1. Chalupnik, R., Kedziora, M., Jozwiak, P., Jozwiak, I.: Correspondent sensitive encryption standard (CSES) algorithm in insecure communication channel. In: International Conference on Dependability and Complex Systems, pp. 90–98. Springer, Heidelberg (2019)
2. Braun, F., Akhawe, D., Weinberger, J., West, M.: Subresourceintegrity. In: W3C Working Draft, vol. 3, pp. 3655–3682 (2014)
3. Callegati, F., Cerroni, W., Ramilli, M.: Man-in-the-Middle attack to the https protocol. IEEE Secur. Priv. 7(1), 78–81 (2009)
4. Cortesi, A., Hils, M., Kriechbaumer, T.: Contributors. Mitmdump (2010)
5. Cortesi, A., Hils, M., Kriechbaumer, T.: Contributors. Mitmproxy: A free and open source interactive HTTPS proxy, 2010–. [Version 5.0] (2010)