1. Trusted Computing Group (2007) TPM main part 1 design principles. Specification version 1.2. Level 2 revision 103. TCG Published. July 9, 2007
2. Felten EW (May–June 2003) Understanding trusted computing: will its benefits outweigh its drawbacks? Secur Privacy IEEE 1(3):60–62
3. Grawrock D (2008) Dynamics of a trusted platform. Intel Press, Hillsboro
4. Tarnovsky C (2008) Security failures in secure devices. Black Hat DC February 21, 2008
5. Parno B, McCune J, Perrig A (16–19 May 2010) Bootstrapping trust in commodity computers. 2010 IEEE symposium on security and privacy (SP). pp 414–429