1. AIS – Fraunhofer Institute for applied and integrated security (2015): PEP – Protecting Electronic Products. Unter:
http://www.aisec.fraunhofer.de/de/fields-of-expertise/product-protection/pep-protecting-electronic-products.html
, am 5. März 2018
2. Bossert, O.; Richter, W.; Weinberg, A. (2015): Protecting the enterprise with cybersecure IT architecture. McKinsey & Company, New York
3. BSI – Bundesamt für Sicherheit in der Informationstechnik (Hrsg.) (2014): Die Lage der IT Sicherheit in Deutschland 2014
4. Campbell, T.A.; Cass, W.J. (2013): 3-D Printing Will be a Counterfeiter’s Best Friend. Scientific American. Unter:
https://www.scientificamerican.com/article/3-d-printing-will-be-a-counterfeiters-best-friend/
, am 6. Juni 2019
5. Dragon, R.; Ostermann, J.; Denkena, B.; Breidenstein, B.; Mörke, T. (2010): Data Storage in Gentelligent Components: A New Way for Self-Authentication. 33rd Annual German Conference on Artificial Intelligence, Self-X in Engineering: 2nd Workshop on „Self-X in Engineering“, Karlsruhe, S. 1–13