mirror of https://github.com/2martens/uni.git
Sem: Review zu Alshamsi verfasst
This commit is contained in:
parent
367d14e1ec
commit
023e851430
22
sem/sem.bib
22
sem/sem.bib
|
@ -14,6 +14,7 @@
|
|||
|
||||
Doi = {10.1109/AINA.2005.70},
|
||||
Owner = {jim},
|
||||
Review = {The comparison is very enlightening and can be used to reference the performance of both protocols. Since OpenVPN is based upon SSL, it can be used very well.},
|
||||
Timestamp = {2014.10.24}
|
||||
}
|
||||
|
||||
|
@ -25,25 +26,7 @@
|
|||
Month = {Apr},
|
||||
Publisher = {IEEE},
|
||||
|
||||
Abstract = {This paper deals with current Virtual Private
|
||||
Network (VPN) technologies, such as Internet Protocol
|
||||
Security (IPSec), Layer Two Tunneling Protocol
|
||||
(L2TP), and Point to Point Tunneling Protocol (PPTP).
|
||||
Furthermore, the VPN solution of the Austrian
|
||||
company phion Information Technologies is presented.
|
||||
After a short introduction to the basics of each
|
||||
protocol, the strengths and weaknesses of each
|
||||
technology are outlined, as far as interoperability,
|
||||
manageability, and practical problems is concerned.
|
||||
This is done by means of a practical analysis and
|
||||
comparison of the results. The analysis includes
|
||||
performance measurement, link quality and stability
|
||||
analysis, feature comparison, interaction with TCP/IP
|
||||
protocols, and some basic security attacks. In order to
|
||||
provide comparable results, all technologies were
|
||||
tested in the same manner. However, this paper does
|
||||
not provide explicit recommendations which technology
|
||||
is to be preferred.},
|
||||
Abstract = {This paper deals with current Virtual Private Network (VPN) technologies, such as Internet Protocol Security (IPSec), Layer Two Tunneling Protocol (L2TP), and Point to Point Tunneling Protocol (PPTP). Furthermore, the VPN solution of the Austrian company phion Information Technologies is presented. After a short introduction to the basics of each protocol, the strengths and weaknesses of each technology are outlined, as far as interoperability, manageability, and practical problems is concerned. This is done by means of a practical analysis and comparison of the results. The analysis includes performance measurement, link quality and stability analysis, feature comparison, interaction with TCP/IP protocols, and some basic security attacks. In order to provide comparable results, all technologies were tested in the same manner. However, this paper does not provide explicit recommendations which technology is to be preferred.},
|
||||
Doi = {10.1109/ARES.2006.30},
|
||||
Owner = {jim},
|
||||
Review = {This conference contribution is interesting, since it shows the problems of IPSec and the differences between some VPN protocols.},
|
||||
|
@ -88,7 +71,6 @@ is to be preferred.},
|
|||
Doi = {10.1109/MITP.2002.1046644},
|
||||
Owner = {jim},
|
||||
Review = {This article is not scientific and falls into the common science area, where everything is explained well but not really backed up with references.
|
||||
|
||||
This source should therefore not be used primarily, even though it comes from the IEEE.},
|
||||
Timestamp = {2014.10.24}
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue