source: libros/maquetacion/bibliografia.bib @ 342b9da

revisionfinal
Last change on this file since 342b9da was 342b9da, checked in by cualquiera <cualquiera@…>, 10 years ago

Cambios en la bibliografía del capítulo 3.

  • Property mode set to 100644
File size: 20.1 KB
Line 
1% Archivo de bibliografia para el libro de seguridad
2
3
4@Book{ NIC:03,
5        author = "R. Nichols and P. C. Lekkas",
6        editor = "McGraw-Hill",
7        title = "Seguridad para comunicaciones inal{\'a}mbricas",
8        publisher = "McGraw-Hill",
9        year = "2003",
10        OPTkey = "",
11        OPTvolume = "",
12        OPTnumber = "",
13        OPTseries = "",
14        OPTaddress = "Mexico",
15        OPTedition = "",
16        OPTmonth = "",
17        OPTnote = "",
18        OPTannote = "",
19        author = "R. Nichols and P. C. Lekkas"
20}
21
22@Book{ ACE:03,
23        author = "Vicente Aceituno Canal",
24        editor = "Noriega Editores",
25        title = "Seguridad de la informaci'on",
26        publisher = "Noriega Editores",
27        year = "2003",
28        OPTkey = "",
29        OPTvolume = "",
30        OPTnumber = "",
31        OPTseries = "",
32        OPTaddress = "M'exico D.F., M'exico",
33        OPTedition = "",
34        OPTmonth = "M'exico D.F.",
35        OPTnote = "",
36        OPTannote = "",
37}
38
39@Book{ KURT:01,
40        author = "Kurt Wall et al",
41        editor = "Prentice Hall",
42        title = "Programaci'on en Linux",
43        publisher = "Prentice Hall",
44        year = "2001",
45        OPTkey = "",
46        OPTvolume = "",
47        OPTnumber = "",
48        OPTseries = "",
49        OPTaddress = "Madrid, Espa~na",
50        OPTedition = "",
51        OPTmonth = "",
52        OPTnote = "",
53        OPTannote = "",
54}
55
56@Book{ SARW:03,
57        author = "Sarwar, Koretsky",
58        editor = "Pearson, Prentice Hall",
59        title = "El libro de Linux",
60        publisher = "Prentice Hall",
61        year = "2003",
62        OPTkey = "",
63        OPTvolume = "",
64        OPTnumber = "",
65        OPTseries = "",
66        OPTaddress = "Madrid, Espa~na",
67        OPTedition = "",
68        OPTmonth = "",
69        OPTnote = "",
70        OPTannote = "",
71}
72
73
74@Book{ STRO:02,
75        author = "Bjarne Stroustrup",
76        editor = "Addison Wesley",
77        title = "El lenguaje de programaci{\'o}n C++",
78        publisher = "Addison Wesley",
79        year = "2002",
80        OPTkey = "",
81        OPTvolume = "",
82        OPTnumber = "",
83        OPTseries = "",
84        OPTaddress = "Madrid, Espa{\~n}a",
85        OPTedition = "",
86        OPTmonth = "",
87        OPTnote = "",
88        OPTannote = ""
89}
90
91@Book{ BLAN:06,
92        author = "James Blanchette and Mark Summerfield",
93        editor = "Prentice Hall",
94        title = "C++ GUI Programming with Qt 4",
95        publisher = "Prentice Hall",
96        year = "2006",
97        OPTkey = "",
98        OPTvolume = "",
99        OPTnumber = "",
100        OPTseries = "",
101        OPTaddress = "Massachusetts, USA",
102        OPTedition = "",
103        OPTmonth = "",
104        OPTnote = "",
105        OPTannote = ""
106}
107
108@Book{ STAL:03,
109        author = "William Stallings",
110        editor = "Pearson",
111        title = "Fundamentos de Seguridad de Redes. Aplicaciones y Est{\'a}ndares",
112        publisher = "Prentice Hall",
113        year = "2003",
114        OPTkey = "",
115        OPTvolume = "",
116        OPTnumber = "",
117        OPTseries = "",
118        OPTaddress = "Espa{\~n}a",
119        OPTedition = "2",
120        OPTmonth = "",
121        OPTnote = "",
122        OPTannote = ""
123}
124
125@Book{ PRESS:05,
126        author = "Roger S. Pressman",
127        editor = "Mc Graw-Hill",
128        title = "Ingenier'ia del software. Un enfoque pr'actico",
129        publisher = "Mc Graw-Hill",
130        year = "2005",
131        OPTkey = "",
132        OPTvolume = "",
133        OPTnumber = "",
134        OPTseries = "",
135        OPTaddress = "Mexico",
136        OPTedition = "6",
137        OPTmonth = "",
138        OPTnote = "",
139        OPTannote = ""
140}
141
142@Book{ NASH:02,
143        author = "Nash Duane and Joseph Brink",
144        editor = "McGraw-Hill",
145        title = "PKI: Infraestructura de clave p{\'u}blica",
146        publisher = "McGraw-Hill",
