scispace - formally typeset
Search or ask a question
Topic

Handshake

About: Handshake is a research topic. Over the lifetime, 1105 publications have been published within this topic receiving 15166 citations. The topic is also known as: 🤝.


Papers
More filters
Proceedings ArticleDOI
28 Nov 2015

1 citations

Patent
25 Aug 2011
TL;DR: In this paper, a power saving mode handshake is proposed to reduce power consumption when communicating with a counter party device at a network side, and to enable power of a main portion of electronic equipment to be completely turned off in a power-saving mode.
Abstract: PROBLEM TO BE SOLVED: To reduce power consumption when communicating with a counter party device at a network side, and to enable power of a main portion of electronic equipment to be completely turned off in a power saving mode. SOLUTION: A power saving mode handshake section 11 starts TCP three way handshake in the power saving mode of the electronic equipment 10, and a normal mode recovery starting section 12 starts recovery to a normal mode before handshake is completed. When the handshake is completed, a window size zero reporting section 13 reports to a counter party that a window size is zero, and puts transmission of data in a standby state. COPYRIGHT: (C)2011,JPO&INPIT

1 citations

Patent
26 Jun 1986
TL;DR: In this article, the authors proposed a handshake transmission protocol to make handshake transmission possible with easy procedures by using one handshake line and pulling up always this line to the high level, where the transmission end 1 releases driving of the handshake line after a preliminarily determined time so that the reception end 2 can detect the fall of a handshake line 12.
Abstract: PURPOSE:To make a handshake transmission possible with easy procedures by using one handshake line and pulling up always this line to the high level. CONSTITUTION:When a handshake line 12 is in the high level, a data line 11 is driven by a driver 3 in a transmission end 1. Next, the handshake line 12 is driven to the low level by the first open collector driver 15 in the transmission end 1. Meanwhile, the fall of the handshake line 12 is detected in the reception end 2, and the handshake line 12 is driven to the low level by the second open collector driver 6. The transmission end 1 releases driving of the handshake line 12 after a preliminarily determined time so that the reception end 2 can detect the fall of the handshake line 12. The reception end 2 releases driving of the handshake line 12 after receiving data through a data receiver 4. The transmission end 1 releases driving of a data line 11 after detecting that the handshake line 12 goes to the high level.

1 citations

Proceedings ArticleDOI
Bo Xu1, Yaxuan Qi1, Fei He1, Zongwei Zhou1, Yibo Xue1, Jun Li1 
17 Jun 2008
TL;DR: A high-speed session creation scheme optimized for network processors, designed for fast-path processing using a two-stage intelligent hashing and achieves a TCP connection creation rate over 2M connections per second.
Abstract: The security gateways today are required not only to block unauthorized accesses by authenticating packet headers, but also by inspecting connection states to defend against malicious intrusions. Hence session creation rate plays a key role in determining the overall performance of stateful intrusion prevention systems. In this paper, we propose a high-speed session creation scheme optimized for network processors. Main contribution includes: a) A high-performance flow classification algorithm on network processors; b) An efficient TCP three-way handshake scheme designed for fast-path processing using a two-stage intelligent hashing. Experimental results show that: a) The presented parallel optimized flow classification algorithm, Parallel Search Cross-Producting, outperforms the original Cross-Producting and Binary Search Cross-Producting algorithms with 300% and 60% increase of classification speed; b) The proposed fast path three-way handshake scheme, IntelliHash, achieves a TCP connection creation rate over 2M connections per second.

1 citations

Book ChapterDOI
29 Oct 2012
TL;DR: The main building block of the approach is CGC (Confidential Group Communication), a primitive formulated in this paper, and a concrete instantiation is presented so as to realize the generic approach.
Abstract: Privacy protection and user revocation are essentially conflicting requirements in many cryptographic protocols. It is a particularly challenging problem to harmonize them in a secret handshake protocol that is geared to offering strong privacy protection on the participants' group membership in the protocol execution. In this paper, we study this problem and propose a generic approach to provide revocation support in secret handshake protocols, without sacrificing the notion of privacy preserving. The main building block of our approach is CGC (Confidential Group Communication), a primitive formulated in this paper, and we present a concrete instantiation so as to realize our generic approach.

1 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
79% related
Social network
42.9K papers, 1.5M citations
74% related
Wireless
133.4K papers, 1.9M citations
74% related
Encryption
98.3K papers, 1.4M citations
73% related
Wireless network
122.5K papers, 2.1M citations
72% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202358
2022140
202137
202065
201991
201877