2021
DOI: 10.1007/978-981-16-3961-6_27
|View full text |Cite
|
Sign up to set email alerts
|

Secured Communication Using Virtual Private Network (VPN)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(7 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…Nonetheless, there could be some correlation between online search behavior and substance-use behavior. Internet users who surf the web could have used virtual private networks applications, Internet protocol (IP) masking, or implemented anonymous web browsing via the Tor browsers or DuckDuckGo search engine, among others, to conceal the actual geographic location and identity while browsing the web for critical information concerning psychedelics [ 76 ]. More advanced web users might use the deep web and darknet to seek information concerning DMT and other controlled substances, or even purchase them [ 77 , 78 , 79 , 80 , 81 , 82 ].…”
Section: Discussionmentioning
confidence: 99%
“…Nonetheless, there could be some correlation between online search behavior and substance-use behavior. Internet users who surf the web could have used virtual private networks applications, Internet protocol (IP) masking, or implemented anonymous web browsing via the Tor browsers or DuckDuckGo search engine, among others, to conceal the actual geographic location and identity while browsing the web for critical information concerning psychedelics [ 76 ]. More advanced web users might use the deep web and darknet to seek information concerning DMT and other controlled substances, or even purchase them [ 77 , 78 , 79 , 80 , 81 , 82 ].…”
Section: Discussionmentioning
confidence: 99%
“…Satellites aim to provide high quality connections with high QoS and low latency error free signals. [133][134][135][136] We have reviewed extensively over the domain of integrating ML and DL with satellite communications. Issues that have been raised like limited bandwidth and spectrum have been tackled using ML and DL solution with adaptive beamforming.…”
Section: Discussionmentioning
confidence: 99%
“…With the aim of creating a fully connected world and the initiation of 5G communication technologies there has been increased attention toward satellites. Satellites aim to provide high quality connections with high QoS and low latency error free signals 133–136 . We have reviewed extensively over the domain of integrating ML and DL with satellite communications.…”
Section: Discussionmentioning
confidence: 99%
“…Through performance analysis and security testing, they demonstrated the successful design and configuration of L2TP and IPsec VPNs, establishing secure connections and providing enhanced network security. Ezra et al (2021) conducted a review focusing on the design of an IP security VPN. They explored the use of VPNs as a means to bypass censorship and access geographically restricted services.…”
Section: Importance Of Vpn Technology In Enhancing Network Securitymentioning
confidence: 99%