References

Adrian, D., Bhargavan, K., Durumeric, Z., Gaudry, P., Green, M., Halderman, J.A., …, & Zimmermann, P. (2015). Imperfect forward secrecy: How Diffie-Hellman fails in practice. In Proceedings of the 22nd ACM SIGSAC Conference on computer and communications security (pp. 5–17). New York: ACM Digital Library. https://doi. org/10.1145/2810103.2813707 . Retrieved October 7, 2016, from https://weakdh.org .

Al-Suqri, M.N., & Akomolafe-Fatuyi, E. (2012). Security and privacy in digital libraries: challenges, opportunities and prospects. International Journal of Digital Library Systems, 3(4), 54–61. https://doi.org/10.4018/ijdls.2012100103 .

Aviram, N., Schinzel, S., Somorovsky, J., Heninger, N., Dankel, M., Steube, J., …, & Shavitt, Y. (2016). DROWN: Breaking TLS using SSLv2. In Proceedings of the 25th USENIX Security Symposium (pp. 689–706). Berkeley, CA: The USENIX Association. Retrieved October 7, 2016, from https://drownattack.com/drown-attack-paper.pdf .

Chen, S., Choo, C., & Chow, R.Y. (2006). Internet security: A novel role/Object-based access control for digital libraries. Journal of Organizational Computing and Electronic Commerce, 16(2), 87–103. https://doi.org/10.1207/s15327744joce1602_1 .

DigiCert. (2016). Disabling browser support for the SSL 3.0 protocol. Retrieved June 5, 2016, from https://www.digicert.com/ssl-support/disabling-browser-support ssl-v3.htm .

Fox, R. (2006). Digital libraries: The systems analysis perspective, vandals at the gates. OCLC Systems & Services: International digital library perspectives, 22(4), 249–255. https://doi.org/10.1108/10650750610706961 .

High-Tech Bridge. (2016). Free SSL server test: About the service. Retrieved June 12, 2016, from https://www.htbridge.com/ssl/#about.

Internetum. (2015). What is SSL certificate and how it works? Retrieved November 23, 2016, from https://www.internetum.com/what-is-ssl-certificate-and-how-it-works/ .

Kozierok, Ch.M. (2005). The TCP/IP guide: A comprehensive, illustrated internet protocols reference. San Francisco: No Starch Press.

Kuzma, J. (2010). European digital libraries: Web security vulnerabilities. Library Hi Tech, 28(3), 402–413. https://doi.org/10.1108/07378831011076657 .

OpenSSL. (2016a). Padding oracle in AES-NI CBC MAC check (CVE-2016-2107). OpenSSL Security Advisory (3rd May 2016). Retrieved June 5, 2016, from https://www. openssl.org/news/secadv/20160503.txt .

OpenSSL. (2016b). Cryptography and SSL/TLS toolkit: Downloads. Retrieved June 10, 2016, from https://www.openssl.org/source .

OpenSSL. (2016c). Cryptography and SSL/TLS toolkit: Vulnerabilities. Retrieved October 7, 2016, from https://www.openssl.org/news/vulnerabilities.html .

Qualis SSL Labs. (2016). SSL server test. Retrieved June 12, 2016, from https://www. ssllabs.com/ssltest .

Rouse, M. (2014). Secure sockets layer (SSL). TechTarget Search Security. Retrieved June 10, 2016, from http://searchsecurity.techtarget.com/definition/ Secure-Sockets-Layer-SSL .

Symantec. (2016). ISTR: Internet Security Threat Report, vol 21. Retrieved November 23, 2016, from https://www.symantec.com/content/dam/symantec/docs/reports/istr 21-2016-en.pdf .

Šilic´, M., Krolo, J., & Delacˇ, G. (2010). Security vulnerabilities in modern web browser architecture. In MIPRO, 2010 Proceedings of the 33rd International Convention (pp. 1240–1245). Red Hook, NY: Curran Associates.

University of Nottingham. (2014). The Directory of Open Access Repositories – OpenDOAR. Retrieved June 9, 2016, from http://www.opendoar.org .