1. Man-in-the-Middle Attack to the HTTPS Protocol
2. Ten risks of PKI: What you'ue not being told about public key infrastructure;Ellison C.;Comput. Secur. J.,2000
3. AppelbaumJ.: ‘Detecting certificate authority compromises and web browser collusion’. Available athttps://www.blog.torproject.org/blog/detecting‐certificate‐authority‐compromises‐and‐web‐browser‐collusion 2011
4. FisherD.:Black tulip report of the investigation into the DigiNotar certificate authority breach Technical Report Fox‐IT 2012
5. KeizerG.‘Hackers spied on 300 000 Iranians using fake Google certificate 2011. Available athttp://www.computerworld.com/article/2510951/cybercrime‐hacking/hackers‐spied‐on‐300‐000‐iranians‐using‐fake‐google‐certificate.html