1. Adrian, D., Bhargavan, K., Durumeric, Z., Gaudry, P., Green, M., Halderman, J.A., …, & Zimmermann, P. (2015). Imperfect forward secrecy: How Diffie-Hellman fails in practice. In Proceedings of the 22nd ACM SIGSAC Conference on computer and communications security (pp. 5–17). New York: ACM Digital Library. https://doi.org/10.1145/2810103.2813707. Retrieved October 7, 2016, from https://weakdh.org
2. Al-Suqri, M.N., & Akomolafe-Fatuyi, E. (2012). Security and privacy in digital libraries: challenges, opportunities and prospects. International Journal of Digital Library Systems, 3(4), 54–61. https://doi.org/10.4018/ijdls.2012100103
3. Aviram, N., Schinzel, S., Somorovsky, J., Heninger, N., Dankel, M., Steube, J., …, & Shavitt, Y. (2016). DROWN: Breaking TLS using SSLv2. In Proceedings of the 25th USENIX Security Symposium (pp. 689–706). Berkeley, CA: The USENIX Association. Retrieved October 7, 2016, from https://drownattack.com/drown-attack-paper.pdf
4. Chen, S., Choo, C., & Chow, R.Y. (2006). Internet security: A novel role/Object-based access control for digital libraries. Journal of Organizational Computing and Electronic Commerce, 16(2), 87–103. https://doi.org/10.1207/s15327744joce1602_1
5. DigiCert. (2016). Disabling browser support for the SSL 3.0 protocol. Retrieved June 5, 2016, from https://www.digicert.com/ssl-support/disabling-browser-support-ssl-v3.htm