1 | % Archivo de bibliografia para el libro de seguridad |
---|
2 | |
---|
3 | |
---|
4 | @Book{ NIC:03, |
---|
5 | author = "R. Nichols and P. C. Lekkas", |
---|
6 | editor = "McGraw-Hill", |
---|
7 | title = "Seguridad para comunicaciones inal{\'a}mbricas", |
---|
8 | publisher = "McGraw-Hill", |
---|
9 | year = "2003", |
---|
10 | OPTkey = "", |
---|
11 | OPTvolume = "", |
---|
12 | OPTnumber = "", |
---|
13 | OPTseries = "", |
---|
14 | OPTaddress = "Mexico", |
---|
15 | OPTedition = "", |
---|
16 | OPTmonth = "", |
---|
17 | OPTnote = "", |
---|
18 | OPTannote = "", |
---|
19 | author = "R. Nichols and P. C. Lekkas" |
---|
20 | } |
---|
21 | |
---|
22 | @Book{ ACE:03, |
---|
23 | author = "Vicente Aceituno Canal", |
---|
24 | editor = "Noriega Editores", |
---|
25 | title = "Seguridad de la informaci'on", |
---|
26 | publisher = "Noriega Editores", |
---|
27 | year = "2003", |
---|
28 | OPTkey = "", |
---|
29 | OPTvolume = "", |
---|
30 | OPTnumber = "", |
---|
31 | OPTseries = "", |
---|
32 | OPTaddress = "M'exico D.F., M'exico", |
---|
33 | OPTedition = "", |
---|
34 | OPTmonth = "M'exico D.F.", |
---|
35 | OPTnote = "", |
---|
36 | OPTannote = "", |
---|
37 | } |
---|
38 | |
---|
39 | @Book{ KURT:01, |
---|
40 | author = "Kurt Wall et al", |
---|
41 | editor = "Prentice Hall", |
---|
42 | title = "Programaci'on en Linux", |
---|
43 | publisher = "Prentice Hall", |
---|
44 | year = "2001", |
---|
45 | OPTkey = "", |
---|
46 | OPTvolume = "", |
---|
47 | OPTnumber = "", |
---|
48 | OPTseries = "", |
---|
49 | OPTaddress = "Madrid, Espa~na", |
---|
50 | OPTedition = "", |
---|
51 | OPTmonth = "", |
---|
52 | OPTnote = "", |
---|
53 | OPTannote = "", |
---|
54 | } |
---|
55 | |
---|
56 | @Book{ SARW:03, |
---|
57 | author = "Sarwar, Koretsky", |
---|
58 | editor = "Pearson, Prentice Hall", |
---|
59 | title = "El libro de Linux", |
---|
60 | publisher = "Prentice Hall", |
---|
61 | year = "2003", |
---|
62 | OPTkey = "", |
---|
63 | OPTvolume = "", |
---|
64 | OPTnumber = "", |
---|
65 | OPTseries = "", |
---|
66 | OPTaddress = "Madrid, Espa~na", |
---|
67 | OPTedition = "", |
---|
68 | OPTmonth = "", |
---|
69 | OPTnote = "", |
---|
70 | OPTannote = "", |
---|
71 | } |
---|
72 | |
---|
73 | |
---|
74 | @Book{ STRO:02, |
---|
75 | author = "Bjarne Stroustrup", |
---|
76 | editor = "Addison Wesley", |
---|
77 | title = "El lenguaje de programaci{\'o}n C++", |
---|
78 | publisher = "Addison Wesley", |
---|
79 | year = "2002", |
---|
80 | OPTkey = "", |
---|
81 | OPTvolume = "", |
---|
82 | OPTnumber = "", |
---|
83 | OPTseries = "", |
---|
84 | OPTaddress = "Madrid, Espa{\~n}a", |
---|
85 | OPTedition = "", |
---|
86 | OPTmonth = "", |
---|
87 | OPTnote = "", |
---|
88 | OPTannote = "" |
---|
89 | } |
---|
90 | |
---|
91 | @Book{ BLAN:06, |
---|
92 | author = "James Blanchette and Mark Summerfield", |
---|
93 | editor = "Prentice Hall", |
---|
94 | title = "C++ GUI Programming with Qt 4", |
---|
95 | publisher = "Prentice Hall", |
---|
96 | year = "2006", |
---|
97 | OPTkey = "", |
---|
98 | OPTvolume = "", |
---|
99 | OPTnumber = "", |
---|
100 | OPTseries = "", |
---|
101 | OPTaddress = "Massachusetts, USA", |
---|
102 | OPTedition = "", |
---|
103 | OPTmonth = "", |
---|
104 | OPTnote = "", |
---|
105 | OPTannote = "" |
---|
106 | } |
---|
107 | |
---|
108 | @Book{ STAL:03, |
---|
109 | author = "William Stallings", |
---|
110 | editor = "Pearson", |
---|
111 | title = "Fundamentos de Seguridad de Redes. Aplicaciones y Est{\'a}ndares", |
---|
112 | publisher = "Prentice Hall", |
---|
113 | year = "2003", |
---|
114 | OPTkey = "", |
---|
115 | OPTvolume = "", |
---|
