Computer Science ›› 2006, Vol. 33 ›› Issue (8): 32-36.
Previous Articles Next Articles
Online:
Published:
Abstract: The use of VPN to securely access the remote servers through Internet is one important technology in the current network security research. However, the tunneling technology of VPN makes it possible to bypass the control of firewall and compromise interio
Key words: Virtual private network, Access control, Application-layer, Tunneling
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2006/V33/I8/32
Cited