• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 44
  • 30
  • 17
  • 5
  • 5
  • 5
  • 5
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 125
  • 48
  • 29
  • 28
  • 23
  • 22
  • 21
  • 21
  • 20
  • 20
  • 19
  • 18
  • 15
  • 14
  • 13
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

3DES, AES i hårdvara - Förmåga att skala i en växande miljö

Andersson, Tommy, Torkelsson, Mattis, Wärlinge, Gustav January 2010 (has links)
<p>Den här rapporten beskriver arbetet och utförda studier inom området kryptering och VPN. Fokus ligger på hur väl krypteringsalgoritmerna Triple Data Encryption Standard (3DES) och Advanced Encryption Standard (AES) skalar i en förutbestämd miljö. Huvudfokus har varit att svara på frågan: Vilken av krypteringsalgoritmerna AES och 3DES kräver minst systemresurser? Under utbildningstiden har det flera gånger framförts att 3DES-algoritmen skulle vara mer krävande för krypteringsenheterna att utföra jämfört med AES. Denna rapport söker finna om det är så det förhåller sig och i så fall hur stor skillnaden är mellan algoritmerna. För att söka svar på frågorna genomfördes ett flertal experiment. Dessa syftade till att påvisa eller vederlägga ovan beskrivna påståenden kring 3DES och AES. Resultatet av utförda experiment blev att ingen större skillnad kunde noteras mellan 3DES och AES. Detta står i stark kontrast till de påståenden som ofta florerar kring krypteringsalgoritmerna 3DES och AES</p> / <p>This report describes the work and studies carried out in the field of encryption and VPN. The focus is on how well the encryption algorithms Triple Data Encryption Standard (3DES) and Advanced Encryption Standard (AES) perform in a predetermined environment. The main focus has been to answer the question: Which of the encryption algorithms AES and 3DES requires less system resources. During the period  of studies, lectures and literature have several times claimed the 3DES algorithm to require more resources of encryption devices, compared to AES. This report tries to find if it is a fact and if so how big is the difference between the algorithms. To seek  answers to the questions, a number of experiments was performed. These experiments were intended to demonstrate or refute the above claims about 3DES and AES. The results of the performed experiments shows no major differences between 3DES and AES. This differs from what have been publicly accepted concerning facts regarding encryption algorithms 3DES and AES.</p>
12

Implementación de una red privada virtual (VPN) bajo software libre para optimizar el manejo de información entre los locales de la Corporación Educativa Adeu, de la ciudad de Chiclayo

Amenero Vásquez, Virgilio January 2012 (has links)
Ésta investigación estuvo centrada en la optimización del acceso a la información entre los locales de la Corporación Educativa Adeu a través de la implementación de una VPN, la cual fue realizada en software libre. La investigación fue realizada en 3 etapas. Como parte de la primera etapa se realizó una entrevista al Jefe del Área de Sistemas, el cual manifestó que actualmente la información a la que accede el personal administrativo de los locales de dicha corporación no cuenta con un medio de comunicación directo para compartir sus datos, por el contrario, están divididos, por lo cual el manejo y el acceso a la información es tedioso, ya que se requiere de otros medios como dispositivos magnéticos y cuentas de correo públicas, que en la mayoría de los casos son canales de transferencia de información no seguros. En la segunda etapa, teniendo en cuenta las necesidades planteadas se propuso un bosquejo de la VPN, la cual posteriormente fue modificada y validada. Luego fue implementado en la herramienta de software denominada OpenVPN, realizándose las configuraciones apropiadas a los servidores y equipos necesarios para la realización de la implementación respectiva. Además se realizaron un conjunto de pruebas, a fin de que se asegure la conexión de la red y se descarten posibles vulnerabilidades de la red. Para el desarrollo de la VPN se hizo empleo de la “Metodología para la implementación de redes seguras”, desarrollada por la empresa argentina CYBSEC. Finalmente, la tercera etapa estuvo enfocada en la comparación de los resultados obtenidos en las etapas 1 y 2; y la demostración de las mejoras a la problemática de la corporación. Mediante la implementación de la VPN se logró proporcionar un canal que permite transferir los datos de manera óptima y eficaz; permitiendo así, la confidencialidad y seguridad en su transmisión, sin tener que incurrir en gastos excesivos en la contratación de canales privados. / Tesis
13