147        year = "2002",
148        OPTkey = "",
149        OPTvolume = "",
150        OPTnumber = "",
151        OPTseries = "",
152        OPTaddress = "Mexico",
153        OPTedition = "",
154        OPTmonth = "",
155        OPTnote = "",
156        OPTannote = ""
157}
158
159@Article{ PERL:99,
160        author = "R. Perlman",
161        title = "An overview of PKI trust models",
162        journal = "Network, IEEE",
163        year = "1999",
164        OPTkey = "",
165        OPTvolume = "",
166        OPTnumber = "",
167        OPTpages = "",
168        OPTmonth = "",
169        OPTnote = "",
170        OPTannote = ""
171}
172
173@Book{ SCHM:03,
174        title = "Aprendiendo UML en 24 horas",
175        author = "Joseph Schmuller",
176        editor = "Prentice Hall",
177        publisher = "Prentice Hall",
178        year = "2003",
179        address = "M{\'e}xico"
180}
181
182@Book{ VIEG:2002,
183        title = "Network Security with OpenSSL",
184        author = "John Viega and Matt Messier and Pravir Chandra",
185        publisher = "O'Really",
186        edition = "384",
187        year = "2002"
188}
189
190@Book{ BOOC:99,
191        title = "UML Lenguaje Unificado de Modelado",
192        author = "G., Booch",
193        publisher = "Addison Wesley",
194        year = "1999"
195}
196
197@Book{ MULL:97,
198        title = "Modelado de objetos con UML",
199        author = "Alain Pierre-Muller",
200        publisher = "Eyrolles",
201        address = "Barcelona, Espa\~na",
202        year = "1997"
203}
204
205@Book{ PILA:04,
206        title = "Version Control with Subversion ",
207        author = "C. Michael Pilato and Ben Collins-Sussman and Brian W. Fitzpatrick",
208        publisher = "O'Really ",
209        year = "2004"
210}
211
212@Electronic{ XCA:03,
213        title = "XCA, una interfaz gr\'afica para OpenSSL, Clave p\'ublicas y privadas, certificados, solicitudes y listas de revocaci'on",
214        howpublished = "http://www.hohnstaedt.de/xca.html",
215        year = "2003",
216        author = {Christian Hohnst\"{a}dt}
217}
218
219@Electronic{ IBM:98,
220        title = "IBM Corporation. An overview of the IBM SET and the IBM CommercePoint Products",
221        howpublished = "http://www.software.ibm.com/commerce/set/overview.html",
222        year = "2003",
223        author = {IBM Corporation}
224}
225
226
227
228@Electronic{ FSF:07,
229        title = "Free Software Definition",
230        howpublished = "http://www.fsf.org/licensing/essays/free-sw.html",
231        year = "2007",
232        author = {}
233}
234
235@Electronic{ TRAC:07,
236        title = "Welcome to the Trac Project",
237        howpublished = "http://trac.edgewall.org/",
238        year = "2007",
239        author = {}
240}
241
242@Book{ TONITO:14,
243        title = "Trasteando con la bibliografía",
244        author = "Antonio Araujo ",
245        editor = "CENDITEL",
246        publisher = "CENDITEL",
247        year = "2014",
248        address = "Mérida"
249}
250
251
252@Electronic{ IEEEhowto:espana,
253        title = "Portal del DNI Electrónico Español",
254        author = {},
255        howpublished = "http://www.dnielectronico.es/",
256        year = "2012"
257}
258
259@Article{ IEEEhowto:eID,
260        title = "Electronic Identity Cards for User Authentication Promise and Practice",
261        author = "Andreas Poller, Ulrich Waldmann, Sven Vowe, Sven Turpe",
262        journal = "IEEE Security \& Privacy",
263        year = "2013",
264        volume = "10",
265        pages = "46--54"
266}
267
268@Electronic{ IEEEhowto:estonia,
269        title = "Oficial Gateway to Estonia",
270        author = {},
271        howpublished = "http://estonia.eu/about-estonia/economy-a-it/e-estonia.html",
272        year = "2013"
273}
274
275
276
277@Book{ IEEEhowto:software,
278        title = "Ingeniería del Software",
279        author = "Campderrich Falgueras",
280        publisher = "Editorial UOC",
281        year = "2003",
282        address = "Barcelona, España"
283}
284
285@Electronic{ IEEEhowto:directiva,
286        title = "DIRECTIVA 1999/93/CE DEL PARLAMENTO EUROPEO Y DEL CONSEJO",
287        author = {},
288        howpublished = "http://www.cert.fnmt.es/legsoporte/D\_1999\_93\_CE.pdf",
289        year = "1999"
290}
291
292@Electronic{ IEEEhowto:x509,
293        title = "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. Request for Comments (RFC) 5280",
