[9c88d1e] | 1 | % Archivo de bibliografia para el libro de seguridad |
---|
| 2 | |
---|
| 3 | |
---|
| 4 | @Book{ NIC:03, |
---|
| 5 | author = "R. Nichols and P. C. Lekkas", |
---|
| 6 | editor = "McGraw-Hill", |
---|
| 7 | title = "Seguridad para comunicaciones inal{\'a}mbricas", |
---|
| 8 | publisher = "McGraw-Hill", |
---|
| 9 | year = "2003", |
---|
| 10 | OPTkey = "", |
---|
| 11 | OPTvolume = "", |
---|
| 12 | OPTnumber = "", |
---|
| 13 | OPTseries = "", |
---|
| 14 | OPTaddress = "Mexico", |
---|
| 15 | OPTedition = "", |
---|
| 16 | OPTmonth = "", |
---|
| 17 | OPTnote = "", |
---|
| 18 | OPTannote = "", |
---|
| 19 | author = "R. Nichols and P. C. Lekkas" |
---|
| 20 | } |
---|
| 21 | |
---|
| 22 | @Book{ ACE:03, |
---|
| 23 | author = "Vicente Aceituno Canal", |
---|
| 24 | editor = "Noriega Editores", |
---|
| 25 | title = "Seguridad de la informaci'on", |
---|
| 26 | publisher = "Noriega Editores", |
---|
| 27 | year = "2003", |
---|
| 28 | OPTkey = "", |
---|
| 29 | OPTvolume = "", |
---|
| 30 | OPTnumber = "", |
---|
| 31 | OPTseries = "", |
---|
| 32 | OPTaddress = "M'exico D.F., M'exico", |
---|
| 33 | OPTedition = "", |
---|
| 34 | OPTmonth = "M'exico D.F.", |
---|
| 35 | OPTnote = "", |
---|
| 36 | OPTannote = "", |
---|
| 37 | } |
---|
| 38 | |
---|
| 39 | @Book{ KURT:01, |
---|
| 40 | author = "Kurt Wall et al", |
---|
| 41 | editor = "Prentice Hall", |
---|
| 42 | title = "Programaci'on en Linux", |
---|
| 43 | publisher = "Prentice Hall", |
---|
| 44 | year = "2001", |
---|
| 45 | OPTkey = "", |
---|
| 46 | OPTvolume = "", |
---|
| 47 | OPTnumber = "", |
---|
| 48 | OPTseries = "", |
---|
| 49 | OPTaddress = "Madrid, Espa~na", |
---|
| 50 | OPTedition = "", |
---|
| 51 | OPTmonth = "", |
---|
| 52 | OPTnote = "", |
---|
| 53 | OPTannote = "", |
---|
| 54 | } |
---|
| 55 | |
---|
| 56 | @Book{ SARW:03, |
---|
| 57 | author = "Sarwar, Koretsky", |
---|
| 58 | editor = "Pearson, Prentice Hall", |
---|
| 59 | title = "El libro de Linux", |
---|
| 60 | publisher = "Prentice Hall", |
---|
| 61 | year = "2003", |
---|
| 62 | OPTkey = "", |
---|
| 63 | OPTvolume = "", |
---|
| 64 | OPTnumber = "", |
---|
| 65 | OPTseries = "", |
---|
| 66 | OPTaddress = "Madrid, Espa~na", |
---|
| 67 | OPTedition = "", |
---|
| 68 | OPTmonth = "", |
---|
| 69 | OPTnote = "", |
---|
| 70 | OPTannote = "", |
---|
| 71 | } |
---|
| 72 | |
---|
| 73 | |
---|
| 74 | @Book{ STRO:02, |
---|
| 75 | author = "Bjarne Stroustrup", |
---|
| 76 | editor = "Addison Wesley", |
---|
| 77 | title = "El lenguaje de programaci{\'o}n C++", |
---|
| 78 | publisher = "Addison Wesley", |
---|
| 79 | year = "2002", |
---|
| 80 | OPTkey = "", |
---|
| 81 | OPTvolume = "", |
---|
| 82 | OPTnumber = "", |
---|
| 83 | OPTseries = "", |
---|
| 84 | OPTaddress = "Madrid, Espa{\~n}a", |
---|
| 85 | OPTedition = "", |
---|
| 86 | OPTmonth = "", |
---|
| 87 | OPTnote = "", |
---|
| 88 | OPTannote = "" |
---|
| 89 | } |
---|
| 90 | |
---|
| 91 | @Book{ BLAN:06, |
---|
| 92 | author = "James Blanchette and Mark Summerfield", |
---|
| 93 | editor = "Prentice Hall", |
---|
| 94 | title = "C++ GUI Programming with Qt 4", |
---|
| 95 | publisher = "Prentice Hall", |
---|
| 96 | year = "2006", |
---|
| 97 | OPTkey = "", |
---|
| 98 | OPTvolume = "", |
---|
| 99 | OPTnumber = "", |
---|
| 100 | OPTseries = "", |
---|
| 101 | OPTaddress = "Massachusetts, USA", |
---|
| 102 | OPTedition = "", |
---|
| 103 | OPTmonth = "", |
---|
| 104 | OPTnote = "", |
---|
| 105 | OPTannote = "" |
---|
| 106 | } |
---|
| 107 | |
---|
| 108 | @Book{ STAL:03, |
---|
| 109 | author = "William Stallings", |
---|
| 110 | editor = "Pearson", |
---|
| 111 | title = "Fundamentos de Seguridad de Redes. Aplicaciones y Est{\'a}ndares", |
---|
| 112 | publisher = "Prentice Hall", |
---|
| 113 | year = "2003", |
---|
| 114 | OPTkey = "", |
---|
| 115 | OPTvolume = "", |
---|
| 116 | OPTnumber = "", |
---|
| 117 | OPTseries = "", |
---|
| 118 | OPTaddress = "Espa{\~n}a", |
---|
| 119 | OPTedition = "2", |
---|
| 120 | OPTmonth = "", |
---|
| 121 | OPTnote = "", |
---|
| 122 | OPTannote = "" |
---|
| 123 | } |
---|
| 124 | |
---|
| 125 | @Book{ PRESS:05, |
---|
| 126 | author = "Roger S. Pressman", |
---|
| 127 | editor = "Mc Graw-Hill", |
---|
