1. An efficient VM-based software protection
2. Kennell, R., & Jamieson, L. H. (2003, August). Establishing the Genuinity of Remote Computer Systems. In USENIX Security Symposium (pp. 295-308). USENIX.
3. Kennell, R., & Jamieson, L. H. (2004). An analysis of proposed attacks against genuinity tests. CERIAS, Purdue Univ.
4. Kiperberg, M., & Zaidenberg, N. (2013). Efficient Remote Authentication. Journal of Information Warfare, 12(3), 49-55.