Journal articles on the topic 'Three-Way Handshake Protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 24 journal articles for your research on the topic 'Three-Way Handshake Protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Sy, Erik, Tobias Mueller, Christian Burkert, Hannes Federrath, and Mathias Fischer. "Enhanced Performance and Privacy for TLS over TCP Fast Open." Proceedings on Privacy Enhancing Technologies 2020, no. 2 (2020): 271–87. http://dx.doi.org/10.2478/popets-2020-0027.
Full textGuo, Yang Yong, and Jun Hu. "Research on Connection Ending Protocol on Single-Layer User-Data Switching Platform Architecture." Advanced Materials Research 1044-1045 (October 2014): 1287–92. http://dx.doi.org/10.4028/www.scientific.net/amr.1044-1045.1287.
Full textDing, Hongwei, Mingliang Li, and Jun Zhang. "A CSMA Mechanism with Variable Collision Control and Priority Provision in Multichannel Mobile Ad Hoc Networks." Mobile Information Systems 2021 (July 31, 2021): 1–16. http://dx.doi.org/10.1155/2021/4482815.
Full textYang, Ming Ji, Zhi Yu Jiang, and Hui Ding. "The Attack Principle and Defense Strategy of SYN Flood under Windows." Applied Mechanics and Materials 651-653 (September 2014): 1962–66. http://dx.doi.org/10.4028/www.scientific.net/amm.651-653.1962.
Full textZhao, Yifan, Hongwei Ding, Yingying Guo, et al. "ANALYSIS OF MULTI-CHANNEL TWO-DIMENSIONAL PROBABILITY CSMA AD HOC NETWORK PROTOCOL BASED THREE-WAY HANDSHAKE MECHANISM." International Journal on Smart Sensing and Intelligent Systems 10, no. 1 (2017): 88–107. http://dx.doi.org/10.21307/ijssis-2017-204.
Full textWang, Zhen, and Lin Huang. "VCHR: Virtual Cluster-Based Hybrid Routing Protocol." Key Engineering Materials 467-469 (February 2011): 2117–22. http://dx.doi.org/10.4028/www.scientific.net/kem.467-469.2117.
Full textNirmla, Sharma, K. Gupta S., and Ben Said Olfa. "Design the Connection Creation Bluetooth Techniques using Packet Switching." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2020): 2851–56. https://doi.org/10.35940/ijeat.C6005.029320.
Full textUrmonov, Odilbek, and HyungWon Kim. "Highly Reliable MAC Protocol Based on Associative Acknowledgement for Vehicular Network." Electronics 10, no. 4 (2021): 382. http://dx.doi.org/10.3390/electronics10040382.
Full textNuiaa, Riyadh Rahef, Selvakumar Manickam, and Ali Hakem Alsaeedi. "Distributed reflection denial of service attack: A critical review." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (2021): 5327. http://dx.doi.org/10.11591/ijece.v11i6.pp5327-5341.
Full textRiyadh, Rahef Nuiaa, Manickam Selvakumar, and Hakem Alsaeedi Ali. "Distributed reflection denial of service attack: A critical review." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (2021): 5327–41. https://doi.org/10.11591/ijece.v11i6.pp5327-5341.
Full textRamkumar, B. N., and T. Subbulakshmi. "Tcp Syn Flood Attack Detection and Prevention System using Adaptive Thresholding Method." ITM Web of Conferences 37 (2021): 01016. http://dx.doi.org/10.1051/itmconf/20213701016.
Full textPeacemark, Kipkorir, Ephantus Mwangi, and Jotham Wasike. "A Machine Learning-Based Packet Sniffer for Detection and Classification of the Denial-Of-Service Attack Packets at the Network Layer." International Journal of Research and Innovation in Applied Science X, no. V (2025): 568–82. https://doi.org/10.51584/ijrias.2025.100500051.
