Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,554,474 papers from all fields of science
Search
Sign In
Create Free Account
OpenVPN
Known as:
Open VPN
, Openvon
, PrivateVPN
OpenVPN is an open-source software application that implements virtual private network (VPN) techniques for creating secure point-to-point or site-to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Android
Authentication
BTGuard
Binary file
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
DevCom: Device communities for user-friendly and trustworthy communication, sharing, and collaboration
Hans Vatne Hansen
,
V. Goebel
,
T. Plagemann
Computer Communications
2016
Corpus ID: 206896975
2016
2016
Implementation Experiences and Design Challenges for Resilient SDN Based Secure WAN Overlays
Markku Vajaranta
,
Joona Kannisto
,
J. Harju
Asia Joint Conference on Information Security
2016
Corpus ID: 15712847
Mobile computing devices, industrial control systems, and service provider clouds often need to be connected to each other over…
Expand
2016
2016
Achieving 128-bit Security against Quantum Attacks in OpenVPN
S.H.S. de Vries
2016
Corpus ID: 16911895
Niederreiter is a candidate post-quantum cryptosystem. Its large public key size currently discourages its use in practice. We…
Expand
2015
2015
IMPLEMENTASI VIRTUAL PRIVATE NETWORK DAN PROXY SERVER MENGGUNAKAN CLEAR OS PADA PT.VALDO INTERNATIONAL
Eka Varianto
,
Mohammad Badrul
2015
Corpus ID: 65097364
ne"> Abstract— A demand for the use of the internet network is perceived by IT workers . Therefore, it is needed once an internet…
Expand
2013
2013
CORBYS cognitive control architecture for robotic follower
Adrian Leu
,
Danijela Ristić-Durrant
,
+6 authors
Rajkumar K. Raval
Proceedings of the IEEE/SICE International…
2013
Corpus ID: 11089440
In this paper the novel generic cognitive robot control architecture CORBYS is presented. The objective of the CORBYS…
Expand
2011
2011
IMS-centric Evaluation of IPv4/IPv6 Transition Methods in 3G UMTS Systems
L. Bokor
,
Z. Kanizsai
,
G. Jeney
2011
Corpus ID: 55962119
The Internet Protocol is facing version change nowadays, IPv4 (the old version of IP) will be replaced by IPv6 (the new version…
Expand
2010
2010
Performance Evaluation of Key IMS Operations over IPv6-Capable 3G UMTS Networks
L. Bokor
,
Z. Kanizsai
,
G. Jeney
Ninth International Conference on Networks
2010
Corpus ID: 13256728
Due to the rapid development of high bit-rate IP-based mobile networking architectures, the increasing number of end-user…
Expand
2009
2009
Beginning OpenVPN 2.0.9 : build and integrate virtual private networks using OpenVPN
Markus Feilner
,
Norbert Graf
2009
Corpus ID: 60426929
This book is an easy introduction to OpenVPN. While providing only necessary theoretical background, it takes a practical…
Expand
2009
2009
Investigation and development of a security and forensic analysis teaching environment
Michael Gleeson
,
D. Markey
,
F. Mtenzi
First International Conference on Networked…
2009
Corpus ID: 15248753
Computer Security and Forensics is an emerging academic discipline in which there are many challenges facing educational…
Expand
2007
2007
The Design and Implement of Access System Based on OPENVPN
Zhou Jian
2007
Corpus ID: 62917608
In order to make the staff access the resources of campus network at the outside of campus's network,we design and develop the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE