1. Attack, solution and verification for shared authorisation data in TCG TPM;Chen,2010
2. Flicker: an execution infrastructure for TCB minimization;McCune,2008
3. Introducing the trusted virtual environment module: a new mechanism for rooting trust in cloud computing;Krautheim,2010
4. OSLO: improving the security of trusted computing;Kauer,2007
5. Dynamic enforcement of platform integrity;Pirker,2010