The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?

Download Url(s)
https://library.oapen.org/bitstream/20.500.12657/27793/1/1002212.pdf---
https://library.oapen.org/bitstream/20.500.12657/27793/1/1002212.pdf
---
https://library.oapen.org/bitstream/20.500.12657/27793/1/1002212.pdf
---
https://library.oapen.org/bitstream/20.500.12657/27793/1/1002212.pdf
Author(s)
Lysne, Olav
Language
EnglishAbstract
cyber security; IT management; computer science; computer engineering; digital vulnerability
Keywords
cyber security; IT management; computer science; computer engineering; digital vulnerability; thema EDItEUR::U Computing and Information Technology::UY Computer scienceISBN
9783319749501Publisher
Springer NaturePublisher website
http://www.springernature.com/oabooksPublication date and place
Cham, 2018Series
Simula SpringerBriefs on Computing,Classification
Computer science