| 128 | title = "Ingenier'ia del software. Un enfoque pr'actico", |
---|
| 129 | publisher = "Mc Graw-Hill", |
---|
| 130 | year = "2005", |
---|
| 131 | OPTkey = "", |
---|
| 132 | OPTvolume = "", |
---|
| 133 | OPTnumber = "", |
---|
| 134 | OPTseries = "", |
---|
| 135 | OPTaddress = "Mexico", |
---|
| 136 | OPTedition = "6", |
---|
| 137 | OPTmonth = "", |
---|
| 138 | OPTnote = "", |
---|
| 139 | OPTannote = "" |
---|
| 140 | } |
---|
| 141 | |
---|
| 142 | @Book{ NASH:02, |
---|
[fc4efb3] | 143 | author = "Andrew Nash, William Duane, Celia Joseph and Joseph Brink", |
---|
[9c88d1e] | 144 | editor = "McGraw-Hill", |
---|
| 145 | title = "PKI: Infraestructura de clave p{\'u}blica", |
---|
| 146 | publisher = "McGraw-Hill", |
---|
| 147 | year = "2002", |
---|
| 148 | OPTkey = "", |
---|
| 149 | OPTvolume = "", |
---|
| 150 | OPTnumber = "", |
---|
| 151 | OPTseries = "", |
---|
| 152 | OPTaddress = "Mexico", |
---|
| 153 | OPTedition = "", |
---|
| 154 | OPTmonth = "", |
---|
| 155 | OPTnote = "", |
---|
| 156 | OPTannote = "" |
---|
| 157 | } |
---|
| 158 | |
---|
[10c2c8e] | 159 | @Book{ RANKL:04, |
---|
| 160 | author = "Wolfgang Rankl, Wolfgang Effing", |
---|
| 161 | title = "Smart Card Handbook", |
---|
| 162 | publisher = "Wiley", |
---|
| 163 | year = "2004", |
---|
| 164 | OPTkey = "", |
---|
| 165 | OPTvolume = "", |
---|
| 166 | OPTnumber = "", |
---|
| 167 | OPTseries = "", |
---|
| 168 | OPTaddress = "Mexico", |
---|
| 169 | OPTedition = "3", |
---|
| 170 | OPTmonth = "", |
---|
| 171 | OPTnote = "", |
---|
| 172 | OPTannote = "" |
---|
| 173 | } |
---|
| 174 | |
---|
[9c88d1e] | 175 | @Article{ PERL:99, |
---|
| 176 | author = "R. Perlman", |
---|
| 177 | title = "An overview of PKI trust models", |
---|
| 178 | journal = "Network, IEEE", |
---|
| 179 | year = "1999", |
---|
| 180 | OPTkey = "", |
---|
| 181 | OPTvolume = "", |
---|
| 182 | OPTnumber = "", |
---|
| 183 | OPTpages = "", |
---|
| 184 | OPTmonth = "", |
---|
| 185 | OPTnote = "", |
---|
| 186 | OPTannote = "" |
---|
| 187 | } |
---|
| 188 | |
---|
| 189 | @Book{ SCHM:03, |
---|
| 190 | title = "Aprendiendo UML en 24 horas", |
---|
| 191 | author = "Joseph Schmuller", |
---|
| 192 | editor = "Prentice Hall", |
---|
| 193 | publisher = "Prentice Hall", |
---|
| 194 | year = "2003", |
---|
| 195 | address = "M{\'e}xico" |
---|
| 196 | } |
---|
| 197 | |
---|
| 198 | @Book{ VIEG:2002, |
---|
| 199 | title = "Network Security with OpenSSL", |
---|
| 200 | author = "John Viega and Matt Messier and Pravir Chandra", |
---|
| 201 | publisher = "O'Really", |
---|
| 202 | edition = "384", |
---|
| 203 | year = "2002" |
---|
| 204 | } |
---|
| 205 | |
---|
| 206 | @Book{ BOOC:99, |
---|
| 207 | title = "UML Lenguaje Unificado de Modelado", |
---|
| 208 | author = "G., Booch", |
---|
| 209 | publisher = "Addison Wesley", |
---|
| 210 | year = "1999" |
---|
| 211 | } |
---|
| 212 | |
---|
| 213 | @Book{ MULL:97, |
---|
| 214 | title = "Modelado de objetos con UML", |
---|
| 215 | author = "Alain Pierre-Muller", |
---|
| 216 | publisher = "Eyrolles", |
---|
| 217 | address = "Barcelona, Espa\~na", |
---|
| 218 | year = "1997" |
---|
| 219 | } |
---|
| 220 | |
---|
| 221 | @Book{ PILA:04, |
---|
| 222 | title = "Version Control with Subversion ", |
---|
| 223 | author = "C. Michael Pilato and Ben Collins-Sussman and Brian W. Fitzpatrick", |
---|
| 224 | publisher = "O'Really ", |
---|
| 225 | year = "2004" |
---|
| 226 | } |
---|
| 227 | |
---|
| 228 | @Electronic{ XCA:03, |
---|
| 229 | title = "XCA, una interfaz gr\'afica para OpenSSL, Clave p\'ublicas y privadas, certificados, solicitudes y listas de revocaci'on", |
---|
| 230 | howpublished = "http://www.hohnstaedt.de/xca.html", |
---|
| 231 | year = "2003", |
---|
| 232 | author = {Christian Hohnst\"{a}dt} |
---|
| 233 | } |
---|
| 234 | |
---|
| 235 | @Electronic{ IBM:98, |
---|
| 236 | title = "IBM Corporation. An overview of the IBM SET and the IBM CommercePoint Products", |
---|
| 237 | howpublished = "http://www.software.ibm.com/commerce/set/overview.html", |
---|
| 238 | year = "2003", |
---|
| 239 | author = {IBM Corporation} |
---|
| 240 | } |
---|
| 241 | |
---|
| 242 | |
---|
| 243 | |
---|
| 244 | @Electronic{ FSF:07, |
---|