Full textVedula, Vasudha, Palden Lama, Rajendra V. Boppana, and Luis A. Trejo. "On the Detection of Low-Rate Denial of Service Attacks at Transport and Application Layers." Electronics 10, no. 17 (2021): 2105. http://dx.doi.org/10.3390/electronics10172105.
Full textYuan, Yunjie, Gongye Ren, Xingyu Cai, and Xuguang Li. "An Adaptive 3D Neighbor Discovery and Tracking Algorithm in Battlefield Flying Ad Hoc Networks with Directional Antennas." Sensors 24, no. 17 (2024): 5655. http://dx.doi.org/10.3390/s24175655.
Full textKhan, Kashif Mehboob, Aabira Fahim, Darakhshan M. Saleem, and Marvi Jokhio. "Empirical Investigation on Blockchain Interoperability." VFAST Transactions on Software Engineering 11, no. 1 (2023): 25–36. http://dx.doi.org/10.21015/vtse.v10i4.1315.
Full textKumar, Prof Pradeep. "Creating One Time Password Programming for the Security of Data for Remote Location Treatment in Body Area Network." International Journal on Recent and Innovation Trends in Computing and Communication 9, no. 10 (2021): 01–02. http://dx.doi.org/10.17762/ijritcc.v9i10.5497.
Full textMiasse, Herman Olivier, Timothee Kombe, Olivier Videme Bossou, and Pierre Ele. "Accuracy Low-Cost “Handshake” Two-Way Ranging Protocol Applied to Road Traffic Communications." Transport and Telecommunication Journal 25, no. 3 (2024): 311–20. http://dx.doi.org/10.2478/ttj-2024-0023.
Full textWang, Jie, Xin Hong Wang, Guo Xia Zhang, and Fu Qiang Liu. "Simulation of a Single-Radio Multi-Channel Vehicular Node Structure for VANET in NS-2." Applied Mechanics and Materials 195-196 (August 2012): 732–37. http://dx.doi.org/10.4028/www.scientific.net/amm.195-196.732.
Full textTauqeer, Muhammad, Moneeb Gohar, Seok Koh, and Hani Alquhayz. "Use of QUIC for Mobile-Oriented Future Internet (Q-MOFI)." Electronics 13, no. 2 (2024): 431. http://dx.doi.org/10.3390/electronics13020431.
Full textAHMAD, ALOMARI RAFAT ALSHORMAN. "PROVING THE CORRECTNESS CONDITIONS OF THE THREE-WAY HANDSHAKE PROTOCOL USING COMPUTATIONAL TREE LOGIC." Journal of Theoretical and Applied Information Technology 99, no. 15 (2021). https://doi.org/10.5281/zenodo.5353200.
Full textZhao, Yifan, Hongwei Ding, Yingying Guo, et al. "ANALYSIS OF MULTI-CHANNEL TWO-DIMENSIONAL PROBABILITY CSMA AD HOC NETWORK PROTOCOL BASED THREE-WAY HANDSHAKE MECHANISM." International Journal on Smart Sensing and Intelligent Systems 10, no. 1 (2017). https://doi.org/10.21307/ijssis-2017-204.
Full textPahlevi, Rizka Reza, Parman Sukarno, and Bayu Erfianto. "Secure MQTT PUF-Based Key Exchange Protocol for Smart Healthcare." Jurnal Rekayasa Elektrika 17, no. 2 (2021). http://dx.doi.org/10.17529/jre.v17i2.20428.
Full text"Design the Connection Creation Bluetooth Techniques using Packet Switching." International Journal of Engineering and Advanced Technology 9, no. 3 (2020): 2851–56. http://dx.doi.org/10.35940/ijeat.c6005.029320.
Full textTuyên, Đặng Văn, and Trương Thu Hương. "SSG - A Solution to Prevent Saturation Attack on the Data Plane and Control Plane in SDN/Openflow Network." Research and Development on Information and Communication Technology 2019, no. 1 (2019). http://dx.doi.org/10.32913/mic-ict-research.v2019.n1.833.
Full text