294        author = {Cooper D.,  Santesson S., y otros},
295        howpublished = "http://www.ietf.org/rfc/rfc5280.txt",
296        year = "2013"
297}
298
299
300@Electronic{ IEEEhowto:pkcs7,
301        title = "PKCS\#7.Cryptographic Message Syntax",
302        author = {},
303        howpublished = "https://tools.ietf.org/html/rfc2315",
304        year = "2013"
305}
306
307
308@Electronic{ IEEEhowto:pades,
309        title = "PAdES. PDF Advance Electronic Signatures",
310        author = {},
311        howpublished = "http://www.etsi.org/deliver/etsi\_ts/102700\_102799/10277801/01.01.01\_60/ts\_10277801v010101p.pdf",
312        year = "2013"
313}
314
315@Electronic{ IEEEhowto:xmldsig,
316        title = "XML Signature Syntax and Processing (Second Edition). W3C Recommendation 10 June 2008",
317        author = {Bartel M., Boyer J., y otros},
318        howpublished = "http://www.w3.org/TR/xmldsig-core/",
319        year = "2013"
320}
321
322@Electronic{ IEEEhowto:bdoc,
323        title = "Formato para firmas electrónicas",
324        author = {},
325        howpublished = "http://www.signature.it/-TOOLS/Bdoc-1.0.pdf",
326        year = "2013"
327}
328
329
330@Article{ IEEEhowto:neubauer,
331        title = "Digital signatures with familiar appearance for e-government documents: authentic PDF",
332        author = "Neubauer, T.; Weippl, E.; Biffl, S.",
333        journal = "Proceedings of the First International Conference on Availability, Reliability and Security",
334        year = "2006",
335        volume = {},
336        pages = "723--731"
337}
338
339@Book{ IEEEhowto:java,
340        title = "Professional Java, JDK",
341        author = "Richardson Clay, Avondolio Donald, others",
342        publisher = "Wrox",
343        year = "2005",
344}
345
346@Electronic{ IEEEhowto:xades,
347        title = "XML Advanced Electronic Signatures (XAdES)",
348        author = "Cruellas, J. Karlinger G., y otros",
349        howpublished = "http://www.w3.org/TR/XAdES/",
350        year = "2003"
351}
352
353@Electronic{ IEEEhowto:mime,
354        title = "Security Multiparts for MIME. Multipart/Signed and Multipart/Encrypted",
355        author = "Galvin , J. Murphy, S. Crocker, S. Freed, N.",
356        howpublished = "http://tools.ietf.org/html/rfc1847",
357        year = "2013"
358}
359
360
361@Electronic{ IEEEhowto:pkcs12,
362        title = "PKCS\#12.Personal Information Exchange Syntax Standard.",
363        author = "RSA Laboratories.",
364        howpublished = "https://www.rsa.com/rsalabs/node.asp?id=2138",
365        year = "2013"
366}
367
368
369@Book{ IEEEhowto:bpel,
370        title = "Business Process Execution for Web Services BPEL and BPEL4WS",
371        author = "Matjaz Juric, Mathew Benny",
372        publisher = "Packt Publishing",
373        year = "2006",
374}
375
376
377@Article{ IEEEhowto:safet,
378        title = "SAFET: Sistema para la generación de aplicaciones de firma electrónica",
379        author = "Bravo, V. Araujo A.",
380        journal = "Revista Puente",
381        year = "2011",
382        volume = "6",
383}
384
385
386% referencias capítulo 7
387
388@Electronic{ rlsm:terminology,
389        title = "Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology",
390        author = "Pfitzmann, A., Hansen, M.",
391        howpublished = "http://dud.inf.tu-dresden.de/Anon\_Terminology.shtml",
392        year = "2000"
393}
394
395@Article{ rlsm:diaz01,
396        title = "Towards measuring Anonymity ",
397        author = "D\'{\i}az, C., Seys, S., Claessens, J., Preneel, B.",
398        journal = "Designing Privacy Enhancing Technologies",
399        year = "2002",
400        pages = "54--68",
401        volume = {},
402}
403
404@Article{ rlsm:serj01,
405        title = "Towards an Information Theoretic Metric for Anonymity",
406        author = "Serjantov, A., Danezis, G.",
407        journal = "Proceedings of Privacy Enhancing Technologies Workshop",
408        year = "2002",
409        pages = "54--68",
410        volume = {},
411}
412
413
414@Article{ rlsm:chaum-mix,
415        title = "Untraceable electronic mail, return addresses, and digital pseudonyms",
416        author = "Chaum, D.",
417        journal = "Communications of the ACM",
418        year = "1981",
419        pages = {},
420        volume = "4",
421}
422
423
424@Article{ rlsm:diaz-mixes,
