S. Chokhani, W. Ford, R. Sabett, C. Merrill, and S. Wu, Internet X.509 Public Key Infrastructure: Certificate Policy and Certification Practices Framework, RFC, vol.3647, 2003.

C. Forum, Baseline requirements for the issuance and management of policy-trusted certificates, v.1.1.5, 2013.

G. Markham, R. Sleevi, R. Barnes, and K. Wilson,

A. Olivier-levillain, B. Ébalard, H. Morin, and . Debar, One year of SSL Internet measurement, Proceedings of the 28th Annual Computer Security Applications Conference, ACSAC '12, pp.11-20, 2012.

A. Delignat-lavaud, M. Abadi, A. Birrell, I. Mironov, T. Wobber et al., Web pki: Closing the gap between guidelines and practices, NDSS, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01102254

. Google, Certificate transparency

D. Basin, C. Cremers, T. Kim, A. Perrig, R. Sasse et al., Arpki: Attack resilient public-key infrastructure, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.382-393, 2014.

, Let's encrypt overview, 2016.

, Let's encrypt statistics, 2016.

R. Barnes, J. Hoffman-andrews, and J. Kasten, Automatic certificate management environment (acme, 2016.

C. A. Comodo and . Ltd, Comodo Certification Practice Statement, Comodo CA Ltd, 2015.

. Digicert, DigiCert Certification Practices Statement, 2016.

G. Inc, GeoTrust Certification Practice Statement, 2016.

C. A. Globalsign, GlobalSign CA Certification Practice Statement, 2016.

, Certification Practice Statement. Technical report, 2016.

, Symantec Trust Network (STN) Certification Practice Statement, Symantec Corporation, 2016.

C. A. Startcom and . Ltd, StartCom Certificate Policy and Practice Statements, StartCom CA Ltd, 2016.

. Llc-network and . Solutions, Network Solutions Certification Practice Statement, Network Solutions, 2016.

, Top 1,000,000 sites, Alexa Internet Inc, 2013.

R. and T. Truderung, Using ProVerif to analyze protocols with DiffieHellman exponentiation, IEEE Computer Security Foundations Symposium (CSF), pp.157-171, 2009.

G. Ateniese and S. Mangard, A new approach to dns security (dnssec), Proceedings of the 8th ACM conference on Computer and Communications Security, pp.86-95, 2001.

P. Hoffman and J. Schlyter, The dns-based authentication of named entities (dane) transport layer security (TLS) protocol: TLSA, 2012.