-set used in communication networks. It contains a brief overview o...
Since the development of telecommunication systems the secure transmission of sensible information h...
Bohacek, Stephan K.This project focuses on utilizing Virtual Extensible Local Area Network (VXLAN), ...
In order to electronically exchange information between network users in the web of data, different ...
OF THE MASTER'S THESIS Author and name of the thesis: Timo Aalto: A UNIX STREAMS Implementation...
This dissertation describes the development of a new system whereby the Public Switch Telephone Netw...
SYSTeam is an IT solutions supplier company that wants to develop a product which permits users to c...
Security of computer systems is becoming more important, because more users in more ways use more in...