Virtual private ad hoc networking

J Hoebeke, G Holderbeke, I Moerman… - Wireless Personal …, 2006 - Springer
networking techniques to enable network connectivity. The underlying IP … networks, ad hoc
networks, mesh networks … or combinations thereof. A virtual private ad hoc overlay network

Virtual closed networks: A secure approach to autonomous mobile ad hoc networks

D Hurley-Smith, J Wetherall… - 2015 10th International …, 2015 - ieeexplore.ieee.org
Virtual Private Networks (VPNs) have been shown to enhance the security of Mobile Ad hoc
Networks (MANETs), at a high cost in network … , a Virtual Closed Network (VCN) architecture …

[BOOK][B] Virtual private networks

C Scott, P Wolfe, M Erwin - 1999 - books.google.com
… connections—that is, temporary connections that have no real physical presence, but
consist of packets routed over various machines on the Internet on an ad hoc basis. Secure …

Tincan: User-defined p2p virtual network overlays for ad-hoc collaboration

P St Juste, K Jeong, H Eom, C Baker… - … Endorsed Transactions on …, 2014 - eudl.eu
… to sustain these virtual private networks. Because TinCan runs on endpoints (eg VMs or
personal devices), it requires little additional infrastructure for maintaining the network. TinCan …

Android-based mobile payment service protected by 3-factor authentication and virtual private ad hoc networking

JY Hu, CC Sueng, WH Liao… - 2012 Computing …, 2012 - ieeexplore.ieee.org
… So virtual private Ad Hoc networking feature in this work is a … into 2 subsections: Ad Hoc
networking configuration and i-… factor authentication and virtual private Ad Hoc networking in this …

A virtual ad hoc network testbed

A Poylisher, C Serban, J Lee, TC Lu… - … Networks and …, 2010 - inderscienceonline.com
virtual ad hoc network (VAN) project to test applications over ad hoc networks, with a special
focus on testing network … application instances running on virtual nodes, possibly hosted on …

On the cost of virtual private networks

R Cohen, G Kaempfer - IEEE/ACM Transactions on Networking, 2000 - ieeexplore.ieee.org
… the traditional private self-administered corporate network over the nonprivate backbone. …
ad hoc tunnels. In the past, remote access has been established through the telephone network

Virtual operator based AAA in wireless LAN hot spots with ad-hoc networking support

J Zhang, J Li, S Weinstein, N Tu - ACM SIGMOBILE Mobile Computing …, 2002 - dl.acm.org
… relay MTs connected through ad-hoc networking can be treated as … ad-hoc networking case
for the ease of presentation. The additional AAA requirements incurred by ad-hoc networking

An active network approach to virtual private networks

R Maresca, M D'Arienzo, M Esposito… - … ISCC 2002 Seventh …, 2002 - ieeexplore.ieee.org
… To the purpose we conceived an ad hoc model of injected program especially suited for
dealing with these functions. By appropriately customizing this module, the user is capable of …

[PDF][PDF] Wireless ad hoc networking: the art of networking without a network

M Frodigh, P Johansson, P Larsson - Ericsson review, 2000 - academia.edu
… In the past, the notion of ad hoc networks was often … of ad hoc networking is likely to change,
as is its importance. In this article, the authors describe the concept of ad hoc networking by …