116 | OPTnumber = "", |
---|
117 | OPTseries = "", |
---|
118 | OPTaddress = "Espa{\~n}a", |
---|
119 | OPTedition = "2", |
---|
120 | OPTmonth = "", |
---|
121 | OPTnote = "", |
---|
122 | OPTannote = "" |
---|
123 | } |
---|
124 | |
---|
125 | @Book{ PRESS:05, |
---|
126 | author = "Roger S. Pressman", |
---|
127 | editor = "Mc Graw-Hill", |
---|
128 | title = "Ingenier'ia del software. Un enfoque pr'actico", |
---|
129 | publisher = "Mc Graw-Hill", |
---|
130 | year = "2005", |
---|
131 | OPTkey = "", |
---|
132 | OPTvolume = "", |
---|
133 | OPTnumber = "", |
---|
134 | OPTseries = "", |
---|
135 | OPTaddress = "Mexico", |
---|
136 | OPTedition = "6", |
---|
137 | OPTmonth = "", |
---|
138 | OPTnote = "", |
---|
139 | OPTannote = "" |
---|
140 | } |
---|
141 | |
---|
142 | @Book{ NASH:02, |
---|
143 | author = "Nash Duane and Joseph Brink", |
---|
144 | editor = "McGraw-Hill", |
---|
145 | title = "PKI: Infraestructura de clave p{\'u}blica", |
---|
146 | publisher = "McGraw-Hill", |
---|
147 | year = "2002", |
---|
148 | OPTkey = "", |
---|
149 | OPTvolume = "", |
---|
150 | OPTnumber = "", |
---|
151 | OPTseries = "", |
---|
152 | OPTaddress = "Mexico", |
---|
153 | OPTedition = "", |
---|
154 | OPTmonth = "", |
---|
155 | OPTnote = "", |
---|
156 | OPTannote = "" |
---|
157 | } |
---|
158 | |
---|
159 | @Article{ PERL:99, |
---|
160 | author = "R. Perlman", |
---|
161 | title = "An overview of PKI trust models", |
---|
162 | journal = "Network, IEEE", |
---|
163 | year = "1999", |
---|
164 | OPTkey = "", |
---|
165 | OPTvolume = "", |
---|
166 | OPTnumber = "", |
---|
167 | OPTpages = "", |
---|
168 | OPTmonth = "", |
---|
169 | OPTnote = "", |
---|
170 | OPTannote = "" |
---|
171 | } |
---|
172 | |
---|
173 | @Book{ SCHM:03, |
---|
174 | title = "Aprendiendo UML en 24 horas", |
---|
175 | author = "Joseph Schmuller", |
---|
176 | editor = "Prentice Hall", |
---|
177 | publisher = "Prentice Hall", |
---|
178 | year = "2003", |
---|
179 | address = "M{\'e}xico" |
---|
180 | } |
---|
181 | |
---|
182 | @Book{ VIEG:2002, |
---|
183 | title = "Network Security with OpenSSL", |
---|
184 | author = "John Viega and Matt Messier and Pravir Chandra", |
---|
185 | publisher = "O'Really", |
---|
186 | edition = "384", |
---|
187 | year = "2002" |
---|
188 | } |
---|
189 | |
---|
190 | @Book{ BOOC:99, |
---|
191 | title = "UML Lenguaje Unificado de Modelado", |
---|
192 | author = "G., Booch", |
---|
193 | publisher = "Addison Wesley", |
---|
194 | year = "1999" |
---|
195 | } |
---|
196 | |
---|
197 | @Book{ MULL:97, |
---|
198 | title = "Modelado de objetos con UML", |
---|
199 | author = "Alain Pierre-Muller", |
---|
200 | publisher = "Eyrolles", |
---|
201 | address = "Barcelona, Espa\~na", |
---|
202 | year = "1997" |
---|
203 | } |
---|
204 | |
---|
205 | @Book{ PILA:04, |
---|
206 | title = "Version Control with Subversion ", |
---|
207 | author = "C. Michael Pilato and Ben Collins-Sussman and Brian W. Fitzpatrick", |
---|
208 | publisher = "O'Really ", |
---|
209 | year = "2004" |
---|
210 | } |
---|
211 | |
---|
212 | @Electronic{ XCA:03, |
---|
213 | title = "XCA, una interfaz gr\'afica para OpenSSL, Clave p\'ublicas y privadas, certificados, solicitudes y listas de revocaci'on", |
---|
214 | howpublished = "http://www.hohnstaedt.de/xca.html", |
---|
215 | year = "2003", |
---|
216 | author = {Christian Hohnst\"{a}dt} |
---|
217 | } |
---|
218 | |
---|
219 | @Electronic{ IBM:98, |
---|
220 | title = "IBM Corporation. An overview of the IBM SET and the IBM CommercePoint Products", |
---|
221 | howpublished = "http://www.software.ibm.com/commerce/set/overview.html", |
---|
