The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?
| dc.contributor.author | Lysne, Olav | |
| dc.date.accessioned | 2021-02-10T12:58:18Z | |
| dc.date.issued | 2018 | |
| dc.date.submitted | 2018-10-01 23:55:55 | |
| dc.date.submitted | 2020-03-18 13:36:15 | |
| dc.date.submitted | 2020-04-01T12:03:30Z | |
| dc.identifier | 1002212 | |
| dc.identifier | OCN: 1026406740 | |
| dc.identifier | http://library.oapen.org/handle/20.500.12657/27793 | |
| dc.identifier.uri | https://directory.doabooks.org/handle/20.500.12854/26719 | |
| dc.description.abstract | cyber security; IT management; computer science; computer engineering; digital vulnerability | |
| dc.language | English | |
| dc.relation.ispartofseries | Simula SpringerBriefs on Computing | |
| dc.rights | open access | |
| dc.subject.classification | thema EDItEUR::U Computing and Information Technology::UY Computer science | en_US |
| dc.subject.other | cyber security | |
| dc.subject.other | IT management | |
| dc.subject.other | computer science | |
| dc.subject.other | computer engineering | |
| dc.subject.other | digital vulnerability | |
| dc.subject.other | thema EDItEUR::U Computing and Information Technology::UY Computer science | |
| dc.title | The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? | |
| dc.type | book | |
| oapen.identifier.doi | 10.1007/978-3-319-74950-1 | |
| oapen.relation.isPublishedBy | 9fa3421d-f917-4153-b9ab-fc337c396b5a | |
| oapen.relation.isbn | 9783319749501 | |
| oapen.place.publication | Cham | |
| dc.seriesnumber | 4 |
Fichier(s) constituant ce document
| Fichiers | Taille | Format | Vue |
|---|---|---|---|
|
Il n'y a pas de fichiers associés à ce document. |
|||

