1. Anderson, R., Kuhn, M.: Tamper resistance - a cautionary note. In: Proceedings of the Second USENIX Workshop on Electronic Commerce (1996)
2. Arbaugh, W.A., Farber, D.J., Smith, J.M.: A secure and reliable bootstrap architecture. In: SP 1997: Proceedings of the 1997 IEEE Symposium on Security and Privacy, Washington, DC, USA, p. 65. IEEE Computer Society, Los Alamitos (1997)
3. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: CCS 2007: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598–609. ACM, New York (2007)
4. Ateniese, G., Di Pietro, R., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: SecureComm 2008: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, pp. 1–10. ACM, New York (2008)
5. Atmel Corporation. Atmega128 datasheet,
http://www.atmel.com/atmel/acrobat/doc2467.pdf