SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Demystifying the Ipsec Puzzle
Key Exchange in IPSec: Analysis of IKE
IEEE Internet Computing
DOS-Resistant Authentication with Client Puzzles
Revised Papers from the 8th International Workshop on Security Protocols
Towards a Policy System for IPsec: Issues and an Experimental Implementation
ICON '01 Proceedings of the 9th IEEE International Conference on Networks
IPSec and DNSSEC to Support GRID Application Security
CCGRID '02 Proceedings of the 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid
Security in Fixed and Wireless Networks: An Introduction to securing data communications
Security in Fixed and Wireless Networks: An Introduction to securing data communications
Is hierarchical public-key certification the next target for hackers?
Communications of the ACM - Interactive immersion in 3D graphics
Measurement based characterization and provisioning of IP VPNs
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
IPSec VPN Design
Inferring Internet denial-of-service activity
ACM Transactions on Computer Systems (TOCS)
The New Front Line: Estonia under Cyberassault
IEEE Security and Privacy
N2N: A Layer Two Peer-to-Peer VPN
AIMS '08 Proceedings of the 2nd international conference on Autonomous Infrastructure, Management and Security: Resilient Networks and Services
Integrating Overlay and Social Networks for Seamless P2P Networking
WETICE '08 Proceedings of the 2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
All your contacts are belong to us: automated identity theft attacks on social networks
Proceedings of the 18th international conference on World wide web
Decentralized Bootstrapping of P2P Systems: A Practical View
NETWORKING '09 Proceedings of the 8th International IFIP-TC 6 Networking Conference
Analysis and Optimization of Cryptographically Generated Addresses
ISC '09 Proceedings of the 12th International Conference on Information Security
A distributed routing architecture for secure communication over highly dynamic radio networks
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Breaking 104 Bit WEP in less than 60 seconds
WISA'07 Proceedings of the 8th international conference on Information security applications
Towards a denial-of-service resilient design of complex IPsec overlays
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Proactive multicast-based IPsec discovery protocol and multicast extension
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
IP over P2P: enabling self-configuring virtual IP networks for grid computing
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Cryptanalysis of two variants of PCBC mode when used for message integrity
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Enabling practical IPsec authentication for the internet
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
New directions in cryptography
IEEE Transactions on Information Theory
Network mobility and protocol interoperability in ad hoc networks
IEEE Communications Magazine
Kaminsky: Catching up with Kaminsky
Network Security
SOS: an architecture for mitigating DDoS attacks
IEEE Journal on Selected Areas in Communications
Efficient opportunistic network creation in the context of future internet
The future internet
Hi-index | 0.00 |
Virtual private networks (VPN) offer a secure data exchange over public networks. Despite being cheaper than leased lines, growing sizes and dynamic behavior of VPN nodes, e.g., for mobility or reasons of denial-of-service-attacks, make a manual configuration of large, dynamic VPN expensive. Consequently, a number of different VPN auto-configuration approaches have been invented and partially deployed over the last decade. This article identifies a comprehensive set of objectives to be fulfilled by IP-based VPN auto-configuration, explains and groups mechanisms, and analyzes their strengths and weaknesses with regards to the objectives. Finally, it identifies potential future directions of autonomous VPN deployment.