source: libros/maquetacion/bibliografia.bib @ 4bb7b3c

revisionfinal
Last change on this file since 4bb7b3c was 4bb7b3c, checked in by Daniel Quintero <dquintero@…>, 10 years ago

CAMBIOS CAPITULO 10

  • Property mode set to 100644
File size: 44.3 KB
Line 
1% Archivo de bibliografia para el libro de seguridad
2
3% referencias capítulo 5
4
5@Book{ NIC:03,
6        author = "R. Nichols and P. C. Lekkas",
7        editor = "McGraw-Hill",
8        title = "Seguridad para comunicaciones inal{\'a}mbricas",
9        publisher = "McGraw-Hill",
10        year = "2003",
11        OPTkey = "",
12        OPTvolume = "",
13        OPTnumber = "",
14        OPTseries = "",
15        OPTaddress = "Mexico",
16        OPTedition = "",
17        OPTmonth = "",
18        OPTnote = "",
19        OPTannote = "",
20        author = "R. Nichols and P. C. Lekkas"
21}
22
23@Book{ ACE:03,
24        author = "Vicente Aceituno Canal",
25        editor = "Noriega Editores",
26        title = "Seguridad de la información",
27        publisher = "Noriega Editores",
28        year = "2003",
29        OPTkey = "",
30        OPTvolume = "",
31        OPTnumber = "",
32        OPTseries = "",
33        OPTaddress = "M'exico D.F., M'exico",
34        OPTedition = "",
35        OPTmonth = "M'exico D.F.",
36        OPTnote = "",
37        OPTannote = "",
38}
39
40@Book{ KURT:01,
41        author = "Kurt Wall et al",
42        editor = "Prentice Hall",
43        title = "Programación en Linux",
44        publisher = "Prentice Hall",
45        year = "2001",
46        OPTkey = "",
47        OPTvolume = "",
48        OPTnumber = "",
49        OPTseries = "",
50        OPTaddress = "Madrid, Espa~na",
51        OPTedition = "",
52        OPTmonth = "",
53        OPTnote = "",
54        OPTannote = "",
55}
56
57@Book{ SARW:03,
58        author = "Sarwar, Koretsky",
59        editor = "Pearson, Prentice Hall",
60        title = "El libro de Linux",
61        publisher = "Prentice Hall",
62        year = "2003",
63        OPTkey = "",
64        OPTvolume = "",
65        OPTnumber = "",
66        OPTseries = "",
67        OPTaddress = "Madrid, Espa~na",
68        OPTedition = "",
69        OPTmonth = "",
70        OPTnote = "",
71        OPTannote = "",
72}
73
74
75@Book{ STRO:02,
76        author = "Bjarne Stroustrup",
77        editor = "Addison Wesley",
78        title = "El lenguaje de programaci{\'o}n C++",
79        publisher = "Addison Wesley",
80        year = "2002",
81        OPTkey = "",
82        OPTvolume = "",
83        OPTnumber = "",
84        OPTseries = "",
85        OPTaddress = "Madrid, Espa{\~n}a",
86        OPTedition = "",
87        OPTmonth = "",
88        OPTnote = "",
89        OPTannote = ""
90}
91
92@Book{ BLAN:06,
93        author = "James Blanchette and Mark Summerfield",
94        editor = "Prentice Hall",
95        title = "C++ GUI Programming with Qt 4",
96        publisher = "Prentice Hall",
97        year = "2006",
98        OPTkey = "",
99        OPTvolume = "",
100        OPTnumber = "",
101        OPTseries = "",
102        OPTaddress = "Massachusetts, USA",
103        OPTedition = "",
104        OPTmonth = "",
105        OPTnote = "",
106        OPTannote = ""
107}
108
109@Book{ STAL:03,
110        author = "William Stallings",
111        editor = "Pearson",
112        title = "Fundamentos de Seguridad de Redes. Aplicaciones y Est{\'a}ndares",
113        publisher = "Prentice Hall",
114        year = "2003",
115        OPTkey = "",
116        OPTvolume = "",
117        OPTnumber = "",
118        OPTseries = "",
119        OPTaddress = "Espa{\~n}a",
120        OPTedition = "2",
121        OPTmonth = "",
122        OPTnote = "",
123        OPTannote = ""
124}
125
126@Book{ PRESS:05,
127        author = "Roger S. Pressman",
128        editor = "Mc Graw-Hill",
