1. Common Criteria for Information Technology Security Evaluation,
http://www.commoncriteriaportal.org/thecc.html
2. Trusted Computing Group: TPM Main Specification Version 1.2 rev. 103 (July 2007),
https://www.trustedcomputinggroup.org
3. Smith, S.W., Weingart, S.: Building a high-performance, programmable secure coprocessor. Computer Networks 31(8), 831–860 (1999)
4. Yee, B.S.: Using Secure Coprocessors. PhD thesis, School of Computer Science, Carnegie Mellon University, CMU-CS-94-149 (May 1994)
5. Kurth, H., Krummeck, G., Stüble, C., Weber, M., Winandy, M.: HASK-PP: Protection profile for a high assurance security kernel (2008),
http://www.sirrix.com/media/downloads/54500.pdf