222 | year = "2003", |
---|
223 | author = {IBM Corporation} |
---|
224 | } |
---|
225 | |
---|
226 | |
---|
227 | |
---|
228 | @Electronic{ FSF:07, |
---|
229 | title = "Free Software Definition", |
---|
230 | howpublished = "http://www.fsf.org/licensing/essays/free-sw.html", |
---|
231 | year = "2007", |
---|
232 | author = {} |
---|
233 | } |
---|
234 | |
---|
235 | @Electronic{ TRAC:07, |
---|
236 | title = "Welcome to the Trac Project", |
---|
237 | howpublished = "http://trac.edgewall.org/", |
---|
238 | year = "2007", |
---|
239 | author = {} |
---|
240 | } |
---|
241 | |
---|
242 | @Book{ TONITO:14, |
---|
243 | title = "Trasteando con la bibliografía", |
---|
244 | author = "Antonio Araujo ", |
---|
245 | editor = "CENDITEL", |
---|
246 | publisher = "CENDITEL", |
---|
247 | year = "2014", |
---|
248 | address = "Mérida" |
---|
249 | } |
---|
250 | |
---|
251 | |
---|
252 | @Electronic{ IEEEhowto:espana, |
---|
253 | title = "Portal del DNI Electrónico Español", |
---|
254 | author = {}, |
---|
255 | howpublished = "http://www.dnielectronico.es/", |
---|
256 | year = "2012" |
---|
257 | } |
---|
258 | |
---|
259 | @Article{ IEEEhowto:eID, |
---|
260 | title = "Electronic Identity Cards for User Authentication Promise and Practice", |
---|
261 | author = "Andreas Poller, Ulrich Waldmann, Sven Vowe, Sven Turpe", |
---|
262 | journal = "IEEE Security \& Privacy", |
---|
263 | year = "2013", |
---|
264 | volume = "10", |
---|
265 | pages = "46--54" |
---|
266 | } |
---|
267 | |
---|
268 | @Electronic{ IEEEhowto:estonia, |
---|
269 | title = "Oficial Gateway to Estonia", |
---|
270 | author = {}, |
---|
271 | howpublished = "http://estonia.eu/about-estonia/economy-a-it/e-estonia.html", |
---|
272 | year = "2013" |
---|
273 | } |
---|
274 | |
---|
275 | |
---|
276 | |
---|
277 | @Book{ IEEEhowto:software, |
---|
278 | title = "Ingeniería del Software", |
---|
279 | author = "Campderrich Falgueras", |
---|
280 | publisher = "Editorial UOC", |
---|
281 | year = "2003", |
---|
282 | address = "Barcelona, España" |
---|
283 | } |
---|
284 | |
---|
285 | @Electronic{ IEEEhowto:directiva, |
---|
286 | title = "DIRECTIVA 1999/93/CE DEL PARLAMENTO EUROPEO Y DEL CONSEJO", |
---|
287 | author = {}, |
---|
288 | howpublished = "http://www.cert.fnmt.es/legsoporte/D\_1999\_93\_CE.pdf", |
---|
289 | year = "1999" |
---|
290 | } |
---|
291 | |
---|
292 | @Electronic{ IEEEhowto:x509, |
---|
293 | title = "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. Request for Comments (RFC) 5280", |
---|
294 | author = {Cooper D., Santesson S., y otros}, |
---|
295 | howpublished = "http://www.ietf.org/rfc/rfc5280.txt", |
---|
296 | year = "2013" |
---|
297 | } |
---|
298 | |
---|
299 | |
---|
300 | @Electronic{ IEEEhowto:pkcs7, |
---|
301 | title = "PKCS\#7.Cryptographic Message Syntax", |
---|
302 | author = {}, |
---|
303 | howpublished = "https://tools.ietf.org/html/rfc2315", |
---|
304 | year = "2013" |
---|
305 | } |
---|
306 | |
---|
307 | |
---|
308 | @Electronic{ IEEEhowto:pades, |
---|
309 | title = "PAdES. PDF Advance Electronic Signatures", |
---|
310 | author = {}, |
---|
311 | howpublished = "http://www.etsi.org/deliver/etsi\_ts/102700\_102799/10277801/01.01.01\_60/ts\_10277801v010101p.pdf", |
---|
312 | year = "2013" |
---|
313 | } |
---|
314 | |
---|
315 | @Electronic{ IEEEhowto:xmldsig, |
---|
316 | title = "XML Signature Syntax and Processing (Second Edition). W3C Recommendation 10 June 2008", |
---|
317 | author = {Bartel M., Boyer J., y otros}, |
---|
318 | howpublished = "http://www.w3.org/TR/xmldsig-core/", |
---|
319 | year = "2013" |
---|
320 | } |
---|
321 | |
---|
