1. Bickford, J., O’Hare, R., Baliga, A., Ganapathy, V., Iftode, L.: Rootkits on smart phones: attacks, implications and opportunities. In: Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, pp. 49–54. ACM (2010)
2. Blaze, M., Diffie, W., Rivest, R.L., Schneier, B., Shimomura, T.: Minimal key lengths for symmetric ciphers to provide adequate commercial security (1996)
3. Common Criteria: Introduction and general model. Common Criteria for Information Technology Security Evaluation. National Security Agency (2012)
4. Dacosta, I., Chakradeo, S., Ahamad, M., Traynor, P.: One-time cookies: preventing session hijacking attacks with stateless authentication tokens. ACM Trans. Internet Technol. (TOIT) 12(1), 1 (2012)
5. Dierks, T., Allen, C.: The TLS Protocol Version 1.0 (1999).
https://www.ietf.org/rfc2246
. Accessed 23 June 2015