J. Stradley and D. Karraker, The electronic part supply chain and risks of counterfeit parts in defense applications Components and Packaging Technologies, IEEE Transactions on, vol.29, issue.3, pp.703-705, 2006.

S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola et al., Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications, 2008 IEEE International Conference on RFID, 2008.
DOI : 10.1109/RFID.2008.4519377

B. Parno, J. M. Mccune, and A. Perrig, Bootstrapping trust in commodity computers, Security and Privacy (SP), 2010.

E. Brickell, J. Camenisch, and L. Chen, Direct anonymous attestation, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, 2004.
DOI : 10.1145/1030083.1030103

N. Kuntze and C. Rudolph, On the automatic establishment of security relations for devices, Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management. IFIP/IEEE, 2013.

R. Sailer, X. Zhang, T. Jaeger, and L. Van-doorn, Design and implementation of a tcg-based integrity measurement architecture, Proceedings of the 13th conference on USENIX Security Symposium, pp.16-16, 2004.

A. Oberle, A. Rein, N. Kuntze, R. Carsten, J. Paatero et al., Integrating trust establishment into routing protocols of today's MANETs, 2013 IEEE Wireless Communications and Networking Conference (WCNC), pp.1403-1408, 2013.
DOI : 10.1109/WCNC.2013.6554931