Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Impact of the information technology on the accounting system
This research aims to measure the effect of information technology (IT) on the accounting
system IT helps to improve the quality and performance of accounting transactions in a …
system IT helps to improve the quality and performance of accounting transactions in a …
A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives
Driven by the rapid escalation of its utilization, as well as ram** commercialization,
Internet of Things (IoT) devices increasingly face security threats. Apart from denial of …
Internet of Things (IoT) devices increasingly face security threats. Apart from denial of …
Intel SGX explained
Abstract Intel's Software Guard Extensions (SGX) is a set of extensions to the Intel
architecture that aims to provide integrity and privacy guarantees to security-sensitive …
architecture that aims to provide integrity and privacy guarantees to security-sensitive …
Shielding applications from an untrusted cloud with haven
Today's cloud computing infrastructure requires substantial trust. Cloud users rely on both
the provider's staff and its globally distributed software/hardware platform not to expose any …
the provider's staff and its globally distributed software/hardware platform not to expose any …
Obfuscator-LLVM--software protection for the masses
P Junod, J Rinaldini, J Wehrli… - 2015 ieee/acm 1st …, 2015 - ieeexplore.ieee.org
Software security with respect to reverse-engineering is a challenging discipline that has
been researched for several years and which is still active. At the same time, this field is …
been researched for several years and which is still active. At the same time, this field is …
Physical unclonable functions for device authentication and secret key generation
Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets
from physical characteristics of integrated circuits (ICs). We present PUF designs that exploit …
from physical characteristics of integrated circuits (ICs). We present PUF designs that exploit …
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
We introduce and formalize the notion of Verifiable Computation, which enables a
computationally weak client to “outsource” the computation of a function F on various …
computationally weak client to “outsource” the computation of a function F on various …
Silicon physical random functions
We introduce the notion of a Physical Random Function (PUF). We argue that a complex
integrated circuit can be viewed as a silicon PUF and describe a technique to identify and …
integrated circuit can be viewed as a silicon PUF and describe a technique to identify and …
SWATT: Software-based attestation for embedded devices
We expect a future where we are surrounded by embedded devices, ranging from Java-
enabled cell phones to sensor networks and smart appliances. An adversary can …
enabled cell phones to sensor networks and smart appliances. An adversary can …
Flicker: An execution infrastructure for TCB minimization
We present Flicker, an infrastructure for executing security-sensitive code in complete
isolation while trusting as few as 250 lines of additional code. Flicker can also provide …
isolation while trusting as few as 250 lines of additional code. Flicker can also provide …