Abstract
No abstract available.
Cited By
- Nakhila O, Amjad M, Dondyk E and Zou C (2018). Gateway independent user-side wi-fi Evil Twin Attack detection using virtual wireless clients, Computers and Security, 74:C, (41-54), Online publication date: 1-May-2018.
- Liu X and Trappe W (2016). Overlay tunneling as a policy tool for defending mobile ad hoc networks, Security and Communication Networks, 9:17, (4482-4494), Online publication date: 25-Nov-2016.
- Quynh N and Takefuji Y A central and secured logging data solution for Xen virtual machine Proceedings of the 24th IASTED international conference on Parallel and distributed computing and networks, (218-224)
- Kim D, Jung Y and Chung T (2005). PRISM, The Journal of Supercomputing, 33:1, (103-121), Online publication date: 1-Jul-2005.
- Kamara S, Davis D, Ballard L, Caudy R and Monrose F An Extensible Platform for Evaluating Security Protocols Proceedings of the 38th annual Symposium on Simulation, (204-213)
- Shaikh S Information security education in the UK Proceedings of the 1st annual conference on Information security curriculum development, (53-58)
- Steinder M and Sethi A (2004). Probabilistic fault diagnosis in communication systems through incremental hypothesis updating, Computer Networks: The International Journal of Computer and Telecommunications Networking, 45:4, (537-562), Online publication date: 15-Jul-2004.
- Gupta A, Kleinberg J, Kumar A, Rastogi R and Yener B Provisioning a virtual private network Proceedings of the thirty-third annual ACM symposium on Theory of computing, (389-398)
- Prevelakis V A secure station for network monitoring and control Proceedings of the 8th conference on USENIX Security Symposium - Volume 8, (10-10)
- Sirer E, Grimm R, Gregory A and Bershad B (1999). Design and implementation of a distributed virtual machine for networked computers, ACM SIGOPS Operating Systems Review, 33:5, (202-216), Online publication date: 12-Dec-1999.
- Sirer E, Grimm R, Gregory A and Bershad B Design and implementation of a distributed virtual machine for networked computers Proceedings of the seventeenth ACM symposium on Operating systems principles, (202-216)
Index Terms
- Virtual private networks
Please enable JavaScript to view thecomments powered by Disqus.
Recommendations
Virtual private social networks
CODASPY '11: Proceedings of the first ACM conference on Data and application security and privacySocial Networking Sites (SNSs) are having a significant impact on the social life of many people - even beyond the millions of people that use them directly. These websites usually allow users to present a profile of themselves through a long list of ...