(1)
Weber, A.; Heiser, G.; Kuhlmann, D.; Schallbruch, M.; Chattopadhyay, A.; Guilley, S.; Kasper, M.; Krauß, C.; Krüger, P. S.; Reith, S.; Seifert, J.-P. Secure IT Without Vulnerabilities and Back Doors. TATuP 2020, 29, 30-36.