Catalog Search Results
This open access book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In separate chapters the book takes readers through the state of the art in fields of computer science that can shed light on these questions. In a concluding chapter
...Spelling Suggestions
Didn't find what you want? Here are some alternative spellings that you can try.
Didn't find it?
Didn't find it in the Minuteman Library Network? Request it from other Massachusetts library systems.
Can't find what you are looking for? Recommend it to your local library as a future purchase. Suggest a Purchase