Please use this identifier to cite or link to this item:
https://rfos.fon.bg.ac.rs/handle/123456789/282Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.creator | Ćurčić, Nataša | |
| dc.creator | Simić, Dejan | |
| dc.date.accessioned | 2023-05-12T09:56:51Z | - |
| dc.date.available | 2023-05-12T09:56:51Z | - |
| dc.date.issued | 2004 | |
| dc.identifier.issn | 1451-4397 | |
| dc.identifier.uri | https://rfos.fon.bg.ac.rs/handle/123456789/282 | - |
| dc.description.abstract | U ovom radu zaštita računarskih mreža obuhvata obezbeđenje celokupnog saobraćaja na mrežnom nivou. Tradicionalne metode zaštite računarskih mreža podrazumevaju postavljanje uređaja za kriptovanje na krajevima mreže čime se omogućava kriptovanje mrežnog linka "s kraja na kraj". Sa javnom mrežom kao što je Internet tradicionalni kriptovani linkovi nisu izvodljivi. U ovom radu je prikazano nekoliko savremenih tehnologija za zaštitu računarskih mreža: IP zaštita, PPTP i RADIUS. | sr |
| dc.description.abstract | In this paper network security refers to the securing of all traffic at network level. Traditional methods of securing computer networks involved installing encryptions at the ends of the network that enabled end-to-end encryption of the network link. However, with public networks such as the Internet, such link encryption is not feasible. This paper describes several contemporary computer network security technologies such as: IP Security PPTR and RADIUS. | en |
| dc.publisher | Univerzitet u Beogradu - Fakultet organizacionih nauka, Beograd | |
| dc.rights | openAccess | |
| dc.source | Info M | |
| dc.subject | zaštita računarskih mreža | sr |
| dc.subject | PPTR RADIUS | sr |
| dc.subject | IP zaštita | sr |
| dc.subject | firewall | sr |
| dc.subject | PPTR RADIUS | en |
| dc.subject | IP Security | en |
| dc.subject | firewall | en |
| dc.subject | computer networks security | en |
| dc.title | Tehnologije zaštite računarskih mreža na mrežnom nivou | sr |
| dc.title | Security technologies for computer networks at network level | en |
| dc.type | article | |
| dc.rights.license | ARR | |
| dc.citation.epage | 17 | |
| dc.citation.issue | 12 | |
| dc.citation.other | 3(12): 11-17 | |
| dc.citation.spage | 11 | |
| dc.citation.volume | 3 | |
| dc.identifier.rcub | conv_602 | |
| dc.type.version | publishedVersion | |
| item.cerifentitytype | Publications | - |
| item.fulltext | No Fulltext | - |
| item.grantfulltext | none | - |
| item.openairetype | article | - |
| item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
| Appears in Collections: | Radovi istraživača / Researchers’ publications | |
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.