[PDF][PDF] Study on virtual private network (VPN), VPN's protocols and security

KK Jyothi, BI Reddy - … Journal of Scientific Research in Computer …, 2018 - researchgate.net
When an access-desired network is constructed using public network infrastructure such as
global Internet to connect remote users or regional offices to company's private network is …

[PDF][PDF] Security investigation on remote access methods of virtual private network

PS Nyakomitta, SO Abeka - Global journal of computer science and …, 2020 - academia.edu
Remote access is one of the prevalent business trends in today's computing pervasive
business environments. The ease of access to internal private networks over the internet by …

A novel modified chaotic simplified advanced encryption system (MCS-AES): mixed reality for a secure surgical tele-presence

A Neupane, A Alsadoon, PWC Prasad, RS Ali… - Multimedia Tools and …, 2020 - Springer
Mixed Reality (MR) surgery has not been effectively implemented in telemedicine due to
strict requirements of security and delay minimization during real-time video transmission …

İletişim Teknolojilerinde Veri Güvenliği ve Uzaktan Erişim: VPN Kullanımı Üzerine Bir Vaka Çalışması

M Aydemir, V Fetah - Bilgi Yönetimi, 2023 - dergipark.org.tr
Yeni medya sisteminin önemli bir alanını oluşturan iletişim teknolojileri, yoğun enformasyon
akışının gerçekleştiği mecralardır. Son yıllarda veri yönetimi konusunda çeşitli uygulama …

Managing cybercrimes through the implementation of security measures

OK Enigbokan, N Ajayi - Journal of Information Warfare, 2017 - JSTOR
Today's global environment has seen tremendous growth in the number of online
transactions and Internet subscribers. This increase is creating a situation in which …

[PDF][PDF] Teargas, Water Cannons and Twitter: A case study on detecting protest repression events in Turkey 2013.

F Elsafoury - Text2story@ ecir, 2020 - efatmae.github.io
Since the Arab spring in 2011, protests have been spreading around the world for different
reasons, often these protests are faced with violent repression. Studying protest repression …

Security of Modern Networks and Its Challenges

A Garg, B Sharma, A Gupta, R Khan - Cyber Security Using …, 2023 - taylorfrancis.com
Modern network security has become essential and much more worrying nowadays due to
its privacy concerns. Modern networks are present everywhere. The world is basically …

Point to Point Protocol Tunneling VPN Simulation and Analysis on Sniffing

CA Putra, YV Via, WSJ Saputra - International Conference on …, 2018 - atlantis-press.com
Abstract PPTP (Point-to-Point Tunneling Protocol) is a network protocol used in the
implementation of Virtual Private Networks (VPN). PPTP uses a client-server design that …

Investigating the Mediating Role of Organization's Sustainability in The Relationship between Using Greening Technology Information Tools and Organization's …

M Ridha - Review of Applied Socio-Economic Research, 2020 - reaser.eu
This study aims at investigating, the mediating role of business organization sustainability in
the relationship and impact of the use of IT Tools on Organizational performance. A selective …

Securing Data Communication: An InDepth Exploration of IPsec Protocol Integration for Enhanced Data Security.

AJ Nair - Journal of Network & Information Security, 2024 - search.ebscohost.com
In today's interconnected digital landscape, safeguarding sensitive data has become
paramount. Recognizing this imperative, our study directs its focus towards enhancing data …