1. WireGuard: Next Generation Kernel Network Tunnel
2. Matthew Garrett and Brandon Weeks. 2019. Verifying Device Identity with TPMs. https://osseu19.sched.com/event/TLMW Matthew Garrett and Brandon Weeks. 2019. Verifying Device Identity with TPMs. https://osseu19.sched.com/event/TLMW
3. David Grawrock . 2009. Dynamics of a Trusted Platform: A Building Block Approach . Intel Press . ISBN 978- 1934 053171. David Grawrock. 2009. Dynamics of a Trusted Platform: A Building Block Approach. Intel Press. ISBN 978-1934053171.
4. Jakob Hagl , Oliver Mann , and Martin Pirker .2021. Securing the Linux Boot Process: From Start to Finish . In Proceedings of the 7th International Conference on Information Systems Security and Privacy (ICISSP). INSTICC, SciTePress, 604–610 . https://doi.org/10.5220/0010313906040610 10.5220/0010313906040610 Jakob Hagl, Oliver Mann, and Martin Pirker.2021. Securing the Linux Boot Process: From Start to Finish. In Proceedings of the 7th International Conference on Information Systems Security and Privacy (ICISSP). INSTICC, SciTePress, 604–610. https://doi.org/10.5220/0010313906040610
5. Niclas Kannengießer , Sebastian Lins , Tobias Dehling , and Ali Sunyaev . 2020. Trade-Offs between Distributed Ledger Technology Characteristics. ACM Comput. Surv. 53, 2 , Article 42 (May 2020 ). https://doi.org/10.1145/3379463 10.1145/3379463 Niclas Kannengießer, Sebastian Lins, Tobias Dehling, and Ali Sunyaev. 2020. Trade-Offs between Distributed Ledger Technology Characteristics. ACM Comput. Surv. 53, 2, Article 42 (May 2020). https://doi.org/10.1145/3379463