Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Network Endpoint

An individual user device on a data communication network.
National Institutes of Health

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
This paper describes the key components for implementing a modern network for intra-satellite communications at the backplane and… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2012
2012
  • S. Verma, A. Singh
  • Fourth International Conference on Advanced…
  • 2012
  • Corpus ID: 20080910
Podslurping is the intentional or unintentional use of a portable USB mass storage device, such as a USB flash drive (or “thumb… Expand
Is this relevant?
2011
2011
This paper extends the discussion of potential damage that can be done by Hardware Trojan Horse devices by discussing the… Expand
  • table I
  • figure 1
  • figure 2
Is this relevant?
2010
2010
NVESD is developing a Sensor Data and Management Services (SDMS) Service Oriented Architecture (SOA) that provides an innovative… Expand
Is this relevant?
2009
2009
  • 刘浩
  • 2009
  • Corpus ID: 146104277
The invention discloses a wide area network endpoint access domination (EAD) authentication method, comprising: after that the… Expand
Is this relevant?
2008
2008
Trusted computing technology provides powerful support for the solution to security issues of embedded endpoints in mobile… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2007
2007
Online techniques are presented for estimating the source and destination of a suspect transmission through a network based on… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
2006
2006
The objective of the network endpoint localization problem is to estimate the endpoints (source and destination) of some message… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2005
2005
Methods and apparatuses associated with sharing cryptographic keys in a network domain. An embedded agent on a network endpoint… Expand
Is this relevant?
2004
2004
This paper proposes to improve a memory registration strategy for Remote DMA operations over pinningbased networks in the context… Expand
  • table 1
  • figure 1
  • table 2
  • figure 3
  • figure 4
Is this relevant?