322 | @Electronic{ IEEEhowto:bdoc, |
---|
323 | title = "Formato para firmas electrónicas", |
---|
324 | author = {}, |
---|
325 | howpublished = "http://www.signature.it/-TOOLS/Bdoc-1.0.pdf", |
---|
326 | year = "2013" |
---|
327 | } |
---|
328 | |
---|
329 | |
---|
330 | @Article{ IEEEhowto:neubauer, |
---|
331 | title = "Digital signatures with familiar appearance for e-government documents: authentic PDF", |
---|
332 | author = "Neubauer, T.; Weippl, E.; Biffl, S.", |
---|
333 | journal = "Proceedings of the First International Conference on Availability, Reliability and Security", |
---|
334 | year = "2006", |
---|
335 | volume = {}, |
---|
336 | pages = "723--731" |
---|
337 | } |
---|
338 | |
---|
339 | @Book{ IEEEhowto:java, |
---|
340 | title = "Professional Java, JDK", |
---|
341 | author = "Richardson Clay, Avondolio Donald, others", |
---|
342 | publisher = "Wrox", |
---|
343 | year = "2005", |
---|
344 | } |
---|
345 | |
---|
346 | @Electronic{ IEEEhowto:xades, |
---|
347 | title = "XML Advanced Electronic Signatures (XAdES)", |
---|
348 | author = "Cruellas, J. Karlinger G., y otros", |
---|
349 | howpublished = "http://www.w3.org/TR/XAdES/", |
---|
350 | year = "2003" |
---|
351 | } |
---|
352 | |
---|
353 | @Electronic{ IEEEhowto:mime, |
---|
354 | title = "Security Multiparts for MIME. Multipart/Signed and Multipart/Encrypted", |
---|
355 | author = "Galvin , J. Murphy, S. Crocker, S. Freed, N.", |
---|
356 | howpublished = "http://tools.ietf.org/html/rfc1847", |
---|
357 | year = "2013" |
---|
358 | } |
---|
359 | |
---|
360 | |
---|
361 | @Electronic{ IEEEhowto:pkcs12, |
---|
362 | title = "PKCS\#12.Personal Information Exchange Syntax Standard.", |
---|
363 | author = "RSA Laboratories.", |
---|
364 | howpublished = "https://www.rsa.com/rsalabs/node.asp?id=2138", |
---|
365 | year = "2013" |
---|
366 | } |
---|
367 | |
---|
368 | |
---|
369 | @Book{ IEEEhowto:bpel, |
---|
370 | title = "Business Process Execution for Web Services BPEL and BPEL4WS", |
---|
371 | author = "Matjaz Juric, Mathew Benny", |
---|
372 | publisher = "Packt Publishing", |
---|
373 | year = "2006", |
---|
374 | } |
---|
375 | |
---|
376 | |
---|
377 | @Article{ IEEEhowto:safet, |
---|
378 | title = "SAFET: Sistema para la generación de aplicaciones de firma electrónica", |
---|
379 | author = "Bravo, V. Araujo A.", |
---|
380 | journal = "Revista Puente", |
---|
381 | year = "2011", |
---|
382 | volume = "6", |
---|
383 | } |
---|
384 | |
---|
385 | |
---|
386 | % referencias capítulo 7 |
---|
387 | |
---|
388 | @Electronic{ rlsm:terminology, |
---|
389 | title = "Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology", |
---|
390 | author = "Pfitzmann, A., Hansen, M.", |
---|
391 | howpublished = "http://dud.inf.tu-dresden.de/Anon\_Terminology.shtml", |
---|
392 | year = "2000" |
---|
393 | } |
---|
394 | |
---|
395 | @Article{ rlsm:diaz01, |
---|
396 | title = "Towards measuring Anonymity ", |
---|
397 | author = "D\'{\i}az, C., Seys, S., Claessens, J., Preneel, B.", |
---|
398 | journal = "Designing Privacy Enhancing Technologies", |
---|
399 | year = "2002", |
---|
400 | pages = "54--68", |
---|
401 | volume = {}, |
---|
402 | } |
---|
403 | |
---|
404 | @Article{ rlsm:serj01, |
---|
405 | title = "Towards an Information Theoretic Metric for Anonymity", |
---|
406 | author = "Serjantov, A., Danezis, G.", |
---|
407 | journal = "Proceedings of Privacy Enhancing Technologies Workshop", |
---|
408 | year = "2002", |
---|
409 | pages = "54--68", |
---|
410 | volume = {}, |
---|
411 | } |
---|
412 | |
---|
413 | |
---|
414 | @Article{ rlsm:chaum-mix, |
---|
