1. Trusted Computing Group TPM Specification Version 1.2 Revision 103 (2007), https://www.trustedcomputinggroup.org/specs/TPM/
2. Lecture Notes in Computer Science;P. England,2002
3. Sparks, E.R.: A Security Assesment of Trusted Platform Modules. Dartmouth College, Technical Report. TR2007-597
4. Halderman, J.A., et al.: Lest We Remember: Cold Boot Attacks on Encryption Keys. In: Proc. 2008 USENIX Security Symposium (2008)
5. Bruschi, D., et al.: Attacking a Trusted Computing Platform. Improving the Security of the TCG Specification. Technical Report. Università degli Studi di Milano. Milan (2005)