Study of Supporting Per Class Differentated Service on MPLS VPN

Wu, Jung-Chieh 10 August 2004 (has links)
Nowadays, MPLS VPN has become a widely used solution on the issue of QoS guarantees against unexpected changes of network environments. This thesis investigates the system performance of the BGP-based MPLS VPN, which supports per class differentiated services. The results are compared with those without VPN. In this study, the target network is simulated through the OPNET simulator. Through adjusting the network parameters and creating different scenarios, such as network congestion and disconnection, we make statistical analyses based on the simulation results. It is observed that in addition to increasing the labels contained in each packet, MPLS VPN require PE routers be capable of supporting more protocols, such as searching for IP tables, and transferring various tables for the use of routing. Therefore, introducing VPN may increase processing load and overhead for data transmission. On the other hand, MPLS VPN may take longer convergence time in establishing entire routing messages than Non-VPN. However, when network disconnection occurs, the former has better throughput than the latter due to the shorter convergence time in the search of new routes. Also, if the networks become congested, the transmission delay of EF traffic in MPLS VPN is smaller since the alternative LSP for it is pre-established. For the same disconnected LSP route, MPLS VPN network also achieves better throughput, because the guaranteed EF traffic can be rerouted via different LSP routes. According to our simulation results, the background traffic has the largest throughput decrease, while the EF Traffic has the least.
14

How IP VPN Affects Strategy for Company X

TSAI, TUN-CHI 16 July 2003 (has links)
The purpose of this article is to identify how Internet Protocol Virtual Private Network (IP VPN) affects the business strategy for Taiwan Internet Service Provider, using X Company as an example. With the change in technology, the world¡¦s business environment change from day to day. The break though development such as Internet Protocol Virtual Private Network, create a whole new era of communication. With the pressure coming from both the fixed network carrier (Type 1 telecommunications enterprises) and the existing Internet service provider competitors. X Company needs to find a new market niche to maintain its competition. Strategy becomes most important when the existing business model is coming into a mature stage. A partnership with other service carriers or an innovation within the same business filed becomes the crucial decision. Through X Company¡¦s internal data, this thesis will analyzed the strength and weakness compare to its current competitors. With the data from the customer survey, X Company can also identify the need of its customers. At the end, this thesis will prove X Company¡¦s trend toward IP VPN transformations is the right strategy. As data traffic expected to outgrow voice traffic in the coming year, X Company¡¦s transformation to IP-based Virtual Private Networks is the right strategy. IP VPN setup will be the trend of increasing dependence on the corporate network as a way of interconnecting users with enterprise software, business process, databases, and intellectual capital. Companies are transferring more enterprise applications between sites, as well as data replication and transfer. But enterprises are aiming at the same time to combine the effectiveness of information sharing with the network with the need to make sure security, manageability, functionality and privacy while being paying attention on cost control. X Company IP VPNs offer a more reasonable mean of doing so without the necessity for expensive leased line dedicated connections.
15

Fjärrbackup : Ett komplement till ordinarie backup

Larsson, Dennis January 2009 (has links)
<p>Denna rapport inriktar sig till ett mindre företag som vill tillhandahålla en egen fjärrbackuplösning. Backupen ska göras från en server placerad i företagets lokal till en lagringsenhet i någon av ägarnas hem med hjälp av VPN-förbindelse. För detta krävs ett program som har stöd för att göra uppkoppling automatiskt via VPN på en Windows 2008 Server, 64-bit plattform. Utöver det ska kryptering, komprimering och funktion för full och inkrementell backup finnas tillgängligt i programmet. Fyra fjärrbackupprogram har därför utsetts för jämförelse av hur de kan lösa företagets krav. Där samtliga program visade sig uppfylla funktionerna som eftersträvades, men endast programmet File Back PC 4 Enterprise har stöd för att göra VPN anslutning i själva programmet. Medan Handy Backup 6.2 Home, Cobian Backup 9 samt SyncbackSE 5.6.0.34 är tvungna att köra externa program för att lösa denna uppgift. Praktisk utvärdering av programmen och hur det hela ska lösas rent hårdvarumässigt återstår.</p>
16

Analysis of the PPTP and IPSec protocols in Virtual Private Networks

Tryggvason, Thorir January 2000 (has links)
<p>Today increasing numbers of individuals are working away from the ordinary workplace while still requiring access to the server located at the workplace. New technology is meeting this demand allowing for safe and secure transmission of the data over the Internet. The aim of this project is to analyse two protocols that are used within the Virtual Private Network (VPN) structure today, with the focus on installation, transmission speed on both Local Area Networks (LAN) and via telephone line and security aspects of the protocols.</p><p>The results show that it is quite complicated to setup a VPN network and to get operational. The results also show that there are security compromises within the VPN structure that indicate that if proper precaution is not taken it may give a false sense of security, where the user believes that it is a secure communication when in reality it is not.</p>
17

EDV-Paranoia unter Linux

Schreiber, Alexander 18 June 2000 (has links) (PDF)
Der Vortrag gibt einen Ueberblick ueber die Moeglichkeiten die Linux bietet um ein System oder Netzwerk vor unerwuenschten Zugriffen zu sichern.
18