415 | title = "Untraceable electronic mail, return addresses, and digital pseudonyms", |
---|
416 | author = "Chaum, D.", |
---|
417 | journal = "Communications of the ACM", |
---|
418 | year = "1981", |
---|
419 | pages = {}, |
---|
420 | volume = "4", |
---|
421 | } |
---|
422 | |
---|
423 | |
---|
424 | @Article{ rlsm:diaz-mixes, |
---|
425 | title = "Generalising Mixes", |
---|
426 | author = "D\'{\i}az, C., Serjantov, A.", |
---|
427 | journal = "Proceedings of Privacy Enhancing Technologies workshop", |
---|
428 | year = "2003", |
---|
429 | pages = "18--31", |
---|
430 | volume = {}, |
---|
431 | } |
---|
432 | |
---|
433 | |
---|
434 | @Article{ rlsm:mixminion, |
---|
435 | title = "Mixminion: Design of a Type III Anonymous Remailer Protocol", |
---|
436 | author = "Danezis, G., Dingledine, R., Mathewson, N.", |
---|
437 | journal = "Proceedings of the 2003 IEEE Symposium on Security and Privacy", |
---|
438 | year = "2003", |
---|
439 | pages = "2--15", |
---|
440 | volume = {}, |
---|
441 | } |
---|
442 | |
---|
443 | @Article{rlsm:tor-design, |
---|
444 | title = "Tor: The Second-Generation Onion Router", |
---|
445 | author = "Dingledine, R., Mathewson, N., Syverson, P.", |
---|
446 | journal = "Proceedings of the 13th USENIX Security Symposium", |
---|
447 | year = "2004", |
---|
448 | pages = {}, |
---|
449 | volume = {}, |
---|
450 | } |
---|
451 | |
---|
452 | |
---|
453 | @Article{rlsm:antnet, |
---|
454 | title = "AntNet: Distributed Stigmergetic Control for Communications Networks", |
---|
455 | author = "Caro, G.D., Dorigo, M.", |
---|
456 | journal = "Journal of Artificial Intelligence Research", |
---|
457 | year = "1998", |
---|
458 | pages = {}, |
---|
459 | volume = {}, |
---|
460 | } |
---|
461 | |
---|
462 | @Article{ rlsm:ants-white, |
---|
463 | title = "Connection Management using Adaptive Mobile Agents", |
---|
464 | author = "White, T., Pagurek, B.", |
---|
465 | journal = "Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications", |
---|
466 | year = "1998", |
---|
467 | pages = "802--809", |
---|
468 | volume = {}, |
---|
469 | } |
---|
470 | |
---|
471 | |
---|
472 | @Article{ rlsm:ants-loadbalancing, |
---|
473 | title = "Ant-Based Load Balancing in Telecommunications Networks", |
---|
474 | author = "Schoonderwoerd, R.", |
---|
475 | journal = "Adaptive Behavior", |
---|
476 | year = "1997", |
---|
477 | pages = "169--207", |
---|
478 | volume = "5", |
---|
479 | } |
---|
480 | |
---|
481 | |
---|
482 | @Article{ rlsm:shannon, |
---|
483 | title = "The mathematical theory for communicactions", |
---|
484 | author = "Shannon, C.", |
---|
485 | journal = "Bell Systems Technical Journal", |
---|
486 | year = "1948", |
---|
487 | pages = "50--64", |
---|
488 | volume = "30", |
---|
489 | } |
---|
490 | |
---|
491 | @Article{ rlsm:yuxin, |
---|
492 | title = "Measuring Anonymity with Relative Entropy", |
---|
493 | author = "Deng, Y., Pang, J., Wu, P.", |
---|
494 | journal = "Proceedings of the 4th International Workshop on Formal Aspects in Security and Trust", |
---|
495 | year = "2007", |
---|
496 | pages = "65--79", |
---|
497 | volume = {}, |
---|
498 | } |
---|
499 | |
---|
500 | |
---|
501 | @Article{ rlsm:combinatorial, |
---|
502 | title = "A Combinatorial Approach to Measuring Anonymity", |
---|
503 | author = "Edman, M., Sivrikaya, F., Yener, B.", |
---|
504 | journal = "Intelligence and Security Informatics", |
---|
505 | year = "2007", |
---|
506 | pages = "356--363", |
---|
507 | volume = {}, |
---|
508 | } |
---|
509 | |
---|
510 | |
---|
511 | @Article{ rlsm:revisiting, |
---|
512 | title = "Revisiting A Combinatorial Approach Toward Measuring Anonymity", |
