1. Trusted Computing Group. TCG Specification Architecture Overview, Revision 1.4 [DB/OL]. [2009-08-02]. http://www.trustedcomputinggroup.org/files/resource_files/AC652DE1-1D09-3519-ADA026A0C05CFAC2/TCG_14_Architecture_Overview.pdf .
2. Pearson S. Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy[M]. Berlin: Springer-Verlag, 2005.
3. Shen Changxiang, Zhang Huanguo, Feng Dengguo, et al. Survey of information security [J]. Science in China (Information Sciences), 2007, 37(2): 129–150.
4. Trusted Computing Group. TPM main specifications —part 1 design principles [DB/OL]. [2009-07-09]. http://www.trustedcomputinggroup.org/files/resource_files/ACD19914-1D09-3519-ADA64741A1A15795/mainP1DPrev103.zip .
5. Lin Chuang, Peng Xuehai. Research on trustworthy networks [J]. Chinese Journal of Computers, 2005, 28(5): 751–758(Ch).