Browse Items (1 total)

  • Tags: information technology-Security Measure

1002212.pdf.jpg
This book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In…
Output Formats

atom, csv, dcmes-xml, json, omeka-xml, rss2