1. Backes, M., Maffei, M., Unruh, D.: Zero knowledge in the applied Pi–calculus and automated verification of the direct anonymous attestation protocol. In: IEEE Symposium on Security and Privacy – SSP 2008, pp. 202–215 (2008)
2. Balfe, S., Lakhani, A.D., Paterson, K.G.: Securing peer-to-peer networks using Trusted Computing. In: Mitchell, C. (ed.) Trusted Computing, pp. 271–298. IEEE, London (2005)
3. Bernhard, D., Fuchsbauer, G., Ghadafi, E., Smart, N.P.,Warinschi, B.: Anonymous attestation with user-controlled linkability. Cryptology ePrint Archive: Report 2011/658, https://eprint.iacr.org/2011/658 (visited April 2014)
4. Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: The 11th ACM Conference on Computer and Communications Security, pp. 132–145. ACM Press (2004)
5. Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation in context. In: Mitchell, C (ed.) Trusted Computing, pp. 143–174. IEEE, London (2005)