1. Alicherry, M., Keromytis, A.: DoubleCheck: multi-path verification against man-in-the-middle attacks. In: 14th IEEE Symposium on Computers and Communications (ISCC) (2009)
2. Apple Inc.: Apple’s certificate transparency policy (2019). https://support.apple.com/en-us/HT205280
3. Apple Inc.: Lists of available trusted root certificates in macOS (2020). https://support.apple.com/en-us/HT202858
4. Bao, X., Zhang, X., Lin, J., Chu, D., Wang, Q., Li, F.: Towards the trust-enhancements of single sign-on services. In: 3rd IEEE Conference on Dependable and Secure Computing (DSC) (2019)
5. Basin, D., Cremers, C., Kim, H., Perrig, A., Sasse, R., Szalachowski, P.: ARPKI: attack resilient public-key infrastructure. In: 21st ACM Conference on Computer and Communications Security (CCS) (2014)