{"id":"https://openalex.org/W2510876981","doi":"https://doi.org/10.1145/2905055.2905219","title":"A New Approach for the Security of VPN","display_name":"A New Approach for the Security of VPN","publication_year":2016,"publication_date":"2016-03-04","ids":{"openalex":"https://openalex.org/W2510876981","doi":"https://doi.org/10.1145/2905055.2905219","mag":"2510876981"},"language":"en","primary_location":{"id":"doi:10.1145/2905055.2905219","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2905055.2905219","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091900609","display_name":"Kuwar Kuldeep V. V. Singh","orcid":null},"institutions":[{"id":"https://openalex.org/I191972202","display_name":"Amity University","ror":"https://ror.org/02n9z0v62","country_code":"IN","type":"education","lineage":["https://openalex.org/I191972202"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Kuwar Kuldeep V. V. Singh","raw_affiliation_strings":["Amity Institute of Information Technology, Amity University Campus, Noida, Uttar Pradesh, India"],"affiliations":[{"raw_affiliation_string":"Amity Institute of Information Technology, Amity University Campus, Noida, Uttar Pradesh, India","institution_ids":["https://openalex.org/I191972202"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044609019","display_name":"Himanshu Gupta","orcid":"https://orcid.org/0000-0001-8290-7666"},"institutions":[{"id":"https://openalex.org/I191972202","display_name":"Amity University","ror":"https://ror.org/02n9z0v62","country_code":"IN","type":"education","lineage":["https://openalex.org/I191972202"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Himanshu Gupta","raw_affiliation_strings":["Amity Institute of Information Technology, Amity University Campus, Noida, Uttar Pradesh, India"],"affiliations":[{"raw_affiliation_string":"Amity Institute of Information Technology, Amity University Campus, Noida, Uttar Pradesh, India","institution_ids":["https://openalex.org/I191972202"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5091900609"],"corresponding_institution_ids":["https://openalex.org/I191972202"],"apc_list":null,"apc_paid":null,"fwci":3.4278,"has_fulltext":false,"cited_by_count":32,"citation_normalized_percentile":{"value":0.9362708,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6835172772407532},{"id":"https://openalex.org/keywords/private-network","display_name":"Private network","score":0.6191847920417786},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6178306341171265},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6007898449897766},{"id":"https://openalex.org/keywords/security-association","display_name":"Security association","score":0.5673837661743164},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5189685225486755},{"id":"https://openalex.org/keywords/ipsec","display_name":"IPsec","score":0.45424944162368774},{"id":"https://openalex.org/keywords/internet-security","display_name":"Internet security","score":0.4524296224117279},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.43049266934394836},{"id":"https://openalex.org/keywords/internet-layer","display_name":"Internet layer","score":0.41476666927337646},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.40468066930770874},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.3681035041809082},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.32539743185043335},{"id":"https://openalex.org/keywords/internet-protocol","display_name":"Internet Protocol","score":0.27299124002456665},{"id":"https://openalex.org/keywords/network-access-control","display_name":"Network Access Control","score":0.19111043214797974},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.16949701309204102},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.14845579862594604}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6835172772407532},{"id":"https://openalex.org/C117387248","wikidata":"https://www.wikidata.org/wiki/Q11186","display_name":"Private network","level":2,"score":0.6191847920417786},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6178306341171265},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6007898449897766},{"id":"https://openalex.org/C130881749","wikidata":"https://www.wikidata.org/wiki/Q586894","display_name":"Security association","level":5,"score":0.5673837661743164},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5189685225486755},{"id":"https://openalex.org/C67396069","wikidata":"https://www.wikidata.org/wiki/Q210214","display_name":"IPsec","level":3,"score":0.45424944162368774},{"id":"https://openalex.org/C22111027","wikidata":"https://www.wikidata.org/wiki/Q1070427","display_name":"Internet