Apiecionek et al., 2015
| Publication | Publication Date | Title |
|---|---|---|
| Donenfeld | WireGuard: Next Generation Kernel Network Tunnel. | |
| EP3387812B1 (en) | Virtual private network aggregation | |
| US7280540B2 (en) | Processing of data packets within a network element cluster | |
| US11115391B2 (en) | Securing end-to-end virtual machine traffic | |
| CN104247367B (en) | Improve IPsec performance and anti-eavesdropping security | |
| EP2345212B1 (en) | Method and apparatus for forwarding data packets using aggregating router keys | |
| US7086086B2 (en) | System and method for maintaining N number of simultaneous cryptographic sessions using a distributed computing environment | |
| Apiecionek et al. | Multi path transmission control protocols as a security solution | |
| US8104082B2 (en) | Virtual security interface | |
| Liyanage et al. | Secure communication channel architecture for software defined mobile networks | |
| JP2004524768A (en) | System and method for distributing protection processing functions for network applications | |
| Touil et al. | Secure and guarantee QoS in a video sequence: a new approach based on TLS protocol to secure data and RTP to ensure real-time exchanges | |
| Liu et al. | P4NIS: Improving network immunity against eavesdropping with programmable data planes | |
| Tennekoon et al. | Prototype implementation of fast and secure traceability service over public networks | |
| Popat et al. | Multipath TCP security issues, challenges and solutions | |
| US20170346932A1 (en) | In-band path-to-path signals using tcp retransmission | |
| Hohendorf et al. | Secure End-to-End Transport Over SCTP. | |
| CN107135226B (en) | Transport layer proxy communication method based on socks5 | |
| EP1189410B1 (en) | Processing of data packets within a network cluster | |
| Faizullah et al. | Vulnerabilities in sdn due to separation of data and control planes | |
| US8453205B1 (en) | Secure network services via daemons | |
| Krishnan et al. | Sum chain based approach against session hijacking in MPTCP | |
| Stavrou | Overlay-Based DoS Defenses | |
| Phatak | Spread-Identity mechanisms for DOS resilience and Security. | |
| Pohly et al. | MICSS: A realistic multichannel secrecy protocol |