Topic
Handshake
About: Handshake is a research topic. Over the lifetime, 1105 publications have been published within this topic receiving 15166 citations. The topic is also known as: 🤝.
Papers published on a yearly basis
Papers
More filters
•
15 Nov 1999
TL;DR: In this article, a protocol analyzer captures handshake protocol frames exchanged by two nodes attempting to establish a physical link and displays them to the user in a merged, time-ordered list, and the information contained in the frames is decoded and displayed.
Abstract: A method, system and computer program product for analyzing link failure in a network is described, wherein a protocol analyzer captures handshake protocol frames exchanged by two nodes attempting to establish a physical link. The captured handshake protocol frames ordered sets are displayed to the user in a merged, time-ordered list, and the information contained in the frames is decoded and displayed. If an attempt to establish a link fails, the symptoms of the failure and a possible diagnosis are identified and displayed. The user is thereby provided with a complete, understandable picture of the events leading up to the link failure, and with symptoms and possible cause of the link failure.
4 citations
•
06 Nov 2008
TL;DR: In this article, the authors proposed a scheme in which several common encryption keys are initially set and then they are arbitrarily switched for each packet to be transmitted, in order to ensure that the encryption keys to be used are timely changed without repeating handshake.
Abstract: PROBLEM TO BE SOLVED: To provide an encryption communication processing apparatus and an encryption communication processing method which can establish an effective encryption communication between nodes in a network at a high communication speed whose safety is improved without damaging its high-speed performance. SOLUTION: In communication between the nodes in the network, several common encryption keys are initially set. They are arbitrarily switched for each packet to be transmitted. In this manner, encryption keys to be used are timely changed without repeating handshake. COPYRIGHT: (C)2009,JPO&INPIT
4 citations
••
TL;DR: A novel biped-wheeled-wearable machine able to revolutionize the lower body exoskeletons’ world is presented, and a first reduced scale prototype is used to show the feasibility of the proposed solution.
Abstract: This paper presents a novel biped-wheeled-wearable machine, named HANDSHAKE, and obtained by an evolution of two robots presented in other works: one flexible-wheeled leg and one biped-flexible-whe...
4 citations
••
25 Apr 2022TL;DR: In this paper , an empirical analysis of how post-quantum cryptography affects real-world performance compared to classical cryptography is presented, showing that postquantum cryptography can be as fast or even faster than classical cryptography, depending on the specific encryption and signature algorithms used.
Abstract: With the increasing speed in the development of quantum computers, secure communication is at risk. A promising candidate to replace existing cryptographic patterns with quantum-secure variants is Post-Quantum Cryptography (PQC). This paper presents an empirical analysis of how Post-Quantum Cryptography affects real-world performance compared to classical cryptography. Therefore we analyze the Transport Layer Security (TLS) handshake performance showing that Post-Quantum Cryptography can be as fast or even faster than classical cryptography, depending on the specific encryption and signature algorithms used.
4 citations
••
24 Nov 2009TL;DR: An attempt has been made to propose the medium-access-control protocol, which uses collision avoidance using receiver initiated handshake, and in this model, the channel is divided into equal and static size slots.
Abstract: Medium-access-control (MAC) protocol for wireless networks proposed are based on collision avoidance using handshake between sender and receiver. The earlier existing protocols are sender initiated. In this paper, an attempt has been made to propose the model, which uses collision avoidance using receiver initiated handshake. In this model, the channel is divided into equal and static size slots. The proposed model uses carrier sensing and frequency hoping spread spectrum.
4 citations