Impact of the information technology on the accounting system

YA Jasim, MB Raewf - Cihan University-Erbil Journal …, 2020 - eprints.cihanuniversity.edu.iq
This research aims to measure the effect of information technology (IT) on the accounting
system IT helps to improve the quality and performance of accounting transactions in a …

A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives

M Hossain, G Kayas, R Hasan, A Skjellum, S Noor… - Future Internet, 2024 - mdpi.com
Driven by the rapid escalation of its utilization, as well as ram** commercialization,
Internet of Things (IoT) devices increasingly face security threats. Apart from denial of …

Intel SGX explained

V Costan, S Devadas - Cryptology ePrint Archive, 2016 - eprint.iacr.org
Abstract Intel's Software Guard Extensions (SGX) is a set of extensions to the Intel
architecture that aims to provide integrity and privacy guarantees to security-sensitive …

Shielding applications from an untrusted cloud with haven

A Baumann, M Peinado, G Hunt - ACM Transactions on Computer …, 2015 - dl.acm.org
Today's cloud computing infrastructure requires substantial trust. Cloud users rely on both
the provider's staff and its globally distributed software/hardware platform not to expose any …

Obfuscator-LLVM--software protection for the masses

P Junod, J Rinaldini, J Wehrli… - 2015 ieee/acm 1st …, 2015 - ieeexplore.ieee.org
Software security with respect to reverse-engineering is a challenging discipline that has
been researched for several years and which is still active. At the same time, this field is …

Physical unclonable functions for device authentication and secret key generation

GE Suh, S Devadas - Proceedings of the 44th annual design automation …, 2007 - dl.acm.org
Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets
from physical characteristics of integrated circuits (ICs). We present PUF designs that exploit …

Non-interactive verifiable computing: Outsourcing computation to untrusted workers

R Gennaro, C Gentry, B Parno - … , Santa Barbara, CA, USA, August 15-19 …, 2010 - Springer
We introduce and formalize the notion of Verifiable Computation, which enables a
computationally weak client to “outsource” the computation of a function F on various …

Silicon physical random functions

B Gassend, D Clarke, M Van Dijk… - Proceedings of the 9th …, 2002 - dl.acm.org
We introduce the notion of a Physical Random Function (PUF). We argue that a complex
integrated circuit can be viewed as a silicon PUF and describe a technique to identify and …

SWATT: Software-based attestation for embedded devices

A Seshadri, A Perrig, L Van Doorn… - IEEE Symposium on …, 2004 - ieeexplore.ieee.org
We expect a future where we are surrounded by embedded devices, ranging from Java-
enabled cell phones to sensor networks and smart appliances. An adversary can …

Flicker: An execution infrastructure for TCB minimization

JM McCune, BJ Parno, A Perrig, MK Reiter… - Proceedings of the 3rd …, 2008 - dl.acm.org
We present Flicker, an infrastructure for executing security-sensitive code in complete
isolation while trusting as few as 250 lines of additional code. Flicker can also provide …