| 245 | title = "Free Software Definition", |
---|
| 246 | howpublished = "http://www.fsf.org/licensing/essays/free-sw.html", |
---|
| 247 | year = "2007", |
---|
| 248 | author = {} |
---|
| 249 | } |
---|
| 250 | |
---|
| 251 | @Electronic{ TRAC:07, |
---|
| 252 | title = "Welcome to the Trac Project", |
---|
| 253 | howpublished = "http://trac.edgewall.org/", |
---|
| 254 | year = "2007", |
---|
| 255 | author = {} |
---|
| 256 | } |
---|
| 257 | |
---|
| 258 | @Book{ TONITO:14, |
---|
| 259 | title = "Trasteando con la bibliografía", |
---|
| 260 | author = "Antonio Araujo ", |
---|
| 261 | editor = "CENDITEL", |
---|
| 262 | publisher = "CENDITEL", |
---|
| 263 | year = "2014", |
---|
| 264 | address = "Mérida" |
---|
[12c2106] | 265 | } |
---|
| 266 | |
---|
| 267 | |
---|
| 268 | @Electronic{ IEEEhowto:espana, |
---|
| 269 | title = "Portal del DNI Electrónico Español", |
---|
| 270 | author = {}, |
---|
| 271 | howpublished = "http://www.dnielectronico.es/", |
---|
| 272 | year = "2012" |
---|
| 273 | } |
---|
| 274 | |
---|
| 275 | @Article{ IEEEhowto:eID, |
---|
| 276 | title = "Electronic Identity Cards for User Authentication Promise and Practice", |
---|
| 277 | author = "Andreas Poller, Ulrich Waldmann, Sven Vowe, Sven Turpe", |
---|
| 278 | journal = "IEEE Security \& Privacy", |
---|
| 279 | year = "2013", |
---|
| 280 | volume = "10", |
---|
| 281 | pages = "46--54" |
---|
| 282 | } |
---|
| 283 | |
---|
| 284 | @Electronic{ IEEEhowto:estonia, |
---|
| 285 | title = "Oficial Gateway to Estonia", |
---|
| 286 | author = {}, |
---|
| 287 | howpublished = "http://estonia.eu/about-estonia/economy-a-it/e-estonia.html", |
---|
| 288 | year = "2013" |
---|
| 289 | } |
---|
| 290 | |
---|
| 291 | |
---|
| 292 | |
---|
| 293 | @Book{ IEEEhowto:software, |
---|
| 294 | title = "Ingeniería del Software", |
---|
| 295 | author = "Campderrich Falgueras", |
---|
| 296 | publisher = "Editorial UOC", |
---|
| 297 | year = "2003", |
---|
| 298 | address = "Barcelona, España" |
---|
| 299 | } |
---|
| 300 | |
---|
| 301 | @Electronic{ IEEEhowto:directiva, |
---|
| 302 | title = "DIRECTIVA 1999/93/CE DEL PARLAMENTO EUROPEO Y DEL CONSEJO", |
---|
| 303 | author = {}, |
---|
| 304 | howpublished = "http://www.cert.fnmt.es/legsoporte/D\_1999\_93\_CE.pdf", |
---|
| 305 | year = "1999" |
---|
| 306 | } |
---|
| 307 | |
---|
| 308 | @Electronic{ IEEEhowto:x509, |
---|
| 309 | title = "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. Request for Comments (RFC) 5280", |
---|
| 310 | author = {Cooper D., Santesson S., y otros}, |
---|
| 311 | howpublished = "http://www.ietf.org/rfc/rfc5280.txt", |
---|
| 312 | year = "2013" |
---|
| 313 | } |
---|
| 314 | |
---|
| 315 | |
---|
| 316 | @Electronic{ IEEEhowto:pkcs7, |
---|
| 317 | title = "PKCS\#7.Cryptographic Message Syntax", |
---|
| 318 | author = {}, |
---|
| 319 | howpublished = "https://tools.ietf.org/html/rfc2315", |
---|
| 320 | year = "2013" |
---|
| 321 | } |
---|
| 322 | |
---|
| 323 | |
---|
| 324 | @Electronic{ IEEEhowto:pades, |
---|
| 325 | title = "PAdES. PDF Advance Electronic Signatures", |
---|
| 326 | author = {}, |
---|
| 327 | howpublished = "http://www.etsi.org/deliver/etsi\_ts/102700\_102799/10277801/01.01.01\_60/ts\_10277801v010101p.pdf", |
---|
| 328 | year = "2013" |
---|
| 329 | } |
---|
| 330 | |
---|
| 331 | @Electronic{ IEEEhowto:xmldsig, |
---|
| 332 | title = "XML Signature Syntax and Processing (Second Edition). W3C Recommendation 10 June 2008", |
---|
| 333 | author = {Bartel M., Boyer J., y otros}, |
---|
| 334 | howpublished = "http://www.w3.org/TR/xmldsig-core/", |
---|
| 335 | year = "2013" |
---|
| 336 | } |
---|
| 337 | |
---|
| 338 | @Electronic{ IEEEhowto:bdoc, |
---|
| 339 | title = "Formato para firmas electrónicas", |
---|
| 340 | author = {}, |
---|
| 341 | howpublished = "http://www.signature.it/-TOOLS/Bdoc-1.0.pdf", |
---|
| 342 | year = "2013" |
---|
| 343 | } |
---|
| 344 | |
---|
| 345 | |
---|
| 346 | @Article{ IEEEhowto:neubauer, |
---|
| 347 | title = "Digital signatures with familiar appearance for e-government documents: authentic PDF", |
---|
| 348 | author = "Neubauer, T.; Weippl, E.; Biffl, S.", |
---|
| 349 | journal = "Proceedings of the First International Conference on Availability, Reliability and Security", |
