scispace - formally typeset
Search or ask a question
Topic

Handshake

About: Handshake is a research topic. Over the lifetime, 1105 publications have been published within this topic receiving 15166 citations. The topic is also known as: 🤝.


Papers
More filters
Patent•
19 Jan 2018
TL;DR: In this paper, the authors proposed a large-scale user sign-in method based on a wireless device handshake protocol, which comprises the following steps that a server reads in user serial number information, establishes an encrypted wireless local area network and waits for connection of users.
Abstract: The invention provides a large-scale user sign-in method based on a wireless device handshake protocol. The method comprises the following steps that (1), a server reads in user serial number information, establishes an encrypted wireless local area network and waits for connection of users; (2), the users join the local area network through wireless devices and inputs user serial numbers as network passwords, and the wireless devices automatically send request messages to the server through the handshake protocol; (3), the server filters authentication messages, breaks the serial numbers input by the users through a password collision method and moreover records MAC addresses of the devices in the user messages; and (4), the server marks sign-in users and moreover rejects the connection of the users. The method has the advantages that the users do not need to install software, the server only needs an ordinary wireless router, and a system supports more than one hundred users.

2 citations

Patent•
28 Sep 2015
TL;DR: In this article, a wireless device and a base station may perform a handshake procedure to select configuration parameters for cellular communication, and the handshake procedure may establish a system frame number and subframe number at which the selected configuration parameters take effect.
Abstract: This disclosure relates to techniques for avoiding loss of synchronization between a cellular device and a cellular network. According to some embodiments, a wireless device and a base station may perform a handshake procedure to select configuration parameters for cellular communication. The handshake procedure may establish a system frame number and subframe number at which the selected configuration parameters take effect. The wireless device and the base station may implement the selected configuration parameters at the selected system frame number and subframe number.

2 citations

Journal Article•DOI•
TL;DR: Wang et al. as discussed by the authors proposed a Snowflake traffic identification framework, which can identify whether the user is accessing Tor and which hidden service he is visiting, using rule matching and DTLS handshake fingerprint features.
Abstract: Tor is widely used to protect users’ privacy, which is the most popular anonymous tool. Tor introduces multiple pluggable transports (PT) to help users avoid censorship. A number of traffic analysis methods have been devoted to de-anonymize these PT. Snowflake is the latest PT based on the WebRTC protocol and DTLS encryption protocol for peer-to-peer communication, differing from other PT, which defeat these traffic analysis methods. In this paper, we propose a Snowflake traffic identification framework, which can identify whether the user is accessing Tor and which hidden service he is visiting. Rule matching and DTLS handshake fingerprint features are utilized to classify Snowflake traffic. The linear interpolation of the accumulative payload length of the first n messages in the DTLS data transmission phase as additional features are extracted to identify the hidden service. The experimental results show that our identification framework F-ACCUMUL can effectively identify Tor-Snowflake traffic and Tor-Snowflake hidden service traffic.

2 citations

Journal Article•
TL;DR: In this paper, the transactional interpretation of quantum mechanics, applied to several counter-intuitive quantum optics experiments (two-slit, quantum eraser, trapped atom,...), and describe a mathematical model that shows how transactions form.
Abstract: We discuss the transactional interpretation of quantum mechanics, apply it to several counter-intuitive quantum optics experiments (two-slit, quantum eraser, trapped atom, ...), and describe a mathematical model that shows in detail how transactions form. 1. Quantum Entanglement and Nonlocality Quantum mechanics, our standard theoretical model of the physical world at the smallest scales of energy and size, differs from the classical mechanics of Newton that preceded it in one very important way. Newtonian systems are always local. If a Newtonian system breaks up, each of its parts has a definite and well-defined energy, momentum, and angular momentum, parceled out at breakup by the system while respecting conservation laws. After the component subsystems are separated, the properties of any subsystem are completely independent and do not depend on those of the other subsystems. On the other hand, quantum mechanics is nonlocal, meaning that the component parts of a quantum system may continue to influence each other, even when they are well separated in space and out of speed-of-light contact. This characteristic of standard quantum theory was first pointed out by Albert Einstein and his colleagues Boris Podolsky and Nathan Rosen (EPR) in 1935, in a critical paper[1] in which they held up the discovered nonlocality as a devastating flaw that, it was claimed, demonstrated that the standard quantum formalism must be incomplete or wrong. Einstein called nonlocality “spooky actions at a distance”. Schrödinger followed on the discovery of quantum nonlocality by showing in detail how the components of a multi-part quantum system must depend on each other, even when they are well separated[2]. Beginning in 1972 with the pioneering experimental work of Stuart Freedman and John Clauser[3], a series of quantum-optics EPR experiments testing Bell inequality violations[4] and other aspects of entangled quantum systems were performed. This body of experimental results can be taken as a demonstration that, like it or not, both quantum mechanics and the underlying reality it describes are intrinsically nonlocal. Einstein’s spooky actions-at-a-distance are really out there in the physical world, whether we understand and accept them or not. How and why is quantum mechanics nonlocal? Nonlocality comes from two seemingly conflicting aspects of the quantum formalism: (1) energy, momentum, and angular momentum, important properties of light and matter, are conserved in all quantum systems, in the sense that, in the absence of external forces and torques, their net values must remain unchanged as the system evolves, while (2) in the wave functions describing quantum systems, as required by Heisenberg’s uncertainty principle[5], the conserved quantities may be indefinite and unspecified and typically can span a large range of possible values. This non-specifity persists until a measurement is made that “collapses” the wave function and fixes the measured quantities with specific values. These seemingly inconsistent requirements of (1) and (2) raise an important question:

2 citations

Patent•
05 Mar 2019
TL;DR: In this paper, the authors proposed a handshake connection method and device, which comprises the following steps: receiving a handshake request sent by a client, determining a to-be-adopted public key encryption algorithm of the handshake request; determining to be-separately computed algorithm parameters from the public-key encryption algorithm; sending the algorithm parameters to a preset distributedcomputation cluster, and performing handshake connection based on the PKE algorithm while the distributed computation cluster performs computation on the algorithm parameter.
Abstract: The invention discloses a handshake connection method and device. The method comprises the following steps: receiving a handshake request sent by a client; determining a to-be-adopted public key encryption algorithm of the handshake request; determining to-be-separately computed algorithm parameters from the public key encryption algorithm; sending the algorithm parameters to a preset distributedcomputation cluster, and performing handshake connection based on the public key encryption algorithm while the distributed computation cluster performs computation on the algorithm parameter. The to-be-separately computed algorithm parameters in the handshake connection method disclosed by the invention are the algorithm parameters needing to consume a great amount of control server resources, the algorithm parameters are separated to the distributed computation cluster to perform computation, the consumption of the local computation resource of the control server can be greatly reduced, thereby improving the entire performance of the control server.

2 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
79% related
Social network
42.9K papers, 1.5M citations
74% related
Wireless
133.4K papers, 1.9M citations
74% related
Encryption
98.3K papers, 1.4M citations
73% related
Wireless network
122.5K papers, 2.1M citations
72% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202358
2022140
202137
202065
201991
201877