scispace - formally typeset
Search or ask a question
Topic

Handshake

About: Handshake is a research topic. Over the lifetime, 1105 publications have been published within this topic receiving 15166 citations. The topic is also known as: 🤝.


Papers
More filters
Patent
07 Sep 2018
TL;DR: In this article, the authors proposed a handshake method for accessing a server. The method comprises the steps of acquiring a first timestamp corresponding to encrypted time domain information and an access moment of a handshake request, finding a first target key corresponding to the first timestamp, and decrypting the encrypted time domains information according to the target.
Abstract: The invention discloses a handshake method for accessing a server. The method comprises the steps of acquiring a first timestamp corresponding to encrypted time domain information and an access momentof a handshake request, finding a first target key corresponding to the first timestamp, and decrypting the encrypted time domain information according to the first target; when a first decryption failure command is received, acquiring a second target key from a key list, and decrypting the encrypted time domain information according to the second target key; and when a decryption success commandis received, completing handshake with the target server. According to the above handshake method, when the first time of decryption is failed, decryption is performed according to the second targetkey, and the problem that in the prior art, decryption cannot be performed due to the fact that time synchronization of the server is the distribution of loose coupling, so that errors in the millisecond level or second level may occur, and the server decrypts the encrypted time domain information sent by the client by using the new key is avoided.
Journal ArticleDOI
N. J, Akash B R, Suhaan Ym, Y. S. Teja, Nagatarun C 
TL;DR: The findings of the performance evaluation show that IoT devices' computational overhead and energy consumption are decreased, as well as the total time of the handshake.
Abstract: SDN (Software-Defined Networking) is a new networking architecture that is enterprising, feasible, cost-effective and robust applications. This approach decouples network management and forwarding operations, allowing network control to be directly programmable while the underlying infrastructure is veiled for applications and network services. MQTT is a lightweight publish-subscribe network protocol for sending and receiving messages. It is made for communications with remote places when there are resource limits or network capacity limitations. The ESP8266EX-based NodeMCU development board is a small module that has a microcontroller, integrated Wi-Fi receiver, and transmitter. The findings of the performance evaluation show that IoT devices' computational overhead and energy consumption are decreased, as well as the total time of the handshake.
Journal ArticleDOI
TL;DR: This article argued that the teacher-translator is the indispensable light to the officer-translate and that unless regular occasions are provided for the teacher to pull his weight in the field, the assumed parity between translation and interpretation might be a nullity.
Abstract: This essay is out to draw attention to a simple but often overlooked subject: the need to recognize two broad streams of translators and, more importantly, to draw together not only for the mutual benefit of both streams but for the ultimate growth and sustenance of the enterprise as a social cum international service. The essay admits the classic definition of translation and puts its major plank of argument on the assumption that translation and interpretation are Siamese twins. It purports that so much is going on in classroom translation that without it, office translation may well be a mirage. Put more sharply, classroom translation often called pedagogical translation is the father of office translation. Yet there is little, except for conferences, which brings the two into cross-fertilizing synergy. This is against the backdrop that office translation as an activity carried out for a fee or in return for a specified honorarium or salary. The central argument is that, whereas the teacher-translator is the indispensable light to the officer-translator, he is not open to being readily outsourced and that, unless regular occasions are provided for the teacher-translator to pull his weight in the field, the assumed parity between both streams might be a nullity.
Journal ArticleDOI
TL;DR: In this paper , the authors proposed a MAC protocol based on short signal game backoff, which adopts game theory to ensure that the sending node can send without conflict after winning the reservation channel competition with the best probability without using handshake mechanism.
Abstract: Underwater wireless sensor networks(UWSNs) have a long propagation delay; In order to avoid collision, the handshake mechanism is adopted in the design of media access control protocol. However, with the increase of propagation delay, The time of waiting for the feedback signal will increase continuously, resulting in the delay that too many channels are occupied by reservation. When the delay starts to be larger than the transmission time of the packet, the handshake protocol will lose its advantage in performance completely. However, the protocol that does not use the handshake mechanism has the loopholes of the confirmation mechanism or the excessive backoff after the number of nodes’s increasing, which leads to the increase of conflicts. Therefore, this paper proposes a MAC protocol based on short signal game backoff. Based on counting the number of short signal messages in the reservation stage, The protocol adopts game theory to ensure that the sending node can send without conflict after winning the reservation channel competition with the best probability without using handshake mechanism. In addition, the remaining nodes are allowed to choose the backoff time in a more reasonable way, rather than the random backoff which reduces the efficiency infinitely. The simulation results show that the protocol can greatly improve the network performance.

Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
79% related
Social network
42.9K papers, 1.5M citations
74% related
Wireless
133.4K papers, 1.9M citations
74% related
Encryption
98.3K papers, 1.4M citations
73% related
Wireless network
122.5K papers, 2.1M citations
72% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202358
2022140
202137
202065
201991
201877