129        title = "Ingeniería del software. Un enfoque práctico",
130        publisher = "Mc Graw-Hill",
131        year = "2005",
132        OPTkey = "",
133        OPTvolume = "",
134        OPTnumber = "",
135        OPTseries = "",
136        OPTaddress = "Mexico",
137        OPTedition = "6",
138        OPTmonth = "",
139        OPTnote = "",
140        OPTannote = ""
141}
142
143@Book{ NASH:02,
144        author = "Andrew Nash, William Duane, Celia Joseph and Joseph Brink",
145        editor = "McGraw-Hill",
146        title = "PKI: Infraestructura de clave p{\'u}blica",
147        publisher = "McGraw-Hill",
148        year = "2002",
149        OPTkey = "",
150        OPTvolume = "",
151        OPTnumber = "",
152        OPTseries = "",
153        OPTaddress = "Mexico",
154        OPTedition = "",
155        OPTmonth = "",
156        OPTnote = "",
157        OPTannote = ""
158}
159
160@Book{ RANKL:04,
161        author = "Wolfgang Rankl, Wolfgang Effing",
162        title = "Smart Card Handbook",
163        publisher = "Wiley",
164        year = "2004",
165        OPTkey = "",
166        OPTvolume = "",
167        OPTnumber = "",
168        OPTseries = "",
169        OPTaddress = "Mexico",
170        OPTedition = "3",
171        OPTmonth = "",
172        OPTnote = "",
173        OPTannote = ""
174}
175
176@Article{ PERL:99,
177        author = "R. Perlman",
178        title = "An overview of PKI trust models",
179        journal = "Network, IEEE",
180        year = "1999",
181        OPTkey = "",
182        OPTvolume = "",
183        OPTnumber = "",
184        OPTpages = "",
185        OPTmonth = "",
186        OPTnote = "",
187        OPTannote = ""
188}
189
190@Book{ SCHM:03,
191        title = "Aprendiendo UML en 24 horas",
192        author = "Joseph Schmuller",
193        editor = "Prentice Hall",
194        publisher = "Prentice Hall",
195        year = "2003",
196        address = "M{\'e}xico"
197}
198
199@Book{ VIEG:2002,
200        title = "Network Security with OpenSSL",
201        author = "John Viega and Matt Messier and Pravir Chandra",
202        publisher = "O'Really",
203        edition = "384",
204        year = "2002"
205}
206
207@Book{ BOOC:99,
208        title = "UML Lenguaje Unificado de Modelado",
209        author = "G., Booch",
210        publisher = "Addison Wesley",
211        year = "1999"
212}
213
214@Book{ MULL:97,
215        title = "Modelado de objetos con UML",
216        author = "Alain Pierre-Muller",
217        publisher = "Eyrolles",
218        address = "Barcelona, Espa\~na",
219        year = "1997"
220}
221
222@Book{ PILA:04,
223        title = "Version Control with Subversion ",
224        author = "C. Michael Pilato and Ben Collins-Sussman and Brian W. Fitzpatrick",
225        publisher = "O'Really ",
226        year = "2004"
227}
228
229@Electronic{ XCA:03,
230        title = "XCA, una interfaz gr\'afica para OpenSSL, Claves p\'ublicas y privadas, certificados, solicitudes y listas de revocaci'on",
231        howpublished = "http://www.hohnstaedt.de/xca.html",
232        year = "2003",
233        author = {Christian Hohnst\"{a}dt}
234}
235
236@Electronic{ IBM:98,
237        title = "IBM Corporation. An overview of the IBM SET and the IBM CommercePoint Products",
238        howpublished = "http://www.software.ibm.com/commerce/set/overview.html",
239        year = "2003",
240        author = {IBM Corporation}
241}
242
243
244
245@Electronic{ FSF:07,
246        title = "Free Software Definition",
247        howpublished = "http://www.fsf.org/licensing/essays/free-sw.html",
248        year = "2007",
249        author = {}
250}
251
252@Electronic{ TRAC:07,
253        title = "Welcome to the Trac Project",
254        howpublished = "http://trac.edgewall.org/",
255        year = "2007",
256        author = {}
257}
258