---|
| 350 | year = "2006", |
---|
| 351 | volume = {}, |
---|
| 352 | pages = "723--731" |
---|
| 353 | } |
---|
| 354 | |
---|
| 355 | @Book{ IEEEhowto:java, |
---|
| 356 | title = "Professional Java, JDK", |
---|
| 357 | author = "Richardson Clay, Avondolio Donald, others", |
---|
| 358 | publisher = "Wrox", |
---|
| 359 | year = "2005", |
---|
| 360 | } |
---|
| 361 | |
---|
| 362 | @Electronic{ IEEEhowto:xades, |
---|
| 363 | title = "XML Advanced Electronic Signatures (XAdES)", |
---|
| 364 | author = "Cruellas, J. Karlinger G., y otros", |
---|
| 365 | howpublished = "http://www.w3.org/TR/XAdES/", |
---|
| 366 | year = "2003" |
---|
| 367 | } |
---|
| 368 | |
---|
| 369 | @Electronic{ IEEEhowto:mime, |
---|
| 370 | title = "Security Multiparts for MIME. Multipart/Signed and Multipart/Encrypted", |
---|
| 371 | author = "Galvin , J. Murphy, S. Crocker, S. Freed, N.", |
---|
| 372 | howpublished = "http://tools.ietf.org/html/rfc1847", |
---|
| 373 | year = "2013" |
---|
| 374 | } |
---|
| 375 | |
---|
| 376 | |
---|
| 377 | @Electronic{ IEEEhowto:pkcs12, |
---|
| 378 | title = "PKCS\#12.Personal Information Exchange Syntax Standard.", |
---|
| 379 | author = "RSA Laboratories.", |
---|
| 380 | howpublished = "https://www.rsa.com/rsalabs/node.asp?id=2138", |
---|
| 381 | year = "2013" |
---|
| 382 | } |
---|
| 383 | |
---|
| 384 | |
---|
| 385 | @Book{ IEEEhowto:bpel, |
---|
| 386 | title = "Business Process Execution for Web Services BPEL and BPEL4WS", |
---|
| 387 | author = "Matjaz Juric, Mathew Benny", |
---|
| 388 | publisher = "Packt Publishing", |
---|
| 389 | year = "2006", |
---|
| 390 | } |
---|
| 391 | |
---|
| 392 | |
---|
| 393 | @Article{ IEEEhowto:safet, |
---|
| 394 | title = "SAFET: Sistema para la generación de aplicaciones de firma electrónica", |
---|
| 395 | author = "Bravo, V. Araujo A.", |
---|
| 396 | journal = "Revista Puente", |
---|
| 397 | year = "2011", |
---|
| 398 | volume = "6", |
---|
| 399 | } |
---|
| 400 | |
---|
| 401 | |
---|
| 402 | % referencias capítulo 7 |
---|
| 403 | |
---|
[6a2d170] | 404 | @Electronic{rlsm:terminology, |
---|
[12c2106] | 405 | title = "Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology", |
---|
| 406 | author = "Pfitzmann, A., Hansen, M.", |
---|
| 407 | howpublished = "http://dud.inf.tu-dresden.de/Anon\_Terminology.shtml", |
---|
| 408 | year = "2000" |
---|
| 409 | } |
---|
| 410 | |
---|
[6a2d170] | 411 | @Article{rlsm:diaz01, |
---|
[12c2106] | 412 | title = "Towards measuring Anonymity ", |
---|
| 413 | author = "D\'{\i}az, C., Seys, S., Claessens, J., Preneel, B.", |
---|
| 414 | journal = "Designing Privacy Enhancing Technologies", |
---|
| 415 | year = "2002", |
---|
| 416 | pages = "54--68", |
---|
| 417 | volume = {}, |
---|
| 418 | } |
---|
| 419 | |
---|
[6a2d170] | 420 | @Article{rlsm:serj01, |
---|
[12c2106] | 421 | title = "Towards an Information Theoretic Metric for Anonymity", |
---|
| 422 | author = "Serjantov, A., Danezis, G.", |
---|
| 423 | journal = "Proceedings of Privacy Enhancing Technologies Workshop", |
---|
| 424 | year = "2002", |
---|
| 425 | pages = "54--68", |
---|
| 426 | volume = {}, |
---|
| 427 | } |
---|
| 428 | |
---|
| 429 | |
---|
| 430 | @Article{ rlsm:chaum-mix, |
---|
| 431 | title = "Untraceable electronic mail, return addresses, and digital pseudonyms", |
---|
| 432 | author = "Chaum, D.", |
---|
| 433 | journal = "Communications of the ACM", |
---|
| 434 | year = "1981", |
---|
| 435 | pages = {}, |
---|
| 436 | volume = "4", |
---|
| 437 | } |
---|
| 438 | |
---|
| 439 | |
---|
| 440 | @Article{ rlsm:diaz-mixes, |
---|
| 441 | title = "Generalising Mixes", |
---|
| 442 | author = "D\'{\i}az, C., Serjantov, A.", |
---|
| 443 | journal = "Proceedings of Privacy Enhancing Technologies workshop", |
---|
| 444 | year = "2003", |
---|
| 445 | pages = "18--31", |
---|
| 446 | volume = {}, |
---|
| 447 | } |
---|
| 448 | |
---|
| 449 | |
---|
| 450 | @Article{ rlsm:mixminion, |
---|
| 451 | title = "Mixminion: Design of a Type III Anonymous Remailer Protocol", |
---|
| 452 | author = "Danezis, G., Dingledine, R., Mathewson, N.", |
---|
| 453 | journal = "Proceedings of the 2003 IEEE Symposium on Security and Privacy", |
---|
