1. R. Anderson, “Cryptography and Competition Policy - Issues with ‘Trusted Computing’,” in Advances in Information Security. vol. 12, S. Jajodia, L. Camp and S. Lewis, Eds.: Springer US,;1; 2004, pp. 35-52.
2. R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn, “Design and implementation of a TCG-based integrity measurement architecture,” in SSYM’04, Berkeley, CA, USA, 2004, p. 16--16.
3. Trusted Computing: Security and Applications;Gallery;Cryptologia, 33, 217--245,2009
4. Development of trusted computing research;Huanguo;Wuhan University, co-published with Springer,2006
5. Foundations of Cryptography: Basic Tools. New York, NY USA:;Goldreich,2000