1. Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., Levkowetz, H.: Extensible Authentication Protocol (EAP). RFC 3748 (Proposed Standard) (June 2004)
2. Balacheff, B., Chen, L., Pearson, S., Plaquin, D., Proudler, G. (eds.): Trusted Computing Platforms: TCPA Technology in Context. Prentice Hall PTR, Upper Saddle River (2003)
3. Chen, L., Landfermann, R., Löhr, H., Rohe, M., Sadeghi, A.-R., Stüble, C.: A protocol for property-based attestation. In: STC 2006: Proceedings, First ACM Workshop on Scalable Trusted Computing, pp. 7–16. ACM Press, New York (2006)
4. AMD Corporation. Amd64 architecture programmer’s manual volume 2: System programming rev 3.11 (January 2006), http://www.amd.com/usen/assets/content_type/white_papers_and_tech_docs /24593.pdf
5. Intel Corporation. Intel trusted execution technology (November 2006),
http://download.intel.com/technology/security/downloads/31516803.pdf