425        title = "Generalising Mixes",
426        author = "D\'{\i}az, C., Serjantov, A.",
427        journal = "Proceedings of Privacy Enhancing Technologies workshop",
428        year = "2003",
429        pages = "18--31",
430        volume = {},
431}
432
433
434@Article{ rlsm:mixminion,
435        title = "Mixminion: Design of a Type III Anonymous Remailer Protocol",
436        author = "Danezis, G., Dingledine, R., Mathewson, N.",
437        journal = "Proceedings of the 2003 IEEE Symposium on Security and Privacy",
438        year = "2003",
439        pages = "2--15",
440        volume = {},
441}
442
443@Article{rlsm:tor-design,
444        title = "Tor: The Second-Generation Onion Router",
445        author = "Dingledine, R., Mathewson, N., Syverson, P.",
446        journal = "Proceedings of the 13th USENIX Security Symposium",
447        year = "2004",
448        pages = {},
449        volume = {},
450}
451
452
453@Article{rlsm:antnet,
454        title = "AntNet: Distributed Stigmergetic Control for Communications Networks",
455        author = "Caro, G.D., Dorigo, M.",
456        journal = "Journal of Artificial Intelligence Research",
457        year = "1998",
458        pages = {},
459        volume = {},
460}
461
462@Article{ rlsm:ants-white,
463        title = "Connection Management using Adaptive Mobile Agents",
464        author = "White, T., Pagurek, B.",
465        journal = "Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications",
466        year = "1998",
467        pages = "802--809",
468        volume = {},
469}
470
471
472@Article{ rlsm:ants-loadbalancing,
473        title = "Ant-Based Load Balancing in Telecommunications Networks",
474        author = "Schoonderwoerd, R.",
475        journal = "Adaptive Behavior",
476        year = "1997",
477        pages = "169--207",
478        volume = "5",
479}
480
481
482@Article{ rlsm:shannon,
483        title = "The mathematical theory for communicactions",
484        author = "Shannon, C.",
485        journal = "Bell Systems Technical Journal",
486        year = "1948",
487        pages = "50--64",
488        volume = "30",
489}
490
491@Article{ rlsm:yuxin,
492        title = "Measuring Anonymity with Relative Entropy",
493        author = "Deng, Y., Pang, J., Wu, P.",
494        journal = "Proceedings of the 4th International Workshop on Formal Aspects in Security and Trust",
495        year = "2007",
496        pages = "65--79",
497        volume = {},
498}
499
500
501@Article{ rlsm:combinatorial,
502        title = "A Combinatorial Approach to Measuring Anonymity",
503        author = "Edman, M., Sivrikaya, F., Yener, B.",
504        journal = "Intelligence and Security Informatics",
505        year = "2007",
506        pages = "356--363",
507        volume = {},
508}
509
510
511@Article{ rlsm:revisiting,
512        title = "Revisiting A Combinatorial Approach Toward Measuring Anonymity",
513        author = "Gierlichs, B., Troncoso, C., Diaz, C., Preneel, B., Verbauwhede, I.",
514        journal = "Workshop on Privacy in the Electronic Society",
515        year = "2008",
516        pages = "111--116",
517        volume = {},
518}
519
520
521@Article{ rlsm:berthold,
522        title = "The Disavantages of Free Mix Routes and How to overcome them",
523        author = "Berthold, O., Pfitzmann, A., Standtke, R.",
524        journal = "Proceedings of Privacy Enhancing Technologies Workshop",
525        year = "2001",
526        pages = "30--45",
527        volume = {},
528}
529
530
531@Article{ rlsm:reiter,
532        title = "Crowds: Anonymity for Web Transactions",
533        author = "Reiter, M., Rubin, A.",
534        journal = "ACM Transactions on Information and System Security",
535        year = "1998",
536        pages = {},
537        volume = "1",
538}
539
540
541@Electronic{ rlsm:vernier,
542        title = "What are Mean Squared Error and Root Mean Squared Error?.",
543        author = "Vernier, D., and Gastineau, J.",
544        howpublished = "http://www.vernier.com/til/1014/",
545        year = "2011"
546}
547
548
549@Article{ rlsm:jianhua,
550        title = "Divergences Measures Based in Shannon Entropy",
551        author = "Jianhua, L.",
552        journal = "IEEE Transactions on Information Theory",
553        year = "1991",
554        pages = {},
555        volume = "37",
556        number = "1",
557}
558
559% Referencias adicionales del capítulo 3.
