1. Applied Cryptography: Protocols, Algorithms and Source Code in C;Schneier,1996
2. S. Ravi, A. Raghunathan, S. Chakradhar, Tamper resistance mechanisms for secure embedded systems, in: International Conference on VLSI Design, 2004.
3. B. Schneier, Security pitfalls in cryptography 〈http://www.schneier.com/essay-pitfalls.html〉.
4. Trusted Computing Group, Trusted Platform Module (TPM) specifications. URL 〈http://www.trustedcomputinggroup.org/resources/tpm_main_specification〉
5. ARM, Building a secure system using trustzone technology, ARM Limited.