Implementation of IPSec Protocol

@article{Dhall2012ImplementationOI,
  title={Implementation of IPSec Protocol},
  author={H. Dhall and D. Dhall and S. Batra and P. Rani},
  journal={2012 Second International Conference on Advanced Computing & Communication Technologies},
  year={2012},
  pages={176-181}
}
  • H. Dhall, D. Dhall, +1 author P. Rani
  • Published 2012
  • Computer Science
  • 2012 Second International Conference on Advanced Computing & Communication Technologies
The aim of this paper is to present the implementation of IPSec Protocol. IPSec protocol provides an end user to end user traffic with ensuring authenticity and confidentiality of data packet. IP sec is a successor of the ISO standard Network Layer Security Protocol (NLSP). NLSP was based on the SP3 protocol that was published by NIST, but designed by the Secure Data Network System project of the National Security Administration (NSA). IPSec is officially specified by the Internet Engineering… Expand
11 Citations
Issues and Security on IPSec: Survey
  • 1
  • PDF
Application specific tunneling protocol selection for Virtual Private Networks
  • 11
An Automated Implementation of Hybrid Cloud for Performance Evaluation of Distributed Databases
  • 4
  • PDF
...
1
2
...

References

SHOWING 1-8 OF 8 REFERENCES
Cryptography & Network Security
  • 207
Security in computing
  • 1,393
  • PDF
A Framework for QoS-based Routing in the Internet
  • 761
  • PDF
Computer Networks
  • 1,191
  • PDF
Security in Computing, Pearson Education, Singapore
  • 2003
William stalling, Cryptography & Network security, Principles & practice
  • William stalling, Cryptography & Network security, Principles & practice
William stalling, Network Security Essentials, Application and standard
  • William stalling, Network Security Essentials, Application and standard