| 454 | year = "2003", |
---|
| 455 | pages = "2--15", |
---|
| 456 | volume = {}, |
---|
| 457 | } |
---|
| 458 | |
---|
[342b9da] | 459 | @Article{rlsm:tor-design, |
---|
[12c2106] | 460 | title = "Tor: The Second-Generation Onion Router", |
---|
| 461 | author = "Dingledine, R., Mathewson, N., Syverson, P.", |
---|
| 462 | journal = "Proceedings of the 13th USENIX Security Symposium", |
---|
| 463 | year = "2004", |
---|
| 464 | pages = {}, |
---|
| 465 | volume = {}, |
---|
| 466 | } |
---|
| 467 | |
---|
| 468 | |
---|
[342b9da] | 469 | @Article{rlsm:antnet, |
---|
[12c2106] | 470 | title = "AntNet: Distributed Stigmergetic Control for Communications Networks", |
---|
| 471 | author = "Caro, G.D., Dorigo, M.", |
---|
| 472 | journal = "Journal of Artificial Intelligence Research", |
---|
| 473 | year = "1998", |
---|
| 474 | pages = {}, |
---|
| 475 | volume = {}, |
---|
| 476 | } |
---|
| 477 | |
---|
| 478 | @Article{ rlsm:ants-white, |
---|
| 479 | title = "Connection Management using Adaptive Mobile Agents", |
---|
| 480 | author = "White, T., Pagurek, B.", |
---|
| 481 | journal = "Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications", |
---|
| 482 | year = "1998", |
---|
| 483 | pages = "802--809", |
---|
| 484 | volume = {}, |
---|
| 485 | } |
---|
| 486 | |
---|
| 487 | |
---|
| 488 | @Article{ rlsm:ants-loadbalancing, |
---|
| 489 | title = "Ant-Based Load Balancing in Telecommunications Networks", |
---|
| 490 | author = "Schoonderwoerd, R.", |
---|
| 491 | journal = "Adaptive Behavior", |
---|
| 492 | year = "1997", |
---|
| 493 | pages = "169--207", |
---|
| 494 | volume = "5", |
---|
| 495 | } |
---|
| 496 | |
---|
| 497 | |
---|
| 498 | @Article{ rlsm:shannon, |
---|
| 499 | title = "The mathematical theory for communicactions", |
---|
| 500 | author = "Shannon, C.", |
---|
| 501 | journal = "Bell Systems Technical Journal", |
---|
| 502 | year = "1948", |
---|
| 503 | pages = "50--64", |
---|
| 504 | volume = "30", |
---|
| 505 | } |
---|
| 506 | |
---|
[6a2d170] | 507 | @Article{rlsm:yuxin, |
---|
[12c2106] | 508 | title = "Measuring Anonymity with Relative Entropy", |
---|
| 509 | author = "Deng, Y., Pang, J., Wu, P.", |
---|
| 510 | journal = "Proceedings of the 4th International Workshop on Formal Aspects in Security and Trust", |
---|
| 511 | year = "2007", |
---|
| 512 | pages = "65--79", |
---|
| 513 | volume = {}, |
---|
| 514 | } |
---|
| 515 | |
---|
| 516 | |
---|
[6a2d170] | 517 | @Article{rlsm:combinatorial, |
---|
[12c2106] | 518 | title = "A Combinatorial Approach to Measuring Anonymity", |
---|
| 519 | author = "Edman, M., Sivrikaya, F., Yener, B.", |
---|
| 520 | journal = "Intelligence and Security Informatics", |
---|
| 521 | year = "2007", |
---|
| 522 | pages = "356--363", |
---|
| 523 | volume = {}, |
---|
| 524 | } |
---|
| 525 | |
---|
| 526 | |
---|
[6a2d170] | 527 | @Article{rlsm:revisiting, |
---|
[12c2106] | 528 | title = "Revisiting A Combinatorial Approach Toward Measuring Anonymity", |
---|
| 529 | author = "Gierlichs, B., Troncoso, C., Diaz, C., Preneel, B., Verbauwhede, I.", |
---|
| 530 | journal = "Workshop on Privacy in the Electronic Society", |
---|
| 531 | year = "2008", |
---|
| 532 | pages = "111--116", |
---|
| 533 | volume = {}, |
---|
| 534 | } |
---|
| 535 | |
---|
| 536 | |
---|
[6a2d170] | 537 | @Article{rlsm:berthold, |
---|
[12c2106] | 538 | title = "The Disavantages of Free Mix Routes and How to overcome them", |
---|
| 539 | author = "Berthold, O., Pfitzmann, A., Standtke, R.", |
---|
| 540 | journal = "Proceedings of Privacy Enhancing Technologies Workshop", |
---|
| 541 | year = "2001", |
---|
| 542 | pages = "30--45", |
---|
| 543 | volume = {}, |
---|
| 544 | } |
---|
| 545 | |
---|
| 546 | |
---|
| 547 | @Article{ rlsm:reiter, |
---|
| 548 | title = "Crowds: Anonymity for Web Transactions", |
---|
| 549 | author = "Reiter, M., Rubin, A.", |
---|
| 550 | journal = "ACM Transactions on Information and System Security", |
---|
| 551 | year = "1998", |
---|
| 552 | pages = {}, |
---|
| 553 | volume = "1", |
---|
| 554 | } |
---|
| 555 | |
---|
| 556 | |
---|
| 557 | @Electronic{ rlsm:vernier, |
---|
| 558 | title = "What are Mean Squared Error and Root Mean Squared Error?.", |
---|
