Volume no :
9 |Issue no :
2Article Type :
Scholarly ArticleAuthor :
Mr. P. T. Talole Sir, Vinesh Chavhan, Rushikesh Kanfade, Vaibhav WanerePublished Date :
June, 2025Publisher :
Journal of Artificial Intelligence and Cyber Security (JAICS)[1] Charlie Scott, Paul Wolfe and Mike Erwin,” Virtual Private Networks”, Second Edition January 1999.
[2] Martin W. Murhammer, Orcun Atakan, Zikrun Badri, Beomjun Cho Hyun Jeong Lee, Alexander Schmid, “A Comprehensive Guide to Virtual Private Networks, Volume III: CrossPlatform Key and Policy Management”, November1999.
[3] Shashank Khanvilkar and Ashfaq Khokhar, ―Virtual Private Networks: An Overview with Performance Evaluation‖, University of Illinois at Chicago, IEEE Communications Magazine, October 2004.
[4]Virtual Private Networks by Shamod Lacoul http://www.slidefinder.net/V/Virtual_Private_Networks_ Shamod_Lacoul/32104518
[5] Yurcik and W. Doss, ―A planning framework for implementing VPNs‖, Volume: 3 Issue: 3, May-June 2001.
[6] Reuven Cohen and Gideon Kaempfer, ―On the Cost of Virtual Private Networks‖, IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 200