Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Network Endpoint

An individual user device on a data communication network.
National Institutes of Health

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
This paper describes the key components for implementing a modern network for intra-satellite communications at the backplane and… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2012
2012
  • S. Verma, A. Singh
  • Fourth International Conference on Advanced…
  • 2012
  • Corpus ID: 20080910
Podslurping is the intentional or unintentional use of a portable USB mass storage device, such as a USB flash drive (or “thumb… Expand
2011
2011
This paper extends the discussion of potential damage that can be done by Hardware Trojan Horse devices by discussing the… Expand
  • table I
  • figure 1
  • figure 2
2010
2010
NVESD is developing a Sensor Data and Management Services (SDMS) Service Oriented Architecture (SOA) that provides an innovative… Expand
2009
2009
  • 刘浩
  • 2009
  • Corpus ID: 146104277
The invention discloses a wide area network endpoint access domination (EAD) authentication method, comprising: after that the… Expand
2008
2008
Trusted computing technology provides powerful support for the solution to security issues of embedded endpoints in mobile… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2006
2006
The objective of the network endpoint localization problem is to estimate the endpoints (source and destination) of some message… Expand
  • figure 1
  • figure 2
  • figure 3
2005
2005
Methods and apparatuses associated with sharing cryptographic keys in a network domain. An embedded agent on a network endpoint… Expand
2005
2005
Methods and apparatuses associated with sharing cryptographic keys in a network domain. An embedded agent on a network endpoint… Expand
2004
2004
This paper proposes to improve a memory registration strategy for Remote DMA operations over pinningbased networks in the context… Expand
  • table 1
  • figure 1
  • table 2
  • figure 3
  • figure 4