Lysne, Olav

The Huawei and Snowden Questions Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?


English[eng]


Privacy||Computer Engineering||Management of Computing and Information Systems||Governance and Government||R & D/Technology Policy||Computer Hardware||IT Operations||Economics||cyber security||IT management||computer science||digital vulnerability||open access||Privacy & data protection||Information architecture||Maintenance & repairs||Political structure & processes||Research & development management