Tunneling protocol

Known as: Ssh tunnel, Secure Shell tunneling, SSH tunneling 
In computer networks, a tunneling protocol allows a network user to access or provide a network service that the underlying network does not support… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1993-2017
051019932017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
Protocol tunneling is widely used to add security and/or privacy to Internet applications. Recent research has exposed side… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 4
  • figure 5
Is this relevant?
2010
2010
This article analyzes the viability of secure tunneling for clock synchronization protocols with special respect to high… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
Is this relevant?
2005
2005
Status of This Memo This memo defines an Experimental Protocol for the Internet community. It does not specify an Internet… (More)
Is this relevant?
2001
2001
Layer Two Tunneling Protocol (L2TP) describes a mechanism to tunnel Point-to-Point (PPP) sessions. The protocol has been designed… (More)
Is this relevant?
2000
2000
Many applications of tunneling protocols such as PPTP [5] and L2TP [4] involve dial-up network access. Some, such as the… (More)
Is this relevant?
2000
2000
We investigate the theoretical and numerical properties of two global optimization techniques for the solution of mixed… (More)
Is this relevant?
1998
1998
The Point-to-Point Tunneling Protocol (PPTP) is used to secure PPP connections over TCP/IP links. In this paper we analyze… (More)
Is this relevant?
1993
1993
The trend towards ever decreasing geometries is making the non-volatile memory cell design task increasingly difficult. For… (More)
Is this relevant?