E. Brickell, J. Camenisch, and L. Chen, Direct anonymous attestation, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.132-145, 2004.
DOI : 10.1145/1030083.1030103

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.58.5041

G. Chen and F. Rahman, Analyzing Privacy Designs of Mobile Social Networking Applications, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp.83-88, 2008.
DOI : 10.1109/EUC.2008.156

K. Dietrich, A Secure and Reliable Platform Configuration Change Reporting Mechanism for Trusted Computing Enhanced Secure Channels, 2008 The 9th International Conference for Young Computer Scientists, pp.2137-2142, 2008.
DOI : 10.1109/ICYCS.2008.530

A. Ganguly, A. Agrawal, P. Boykin, and R. Figueiredo, IP over P2P: enabling self-configuring virtual IP networks for grid computing, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium, 2006.
DOI : 10.1109/IPDPS.2006.1639287

K. Goldman, R. Perez, and R. Sailer, Linking remote attestation to secure tunnel endpoints, Proceedings of the first ACM workshop on Scalable trusted computing , STC '06, pp.21-24, 2006.
DOI : 10.1145/1179474.1179481

N. Kuntze and A. U. Schmidt, Trusted Ticket Systems and Applications, Proceedings of the IFIP sec2007, pp.14-16, 2007.
DOI : 10.1007/978-0-387-72367-9_5

URL : http://arxiv.org/abs/cs/0701144

A. Leung, L. Chen, and C. Mitchell, On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA), 2007.
DOI : 10.1007/978-3-540-68979-9_14

S. Pearson, Trusted Computing Platforms, the Next Security Solution, Bristol UK: HP Laboratories, 2002.

W. Pollock, C. Pitcher, and I. Chicago, Identifying Trustworthy Hosts Using Remote Attestation (accessed on 31, 2010.

C. Rudolph, Covert Identity Information in Direct Anonymous Attestation (DAA) IFIP Security, p.443, 2007.

V. Scarlata, C. Rozas, M. Wiseman, D. Grawrock, and C. Vishik, TPM Virtualization: Building a General Framework, 2007.
DOI : 10.1007/978-3-8348-9452-6_4

S. Schechter, R. Greenstadt, and M. Smith, Trusted Computing, Peer-to-Peer Distribution, and The Economics of Pirated Entertainment, Proceedings of The Second Annual Workshop on Economics and Information Security, pp.29-30, 2003.
DOI : 10.1007/1-4020-8090-5_5

A. Schmidt, N. Kuntze, and M. Kasper, On the Deployment of Mobile Trusted Modules, 2008 IEEE Wireless Communications and Networking Conference, pp.3169-3174, 2008.
DOI : 10.1109/WCNC.2008.553

F. Stumpf, A. Fuchs, A. Katzenbeisser, and C. Eckert, Improving the scalability of platform attestation, Proceedings of the 3rd ACM workshop on Scalable trusted computing, STC '08, pp.1-10, 2008.
DOI : 10.1145/1456455.1456457

F. Stumpf, O. Tafreschi, P. Roder, and C. Eckert, A Robust Integrity Reporting Protocol for Remote Attestation, Proceedings of the Workshop on Advances in Trusted Computing (WATC), 2006.

M. Tsugawa and J. Fortes, A virtual network (ViNe) architecture for grid computing, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium, 2006.
DOI : 10.1109/IPDPS.2006.1639380

J. Winter, Trusted computing building blocks for embedded linux-based ARM trustzone platforms, Proceedings of the 3rd ACM workshop on Scalable trusted computing, STC '08, pp.21-30, 2008.
DOI : 10.1145/1456455.1456460

D. Wolinsky, A. Agrawal, P. Boykin, J. Davis, A. Ganguly et al., On the Design of Virtual Machine Sandboxes for Distributed Computing in Wide-area Overlays of Virtual Workstations, First International Workshop on Virtualization Technology in Distributed Computing (VTDC 2006), p.8, 2006.
DOI : 10.1109/VTDC.2006.8