1. Lecture Notes in Computer Science;A. Young,1997
2. Drimer, S., Murdoch, S.J., Anderson, R.J.: Thinking inside the box: System-level failures of tamper proofing. In: IEEE Symposium on Security and Privacy, pp. 281–295. IEEE Computer Society, Los Alamitos (2008)
3. Itkis, G.: Cryptographic tamper evidence. In: CCS 2003: Proc. 10th ACM Conference on Computer and Communications Security, pp. 355–364. ACM, New York (2003)
4. Informatik-Fachberichte;B. Pfitzmann,1991
5. Lecture Notes in Computer Science;E. Heyst van,1993