| 559 | author = "Vernier, D., and Gastineau, J.", |
---|
| 560 | howpublished = "http://www.vernier.com/til/1014/", |
---|
| 561 | year = "2011" |
---|
| 562 | } |
---|
| 563 | |
---|
| 564 | |
---|
| 565 | @Article{ rlsm:jianhua, |
---|
| 566 | title = "Divergences Measures Based in Shannon Entropy", |
---|
| 567 | author = "Jianhua, L.", |
---|
| 568 | journal = "IEEE Transactions on Information Theory", |
---|
| 569 | year = "1991", |
---|
| 570 | pages = {}, |
---|
| 571 | volume = "37", |
---|
| 572 | number = "1", |
---|
| 573 | } |
---|
| 574 | |
---|
[342b9da] | 575 | % Referencias adicionales del capítulo 3. |
---|
| 576 | |
---|
| 577 | @TechReport{ico2006, |
---|
| 578 | author = {Information Commissioner Office}, |
---|
| 579 | title = {Data protection technical guidance note: Privacy enhancing technologies (pets)}, |
---|
| 580 | institution = {Information Commissioner Office}, |
---|
| 581 | year = {2006}, |
---|
| 582 | month = {April}, |
---|
| 583 | } |
---|
| 584 | |
---|
| 585 | @TechReport{ONU1948, |
---|
| 586 | author = {Organización de las Naciones Unidas}, |
---|
| 587 | title = {Derechos humanos para todos. Declaración Universal de los Derechos humanos}, |
---|
| 588 | institution = {Organización de las Naciones Unidas}, |
---|
| 589 | year = {1948} |
---|
| 590 | } |
---|
| 591 | |
---|
| 592 | @phdthesis{george-thesis, |
---|
| 593 | title = {Better Anonymous Communications}, |
---|
| 594 | author = {George Danezis}, |
---|
| 595 | school = {University of Cambridge}, |
---|
| 596 | year = {2004}, |
---|
| 597 | month = {July}, |
---|
| 598 | www_tags = {selected}, |
---|
| 599 | www_section = {Anonymous communication}, |
---|
| 600 | www_pdf_url = {http://www.cl.cam.ac.uk/~gd216/thesis.pdf}, |
---|
| 601 | } |
---|
| 602 | |
---|
| 603 | @inproceedings{ISDN-mixes, |
---|
| 604 | title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}}, |
---|
| 605 | author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner}, |
---|
| 606 | booktitle = {Proceedings of the GI/ITG Conference on Communication in Distributed |
---|
| 607 | Systems}, |
---|
| 608 | year = {1991}, |
---|
| 609 | month = {February}, |
---|
| 610 | pages = {451--463}, |
---|
| 611 | www_tags = {selected}, |
---|
| 612 | www_section = {Anonymous communication}, |
---|
| 613 | www_ps_gz_url = {http://www.semper.org/sirene/publ/PfPW_91TelMixeGI_NTG.ps.gz}, |
---|
| 614 | } |
---|
| 615 | |
---|
| 616 | @inproceedings{esorics04-mauw, |
---|
| 617 | title = {A formalization of anonymity and onion routing}, |
---|
| 618 | author = {S. Mauw and J. Verschuren and E.P. de Vink}, |
---|
| 619 | booktitle = {Proceedings of ESORICS 2004}, |
---|
| 620 | year = {2004}, |
---|
| 621 | location = {Sophia Antipolis}, |
---|
| 622 | pages = {109--124}, |
---|
| 623 | editor = {P. Samarati and P. Ryan and D. Gollmann and R. Molva}, |
---|
| 624 | publisher = {LNCS 3193}, |
---|
| 625 | www_tags = {selected}, |
---|
| 626 | www_section = {Formal methods}, |
---|
| 627 | www_pdf_url = {http://www.win.tue.nl/~ecss/downloads/esorics04.pdf}, |
---|
| 628 | } |
---|
| 629 | |
---|
| 630 | @inproceedings{onion-discex00, |
---|
| 631 | title = {{O}nion {R}outing Access Configurations}, |
---|
| 632 | author = {Paul Syverson and Michael Reed and David Goldschlag}, |
---|
| 633 | booktitle = {Proceedings of the DARPA Information Survivability Conference and Exposition |
---|
| 634 | (DISCEX 2000)}, |
---|
| 635 | volume = {1}, |
---|
| 636 | year = {2000}, |
---|
| 637 | pages = {34--40}, |
---|
| 638 | publisher = {IEEE CS Press}, |
---|
| 639 | www_ps_gz_url = {http://www.onion-router.net/Publications/DISCEX-2000.ps.gz}, |
---|
| 640 | www_tags = {selected}, |
---|
| 641 | www_abstract_url = {http://www.onion-router.net/Publications.html}, |
---|
| 642 | www_section = {Anonymous communication}, |
---|
| 643 | www_pdf_url = {http://www.onion-router.net/Publications/DISCEX-2000.pdf}, |
---|
| 644 | www_ps_url = {http://www.onion-router.net/Publications/DISCEX-2000.ps}, |
---|
| 645 | } |
---|
| 646 | |
---|
[6a2d170] | 647 | @inproceedings{onion-routingpet2000, |
---|
[342b9da] | 648 | title = {{Towards an Analysis of Onion Routing Security}}, |
---|
| 649 | author = {Paul Syverson and Gene Tsudik and Michael Reed and Carl Landwehr}, |
