1. Abadi, M., Needham, R.: Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering 22(1), 6–15 (1996)
2. Anderson, R., Kuhn, M.: Tamper resistance - a cautionary note. In: Proceedings of the Second Usenix Workshop on Electronic Commerce, pp. 1–11 (November 1996)
3. Anderson, R.: Security Engineering. Wiley, Chichester (2001)
4. Anderson, T., Shenker, S., Stoica, I., Wetherall, D.: Design guidelines for robust internet protocols (2002)
5. Arbaugh, W.A.: Chaining Layered Integrity Checks. PhD thesis, University of Pennsylvania (1999)