Boot with Integrity, or Don’t Boot

[1]  Scott A. Rotondo Trusted Computing Group , 2011, Encyclopedia of Cryptography and Security.

[2]  N. Asokan,et al.  Mobile Platform Security , 2013, Mobile Platform Security.

[3]  Ariel J. Feldman,et al.  Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.