scispace - formally typeset
Search or ask a question
Topic

Handshake

About: Handshake is a research topic. Over the lifetime, 1105 publications have been published within this topic receiving 15166 citations. The topic is also known as: 🤝.


Papers
More filters
Posted Content
TL;DR: The design and evaluation of the vision-based classification of social gestures, such as handshake, hug, high-five, etc, is described, and it is indicated that significant future work is necessary to improve its practical feasibility in the mediated social touch applications.
Abstract: This paper describes the design and evaluation of the vision-based classification of social gestures, such as handshake, hug, high-five, etc. This is a component of the mediated social touch systems, which can be incorporated into ShareTable and SqueezeBands system to achieve automated gestures recognition and transmission of the touch between the users in real time. The results from our pilot study show the recognition accuracy of each gestures, and they indicate that significant future work is necessary to improve its practical feasibility in the mediated social touch applications.
26 Nov 2015
TL;DR: Being the first of its kind, the matching method proposes a novel technique that maps handshakes to an abstract binary format, called peakmaps, which results in a pairing accuracy of 80% compared to 24% using basic cross correlation.
Abstract: The way people meet each other is usually face to face. Meanwhile, the way people maintain their contacts is mostly through social media. This results in a gap of translating a handshake into a digital connection. Shake-On is a start-up that has come up with an answer by means of a smart bracelet. Their aim is to wirelessly exchange contact details between users wearing the bracelet. This exchange is triggered by the most common human gesture people use when introducing themselves: the handshake. This thesis will overcome two major challenges for Shake-On. First, no general pattern recognition method can be applied to detect handshakes. This is caused by the fact that handshakes gestures show large variations among individual persons. Second, the system should be robust to multiple handshakes happening concurrently. This applies to the scenario of more than two people shaking hands while standing close to each other. Contact details should only be exchanged between people that are handshaking, which requires handshake matching. Again, large variations in `handshaking style' make it a cumbersome task to identify matching handshakes. This thesis proposes a two-fold solution to address the above-mentioned challenges. The first part includes handshake detection, using new features for pattern recognition that are tailored to handshaking recognizing. The second part proposes a new method to perform handshake matching that overcomes the shortcomings of existing solutions. The work done in this thesis has led to the following results: 1. The developed detection method takes into account limited resources and is therefore suitable for implementation on a smart bracelet. Moreover, it shows similar performance as the state-of-the-art solutions, namely an accuracy of 95%. In contrast to existing solutions using 6 stochastic features, our solution uses 4 computationally lightweight features. 2.Being the first of its kind, the matching method proposes a novel technique that maps handshakes to an abstract binary format. This format is called peakmaps. Because it eliminates personal handshaking style, peakmaps result in a pairing accuracy of 80% compared to 24% using basic cross correlation.
Posted ContentDOI
03 Feb 2021
TL;DR: The PT and TOTP approach to TLS is applied to achieve stateless one-time authenticated session resumption and will provide a huge performance gain in large-scale distributed applications.
Abstract: Transport Layer Security (TLS) is a cryptographic protocol that provides communications 1 security between two peers and it is widely used in many applications. To reduce the latency 2 in TLS handshake session resumption using pre-shared key (PSK) had been used. But current 3 methods in PSK mode handshake uses a fixed session key multiple times for the lifetime of session 4 ticket. Reuse of fixed session key should be very careful in the point of communications security. 5 It is vulnerable to replay attacks and there is a possibility of tracking users. Paired token (PT) is a 6 new secondary credential scheme that provides pre-shared key in stateless way in client-server 7 environment. Server issues paired token (public token and secret token) to authenticated client. 8 Public token represents signed identity of client and secret token is a kind of shared secret between 9 client and server. Once client is equipped with PT, it can be used for many symmetric key based 10 cryptographic applications such as authentication, authorization, key establishment, etc. It was 11 also shown that it can be used for one-time authenticated key establishment using the time-based 12 one-time password (TOTP) approach. In this paper we apply the PT and TOTP approach to TLS 13 to achieve stateless one-time authenticated session resumption. Server executes full handshake 14 of TLS 1.3 and issues PT to authenticated client. Then client and server can execute one-time 15 authenticated session resumption using PT in stateless way in server side. In every runs of session 16 resumption distinct session keys are established that the same PT can be used safely for longer 17 lifetime. If anonymous PT is used with renewal issuing, user privacy, untraceability and forward 18 security can be achieved easily. It will provide a huge performance gain in large-scale distributed 19
Proceedings ArticleDOI
23 Dec 2022
TL;DR: In this paper , a robust hardware router architecture based on Round Robin, Handshake and Priority based routing protocols is proposed for real-time applications, which is a serious attempt to develop one such robust Hardware Router Architecture based on round Robin, handshake and priority based protocols.
Abstract: Complex Software Routing algorithms are efficient in Routing and in resolving conflicts, contentions and congestions in any multiuser data environments. But this whole Routing process leads to data blocking i.e. increased latency and packet/data loss in real time applications. This paper is a serious attempt to develop one such robust Hardware Router Architecture based on Round Robin, Handshake and Priority based Routing basic protocols.
Proceedings ArticleDOI
01 Sep 2018
TL;DR: This paper provides an analysis of the standard DTLS handshake's performance under adverse transmission conditions, and proposes and evaluates modifications to the way message loss is dealt with during the handshake, making DTLS deployable in situations which are prohibitive for default DTLS.
Abstract: The Datagram Transport Layer Security (DTLS) protocol has been designed to provide end-to-end security over unreliable communication links. Where its connection establishment is concerned, DTLS copes with potential loss of protocol messages by implementing its own loss detection and retransmission scheme. However, the default scheme turns out to be suboptimal for links with high transmission error rates and low data rates, such as wireless links in electromagnetically harsh industrial environments. Therefore, in this paper, as a first step we provide an analysis of the standard DTLS handshake's performance under such adverse transmission conditions. Our studies are based on simulations that model message loss as the result of bit transmission errors. We consider several handshake variants, including endpoint authentication via pre-shared keys or certificates. As a second step, we propose and evaluate modifications to the way message loss is dealt with during the handshake, making DTLS deployable in situations which are prohibitive for default DTLS.

Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
79% related
Social network
42.9K papers, 1.5M citations
74% related
Wireless
133.4K papers, 1.9M citations
74% related
Encryption
98.3K papers, 1.4M citations
73% related
Wireless network
122.5K papers, 2.1M citations
72% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202358
2022140
202137
202065
201991
201877