Skip to main content

Trusting Code and Trusting Hardware

  • Chapter
  • 675 Accesses

Keywords

  • Smart Card
  • Identity Management
  • Embed Software
  • Identity Theft
  • Trust Code

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   19.99
Price excludes VAT (Canada)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions
Authors

Rights and permissions

Reprints and Permissions

Copyright information

© 2007 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Yee, B. (2007). Trusting Code and Trusting Hardware. In: Economics of Identity Theft: Avoidance, Causes and Possible Cures. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-68614-1_8

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-68614-1_8

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-34589-5

  • Online ISBN: 978-0-387-68614-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics