Chernick, C.
, Edington, C.
, Fanto, M.
and Rosenthal, R.
(2005),
Guidelines for the selection, configuration, and use of Transport Layer Security (TLS) implementations:, , National Institute of Standards and Technology, Gaithersburg, MD, [online], https://doi.org/10.6028/NIST.SP.800-52
(Accessed March 13, 2025)