Information technology's impact on the accounting system

YA Jasim, MB Raewf - Cihan University-Erbil …, 2020 - journals.cihanuniversity.edu.iq
This research aims to measure the effect of information technology (IT) on the accounting
system IT helps to improve the quality and performance of accounting transactions in a …

Cryptographic processors-a survey

R Anderson, M Bond, J Clulow… - Proceedings of the …, 2006 - ieeexplore.ieee.org
Tamper-resistant cryptographic processors are becoming the standard way to enforce data-
usage policies. Their origins lie with military cipher machines and PIN processing in banking …

Intel SGX explained

V Costan, S Devadas - Cryptology ePrint Archive, 2016 - eprint.iacr.org
Abstract Intel's Software Guard Extensions (SGX) is a set of extensions to the Intel
architecture that aims to provide integrity and privacy guarantees to security-sensitive …

Shielding applications from an untrusted cloud with haven

A Baumann, M Peinado, G Hunt - ACM Transactions on Computer …, 2015 - dl.acm.org
Today's cloud computing infrastructure requires substantial trust. Cloud users rely on both
the provider's staff and its globally distributed software/hardware platform not to expose any …

Obfuscator-LLVM--software protection for the masses

P Junod, J Rinaldini, J Wehrli… - 2015 ieee/acm 1st …, 2015 - ieeexplore.ieee.org
Software security with respect to reverse-engineering is a challenging discipline that has
been researched for several years and which is still active. At the same time, this field is …

Non-interactive verifiable computing: Outsourcing computation to untrusted workers

R Gennaro, C Gentry, B Parno - … , Santa Barbara, CA, USA, August 15-19 …, 2010 - Springer
We introduce and formalize the notion of Verifiable Computation, which enables a
computationally weak client to “outsource” the computation of a function F on various …

Physical unclonable functions for device authentication and secret key generation

GE Suh, S Devadas - Proceedings of the 44th annual design automation …, 2007 - dl.acm.org
Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets
from physical characteristics of integrated circuits (ICs). We present PUF designs that exploit …

Silicon physical random functions

B Gassend, D Clarke, M Van Dijk… - Proceedings of the 9th …, 2002 - dl.acm.org
We introduce the notion of a Physical Random Function (PUF). We argue that a complex
integrated circuit can be viewed as a silicon PUF and describe a technique to identify and …

Flicker: An execution infrastructure for TCB minimization

JM McCune, BJ Parno, A Perrig, MK Reiter… - Proceedings of the 3rd …, 2008 - dl.acm.org
We present Flicker, an infrastructure for executing security-sensitive code in complete
isolation while trusting as few as 250 lines of additional code. Flicker can also provide …

SWATT: Software-based attestation for embedded devices

A Seshadri, A Perrig, L Van Doorn… - IEEE Symposium on …, 2004 - ieeexplore.ieee.org
We expect a future where we are surrounded by embedded devices, ranging from Java-
enabled cell phones to sensor networks and smart appliances. An adversary can …