Use of virtual private networks (VPN) and proxy servers: Impact of personality and demographics

Author(s):  
Antonin Pavlicek ◽  
Frantisek Sudzina
netWorker ◽  
1999 ◽  
Vol 3 (4) ◽  
pp. 22-23
Author(s):  
Dennis Fowler

2002 ◽  
Vol 6 (2) ◽  
pp. 99-115
Author(s):  
Narasimhan Raghavan ◽  
Rajat Gopal ◽  
Sashidhar Annaluru ◽  
Shasidhar Kura

EDPACS ◽  
1999 ◽  
Vol 27 (2) ◽  
pp. 16-16 ◽  
Author(s):  
Charlie Scott ◽  
Paul Wolfe ◽  
Mike Erwin

2002 ◽  
Vol 10 (4) ◽  
pp. 565-578 ◽  
Author(s):  
A. Kumar ◽  
R. Rastogi ◽  
A. Silberschatz ◽  
B. Yener

2018 ◽  
Vol 7 (2) ◽  
pp. 30-33
Author(s):  
Yusera Farooq Khan

Now-a-days the significance of security has been greater than before because of the fact that data has been accessed and transferred through public network. The data which has been transferred could be sniffed which may be a loss for us. When data is transferred in to public network we need confidentiality, integration and authentication. In this review paper we will discuss all these factors that keep our data safe enough. In order to provide this factor a site-to-site virtual private network has been designed which provide more security to data and made the public network into private network. The virtual private network hides the source and destination address as well as it also hides the internal network so that our network would be safe enough.


Sign in / Sign up

Export Citation Format

Share Document