259@Book{ TONITO:14,
260        title = "Trasteando con la bibliografía",
261        author = "Antonio Araujo ",
262        editor = "CENDITEL",
263        publisher = "CENDITEL",
264        year = "2014",
265        address = "Mérida"
266}
267
268% referencias capítulo 6
269
270
271@Electronic{ IEEEhowto:espana,
272        title = "Portal del {DNI Electrónico Español}",
273        author = {},
274        howpublished = "http://www.dnielectronico.es/",
275        year = "2012"
276}
277
278@Article{ IEEEhowto:eID,
279        title = "Electronic Identity Cards for User Authentication Promise and Practice",
280        author = "Andreas Poller and Ulrich Waldmann and Sven Vowe and Sven Turpe",
281        journal = "IEEE Security \& Privacy",
282        year = "2013",
283        volume = "10",
284        pages = "46--54"
285}
286
287@Electronic{ IEEEhowto:estonia,
288        title = "Oficial Gateway to {Estonia}",
289        author = {},
290        howpublished = "http://estonia.eu/about-estonia/economy-a-it/e-estonia.html",
291        year = "2013"
292}
293
294
295
296@Book{ IEEEhowto:software,
297        title = "Ingeniería del Software",
298        author = "Campderrich Falgueras",
299        publisher = "Editorial UOC",
300        year = "2003",
301        address = "Barcelona, España"
302}
303
304@Electronic{ IEEEhowto:directiva,
305        title = "DIRECTIVA 1999/93/{CE} DEL {P}ARLAMENTO {E}UROPEO Y DEL {C}ONSEJO",
306        author = {},
307        howpublished = "http://www.cert.fnmt.es/legsoporte/D\_1999\_93\_CE.pdf",
308        year = "1999"
309}
310
311@Electronic{ IEEEhowto:x509,
312        title = "Internet {X.509} {Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile}. {Request for Comments} ({RFC}) 5280",
313        author = {Cooper, D. and Santesson, S. and others},
314        howpublished = "http://www.ietf.org/rfc/rfc5280.txt",
315        year = "2013"
316}
317
318
319@Electronic{ IEEEhowto:pkcs7,
320        title = "{PKCS\#7}. {Cryptographic Message Syntax}",
321        author = {},
322        howpublished = "https://tools.ietf.org/html/rfc2315",
323        year = "2013"
324}
325
326
327@Electronic{ IEEEhowto:pades,
328        title = "{PAdES}. {PDF Advance Electronic Signatures}",
329        author = {ETSI},
330        howpublished = "http://www.etsi.org/deliver/etsi\_ts/102700\_102799/10277801/01.01.01\_60/ts\_10277801v010101p.pdf",
331        year = "2013"
332}
333
334@Electronic{ IEEEhowto:xmldsig,
335        title = "{XML Signature Syntax and Processing (Second Edition). W3C Recommendation 10 June 2008}",
336        author = {Bartel, M. and Boyer, J. and others},
337        howpublished = "http://www.w3.org/TR/xmldsig-core/",
338        year = "2013"
339}
340
341@Electronic{ IEEEhowto:bdoc,
342        title = "Formato para firmas electrónicas",
343        author = {},
344        howpublished = "http://www.signature.it/-TOOLS/Bdoc-1.0.pdf",
345        year = "2013"
346}
347
348
349@Article{ IEEEhowto:neubauer,
350        title = "Digital signatures with familiar appearance for e-government documents: authentic {PDF}",
351        author = "Neubauer, T. and Weippl, E. and Biffl, S.",
352        journal = "Proceedings of the First International Conference on Availability, Reliability and Security",
353        year = "2006",
354        volume = {},
355        pages = "723--731"
356}
357
358@Book{ IEEEhowto:java,
359        title = "{Professional Java, JDK}",
360        author = "Richardson Clay and Avondolio Donald and others",
361        publisher = "Wrox",
362        year = "2005",
363}
364
365@Electronic{ IEEEhowto:xades,
366        title = "{XML Advanced Electronic Signatures (XAdES)}",
367        author = "Cruellas, J. and Karlinger, G. and others",
368        howpublished = "http://www.w3.org/TR/XAdES/",
369        year = "2003"
370}
