scispace - formally typeset
Search or ask a question
Topic

Handshake

About: Handshake is a research topic. Over the lifetime, 1105 publications have been published within this topic receiving 15166 citations. The topic is also known as: 🤝.


Papers
More filters
Journal ArticleDOI
TL;DR: The evaluation results suggest that Look-Ahead Acknowledgment is an effective improvement for data transfer in existing dataflow architectures with a minimal increase in area and power cost.

1 citations

Patent
27 Oct 2017
TL;DR: In this article, a dual-rail coding four-phase handshake protocol-based asynchronous arbiter is presented, consisting of an arbitration module, a handshake control module and an output control module.
Abstract: The invention discloses a dual-rail coding four-phase handshake protocol-based asynchronous arbiter. The arbiter comprises an arbitration module, a handshake control module and an output control module, wherein the arbitration module is used for detecting the validity of inputting dual-rail coding data and finishing arbitration among different input channels; the handshake control module is used for finishing a four-phase handshake protocol; and the output control module is used for outputting data of corresponding data channels according to arbitration results. The arbiter can be directly applied to a dual-rail coding protocol circuit and is highly modular; and each module circuit is regularized, so that the arbiter can be conveniently extended and applied to larger-scale circuits.

1 citations

Patent
19 Jan 2016
TL;DR: In this article, an image sensor and a handshake correction unit are formed in one chip, and the handshake correction units compensate an angle to allow an angle output by handshake frequency to be constant or detects and compensates an output signal offset of the gyro sensor unit in real time.
Abstract: The present invention relates to an image sensor module for a camera and, in particularly, to an image sensor module having a handshake correction function, which comprises: an image sensor for obtaining image data on a subject to transfer the same to an image signal processing unit; and a handshake correction unit for integrating handshake rotation angular velocity data obtained from a gyro sensor to generate a handshake angle value, and transferring the handshake angle value to a server driving control unit which moves the image sensor in the direction of compensating the generated handshake angle value. The image sensor and the handshake correction unit are formed in one chip, and the handshake correction unit compensates an angle to allow an angle output by handshake frequency to be constant or detects and compensates an output signal offset of the gyro sensor unit in real time.

1 citations

Journal ArticleDOI
TL;DR: In this paper, a bitmap‐based steganographic handshake approach is proposed and a prototype system based on the BitTorrent network is implemented, where hidden peers successfully exchange their identity information and accurately identify the other hidden peers without being detected by the regular peers.
Abstract: In BitTorrent network, the bitmap is used to indicate the state of data blocks of file owned by a peer. Before the downloading of the file starts, the file provider first sends its corresponding bitmap to the requester to show which data blocks it owns. This provides the possibility for hiding the identity information in the bitmap and exchanging the identity information secretly. In this paper, we propose a bitmap-based steganographic handshake approach and implement a prototype system based on the BitTorrent network. In our prototype system, the network can operate normally. More importantly, hidden peers successfully exchange their identity information and accurately identify the other hidden peers without being detected by the regular peers. © 2017 Institute of Electrical Engineers of Japan. Published by John Wiley & Sons, Inc.

1 citations

Journal Article
TL;DR: It is helpful in increasing transmission speed to reuse secret keys rather than to create them at every connection, because of deteriorating system's transmission performance.
Abstract: In order to create security session, security keys are preconfigured between communication objects. For this purpose, Handshake Protocol exists. The pre-master secret key that is used in this process needs to interpreted by a server to create master secret key, whose process requires a big calculation, resulting in deteriorating system's transmission performance. Therefore, it is helpful in increasing transmission speed to reuse secret keys rather than to create them at every connection.

1 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
79% related
Social network
42.9K papers, 1.5M citations
74% related
Wireless
133.4K papers, 1.9M citations
74% related
Encryption
98.3K papers, 1.4M citations
73% related
Wireless network
122.5K papers, 2.1M citations
72% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202358
2022140
202137
202065
201991
201877