1. Berkovits, S., Chokhani, S., Furlong, J.A., Geiter, J.A., and Guild, J.C. (1994). Public Key Infrastructure Study, National Institute of Standards and Technology. Final Report.
2. Boeyen, S., Santesson, S., Polk, T., Housley, R., Farrell, S., and Cooper, D. (2024, March 29). RFC 5280; Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. Internet Engineering Task Force, May 2008. Available online: https://doi.org/10.17487/RFC5280.
3. Securing the wireless internet;Gupta;IEEE Commun. Mag.,2001
4. International Telecommunication Union (2012). ITU-T Recommendation X. 509| ISO/IEC 9594-8: “Information Technology-Open Systems Interconnection-The Directory: Public-Key and Attribute Certificate Frameworks”, ITU. Tecnical Report.
5. Ayer, A. (2024, March 29). Misissued/Suspicious Symantec Certificates. Available online: https://www.mail-archive.com/dev-security-policy@lists.mozilla.org/msg05455.html.