Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,321 papers from all fields of science
Search
Sign In
Create Free Account
Point-to-Point Tunneling Protocol
Known as:
PPTP
, Point to Point Tunneling Protocol
, Pptpd
The Point-to-Point Tunneling Protocol (PPTP) is an obsolete method for implementing virtual private networks, with many known security issues. PPTP…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
Authentication
Cybercrime countermeasures
Encryption
Extensible Authentication Protocol
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Investigation of the applicability of SSL/TLS protocol for VPN in APCS
Dmitry Rybin
,
Karina Piliugina
,
Pavel Piliugin
IEEE Conference of Russian Young Researchers in…
2018
Corpus ID: 3934386
One of the most important goals of information security is to ensure the safety of critical facilities such as power plants…
Expand
2015
2015
PERBANDINGAN PERFORMANSI JARINGAN VIRTUAL PRIVATE NETWORK METODE POINT TO POINT TUNNELING PROTOCOL (PPTP) DENGAN METODE INTERNET PROTOCOL SECURITY
I. Nugroho
,
Bebas Widada
,
Kustanto Kustanto
2015
Corpus ID: 58164965
Teknologi Virtual Private Network (VPN) sangat berperan besar dalam dunia komunikasi sekarang ini, dikarenakan VPN mampu membuat…
Expand
2015
2015
Network performance comparison of VPN protocols on wired and wireless networks
S. Narayan
,
Cameron J. Williams
,
Daniel K. Hart
,
Max W. Qualtrough
International Conference on Computational…
2015
Corpus ID: 17078444
VPNs are a well-established method employed by organizations to secure their data communications across un-trusted networks. This…
Expand
2015
2015
Perbandingan Virtual Private Network Protokol Menggunakan Point To Point Tunnel Protocol dan OpenVPN
Henki Bayu Seta
,
M. Ridwan
,
Theresia Wati
2015
Corpus ID: 114181460
Dengan semakin ketergantungannya user kepada teknologi internet tentu harus diimbangi dengan ketersediaan internet yang memadai…
Expand
2014
2014
Implementasi Dan Analisa Perbandingan Qos Pada Pptp Dan L2tp Site-To-Site Vpnuntuk Layanan Video Streaming
Fadloli Ghalib Ansoni
2014
Corpus ID: 60888561
Saat ini video streaming sudah banyak digunakan dalam kegiatan sehari-hari. Seperti pendidikan jarak jauh, monitoring, maupun…
Expand
Review
2014
Review
2014
Secure Network Solutions for Enterprise Cloud Services
Cheng-Chi Huang
,
Philip Smith
,
Zhaohao Sun
2014
Corpus ID: 2359646
Securing a cloud network is an important challenge for delivering cloud services to enterprise clouds. There are a number of…
Expand
2007
2007
Linux Networking Cookbook
C. Schroder
2007
Corpus ID: 60690447
This soup-to-nuts collection of recipes covers everything you need to know to perform your job as a Linux network administrator…
Expand
Highly Cited
1999
Highly Cited
1999
Point-to-Point Tunneling Protocol
K. Hamzeh
,
G. Pall
,
W. Verthein
,
J. Taarud
,
W. Little
,
G. Zorn
1999
Corpus ID: 60490374
This document specifies a protocol which allows the Point to Point Protocol (PPP) to be tunneled through an IP network. PPTP does…
Expand
1997
1997
SOFTWARE ENCRYPTION IN THE DOD
Alma Kondi
1997
Corpus ID: 14549387
This paper represents the views of the authors and not necessarily those of their employers. Risk analysis is the preferred…
Expand
Review
1994
Review
1994
Theory Reasoning in First Order Calculi
U. Furbach
Workshop on Information Systems and Artificial…
1994
Corpus ID: 37787911
Building in special theories into first order calculi is used in various applications of deduction to increase efficiency of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE