1. Kuhlmann D, Landfermanny R, Ramasamy H V. An Open Trusted Computing Architecture-Secure Virtual Machines Enabling User-Defined Policy Enforcement. IBM Reserch Report RZ3655. 2006
2. Pearson S, Balacheff B. Trusted Computing Platforms: Tcpa Technology in Context. New Jersey: Premtice Hall PTR Prees, 2003
3. Delaune S, Kremer S, Ryan M D, et al. A formal analysis of authentication in the TPM. LNCS, 2011, 6151: 350–365
4. LNCS;A. R. Sadeghi,2008
5. ISO/IEC 11889-3. Information Technology-Trusted Platform Module-Part 3: Structures. 2009