39
[37]A. Nadeem and M. Y. Javed, “A performance comparison of data encryption
algorithms,” in
Information and communication technologies, 2005. ICICT 2005.
First international conference on
, 2005, pp. 84–89.
[38]“SHA-2,”
Wikipedia, the free encyclopedia
. 30-Jul-2015.
[39]“What is MD5? - Definition from WhatIs.com,”
SearchSecurity
. [Online].
Available: http://searchsecurity.techtarget.com/definition/MD5. [Accessed: 16-
Aug-2015].
[40]“cryptography - Is calculating an MD5 hash less CPU intensive than SHA family
functions?StackOverflow.”[Online].Available:http://stackoverflow.com/question
s/2722943/is-calculating-an-md5-hash-less-cpu-intensive-than-sha-family-
functions. [Accessed: 04-Sep-2015].
[41]W. Stallings,
Network security essentials: applications and standards
. Pearson
Education India, 2007.
[42]H. Alanazi, B. B. Zaidan, A. A. Zaidan, H. A. Jalab, M. Shabbir, Y. Al-Nabhani,
and others, “New comparative study between DES, 3DES and AES within nine
factors,”
ArXiv Prepr. ArXiv10034085
, 2010.
[43]Dr. Julien Maisonneuve,
Alcatel-Lucent, “Network Functions Virtualisation
(NFV); Service Quality Metrics.” .
[44]Susana Sabater, Vodafone Group PLC, “Network Functions Virtualisation
(NFV); Virtualization Requirements.” .
[45]“http://openmaniak.com/iperf.php.” .
[46]“http://www.certusdigital.com/index.php?option=com_content&view=article&id
=58:why-is-jitter-important&catid=34:questions-a-answers&Itemid=29.” .
[47]“encryption - Is AES-256 weaker than 192 and 128 bit versions? - Cryptography
StackExchange.”[Online].Available:http://crypto.stackexchange.com/questions/5
118/is-aes-256-weaker-than-192-and-128-bit-versions. [Accessed: 05-Sep-2015].
[48]“Comparison of DES, Triple DES, AES, blowfish
encryption for data - Stack
Overflow.”[Online].Available:http://stackoverflow.com/questions/5554526/com
parison-of-des-triple-des-aes-blowfish-encryption-for-data. [Accessed: 16-Aug-
2015].
[49]“VPNaaS_IPsecSpecific_blueprint,”
Google Docs
. [Online]. Available:
https://docs.google.com/document/d/1Jphcvnn7PKxqFEFFZQ1_PYkEx5J4aO5J
5Q74R_PwgV8/edit?usp=embed_facebook. [Accessed: 04-Oct-2015].
[50]“Fiware cloud capabilities_and_setting_up_your_environment,” 07:21:47 UTC.
[51]R. Fisli, “Secure Corporate Communications over VPN-Based WANs,”
Masters
Thesis Comput. Sci. Sch. Comput. Sci. Eng. R. Inst. Technol. Swed.
, 2005.