Building mobile L2TP/IPsec tunnels

Xu, Chen, chen8002004@hotmail.com January 2010 (has links)
Wireless networks introduce a whole range of challenges to the traditional TCP/IP network, especially Virtual Private Network (VPN). Changing IP address is a difficult issue for VPNs in wireless networks because IP addresses are used as one of the identifiers of a VPN connection and the change of IP addresses will break the original connection. The current solution to this problem is to run VPN tunnels over Mobile IP (MIP). However, Mobile IP itself has significant problems in performance and security and that solution is inefficient due to double tunneling. This thesis proposes and implements a new and novel solution on simulators and real devices to solve the mobility problem in a VPN. The new solution adds mobility support to existing L2TP/IPsec (Layer 2 Tunneling Protocol/IP Security) tunnels. The new solution tunnels Layer 2 packets between VPN clients and a VPN server without using Mobile IP, without incurring tunnel-re-establishment at handoff, without losing packets during handoff, achieves better security than current mobility solutions for VPN, and supports fast handoff in IPv4 networks. Experimental results on a VMware simulation showed the handoff time for the VPN tunnel to be 0.08 seconds, much better than the current method which requires a new tunnel establishment at a cost of 1.56 seconds. Experimental results with a real network of computers showed the handoff time for the VPN tunnel to be 4.8 seconds. This delay was mainly caused by getting an IP address from DHCP servers via wireless access points (4.6 seconds). The time for VPN negotiation was only 0.2 seconds. The experimental result proves that the proposed mobility solution greatly reduces the VPN negotiation time but getting an IP address from DHCP servers is a large delay which obstructs the real world application. This problem can be solved by introducing fast DHCP or supplying an IP address from a new wireless access point with a strong signal while the current Internet connection is weak. Currently, there is little work on fast DHCP and this may open a range of new research opportunities.
19

Virtual Private Networks: : A feasibility study of secure communications between remote locations.

Wikström, Alexander, Thomson, Mark, Mageramova, Lolita January 2014 (has links)
Virtual Private Networks (VPNs) are an integral part of protecting company communications from unauthorized viewing, replication or manipulation. In order for employees to remotely conduct business in an effective and secure manner from a branch location or while traveling, Virtual Private Networks can be viewed as an absolute necessity.   Starting with a certain set of network communication requirements, our project's hypothesis was that the most suitable VPN implementation for Cheap Flats (a fictitious company we created) would be an IPSec client VPN. Included in the report are basic definitions, implementations and tests for three different types of VPNs that were used to confirm this hypothesis: 1) Site-to-site: Tunnel mode connection between VPN gateways. The process of encrypting and transferring data between networks is transparent to end-users. [1] 2) IPSec client: Network Layer VPN for both network-to-network and remote-access deployments. End-users will need to run either Cisco or Open Source VPN software on their PCs. 3) Clientless SSL: “Remote-access VPN technology that provides Presentation Layer encryption services for Applications through local redirection on the client.” [2] VPN communications are established using a browser rather than specific software installed on the end-user’s device.   The test results from the above VPN implementations have been published and comparisons were made between the different types of VPNs regarding the time taken to apply network device/end-user configurations, expenses incurred in procuring additional equipment/software to implement the VPN (if any), impact on end-users, scalability and lastly, the overall functionality of the VPN solution as it relates to the day-to-day business operations.   Following the testing phase, a discussion of the merits and drawbacks of each of the VPN implementations was drafted. After which, a final recommendation was presented regarding the VPN solution that best fit the needs of the hypothetical company described in the paper.
20

Fjärrbackup : Ett komplement till ordinarie backup

Larsson, Dennis January 2009 (has links)
Denna rapport inriktar sig till ett mindre företag som vill tillhandahålla en egen fjärrbackuplösning. Backupen ska göras från en server placerad i företagets lokal till en lagringsenhet i någon av ägarnas hem med hjälp av VPN-förbindelse. För detta krävs ett program som har stöd för att göra uppkoppling automatiskt via VPN på en Windows 2008 Server, 64-bit plattform. Utöver det ska kryptering, komprimering och funktion för full och inkrementell backup finnas tillgängligt i programmet. Fyra fjärrbackupprogram har därför utsetts för jämförelse av hur de kan lösa företagets krav. Där samtliga program visade sig uppfylla funktionerna som eftersträvades, men endast programmet File Back PC 4 Enterprise har stöd för att göra VPN anslutning i själva programmet. Medan Handy Backup 6.2 Home, Cobian Backup 9 samt SyncbackSE 5.6.0.34 är tvungna att köra externa program för att lösa denna uppgift. Praktisk utvärdering av programmen och hur det hela ska lösas rent hårdvarumässigt återstår.

Page generated in 0.0267 seconds