@incollection{, A2F2696D7BF5CF7D0DC4B765D661BCC9 , author={{Peter S.Nyakomitta} and {Dr. Silvance O.Abeka}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}2012735 } @incollection{b0, , title={{A Survey of Mobile VPN Technologies}} , author={{ PSandeep }} , journal={{IEEE Communications Surveys & Tutorials}} 18 , year={2016. 2016} } @incollection{b1, , title={{A Survey of VPN Performance Evaluation}} , author={{ PAvani } and { GAnkita }} , journal={{International Journal on Recent and Innovation Trends in Computing and Communication}} 2321-8169 5 , year={2017} } @book{b2, , title={{}} , author={{ WRashikala }} , year={2013} } @book{b3, , title={{An Empirical Test-bed Analysis of a Virtual Private Network Protocol. UNITEC Institute of Technology}} , address={New Zealand} } @book{b4, , author={{ JButts } and { SShenoi }} , title={{Critical Infrastructure Protection V, IFIP AICT 367}} , year={2011} } @incollection{b5, , title={{Effective and Extensive Virtual Private Network}} , author={{ STarek } and { AYasser }} , journal={{Journal of Information Security}} 2 , year={2011. 2011} } @incollection{b6, , title={{An Overview of Remote Access Vpns: Architecture and Efficient Installation}} , author={{ PRajamohan }} , journal={{Ipasj International Journal of Information Technology}} , year={2014} , note={Iijit} } @book{b7, , title={{Guide to Enterprise Telework, Remote Access, and Bring Your Own}} , author={{ SMurugiah } and { SKaren }} , editor={S. Karen, H. Paul and S. Murugiah} , year={2016. 2009} Guide to Enterprise Telework and Remote Access Security. National Institute of Standards and technology } @incollection{b8, , title={{Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security}} , author={{ SMurugiah } and { SKaren }} , journal={{NIST Special Publication}} , year={2016} , note={Revision 2} } @incollection{b9, , title={{}} , journal={{Device (BYOD) Security. NIST Special Publication (SP)}} 2 } @incollection{b10, , title={{A Comparative Study Of Remote Access Technologies and Implementation of a Smartphone App for Remote System Administration Based on a Proposed Secure RFB Protocol}} , author={{ DErnest }} , journal={{International Journal of Science and Engineering Applications}} 4 , year={2015} } @incollection{b11, , title={{Virtual Network Computing of User Appliances}} , author={{ KMasthan } and { SKumar } and { VPrasad }} , journal={{International Journal of Computer Science and Mobile Computing}} 2 8 132 , year={2013} } @book{b12, , title={{Gartner says less than 0.01 percent of consumer mobile apps will be considered a financial success by their developers through}} , author={{ Gartner }} , year={2014. 2018} , publisher={Gartner Newsroom} } @book{b13, , title={{More secure smart card-based remote user password authentication scheme with user anonymity. Security and Communication Networks}} , author={{ SKumari } and { MKKhan }} , year={2014. 2014} 7 } @incollection{b14, , title={{An enhanced privacy preserving remote user authentication scheme with provable security}} , author={{ AShehzad }} , journal={{Security Comm. Networks}} 8 , year={2015} } @incollection{b15, , title={{Security bound enhancement of remote user authentication using smart card}} , author={{ RMadhusudhan } and { MHegde }} , journal={{J. Inf. Secur. Appl}} 36 , year={2017. 2017} } @incollection{b16, , title={{PMAS: A proposed mutual authentication scheme for wireless body area networks}} , author={{ HSalama } and { STaha } and { HElmahdy }} , booktitle={{Information and Communication Technology Convergence (ICTC), 2015 International Conference on}} , publisher={IEEE} , year={2015} } @incollection{b17, , title={{A CAE Scheme Using ECC Based Self Certified PKC}} , author={{ Chande }} , journal={{J. Comput. Sci}} 12 , year={2016} } @incollection{b18, , title={{A Review of Bring Your Own Device on Security Issues}} , author={{ OMorufu }} , journal={{SAGE Open. Pp}} , year={2015} } @incollection{b19, , title={{Why API are central to a BYOD security strategy}} , author={{ JThielens } and { J }} 10.1016/S1353-4858(13)70091-6 , journal={{Network Security}} , year={2013. 2013} } @book{b20, , author={{ UVignesh } and { SAsha }} , title={{Modifying security policies towards BYOD. 2nd International Symposium on Big Data and Cloud Computing}} , year={2015} 50 } @book{b21, , title={{Gartner says less than 0.01 percent of consumer mobile apps will be considered a financial success by their developers through}} , author={{ Gartner }} , year={2014. 2018} , publisher={Gartner Newsroom} } @incollection{b22, , title={{Security and Privacy Risks Awareness for Bring Your Own Device (BYOD) Paradigm}} , author={{ MManmeet }} , journal={{International Journal of Advanced Computer Science and Applications}} 8 2 , year={2017} } @incollection{b23, , title={{A Survey Report On Vpn Security & Its Technologies}} , author={{ JGokulakrishnan } and { VThulasi }} , journal={{Indian Journal of Computer Science and Engineering (IJCSE)}} 5 , year={2014. 2014} } @incollection{b24, , title={{A Survey of Mobile VPN Technologies}} , author={{ AAlshalan }} , journal={{IEEE Communications Surveys & Tutorials}} 18 , year={2016. 2016} } @incollection{b25, , title={{An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps}} , author={{ IMuhammad }} , journal={{IMC. Pp}} , year={2016} } @incollection{b26, , title={{AntMonitor: A System for Monitoring from Mobile Devices}} , author={{ Varmarken }} , booktitle={{ACM (C2B(I)D)}} , year={2015. 2015} } @incollection{b27, , title={{An enhanced privacy preserving remote user authentication scheme with provable security}} , author={{ AShehzad }} , journal={{Security Comm. Networks}} 8 , year={2015} } @book{b28, , title={{An Improvement on Remote User Authentication Schemes Using Smart Cards}} , author={{ CChin-Ling }} , year={2018} , publisher={MDPI} 7 } @incollection{b29, , title={{Cryptanalysis and Improvement of ECC Based Authentication and Key Exchanging Protocols}} , author={{ RSwapnoneel } and { K }} , journal={{MDPI}} 1 9 , year={2017} }