1. S. Balfe, E. Gallery, C. J. Mitchell, and K. G. Paterson, Challenges for trusted computing, Tech. Report RHUL-MA-2008-14, Department of Mathematics, Royal Holloway, University of London, (2008).
2. S. Balfe and K. G. Paterson, Augmenting internet-based card not present transactions with trusted computing: An analysis, Tech. Report RHUL-MA-2006-9, Department of Mathematics, Royal Holloway, University of London, (2005).
3. P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the Art of Virtualization. In Proc. 19th ACM Symposium on Operating Systems Principles (SOSP 2003), NY, Oct. (2003).
4. T. Gar¯nkel, M. Rosenblum, and D. Boneh, Flexible OS support and applications for trusted computing, Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems, Lihue, Hawaii, USA, May 18{21, 2003, USENIX Association, 2003, p.145.
5. TCG. TPM main specification. v1. 2, rev. 103, (2007).