Academic literature on the topic 'Three-Way Handshake Protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Three-Way Handshake Protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Three-Way Handshake Protocol"
Sy, Erik, Tobias Mueller, Christian Burkert, Hannes Federrath, and Mathias Fischer. "Enhanced Performance and Privacy for TLS over TCP Fast Open." Proceedings on Privacy Enhancing Technologies 2020, no. 2 (2020): 271–87. http://dx.doi.org/10.2478/popets-2020-0027.
Full textGuo, Yang Yong, and Jun Hu. "Research on Connection Ending Protocol on Single-Layer User-Data Switching Platform Architecture." Advanced Materials Research 1044-1045 (October 2014): 1287–92. http://dx.doi.org/10.4028/www.scientific.net/amr.1044-1045.1287.
Full textDing, Hongwei, Mingliang Li, and Jun Zhang. "A CSMA Mechanism with Variable Collision Control and Priority Provision in Multichannel Mobile Ad Hoc Networks." Mobile Information Systems 2021 (July 31, 2021): 1–16. http://dx.doi.org/10.1155/2021/4482815.
Full textYang, Ming Ji, Zhi Yu Jiang, and Hui Ding. "The Attack Principle and Defense Strategy of SYN Flood under Windows." Applied Mechanics and Materials 651-653 (September 2014): 1962–66. http://dx.doi.org/10.4028/www.scientific.net/amm.651-653.1962.
Full textZhao, Yifan, Hongwei Ding, Yingying Guo, et al. "ANALYSIS OF MULTI-CHANNEL TWO-DIMENSIONAL PROBABILITY CSMA AD HOC NETWORK PROTOCOL BASED THREE-WAY HANDSHAKE MECHANISM." International Journal on Smart Sensing and Intelligent Systems 10, no. 1 (2017): 88–107. http://dx.doi.org/10.21307/ijssis-2017-204.
Full textWang, Zhen, and Lin Huang. "VCHR: Virtual Cluster-Based Hybrid Routing Protocol." Key Engineering Materials 467-469 (February 2011): 2117–22. http://dx.doi.org/10.4028/www.scientific.net/kem.467-469.2117.
Full textNirmla, Sharma, K. Gupta S., and Ben Said Olfa. "Design the Connection Creation Bluetooth Techniques using Packet Switching." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2020): 2851–56. https://doi.org/10.35940/ijeat.C6005.029320.
Full textUrmonov, Odilbek, and HyungWon Kim. "Highly Reliable MAC Protocol Based on Associative Acknowledgement for Vehicular Network." Electronics 10, no. 4 (2021): 382. http://dx.doi.org/10.3390/electronics10040382.
Full textNuiaa, Riyadh Rahef, Selvakumar Manickam, and Ali Hakem Alsaeedi. "Distributed reflection denial of service attack: A critical review." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (2021): 5327. http://dx.doi.org/10.11591/ijece.v11i6.pp5327-5341.
Full textRiyadh, Rahef Nuiaa, Manickam Selvakumar, and Hakem Alsaeedi Ali. "Distributed reflection denial of service attack: A critical review." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (2021): 5327–41. https://doi.org/10.11591/ijece.v11i6.pp5327-5341.
Full textBook chapters on the topic "Three-Way Handshake Protocol"
Ding, Hongwei, Shengjie Zhou, Kun Yue, et al. "Multichannel Dual Clocks Two-Dimensional Probability Random Access Protocol with Three-way Handshake Mechanism." In Advances in Computer and Computational Sciences. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3770-2_36.
Full textMa, Jianfeng, and Xinghua Li. "The Provably Secure Formal Methods for Authentication and Key Agreement Protocols." In Handbook of Research on Wireless Security. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-899-4.ch015.
Full textConference papers on the topic "Three-Way Handshake Protocol"
Meng, Jianliang, and Ze Wang. "A RFID Security Protocol Based on Hash Chain and Three-Way Handshake." In 2013 Fifth International Conference on Computational and Information Sciences (ICCIS). IEEE, 2013. http://dx.doi.org/10.1109/iccis.2013.386.
Full textAlahmadi, Mohammed. "Detecting SYN Flood Attack Using CSA-Nets." In 9th International Conference on Computer Science, Engineering and Applications. Academy & Industry Research Collaboration Center, 2023. http://dx.doi.org/10.5121/csit.2023.132301.
Full text