560
561@TechReport{ico2006,
562author = {Information Commissioner Office},
563title = {Data protection technical guidance note: Privacy enhancing technologies (pets)},
564institution = {Information Commissioner Office},
565year = {2006},
566month = {April},
567}
568
569@TechReport{ONU1948,
570author = {Organización de las Naciones Unidas},
571title = {Derechos humanos para todos. Declaración Universal de los Derechos humanos},
572institution = {Organización de las Naciones Unidas},
573year = {1948}
574}
575
576@phdthesis{george-thesis,
577  title = {Better Anonymous Communications},
578  author = {George Danezis},
579  school = {University of Cambridge},
580  year = {2004},
581  month = {July},
582  www_tags = {selected},
583  www_section = {Anonymous communication},
584  www_pdf_url = {http://www.cl.cam.ac.uk/~gd216/thesis.pdf},
585}
586
587@inproceedings{ISDN-mixes,
588  title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},
589  author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},
590  booktitle = {Proceedings of the GI/ITG Conference on Communication in Distributed
591        Systems},
592  year = {1991},
593  month = {February},
594  pages = {451--463},
595  www_tags = {selected},
596  www_section = {Anonymous communication},
597  www_ps_gz_url = {http://www.semper.org/sirene/publ/PfPW_91TelMixeGI_NTG.ps.gz},
598}
599
600@inproceedings{esorics04-mauw,
601  title = {A formalization of anonymity and onion routing},
602  author = {S. Mauw and J. Verschuren and E.P. de Vink},
603  booktitle = {Proceedings of ESORICS 2004},
604  year = {2004},
605  location = {Sophia Antipolis},
606  pages = {109--124},
607  editor = {P. Samarati and P. Ryan and D. Gollmann and R. Molva},
608  publisher = {LNCS 3193},
609  www_tags = {selected},
610  www_section = {Formal methods},
611  www_pdf_url = {http://www.win.tue.nl/~ecss/downloads/esorics04.pdf},
612}
613
614@inproceedings{onion-discex00,
615  title = {{O}nion {R}outing Access Configurations},
616  author = {Paul Syverson and Michael Reed and David Goldschlag},
617  booktitle = {Proceedings of the DARPA Information Survivability Conference and Exposition
618        (DISCEX 2000)},
619  volume = {1},
620  year = {2000},
621  pages = {34--40},
622  publisher = {IEEE CS Press},
623  www_ps_gz_url = {http://www.onion-router.net/Publications/DISCEX-2000.ps.gz},
624  www_tags = {selected},
625  www_abstract_url = {http://www.onion-router.net/Publications.html},
626  www_section = {Anonymous communication},
627  www_pdf_url = {http://www.onion-router.net/Publications/DISCEX-2000.pdf},
628  www_ps_url = {http://www.onion-router.net/Publications/DISCEX-2000.ps},
629}
630
631@inproceedings{onion-routing:pet2000,
632  title = {{Towards an Analysis of Onion Routing Security}},
633  author = {Paul Syverson and Gene Tsudik and Michael Reed and Carl Landwehr},
634  booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design
635        Issues in Anonymity and Unobservability},
636  year = {2000},
637  month = {July},
638  pages = {96--114},
639  editor = {H. Federrath},
640  publisher = {Springer-Verlag, LNCS 2009},
641  www_important = {1},
642  www_tags = {selected},
643  www_section = {Anonymous communication},
644  www_ps_gz_url = {http://www.onion-router.net/Publications/WDIAU-2000.ps.gz},
645}
646
647@inproceedings{danezis:pet2004,
648  title = {The Traffic Analysis of Continuous-Time Mixes},
649  author = {George Danezis},
650  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
651  volume = {3424},
652  year = {2004},
653  month = {May},
654  pages = {35--50},
655  series = {LNCS},
656  www_important = {1},
657  www_tags = {selected},
658  www_section = {Traffic analysis},
659  www_pdf_url = {http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf},
