scispace - formally typeset
Search or ask a question
Topic

Handshake

About: Handshake is a research topic. Over the lifetime, 1105 publications have been published within this topic receiving 15166 citations. The topic is also known as: 🤝.


Papers
More filters
Proceedings ArticleDOI
11 Jul 2022
TL;DR: Extended TLS (ETLS) as mentioned in this paper is proposed to mask the server host identity by encrypting the Server Name Indication (SNI) without requiring any change in the existing protocols.
Abstract: The Internet is a common platform for sharing information. It is required to preserve every user’s privacy and security of information on the Internet. While data security is primarily taken care of by the TLS protocol and broader adaptation of HTTPS, FTPS, and SMPTS protocol, some fields of TLS expose the type of activity a user is performing, thus violating user privacy. One such protocol information is Server Name Indication (SNI) in the TLS ClinetHello message that goes in plaintext. Anyone intercepting the message thus identifies the service host type. We present a method named Extended TLS (ETLS) to mask the server host identity by encrypting the SNI without requiring any change in the existing protocols. In ETLS, a connection is established over two handshakes - the first handshake establishes a secure channel without sharing SNI information, and the second handshake shares the encrypted SNI. ETLS requires no modification in the already proven TLS encryption mechanism and retains all security benefits of the existing secure channel establishment. We demonstrate the feasibility of ETLS over live Internet with scripts that implement our methodology. Using a customized client-server and a commercial traffic shaper, we also demonstrated that the host identity is not exposed under ETLS, thus demonstrating its privacy-preserving property.

1 citations

Patent
12 Jul 2000
TL;DR: In this paper, the authors use fuzzy logic to network statistical patterns and to identify wireless links in a communication channel, then send and receive handshake packets, then calculate the mean and variance in a measurement module.
Abstract: The present invention uses fuzzy logic to network statistical patterns and to identify wireless links in a communication channel (Figure 11, 102). The system sends and receives handshake packets, then calculates the mean and variance in a measurement module (Figure 11, 101). The invention employs a fuzzy reasoning engine (Figure 11, 104) to infer quality of service parameters.

1 citations

01 Jan 2010
TL;DR: This thesis presents several novel protocols, aimed at providing new features or at fixing shortcomings of existing protocols in the literature, including a new concept of Secret Handshake, called Dynamic Controlled Matching, generalizing other Secret Hand shake variants.
Abstract: Parties cooperating in hostile networked environments often need to establish an initial trust. Trust establishment can be very delicate when it involves the exchange of sensitive information, such as affiliation to a secret society or to an intelligence agency. The mechanism of Secret Handshakes tackles this problem, providing a solution for secure initial exchange between mistrusting principals. A Secret Handshake is a protocol that allows two users to mutually verify one another’s properties, and in case of simultaneous matching, to share a key used to secure subsequent communications. The protocol assures that an outsider, or an illegitimate group member, does not learn anything by interacting with a legitimate user or by eavesdropping on protocol exchanges. In this thesis, we present several novel protocols, aimed at providing new features or at fixing shortcomings of existing protocols in the literature. At first, we focus on a new concept of Secret Handshake, called Dynamic Controlled Matching, generalizing other Secret Handshake variants. We then address the challenging task of revocation in Secret Handshakes, presenting an approach through which we can achieve revocation for each of the different variants of Secret Handshake known in the literature. Furthermore, we study two decentralized Secret Handshake protocols, one where a number of separate mistrusting entities can federate to create a Secret Handshake scheme and another one where the scheme is self-managed by its users. Finally we investigate two use-cases for Secret Handshake protocols, the first involving online social networks and the second addressing supply chain management. pa st el -0 00 06 27 6, v er si on 1 26 A ug 2 01 0

1 citations

Patent
16 Feb 2001
TL;DR: In this paper, a high-order synthesizing device capable of synthesizing a circuit having an operating speed higher than conventional one on the basis of an operation description including synchronous communication is presented.
Abstract: PROBLEM TO BE SOLVED: To provide a high-order synthesizing device capable of synthesizing a circuit having an operating speed higher than conventional one on the basis of an operation description including synchronous communication. SOLUTION: This device has an extracting part 2 for extracting the same kind of continuous synchronous communication by analyzing an operation description 1 including synchronous communication between threads to be operated parallel, a scheduling part 3 for performing scheduling for each thread by simultaneously handling the extracted synchronous communication as one kind of arithmetic and a circuit element allocating device part (circuit generating part) 4 for generating a circuit capable of starting the synchronous communication collected into one with the same priority through handshake. The circuit generating part 4 selects a circuit element required for constituting a data path based on the scheduling result, allocates it, adds a handshake circuit to each of input/output ports, further adds a waiting state to the scheduling result and generates a control circuit for controlling communication operation based on that state. Thus, plural kinds of synchronous communication can be started with the same priority by handshake.

1 citations

Journal ArticleDOI
TL;DR: Considering that most unexpected difficult airway situations are encountered by anaesthesiologists, without an ENT surgeon at the bedside, the utility of the laryngeal handshake method performed by anaesthesiaiologists in identifying the midline is reassuring.
Abstract: We read the letter by Drs. Drew and McCaul about our study about the laryngeal handshake and appreciate their interesting comments regarding our study. We agree that it is important to identify the midline of the neck accurately when performing cricothyroidotomy to avoid vascular injury. Regarding the identification of the cricothyroid membrane, some of the identified points were superimposed in figure 3 as described in the figure legends, and thus, there were more points outside of 5 mm from midline than shown in figure 3. Analysis of our data shows accurate identification of the midline (defined as within 5 mm of the midline) in 111/123 (90.2%) cases when using the laryngeal handshake method compared to 101/123 (82.1%) cases when using simple palpation and was statistically significant (P = 0.041). Although direct comparison may be inadequate due to the different subspecialties of physicians, this may be another aspect of our results that shows non‐inferiority of the laryngeal handshake method compared to simple palpation. Moreover, considering that most unexpected difficult airway situations are encountered by anaesthesiologists, without an ENT surgeon at the bedside, the utility of the laryngeal handshake method performed by anaesthesiologists in identifying the midline is reassuring. We look forward to reading Drs. Drew and McCaul's study when published as more evidence is required on this important topic.

1 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
79% related
Social network
42.9K papers, 1.5M citations
74% related
Wireless
133.4K papers, 1.9M citations
74% related
Encryption
98.3K papers, 1.4M citations
73% related
Wireless network
122.5K papers, 2.1M citations
72% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202358
2022140
202137
202065
201991
201877