---|
| 650 | booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design |
---|
| 651 | Issues in Anonymity and Unobservability}, |
---|
| 652 | year = {2000}, |
---|
| 653 | month = {July}, |
---|
| 654 | pages = {96--114}, |
---|
| 655 | editor = {H. Federrath}, |
---|
| 656 | publisher = {Springer-Verlag, LNCS 2009}, |
---|
| 657 | www_important = {1}, |
---|
| 658 | www_tags = {selected}, |
---|
| 659 | www_section = {Anonymous communication}, |
---|
| 660 | www_ps_gz_url = {http://www.onion-router.net/Publications/WDIAU-2000.ps.gz}, |
---|
| 661 | } |
---|
| 662 | |
---|
[6a2d170] | 663 | @inproceedings{danezispet2004, |
---|
[342b9da] | 664 | title = {The Traffic Analysis of Continuous-Time Mixes}, |
---|
| 665 | author = {George Danezis}, |
---|
| 666 | booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, |
---|
| 667 | volume = {3424}, |
---|
| 668 | year = {2004}, |
---|
| 669 | month = {May}, |
---|
| 670 | pages = {35--50}, |
---|
| 671 | series = {LNCS}, |
---|
| 672 | www_important = {1}, |
---|
| 673 | www_tags = {selected}, |
---|
| 674 | www_section = {Traffic analysis}, |
---|
| 675 | www_pdf_url = {http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf}, |
---|
| 676 | } |
---|
| 677 | |
---|
| 678 | @inproceedings{timing-fc2004, |
---|
| 679 | title = {Timing Attacks in Low-Latency Mix-Based Systems}, |
---|
| 680 | author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew K. Wright}, |
---|
| 681 | booktitle = {Proceedings of Financial Cryptography (FC '04)}, |
---|
| 682 | year = {2004}, |
---|
| 683 | month = {February}, |
---|
| 684 | pages = {251--265}, |
---|
| 685 | editor = {Ari Juels}, |
---|
| 686 | publisher = {Springer-Verlag, LNCS 3110}, |
---|
| 687 | www_tags = {selected}, |
---|
| 688 | www_section = {Traffic analysis}, |
---|
| 689 | www_pdf_url = {http://www.cs.umass.edu/~mwright/papers/levine-timing.pdf}, |
---|
| 690 | } |
---|
| 691 | |
---|
| 692 | @inproceedings{SS03, |
---|
| 693 | title = {Passive Attack Analysis for Connection-Based Anonymity Systems}, |
---|
| 694 | author = {Andrei Serjantov and Peter Sewell}, |
---|
| 695 | booktitle = {Proceedings of ESORICS 2003}, |
---|
| 696 | year = {2003}, |
---|
| 697 | month = {October}, |
---|
| 698 | www_tags = {selected}, |
---|
| 699 | www_remarks = {An investigation of packet counting attacks (which work best on lightly loaded networks) and connection-start timing attacks.}, |
---|
| 700 | www_ps_url = {http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps}, |
---|
| 701 | www_section = {Traffic analysis}, |
---|
| 702 | } |
---|
| 703 | |
---|
| 704 | @inproceedings{flow-correlation04, |
---|
| 705 | title = {On Flow Correlation Attacks and Countermeasures in Mix Networks}, |
---|
| 706 | author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao}, |
---|
| 707 | booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, |
---|
| 708 | volume = {3424}, |
---|
| 709 | year = {2004}, |
---|
| 710 | month = {May}, |
---|
| 711 | pages = {207--225}, |
---|
| 712 | series = {LNCS}, |
---|
| 713 | www_tags = {selected}, |
---|
| 714 | www_section = {Traffic analysis}, |
---|
| 715 | www_pdf_url = {http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf}, |
---|
| 716 | } |
---|
| 717 | |
---|
| 718 | @inproceedings{WangCJ05, |
---|
| 719 | title = {Tracking anonymous peer-to-peer VoIP calls on the internet}, |
---|
| 720 | author = {Xinyuan Wang and Shiping Chen and Sushil Jajodia}, |
---|
| 721 | booktitle = {Proceedings of the ACM Conference on Computer and Communications Security}, |
---|
| 722 | year = {2005}, |
---|
| 723 | month = {November}, |
---|
| 724 | pages = {81--91}, |
---|
| 725 | www_tags = {selected}, |
---|
| 726 | www_section = {Anonymous communication}, |
---|
| 727 | www_pdf_url = {http://ise.gmu.edu/~xwangc/Publications/CCS05-VoIPTracking.pdf}, |
---|
| 728 | } |
---|
| 729 | |
---|
| 730 | @inproceedings{e2e-traffic, |
---|
| 731 | title = {Practical Traffic Analysis: Extending and Resisting Statistical Disclosure}, |
---|
| 732 | author = {Nick Mathewson and Roger Dingledine}, |
---|
| 733 | booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, |
---|
| 734 | volume = {3424}, |
---|
| 735 | year = {2004}, |
