scispace - formally typeset
Search or ask a question
Topic

Handshake

About: Handshake is a research topic. Over the lifetime, 1105 publications have been published within this topic receiving 15166 citations. The topic is also known as: 🤝.


Papers
More filters
Patent
17 Feb 1998
TL;DR: In this article, a multi-format receiver emits a sequence of different handshakes until the transmitter begins to respond, and the receiver stores the prefix and a descriptor of the last handshake prior to the transmitter response.
Abstract: A location or other description of the source of a transmission is inserted into the communication as a prefix to transmitter data. A multi-format receiver emits a sequence of different handshakes until the transmitter begins to respond. The receiver stores the prefix and a descriptor of the last handshake prior to the transmitter response. Subsequent signals with a stored prefix are greeted immediately with the stored associated handshake.

3 citations

Journal ArticleDOI
TL;DR: Transfer of bacteria from the hands of one person to another is dramatically reduced with a fist bump compared to a handshake, so should this change in greeting in the winter be recommended?
Abstract: Gastrointestinal and respiratory viruses are particularly common during winter months, and reducing risk of transmission is challenging. Transfer of bacteria from the hands of one person to another is dramatically reduced with a fist bump compared to a handshake. If the same is true for viruses, should we recommend this change in greeting in the winter?

3 citations

Proceedings ArticleDOI
02 Apr 2000
TL;DR: This paper studies transformations of delay-insensitive specifications, a model of communicating processes that are embedded in a medium that introduces arbitrary and varying delays on the communication channels, and shows how an implementation of such a protocol can be derived.
Abstract: Delay-insensitive specifications model communicating processes that are embedded in a medium that introduces arbitrary and varying delays on the communication channels. In this paper we study transformations of such specifications. The transformations we study are directed. They are either contracting or expanding. The former are useful when trying to improve specifications, the latter when trying to find implementations. The theory we develop is inspired by transformations based on handshake protocols. We show how an implementation of such a protocol can be derived. We also show how the transformations can help when analyzing specifications containing unavoidable nondeterminism, which is closely related to unavoidable metastability.

3 citations

Book ChapterDOI
27 Mar 2019
TL;DR: A framework for deniable secret handshake is proposed, a protocol is analyzed, three flaws are shown and solutions to prevent them are given.
Abstract: The notion of deniability ensures that the transcript generated in an interactive protocol does not yield any evidence of the interaction. In the context of key-exchange protocols for secure message transmission, the notion of deniability is well-explored. On the other hand, a secret handshake protocol enables a group of authorized users to establish a shared secret key and authenticate each other. Recently, a framework for deniable secret handshake is proposed by Tian et al. in ISPEC 2018. We analyze the protocol, show three flaws and give solutions to prevent them.

3 citations

Journal ArticleDOI
TL;DR: The proposed methodology is occupying lesser memory space and also reducing number of communication of sensor nodes for the authentication model, which proved optimum for WSN.
Abstract: Wireless Sensor Networks (WSN) are major research area in the past few decades. WSN is formed by collection of sensor nodes. Power source life and m emory size limit the hardware sources and these wil l decide the lifesapn of sensor nodes in WSN. Therefo re, many resources based research issues are evolve d in WSN. This study focused security issue and proposed authentication system. As the sensor nodes are limited memory, the traditional authentication syst ems are uncomforted. Hence, secret handshake system using two authorities, namely Issue Authority and V alidate Authority are proposed in this study. The proposed authentication system is called as, Secret Handshake Issue and Validate Authority (SHIVA). The proposed methodology is occupying lesser memory space and also reducing number of communication of sensor nodes for the authentication model. Therefor e, the proposed methodology proved optimum for WSN.

3 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
79% related
Social network
42.9K papers, 1.5M citations
74% related
Wireless
133.4K papers, 1.9M citations
74% related
Encryption
98.3K papers, 1.4M citations
73% related
Wireless network
122.5K papers, 2.1M citations
72% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202358
2022140
202137
202065
201991
201877