---|
513 | author = "Gierlichs, B., Troncoso, C., Diaz, C., Preneel, B., Verbauwhede, I.", |
---|
514 | journal = "Workshop on Privacy in the Electronic Society", |
---|
515 | year = "2008", |
---|
516 | pages = "111--116", |
---|
517 | volume = {}, |
---|
518 | } |
---|
519 | |
---|
520 | |
---|
521 | @Article{ rlsm:berthold, |
---|
522 | title = "The Disavantages of Free Mix Routes and How to overcome them", |
---|
523 | author = "Berthold, O., Pfitzmann, A., Standtke, R.", |
---|
524 | journal = "Proceedings of Privacy Enhancing Technologies Workshop", |
---|
525 | year = "2001", |
---|
526 | pages = "30--45", |
---|
527 | volume = {}, |
---|
528 | } |
---|
529 | |
---|
530 | |
---|
531 | @Article{ rlsm:reiter, |
---|
532 | title = "Crowds: Anonymity for Web Transactions", |
---|
533 | author = "Reiter, M., Rubin, A.", |
---|
534 | journal = "ACM Transactions on Information and System Security", |
---|
535 | year = "1998", |
---|
536 | pages = {}, |
---|
537 | volume = "1", |
---|
538 | } |
---|
539 | |
---|
540 | |
---|
541 | @Electronic{ rlsm:vernier, |
---|
542 | title = "What are Mean Squared Error and Root Mean Squared Error?.", |
---|
543 | author = "Vernier, D., and Gastineau, J.", |
---|
544 | howpublished = "http://www.vernier.com/til/1014/", |
---|
545 | year = "2011" |
---|
546 | } |
---|
547 | |
---|
548 | |
---|
549 | @Article{ rlsm:jianhua, |
---|
550 | title = "Divergences Measures Based in Shannon Entropy", |
---|
551 | author = "Jianhua, L.", |
---|
552 | journal = "IEEE Transactions on Information Theory", |
---|
553 | year = "1991", |
---|
554 | pages = {}, |
---|
555 | volume = "37", |
---|
556 | number = "1", |
---|
557 | } |
---|
558 | |
---|
559 | % Referencias adicionales del capítulo 3. |
---|
560 | |
---|
561 | @TechReport{ico2006, |
---|
562 | author = {Information Commissioner Office}, |
---|
563 | title = {Data protection technical guidance note: Privacy enhancing technologies (pets)}, |
---|
564 | institution = {Information Commissioner Office}, |
---|
565 | year = {2006}, |
---|
566 | month = {April}, |
---|
567 | } |
---|
568 | |
---|
569 | @TechReport{ONU1948, |
---|
570 | author = {Organización de las Naciones Unidas}, |
---|
571 | title = {Derechos humanos para todos. Declaración Universal de los Derechos humanos}, |
---|
572 | institution = {Organización de las Naciones Unidas}, |
---|
573 | year = {1948} |
---|
574 | } |
---|
575 | |
---|
576 | @phdthesis{george-thesis, |
---|
577 | title = {Better Anonymous Communications}, |
---|
578 | author = {George Danezis}, |
---|
579 | school = {University of Cambridge}, |
---|
580 | year = {2004}, |
---|
581 | month = {July}, |
---|
582 | www_tags = {selected}, |
---|
583 | www_section = {Anonymous communication}, |
---|
584 | www_pdf_url = {http://www.cl.cam.ac.uk/~gd216/thesis.pdf}, |
---|
585 | } |
---|
586 | |
---|
587 | @inproceedings{ISDN-mixes, |
---|
588 | title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}}, |
---|
589 | author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner}, |
---|
590 | booktitle = {Proceedings of the GI/ITG Conference on Communication in Distributed |
---|
591 | Systems}, |
---|
592 | year = {1991}, |
---|
593 | month = {February}, |
---|
594 | pages = {451--463}, |
---|
595 | www_tags = {selected}, |
---|
596 | www_section = {Anonymous communication}, |
---|
597 | www_ps_gz_url = {http://www.semper.org/sirene/publ/PfPW_91TelMixeGI_NTG.ps.gz}, |
---|
598 | } |
---|
599 | |
---|
600 | @inproceedings{esorics04-mauw, |
---|
601 | title = {A formalization of anonymity and onion routing}, |
---|
602 | author = {S. Mauw and J. Verschuren and E.P. de Vink}, |
