[1] Dierks, T. and Allen, C. (1999). The TLS Protocol Version 1.0. Retrieved from https://datatracker.ietf.org/doc/html/rfc2246.
[2] Rescorla, E. (2018). The Transport Layer Security (TLS) Protocol Version1.3. Retrieved from https://datatracker.ietf.org /doc/html/rfc8446.
[3] Rescorla, E. (2000). HTTP Over TLS Retrieved from https://datatracker.ietf.org/doc/html/rfc2818.
[4] Fielding, R. (2022). HTTP/1.1: IETF. Retrieved from https://datatracker.ietf.org/doc/html/rfc9112.
[5] Aas, J., Barnes, R., Case, B., Durumeric, Z., Eckersley, P., Flores-López, A., Alex Halderman, J., Hoffman-Andrews, J., Kasten, J., Rescorla, E., Schoen, S. and Warren, B. (2019). Let’s Encrypt: An Automated Certificate Authority to Encrypt the Entire Web. In Proceedings of ACM SIGSAC Conference on Computer and Communications Security, pp.2473–2487. London, United Kingdom.
[6] Barnes R. (2019). Automatic Certificate Management Environment (ACME). Retrieved from https://datatracker.ietf.org/ doc/html/rfc8555.
[7] Lewis, E. (2006). The Role of Wildcards in the Domain Name System. Retrieved from https://datatracker.ietf.org/doc/html /rfc4592.
[8] Kaliski, B. (1998). PKCS #10: Certification Request Syntax Version 1.5. Retrieved from https://datatracker.ietf.org/doc/html/ rfc2314.
[9] Jackson, C. and Barth, A. (2008). ForceHTTPS: Protecting High-security Web Sites from Network Attacks. In Proceedings of the 17th International World Wide Web Conference, pp. 525-534. United States.
[10] RistiC, V. (2024). SSL/TLS Deployment Best Practices. SSL Labs. Retrieved from https://www.ssllabs.com/projects/best-practices.