Perez, 2018
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| US10326741B2 (en) | Secure communication secret sharing | |
| US9749292B2 (en) | Selectively performing man in the middle decryption | |
| US9294450B2 (en) | Selectively performing man in the middle decryption | |
| US8856308B1 (en) | Cloud scale automatic identity management | |
| Liu et al. | Building generic scalable middlebox services over encrypted protocols | |
| Perez | A Framework for the Performance Analysis and Tuning of Virtual Private Networks | |
| Habibovic | Virtual Private Networks: An Analysis of the Performance in State-of-the-Art Virtual Private Network solutions in Unreliable Network Conditions | |
| Sabbagh et al. | Evaluation of WireGuard and OpenVPN VPN solutions | |
| Zou | Network performance and key management of VPN tunnels between autonomous vehicles | |
| Danilova | Comparing the performance of different vpn technologies with tls/ssl | |
| Balaji | User traffic characteristics study and network security implications in PWLAN | |
| Taylor | Software-defined Networking: Improving Security for Enterprise and Home Networks | |
| Rajendran | Security analysis of a software defined wide area network solution | |
| Sridharan | Track Your Track (TYT) | |
| Duarte Coscia | Evaluation of Network-Layer Security Technologies for Cloud Platforms | |
| Coscia | Evaluation of Network-Layer Security Technologies for Cloud | |
| Bin Shahid | Federation of private 5G test network into Emulab based testbed | |
| Terranova | Applications of Quantum Key Distribution to security protocols | |
| Tirumalaraju | Troubleshooting NetScaler | |
| Vyshnavi | Virtual VPN in the Cloud: Design and Modelling of an IPSec VPN in Virtualized Environment. | |
| Ngekeh | CONFIGURING AND USING OPEN VPN ON WINDOWS OS | |
| Khanna | Towards usable and fine-grained security for HTTPS with middleboxes | |
| Abdalrahman | Analysis and implementation of remote access computer communication | |
| Jacob | Instant Citrix Security How-to | |
| Aime et al. | Ontology and algorithms for the dependable configuration of information systems |