---|
| 736 | month = {May}, |
---|
| 737 | pages = {17--34}, |
---|
| 738 | series = {LNCS}, |
---|
| 739 | www_important = {1}, |
---|
| 740 | www_tags = {selected}, |
---|
| 741 | www_section = {Traffic analysis}, |
---|
| 742 | www_pdf_url = {http://freehaven.net/doc/e2e-traffic/e2e-traffic.pdf}, |
---|
| 743 | } |
---|
| 744 | |
---|
| 745 | @inproceedings{back01, |
---|
| 746 | title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems}, |
---|
| 747 | author = {Adam Back and Ulf M\"oller and Anton Stiglic}, |
---|
| 748 | booktitle = {Proceedings of Information Hiding Workshop (IH 2001)}, |
---|
| 749 | year = {2001}, |
---|
| 750 | month = {April}, |
---|
| 751 | pages = {245--257}, |
---|
| 752 | editor = {Ira S. Moskowitz}, |
---|
| 753 | publisher = {Springer-Verlag, LNCS 2137}, |
---|
| 754 | www_important = {1}, |
---|
| 755 | www_tags = {selected}, |
---|
| 756 | www_section = {Traffic analysis}, |
---|
| 757 | www_pdf_url = {http://www.cypherspace.org/adam/pubs/traffic.pdf}, |
---|
| 758 | } |
---|
| 759 | |
---|
| 760 | @inproceedings{hs-attack06, |
---|
| 761 | title = {Locating Hidden Servers}, |
---|
| 762 | author = {Lasse {\O}verlier and Paul Syverson}, |
---|
| 763 | booktitle = {Proceedings of the 2006 IEEE Symposium on Security and Privacy}, |
---|
| 764 | year = {2006}, |
---|
| 765 | month = {May}, |
---|
| 766 | publisher = {IEEE CS}, |
---|
| 767 | www_important = {1}, |
---|
| 768 | www_tags = {selected}, |
---|
| 769 | www_pdf_url = {http://www.onion-router.net/Publications/locating-hidden-servers.pdf}, |
---|
| 770 | www_remarks = {Motivates and describes Tor's entry guard design.}, |
---|
| 771 | www_section = {Traffic analysis}, |
---|
[6a2d170] | 772 | } |
---|
| 773 | |
---|
[2106ee3] | 774 | |
---|
[6a2d170] | 775 | @MastersThesis{maestriaRSumoza, |
---|
| 776 | author = {Rodolfo Sumoza}, |
---|
| 777 | title = {Sistemas Anónimos en Escenarios Globales}, |
---|
| 778 | school = {Universidad Complutense de Madrid}, |
---|
| 779 | year = {2008}, |
---|
| 780 | } |
---|
| 781 | |
---|
| 782 | @inproceedings{traffic_analysis, |
---|
| 783 | author = {J. F. Raymond}, |
---|
| 784 | editor = {H. Federrath}, |
---|
| 785 | title = {Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems}, |
---|
| 786 | booktitle = {Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability - Springer-Verlag, LNCS}, |
---|
| 787 | year = {2000}, |
---|
| 788 | } |
---|
| 789 | |
---|
| 790 | @inproceedings{timing_ssh, |
---|
| 791 | author = {Dawn Xiaodong Song; David Wagner; Xuqing Tian}, |
---|
| 792 | editor = {USENIX Association}, |
---|
| 793 | title = {Timing Analysis of Keystrokes and Timing Attacks on SSH}, |
---|
| 794 | booktitle = {Proceedings of the 10th USENIX Security Symposium}, |
---|
| 795 | year = {2001}, |
---|
| 796 | } |
---|
| 797 | |
---|
| 798 | @online{cenditel_anonimato, |
---|
| 799 | author = {Endira Mora et. al}, |
---|
| 800 | title = {Gestión de Anonimato}, |
---|
| 801 | year = {2014}, |
---|
| 802 | url = {https://tibisay.cenditel.gob.ve/gestionanonimato/wiki/PlanDeTrabajo%3A}, |
---|
| 803 | } |
---|
| 804 | |
---|
| 805 | @inproceedings{cebolla, |
---|
| 806 | title = {{Cebolla: Pragmatic IP Anonymity}}, |
---|
| 807 | author = {Zach Brown}, |
---|
| 808 | booktitle = {Proceedings of the 2002 Ottawa Linux Symposium}, |
---|
| 809 | year = {2002}, |
---|
| 810 | month = {June}, |
---|
| 811 | www_tags = {selected}, |
---|
| 812 | www_pdf_url = {http://cypherspace.org/cebolla/cebolla.pdf}, |
---|
| 813 | www_remarks = {Written by a former Freedom developer, Cebolla has a UDP-based design |
---|
| 814 | similar to second-generation Freedom. The initiator incrementally builds her |
---|
| 815 | circuit, giving her end-to-end forward-secrecy and also better recovery from |
---|
| 816 | broken nodes.}, |
---|
| 817 | www_section = {Anonymous communication}, |
---|
[cff8230] | 818 | } |
---|
[db943f9] | 819 | |
---|
[beee373] | 820 | @Electronic{ SCHNEIER:14, |
---|
| 821 | title = "Choosing Secure Passwords", |
---|
| 822 | howpublished = "http://boingboing.net/2014/02/25/choosing-a-secure-password.html", |
---|
| 823 | year = "2014", |
---|
| 824 | author = {Bruce Schneier} |
---|
| 825 | } |
---|
[db943f9] | 826 | |
---|