660}
661
662@inproceedings{timing-fc2004,
663  title = {Timing Attacks in Low-Latency Mix-Based Systems},
664  author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew K. Wright},
665  booktitle = {Proceedings of Financial Cryptography (FC '04)},
666  year = {2004},
667  month = {February},
668  pages = {251--265},
669  editor = {Ari Juels},
670  publisher = {Springer-Verlag, LNCS 3110},
671  www_tags = {selected},
672  www_section = {Traffic analysis},
673  www_pdf_url = {http://www.cs.umass.edu/~mwright/papers/levine-timing.pdf},
674}
675
676@inproceedings{SS03,
677  title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
678  author = {Andrei Serjantov and Peter Sewell},
679  booktitle = {Proceedings of ESORICS 2003},
680  year = {2003},
681  month = {October},
682  www_tags = {selected},
683  www_remarks = {An investigation of packet counting attacks (which work best on lightly loaded networks) and connection-start timing attacks.},
684  www_ps_url = {http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps},
685  www_section = {Traffic analysis},
686}
687
688@inproceedings{flow-correlation04,
689  title = {On Flow Correlation Attacks and Countermeasures in Mix Networks},
690  author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao},
691  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
692  volume = {3424},
693  year = {2004},
694  month = {May},
695  pages = {207--225},
696  series = {LNCS},
697  www_tags = {selected},
698  www_section = {Traffic analysis},
699  www_pdf_url = {http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf},
700}
701
702@inproceedings{WangCJ05,
703  title = {Tracking anonymous peer-to-peer VoIP calls on the internet},
704  author = {Xinyuan Wang and Shiping Chen and Sushil Jajodia},
705  booktitle = {Proceedings of the ACM Conference on Computer and Communications Security},
706  year = {2005},
707  month = {November},
708  pages = {81--91},
709  www_tags = {selected},
710  www_section = {Anonymous communication},
711  www_pdf_url = {http://ise.gmu.edu/~xwangc/Publications/CCS05-VoIPTracking.pdf},
712}
713
714@inproceedings{e2e-traffic,
715  title = {Practical Traffic Analysis: Extending and Resisting Statistical Disclosure},
716  author = {Nick Mathewson and Roger Dingledine},
717  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
718  volume = {3424},
719  year = {2004},
720  month = {May},
721  pages = {17--34},
722  series = {LNCS},
723  www_important = {1},
724  www_tags = {selected},
725  www_section = {Traffic analysis},
726  www_pdf_url = {http://freehaven.net/doc/e2e-traffic/e2e-traffic.pdf},
727}
728
729@inproceedings{back01,
730  title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
731  author = {Adam Back and Ulf M\"oller and Anton Stiglic},
732  booktitle = {Proceedings of Information Hiding Workshop (IH 2001)},
733  year = {2001},
734  month = {April},
735  pages = {245--257},
736  editor = {Ira S. Moskowitz},
737  publisher = {Springer-Verlag, LNCS 2137},
738  www_important = {1},
739  www_tags = {selected},
740  www_section = {Traffic analysis},
741  www_pdf_url = {http://www.cypherspace.org/adam/pubs/traffic.pdf},
742}
743
744@inproceedings{hs-attack06,
745  title = {Locating Hidden Servers},
746  author = {Lasse {\O}verlier and Paul Syverson},
747  booktitle = {Proceedings of the 2006 IEEE Symposium on Security and Privacy},
748  year = {2006},
749  month = {May},
750  publisher = {IEEE CS},
751  www_important = {1},
752  www_tags = {selected},
753  www_pdf_url = {http://www.onion-router.net/Publications/locating-hidden-servers.pdf},
754  www_remarks = {Motivates and describes Tor's entry guard design.},
755  www_section = {Traffic analysis},
756}
Note: See TracBrowser for help on using the repository browser.