1. [1] 2016. Secure Logging Schemes and Certificate Transparency. Computer Security – ESORICS 2016. ESORICS 2016. Lecture Notes in Computer Science (2016).
2. [2] 2019. How Certificate Transparency Works. https://www.certificate-transparency.org/how-ct-works
3. [3] 2020. CA/Browser Forum. https://cabforum.org/
4. [4] 2020. CT2 Log Compromised via Salt Vulnerability. https://groups.google.com/a/chromium.org/forum/#!topic/ct-policy/aKNbZuJzwfM
5. [5] Apple. 2019. Apple’s Certificate Transparency policy. https://support.apple.com/en-us/HT205280