The Huawei and Snowden Questions : Can Electronic Equipment from Untrusted Vendors Be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?
| Main Author: | Lysne, Olav. |
|---|---|
| Format: | eBook |
| Language: | English |
| Published: |
Cham :
Springer International Publishing AG,
2018.
|
| Edition: | 1st ed. |
| Series: | Simula SpringerBriefs on Computing Series
|
| Subjects: | |
| Online Access: | Click to View |
Similar Items
-
Database Principles and Technologies - Based on Huawei GaussDB.
by: Huawei Technologies Co., Ltd., Ltd.
Published: (2022) -
The Huawei story /
by: Tao, Tian,, et al.
Published: (2015) -
Can. Trust. Will : Hiring for the Human Element in the New Age of Cybersecurity.
by: Garber, Leeza.
Published: (2022) -
Web Authentication Using Third-Parties in Untrusted Environments.
by: Vapen, Anna.
Published: (2016) -
Outsourcing--insourcing can vendors make money from the new relationship opportunities? /
Published: (2005)