371
372@Electronic{ IEEEhowto:mime,
373        title = "{Security Multiparts for MIME. Multipart/Signed and Multipart/Encrypted}",
374        author = "Galvin, J. and Murphy, S. and Crocker, S. and Freed, N.",
375        howpublished = "http://tools.ietf.org/html/rfc1847",
376        year = "2013"
377}
378
379
380@Electronic{ IEEEhowto:pkcs12,
381        title = "{PKCS\#12. Personal Information Exchange Syntax Standard}",
382        author = "{RSA Laboratories}",
383        howpublished = "https://www.rsa.com/rsalabs/node.asp?id=2138",
384        year = "2013"
385}
386
387
388@Book{ IEEEhowto:bpel,
389        title = "{Business Process Execution for Web Services BPEL and BPEL4WS}",
390        author = "Matjaz Juric and Mathew Benny",
391        publisher = "Packt Publishing",
392        year = "2006",
393}
394
395
396@Article{ IEEEhowto:safet,
397        title = "{SAFET: Sistema para la generación de aplicaciones de firma electrónica}",
398        author = "Araujo, A. and Bravo, V.",
399        journal = "Revista Puente",
400        year = "2011",
401        volume = "6",
402}
403
404
405% referencias capítulo 7
406
407@Electronic{rlsm:terminology,
408        title = "Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology",
409        author = "Pfitzmann, A., Hansen, M.",
410        howpublished = "http://dud.inf.tu-dresden.de/Anon\_Terminology.shtml",
411        year = "2000"
412}
413
414@Article{rlsm:diaz01,
415        title = "Towards measuring Anonymity ",
416        author = "D\'{\i}az, C., Seys, S., Claessens, J., Preneel, B.",
417        journal = "Designing Privacy Enhancing Technologies",
418        year = "2002",
419        pages = "54--68",
420        volume = {},
421}
422
423@Article{rlsm:serj01,
424        title = "Towards an Information Theoretic Metric for Anonymity",
425        author = "Serjantov, A., Danezis, G.",
426        journal = "Proceedings of Privacy Enhancing Technologies Workshop",
427        year = "2002",
428        pages = "54--68",
429        volume = {},
430}
431
432
433@Article{ rlsm:chaum-mix,
434        title = "Untraceable electronic mail, return addresses, and digital pseudonyms",
435        author = "Chaum, D.",
436        journal = "Communications of the ACM",
437        year = "1981",
438        pages = {},
439        volume = "4",
440}
441
442
443@Article{ rlsm:diaz-mixes,
444        title = "Generalising Mixes",
445        author = "D\'{\i}az, C., Serjantov, A.",
446        journal = "Proceedings of Privacy Enhancing Technologies workshop",
447        year = "2003",
448        pages = "18--31",
449        volume = {},
450}
451
452
453@Article{ rlsm:mixminion,
454        title = "Mixminion: Design of a Type III Anonymous Remailer Protocol",
455        author = "Danezis, G., Dingledine, R., Mathewson, N.",
456        journal = "Proceedings of the 2003 IEEE Symposium on Security and Privacy",
457        year = "2003",
458        pages = "2--15",
459        volume = {},
460}
461
462@Article{rlsm:tor-design,
463        title = "Tor: The Second-Generation Onion Router",
464        author = "Dingledine, R., Mathewson, N., Syverson, P.",
465        journal = "Proceedings of the 13th USENIX Security Symposium",
466        year = "2004",
467        pages = {},
468        volume = {},
469}
470
471
472@Article{rlsm:antnet,
473        title = "AntNet: Distributed Stigmergetic Control for Communications Networks",
474        author = "Caro, G.D., Dorigo, M.",
475        journal = "Journal of Artificial Intelligence Research",
476        year = "1998",
477        pages = {},
478        volume = {},
479}
480
481@Article{ rlsm:ants-white,
482        title = "Connection Management using Adaptive Mobile Agents",
483        author = "White, T., Pagurek, B.",
484        journal = "Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications",