---|
603 | booktitle = {Proceedings of ESORICS 2004}, |
---|
604 | year = {2004}, |
---|
605 | location = {Sophia Antipolis}, |
---|
606 | pages = {109--124}, |
---|
607 | editor = {P. Samarati and P. Ryan and D. Gollmann and R. Molva}, |
---|
608 | publisher = {LNCS 3193}, |
---|
609 | www_tags = {selected}, |
---|
610 | www_section = {Formal methods}, |
---|
611 | www_pdf_url = {http://www.win.tue.nl/~ecss/downloads/esorics04.pdf}, |
---|
612 | } |
---|
613 | |
---|
614 | @inproceedings{onion-discex00, |
---|
615 | title = {{O}nion {R}outing Access Configurations}, |
---|
616 | author = {Paul Syverson and Michael Reed and David Goldschlag}, |
---|
617 | booktitle = {Proceedings of the DARPA Information Survivability Conference and Exposition |
---|
618 | (DISCEX 2000)}, |
---|
619 | volume = {1}, |
---|
620 | year = {2000}, |
---|
621 | pages = {34--40}, |
---|
622 | publisher = {IEEE CS Press}, |
---|
623 | www_ps_gz_url = {http://www.onion-router.net/Publications/DISCEX-2000.ps.gz}, |
---|
624 | www_tags = {selected}, |
---|
625 | www_abstract_url = {http://www.onion-router.net/Publications.html}, |
---|
626 | www_section = {Anonymous communication}, |
---|
627 | www_pdf_url = {http://www.onion-router.net/Publications/DISCEX-2000.pdf}, |
---|
628 | www_ps_url = {http://www.onion-router.net/Publications/DISCEX-2000.ps}, |
---|
629 | } |
---|
630 | |
---|
631 | @inproceedings{onion-routing:pet2000, |
---|
632 | title = {{Towards an Analysis of Onion Routing Security}}, |
---|
633 | author = {Paul Syverson and Gene Tsudik and Michael Reed and Carl Landwehr}, |
---|
634 | booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design |
---|
635 | Issues in Anonymity and Unobservability}, |
---|
636 | year = {2000}, |
---|
637 | month = {July}, |
---|
638 | pages = {96--114}, |
---|
639 | editor = {H. Federrath}, |
---|
640 | publisher = {Springer-Verlag, LNCS 2009}, |
---|
641 | www_important = {1}, |
---|
642 | www_tags = {selected}, |
---|
643 | www_section = {Anonymous communication}, |
---|
644 | www_ps_gz_url = {http://www.onion-router.net/Publications/WDIAU-2000.ps.gz}, |
---|
645 | } |
---|
646 | |
---|
647 | @inproceedings{danezis:pet2004, |
---|
648 | title = {The Traffic Analysis of Continuous-Time Mixes}, |
---|
649 | author = {George Danezis}, |
---|
650 | booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, |
---|
651 | volume = {3424}, |
---|
652 | year = {2004}, |
---|
653 | month = {May}, |
---|
654 | pages = {35--50}, |
---|
655 | series = {LNCS}, |
---|
656 | www_important = {1}, |
---|
657 | www_tags = {selected}, |
---|
658 | www_section = {Traffic analysis}, |
---|
659 | www_pdf_url = {http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf}, |
---|
660 | } |
---|
661 | |
---|
662 | @inproceedings{timing-fc2004, |
---|
663 | title = {Timing Attacks in Low-Latency Mix-Based Systems}, |
---|
664 | author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew K. Wright}, |
---|
665 | booktitle = {Proceedings of Financial Cryptography (FC '04)}, |
---|
666 | year = {2004}, |
---|
667 | month = {February}, |
---|
668 | pages = {251--265}, |
---|
669 | editor = {Ari Juels}, |
---|
670 | publisher = {Springer-Verlag, LNCS 3110}, |
---|
671 | www_tags = {selected}, |
---|
672 | www_section = {Traffic analysis}, |
---|
673 | www_pdf_url = {http://www.cs.umass.edu/~mwright/papers/levine-timing.pdf}, |
---|
674 | } |
---|
675 | |
---|
676 | @inproceedings{SS03, |
---|
677 | title = {Passive Attack Analysis for Connection-Based Anonymity Systems}, |
---|
678 | author = {Andrei Serjantov and Peter Sewell}, |
---|
679 | booktitle = {Proceedings of ESORICS 2003}, |
