scispace - formally typeset
Search or ask a question
Topic

Handshake

About: Handshake is a research topic. Over the lifetime, 1105 publications have been published within this topic receiving 15166 citations. The topic is also known as: 🤝.


Papers
More filters
Patent
15 Nov 1999
TL;DR: In this article, a protocol analyzer captures handshake protocol frames exchanged by two nodes attempting to establish a physical link and displays them to the user in a merged, time-ordered list, and the information contained in the frames is decoded and displayed.
Abstract: A method, system and computer program product for analyzing link failure in a network is described, wherein a protocol analyzer captures handshake protocol frames exchanged by two nodes attempting to establish a physical link. The captured handshake protocol frames ordered sets are displayed to the user in a merged, time-ordered list, and the information contained in the frames is decoded and displayed. If an attempt to establish a link fails, the symptoms of the failure and a possible diagnosis are identified and displayed. The user is thereby provided with a complete, understandable picture of the events leading up to the link failure, and with symptoms and possible cause of the link failure.

4 citations

Patent
06 Nov 2008
TL;DR: In this article, the authors proposed a scheme in which several common encryption keys are initially set and then they are arbitrarily switched for each packet to be transmitted, in order to ensure that the encryption keys to be used are timely changed without repeating handshake.
Abstract: PROBLEM TO BE SOLVED: To provide an encryption communication processing apparatus and an encryption communication processing method which can establish an effective encryption communication between nodes in a network at a high communication speed whose safety is improved without damaging its high-speed performance. SOLUTION: In communication between the nodes in the network, several common encryption keys are initially set. They are arbitrarily switched for each packet to be transmitted. In this manner, encryption keys to be used are timely changed without repeating handshake. COPYRIGHT: (C)2009,JPO&INPIT

4 citations

Journal ArticleDOI
TL;DR: A novel biped-wheeled-wearable machine able to revolutionize the lower body exoskeletons’ world is presented, and a first reduced scale prototype is used to show the feasibility of the proposed solution.
Abstract: This paper presents a novel biped-wheeled-wearable machine, named HANDSHAKE, and obtained by an evolution of two robots presented in other works: one flexible-wheeled leg and one biped-flexible-whe...

4 citations

Proceedings ArticleDOI
25 Apr 2022
TL;DR: In this paper , an empirical analysis of how post-quantum cryptography affects real-world performance compared to classical cryptography is presented, showing that postquantum cryptography can be as fast or even faster than classical cryptography, depending on the specific encryption and signature algorithms used.
Abstract: With the increasing speed in the development of quantum computers, secure communication is at risk. A promising candidate to replace existing cryptographic patterns with quantum-secure variants is Post-Quantum Cryptography (PQC). This paper presents an empirical analysis of how Post-Quantum Cryptography affects real-world performance compared to classical cryptography. Therefore we analyze the Transport Layer Security (TLS) handshake performance showing that Post-Quantum Cryptography can be as fast or even faster than classical cryptography, depending on the specific encryption and signature algorithms used.

4 citations

Proceedings ArticleDOI
24 Nov 2009
TL;DR: An attempt has been made to propose the medium-access-control protocol, which uses collision avoidance using receiver initiated handshake, and in this model, the channel is divided into equal and static size slots.
Abstract: Medium-access-control (MAC) protocol for wireless networks proposed are based on collision avoidance using handshake between sender and receiver. The earlier existing protocols are sender initiated. In this paper, an attempt has been made to propose the model, which uses collision avoidance using receiver initiated handshake. In this model, the channel is divided into equal and static size slots. The proposed model uses carrier sensing and frequency hoping spread spectrum.

4 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
79% related
Social network
42.9K papers, 1.5M citations
74% related
Wireless
133.4K papers, 1.9M citations
74% related
Encryption
98.3K papers, 1.4M citations
73% related
Wireless network
122.5K papers, 2.1M citations
72% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202358
2022140
202137
202065
201991
201877