1. Siewiorek D. P., Yang Z. X., Chillarege R, et al.: Industry trends and research in dependable computing. Chinese journal of computers, 30, 2, 1645-1661.
2. Trusted Computing-closing that lingering doubt;Mark;Network Security,2006
3. Seshadri A., Luk M., Perrig A.: Externally Verifiable Code Execution. Communications of the ACM, 49(9), 45-49.
4. Vasiliadis D. C., Rizos G. E., Steriou E.: A trusted network model using the lightweight directory access protocol. Proceedings of the 7th Conference on WSEAS. Athens, Greece. pp. 252-256(2007).
5. Remote Attestation on Legacy Operating Systems With Trusted Platform Modules;Schellekens;Electronic Notes in Theoretical Computer Science,2008