1. Blum M, Feldman P, Micali S (1988) Non-interactive zero-knowledge and its applications. In: Proceedings of the twentieth annual ACM symposium on theory of computing (STOC ‘88). ACM, New York, pp 103–112
2. Intel Trusted execution Technology—whitepaper hardware based technology for advanced server protection.
http://www.intel.com/content/www/us/en/trusted-execution-technology/trusted-execution-technology-security-paper.html
,
http://www.intel.com/content/dam/www/public/us/en/documents/white-papers/trusted-execution-technology-security-paper.pdf
3. Quisquater J-J, Guillou LC, Berson TA (1990) How to explain zero-knowledge protocols to your children. In: Advances in cryptology—CRYPTO ‘89 proceedings, lecture notes in computer science, vol 435. Springer, Berlin, pp 628–631
4. Stiel M (2005) 17 mistakes Microsoft made with the Xbox security system. In: 22nd computer chaos club conference
5. Tarnovsky C (2010) Hacking the smartcard chip. Blackhat, DC