---|
680 | year = {2003}, |
---|
681 | month = {October}, |
---|
682 | www_tags = {selected}, |
---|
683 | www_remarks = {An investigation of packet counting attacks (which work best on lightly loaded networks) and connection-start timing attacks.}, |
---|
684 | www_ps_url = {http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps}, |
---|
685 | www_section = {Traffic analysis}, |
---|
686 | } |
---|
687 | |
---|
688 | @inproceedings{flow-correlation04, |
---|
689 | title = {On Flow Correlation Attacks and Countermeasures in Mix Networks}, |
---|
690 | author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao}, |
---|
691 | booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, |
---|
692 | volume = {3424}, |
---|
693 | year = {2004}, |
---|
694 | month = {May}, |
---|
695 | pages = {207--225}, |
---|
696 | series = {LNCS}, |
---|
697 | www_tags = {selected}, |
---|
698 | www_section = {Traffic analysis}, |
---|
699 | www_pdf_url = {http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf}, |
---|
700 | } |
---|
701 | |
---|
702 | @inproceedings{WangCJ05, |
---|
703 | title = {Tracking anonymous peer-to-peer VoIP calls on the internet}, |
---|
704 | author = {Xinyuan Wang and Shiping Chen and Sushil Jajodia}, |
---|
705 | booktitle = {Proceedings of the ACM Conference on Computer and Communications Security}, |
---|
706 | year = {2005}, |
---|
707 | month = {November}, |
---|
708 | pages = {81--91}, |
---|
709 | www_tags = {selected}, |
---|
710 | www_section = {Anonymous communication}, |
---|
711 | www_pdf_url = {http://ise.gmu.edu/~xwangc/Publications/CCS05-VoIPTracking.pdf}, |
---|
712 | } |
---|
713 | |
---|
714 | @inproceedings{e2e-traffic, |
---|
715 | title = {Practical Traffic Analysis: Extending and Resisting Statistical Disclosure}, |
---|
716 | author = {Nick Mathewson and Roger Dingledine}, |
---|
717 | booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, |
---|
718 | volume = {3424}, |
---|
719 | year = {2004}, |
---|
720 | month = {May}, |
---|
721 | pages = {17--34}, |
---|
722 | series = {LNCS}, |
---|
723 | www_important = {1}, |
---|
724 | www_tags = {selected}, |
---|
725 | www_section = {Traffic analysis}, |
---|
726 | www_pdf_url = {http://freehaven.net/doc/e2e-traffic/e2e-traffic.pdf}, |
---|
727 | } |
---|
728 | |
---|
729 | @inproceedings{back01, |
---|
730 | title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems}, |
---|
731 | author = {Adam Back and Ulf M\"oller and Anton Stiglic}, |
---|
732 | booktitle = {Proceedings of Information Hiding Workshop (IH 2001)}, |
---|
733 | year = {2001}, |
---|
734 | month = {April}, |
---|
735 | pages = {245--257}, |
---|
736 | editor = {Ira S. Moskowitz}, |
---|
737 | publisher = {Springer-Verlag, LNCS 2137}, |
---|
738 | www_important = {1}, |
---|
739 | www_tags = {selected}, |
---|
740 | www_section = {Traffic analysis}, |
---|
741 | www_pdf_url = {http://www.cypherspace.org/adam/pubs/traffic.pdf}, |
---|
742 | } |
---|
743 | |
---|
744 | @inproceedings{hs-attack06, |
---|
745 | title = {Locating Hidden Servers}, |
---|
746 | author = {Lasse {\O}verlier and Paul Syverson}, |
---|
747 | booktitle = {Proceedings of the 2006 IEEE Symposium on Security and Privacy}, |
---|
748 | year = {2006}, |
---|
749 | month = {May}, |
---|
750 | publisher = {IEEE CS}, |
---|
751 | www_important = {1}, |
---|
752 | www_tags = {selected}, |
---|
753 | www_pdf_url = {http://www.onion-router.net/Publications/locating-hidden-servers.pdf}, |
---|
754 | www_remarks = {Motivates and describes Tor's entry guard design.}, |
---|
755 | www_section = {Traffic analysis}, |
---|
756 | } |
---|