Sabbagh et al., 2020 - Google Patents
Evaluation of WireGuard and OpenVPN VPN solutionsSabbagh et al., 2020
View PDF- Document ID
- 11115328613501014319
- Author
- Sabbagh M
- Anbarje A
- Publication year
External Links
Snippet
This project evaluates two types of VPN solutions–WireGuard and OpenVPN. The evaluation is done by four different experiments to measure the maximum throughput of each of the VPN solutions, and a theoretical study on the encryption techniques that each …
- 238000011156 evaluation 0 title abstract description 5
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Pereira et al. | An authentication and access control framework for CoAP-based Internet of Things | |
| US20230106172A1 (en) | Unification of data flows over network links with different internet protocol (ip) addresses | |
| US9973516B2 (en) | Traffic shape obfuscation when using an encrypted network connection | |
| US11411924B2 (en) | Method for performing TLS/SSL inspection based on verified subject name | |
| CN110198297B (en) | Flow data monitoring method and device, electronic equipment and computer readable medium | |
| Chatzoglou et al. | Revisiting QUIC attacks: A comprehensive review on QUIC security and a hands-on study | |
| US11570213B2 (en) | Collaborative security for application layer encryption | |
| Angelo | Secure Protocols And Virtual Private Networks: An Evaluation. | |
| JP7601515B2 (en) | Method, system, program, and data structure for maintaining access for security enablement | |
| Tang et al. | Performance study of software-based iscsi security | |
| Zeidler et al. | Performance evaluation of transport layer security in the 5G core control plane | |
| Sy et al. | Enhanced Performance for the encrypted Web through TLS Resumption across Hostnames | |
| Sabbagh et al. | Evaluation of WireGuard and OpenVPN VPN solutions | |
| Liu et al. | Building generic scalable middlebox services over encrypted protocols | |
| Liu | Next generation SSH2 implementation: securing data in motion | |
| López et al. | Effective analysis of secure web response time | |
| Ajay et al. | Packet encryption for securing real-time mobile cloud applications | |
| Islam et al. | Reducing network overhead of IoTDTLS protocol employing ChaCha20 and Poly1305 | |
| Habibovic | Virtual Private Networks: An Analysis of the Performance in State-of-the-Art Virtual Private Network solutions in Unreliable Network Conditions | |
| Cunha et al. | An SFC-enabled approach for processing SSL/TLS encrypted traffic in future enterprise networks | |
| Kazemi et al. | Tunneling protocols identification using light packet inspection | |
| Gaminara | Performance and security evaluation of TLS, DTLS and QUIC security protocols | |
| Surantha | Secure Portable Virtual Private Network with Rabbit Stream Cipher Algorithm | |
| Fischer et al. | Security for building automation with hardware-based node authentication | |
| Zou | Network performance and key management of VPN tunnels between autonomous vehicles |