security","level":4,"score":0.4524296224117279},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.43049266934394836},{"id":"https://openalex.org/C146739243","wikidata":"https://www.wikidata.org/wiki/Q2910948","display_name":"Internet layer","level":4,"score":0.41476666927337646},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.40468066930770874},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3681035041809082},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.32539743185043335},{"id":"https://openalex.org/C35341882","wikidata":"https://www.wikidata.org/wiki/Q8795","display_name":"Internet Protocol","level":3,"score":0.27299124002456665},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.19111043214797974},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.16949701309204102},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.14845579862594604},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2905055.2905219","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2905055.2905219","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W969248760","https://openalex.org/W2033108738","https://openalex.org/W2037232315","https://openalex.org/W2133450435","https://openalex.org/W2168789555","https://openalex.org/W2169838611","https://openalex.org/W2276668495","https://openalex.org/W2541381622","https://openalex.org/W4230804982","https://openalex.org/W4285719527","https://openalex.org/W4291981231"],"related_works":["https://openalex.org/W1728437086","https://openalex.org/W2413322689","https://openalex.org/W2369735498","https://openalex.org/W2525022008","https://openalex.org/W2368720182","https://openalex.org/W2359362913","https://openalex.org/W1998737366","https://openalex.org/W4378364057","https://openalex.org/W2571955537","https://openalex.org/W2102887765"],"abstract_inverted_index":{"In":[0],"present":[1,141],"days,":[2],"Internet":[3,33,87],"has":[4,108],"become":[5,109],"mainstream":[6],"of":[7,29,65,78,150,171,176,206,241,259,285],"the":[8,22,40,46,63,66,71,79,86,102,119,135,143,165,202,229,239,246,250,257,264,268,273,282,286,290],"network":[9,59,173,178],"technology":[10],"for":[11,21,48,62,213,256],"low":[12],"cost":[13],"communications":[14],"architecture,":[15],"also":[16,188],"it":[17,42],"brought":[18],"great":[19],"convenience":[20,170],"organizations":[23],"and":[24,82,96,105,111,123,130,174,185,208],"businesses":[25,47],"to":[26,75,85,91,127,146,159],"support":[27],"growth":[28,77],"their":[30,49,83,131,242],"business.":[31],"Since":[32,222],"is":[34,43,60,156],"highly":[35,124,157],"available":[36],"in":[37,70,142,195,245,289],"almost":[38],"all":[39],"regions,":[41],"oftenrequired":[44],"by":[45,101,115,179,216,263,277],"local":[50],"presence.":[51],"Thus,":[52,249],"a":[53,161,181,209],"secure":[54,125,128,162],"channel":[55],"within":[56,164],"this":[57],"communication":[58,292],"required":[61],"security":[64,89,104,175,204,215,240,258,283],"confidential":[67],"data":[68,243,261],"traversing":[69,244],"public":[72,166,172,247,291],"network.":[73,248,293],"Due":[74],"rapid":[76],"digital":[80],"devices":[81],"access":[84],"caused":[88],"threats":[90,107],"user":[92,224],"data.":[93],"Advance":[94],"measures":[95,205],"high":[97],"technical":[98],"skills":[99],"adapted":[100],"attackers,":[103],"privacy":[106,288],"more":[110,112],"sophisticated":[113],"day":[114],"day,":[116],"which":[117,151],"increases":[118,272],"demand":[120],"foran":[121],"updated":[122],"medium":[126,163],"entities":[129],"valuable":[132],"information":[133,193],"into":[134],"Internet.":[136,167],"There":[137],"are":[138,235],"many":[139],"solutions":[140],"market":[144],"today":[145],"choose":[147],"from,":[148],"out":[149],"Virtual":[152],"Private":[153],"Network":[154],"(VPN)":[155],"preferred":[158],"create":[160],"It":[168],"provide":[169],"private":[177],"forming":[180],"tunnel":[182],"between":[183],"sender":[184],"receiver.":[186],"VPN":[187,207,214,265,278],"encrypt":[189],"upper":[190],"level":[191],"protocol":[192],"contained":[194],"its":[196],"header.":[197],"This":[198],"paper":[199],"discusses":[200],"about":[201,228,238],"traditional":[203],"whole":[210],"new":[211],"approach":[212],"using":[217],"multi-phase":[218],"encryption":[219],"technique":[220],"[1].":[221],"most":[223],"does":[225],"not":[226],"care":[227],"complex":[230],"underlying":[231],"technologies,":[232],"rather":[233],"they":[234],"only":[236,254],"concerned":[237],"proposed":[251,269],"solution":[252,270],"will":[253,271,280],"applicable":[255],"user's":[260,287],"carried":[262],"Header.":[266],"Additionally,":[267],"complexity":[274],"ofencryptionalgorithm":[275],"used":[276],"techniquewhich":[279],"enhances":[281],"commitment":[284]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":6},{"year":2017,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
