1. Lecture Notes in Computer Science;B. Barak,2001
2. Lecture Notes in Computer Science;A. Maña,2002
3. Pagnia, H., Gartner, F.C.: On the impossibility of fair exchange without a trusted third party. Darmstadt University of Technology, Department of Computer Science Tech. Rep. TUD-BS-1999-02 (1999)
4. Spalka, A., Cremers, A.B., Langweg, H.: Protecting the creation of digital signatures with trusted computing platform technology against attacks by Trojan Horse programs. In: Proceedings of the 16th International Conference on Information Security (IFIP/SEC 2001), Kluwer Academic Publishers, Dordrecht (2001)
5. Lecture Notes in Computer Science;I. Schaumüller-Bichl,1985