The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?
Abstract
cyber security; IT management; computer science; computer engineering; digital vulnerability
Keywords
cyber security; IT management; computer science; computer engineering; digital vulnerabilityDOI
10.1007/978-3-319-74950-1ISBN
9783319749501OCN
1026406740Publisher
Springer NaturePublisher website
https://www.springernature.com/gp/products/booksPublication date and place
Cham, 2018Series
Simula SpringerBriefs on Computing, 4Classification
Computer science