S. Berna and O. Yalcin, Radio Frequency Identification: Security and Privacy Issues -6th International Workshop, Lecture Notes in Computer Science, vol.6370, 2010.

P. Bichsel, J. Camenisch, T. Groß, and V. Shoup, Anonymous credentials on a standard java card, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.600-610, 2009.
DOI : 10.1145/1653662.1653734

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.157.668

E. Brickell, J. Camenisch, and L. Chen, Direct anonymous attestation, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.132-145, 2004.
DOI : 10.1145/1030083.1030103

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.58.5041

J. Camenisch and E. Van-herreweghen, anonymous credential system, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.21-30, 2002.
DOI : 10.1145/586110.586114

L. Chen, D. Page, and N. P. Smart, On the Design and Implementation of an Efficient DAA Scheme, Cryptology ePrint Archive Report, vol.598, 2009.
DOI : 10.1007/978-3-642-12510-2_16

URL : https://hal.archives-ouvertes.fr/hal-01056104

K. Dietrich, An integrated architecture for trusted computing for java enabled embedded devices, Proceedings of the 2007 ACM workshop on Scalable trusted computing , STC '07, pp.2-6, 2007.
DOI : 10.1145/1314354.1314358

K. Dietrich, Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation, pp.88-103, 2009.
DOI : 10.1007/978-3-642-14597-1_6

K. Dietrich, Anonymous Client Authentication for Transport Layer Security, Communications and Multimedia Security, pp.268-280, 2010.
DOI : 10.1007/978-3-642-13241-4_24

URL : https://hal.archives-ouvertes.fr/hal-01056373

K. Dietrich, J. Winter, L. Chen, C. J. Mitchell, and A. Martin, Implementation Aspects of Mobile and Embedded Trusted Computing, Lecture Notes in Computer Science, vol.5471, pp.29-44, 2009.
DOI : 10.1145/1314354.1314359

C. Mitchell, Direct Anonymous Attestation in Context. In: Trusted Computing (Professional Applications of Computing), pp.143-174, 2005.

B. Smyth, M. Ryan, and L. Chen, Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators, ESAS. Lecture Notes in Computer Science, vol.4572, pp.218-231, 2007.
DOI : 10.1007/978-3-540-73275-4_16

M. Sterckx, B. Gierlichs, B. Preneel, and I. Verbauwhede, Efficient implementation of anonymous credentials on Java Card smart cards, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS), pp.106-110, 2009.
DOI : 10.1109/WIFS.2009.5386474

C. Wachsmann, L. Chen, K. Dietrich, H. Löhr, A. R. Sadeghi et al., Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices, pp.84-98, 2010.
DOI : 10.1007/3-540-48390-X_14