Search

Your search keyword '"Handshake"' showing total 500 results

Search Constraints

Start Over You searched for: Descriptor "Handshake" Remove constraint Descriptor: "Handshake" Topic computer network Remove constraint Topic: computer network
500 results on '"Handshake"'

Search Results

1. Age of Information Minimization for Grant-Free Non-Orthogonal Massive Access Using Mean-Field Games

2. RHNE-MAC: Random Handshake MAC Protocol Based on Nash Equilibrium for Underwater Wireless Sensor Networks

3. A Systematic Approach to Formal Analysis of QUIC Handshake Protocol Using Symbolic Model Checking

4. Secure and Usable Handshake Based Pairing for Wrist-Worn Smart Devices on Different Users

6. A Secure IoT Firmware Update Scheme Against SCPA and DoS Attacks

7. Using Overhearing and Rateless Coding in Disseminating Various Messages in Vehicular AdHoc Networks

8. A Link-Layer Synchronization and Medium Access Control Protocol for Terahertz-Band Communication Networks

9. Geographic Multipath Routing based on Triangle Link Quality Metric with Minimum Inter-path Interference for Wireless Multimedia Sensor Networks

10. An Adaptive High-Throughput Multichannel MAC Protocol for VANETs

11. iTLS: Lightweight Transport-Layer Security Protocol for IoT With Minimal Latency and Perfect Forward Secrecy

12. A Sequence-Scheduled and Query-Based MAC Protocol for Underwater Acoustic Networks with a Mobile Node

13. ME-TLS: Middlebox-Enhanced TLS for Internet-of-Things Devices

14. An optimized recognition algorithm for SSL VPN protocol encrypted traffic

15. Design and Implementation of Data Security Transmission System Based on SSL

16. Secure Authentication in WLAN Using Modified Four-Way Handshake Protocol

17. Public Key Reinforced Blockchain Platform for Fog-IoT Network System Administration

18. Formal Analysis of SA-TEK 3-Way Handshake Protocols

19. Identification of TLS Communications Using Randomness Testing

20. Julia

21. Connected and Autonomous Electric Vehicles Charging Reservation and Trip Planning System

22. Link Adaptive Protocol for V2LC

23. Mobility-Enabled Authentication Scheme for IoT Architecture

24. An Opportunistic Directional MAC Protocol with Pulse/Tone Exchange in Wireless Ad-Hoc Networks

25. Tone-Based Contention Resolution for Multi-hop Wireless Sensor Networks

26. An enhanced 4-way technique using cookies for robust authentication process in wireless network

27. REMOVING RF VULNERABILITIES FROM IOT DEVICES

28. Model and implementation of user activity tracking utilizing the TLS Client Hello's server name extension

29. Stateless One-time Authenticated Session Resumption in TLS Handshake Using Paired Token

30. QUICsand: Quantifying QUIC Reconnaissance Scans and DoS Flooding Events

31. Stateless Re-Association in WPA3 Using Paired Token

32. An Efficient and Generic Construction for Signal’s Handshake (X3DH): Post-Quantum, State Leakage Secure, and Deniable

33. A Cryptographic Analysis of the TLS 1.3 Handshake Protocol

34. Usable and Secure Pairing Based on Handshake for Wrist-Worn Smart Devices on Different Users

35. A CSMA Mechanism with Variable Collision Control and Priority Provision in Multichannel Mobile Ad Hoc Networks

36. ASSURE: A Hardware-Based Security Protocol for Internet of Things Devices

37. WebRTC Data Channel Establishment Protocol

38. BA-TLS: Blockchain Authentication for Transport Layer Security in Internet of Things

39. A Collision-Protected Multihop Frame Transmission Method with Wireless LAN Communication Supported by Longer-Distance Wireless Communication

40. An Uplink Grant-Free Access Solution Based on Sparse Resource Pattern for IoT

41. A Lightweight Security Authentication Method for the Charging Protocol of Smart Charging Pile

42. A handshake algorithm for scheduling communications in wireless sensor networks

43. Reducing NoC Energy Consumption Exploring Asynchronous End-to-end GALS Communication

44. Authentication Technology in Industrial Control System Based on Identity Password

45. Efficient Post-Quantum TLS Handshakes using Identity-Based Key Exchange from Lattices

46. The Impact of SGI and RTS/CTS in WLAN Throughput

47. Protecting publish/subscribe interactions via TLS and a system-wide certificate validation engine

48. Stupify: A Hardware Countermeasure of KRACKs in WPA2 using Physically Unclonable Functions

49. TLS-Level Security for Low Power Industrial IoT Network Infrastructures

50. A Handy Approach for Teaching and Learning Computer Networks using Wireshark

Catalog

Books, media, physical & digital resources