Research Article

Cryptographic Algorithm Invocation Based on Software-Defined Everything in IPsec

Figure 6

Frame of the designed control program for switching the combined-policies.