485        year = "1998",
486        pages = "802--809",
487        volume = {},
488}
489
490
491@Article{ rlsm:ants-loadbalancing,
492        title = "Ant-Based Load Balancing in Telecommunications Networks",
493        author = "Schoonderwoerd, R.",
494        journal = "Adaptive Behavior",
495        year = "1997",
496        pages = "169--207",
497        volume = "5",
498}
499
500
501@Article{ rlsm:shannon,
502        title = "The mathematical theory for communicactions",
503        author = "Shannon, C.",
504        journal = "Bell Systems Technical Journal",
505        year = "1948",
506        pages = "50--64",
507        volume = "30",
508}
509
510@Article{rlsm:yuxin,
511        title = "Measuring Anonymity with Relative Entropy",
512        author = "Deng, Y., Pang, J., Wu, P.",
513        journal = "Proceedings of the 4th International Workshop on Formal Aspects in Security and Trust",
514        year = "2007",
515        pages = "65--79",
516        volume = {},
517}
518
519
520@Article{rlsm:combinatorial,
521        title = "A Combinatorial Approach to Measuring Anonymity",
522        author = "Edman, M., Sivrikaya, F., Yener, B.",
523        journal = "Intelligence and Security Informatics",
524        year = "2007",
525        pages = "356--363",
526        volume = {},
527}
528
529
530@Article{rlsm:revisiting,
531        title = "Revisiting A Combinatorial Approach Toward Measuring Anonymity",
532        author = "Gierlichs, B., Troncoso, C., Diaz, C., Preneel, B., Verbauwhede, I.",
533        journal = "Workshop on Privacy in the Electronic Society",
534        year = "2008",
535        pages = "111--116",
536        volume = {},
537}
538
539
540@Article{rlsm:berthold,
541        title = "The Disavantages of Free Mix Routes and How to overcome them",
542        author = "Berthold, O., Pfitzmann, A., Standtke, R.",
543        journal = "Proceedings of Privacy Enhancing Technologies Workshop",
544        year = "2001",
545        pages = "30--45",
546        volume = {},
547}
548
549
550@Article{ rlsm:reiter,
551        title = "Crowds: Anonymity for Web Transactions",
552        author = "Reiter, M., Rubin, A.",
553        journal = "ACM Transactions on Information and System Security",
554        year = "1998",
555        pages = {},
556        volume = "1",
557}
558
559
560@Electronic{ rlsm:vernier,
561        title = "What are Mean Squared Error and Root Mean Squared Error?.",
562        author = "Vernier, D., and Gastineau, J.",
563        howpublished = "http://www.vernier.com/til/1014/",
564        year = "2011"
565}
566
567
568@Article{ rlsm:jianhua,
569        title = "Divergences Measures Based in Shannon Entropy",
570        author = "Jianhua, L.",
571        journal = "IEEE Transactions on Information Theory",
572        year = "1991",
573        pages = {},
574        volume = "37",
575        number = "1",
576}
577
578% Referencias adicionales del capítulo 3.
579
580@TechReport{ico2006,
581author = {Information Commissioner Office},
582title = {Data protection technical guidance note: Privacy enhancing technologies (pets)},
583institution = {Information Commissioner Office},
584year = {2006},
585month = {April},
586}
587
588@TechReport{ONU1948,
589author = {Organización de las Naciones Unidas},
590title = {Derechos humanos para todos. Declaración Universal de los Derechos humanos},
591institution = {Organización de las Naciones Unidas},
592year = {1948}
593}
594
595@phdthesis{george-thesis,
596  title = {Better Anonymous Communications},
597  author = {George Danezis},
598  school = {University of Cambridge},
599  year = {2004},
600  month = {July},
601  www_tags = {selected},
602  www_section = {Anonymous communication},
603  www_pdf_url = {http://www.cl.cam.ac.uk/~gd216/thesis.pdf},
604}
605
606@inproceedings{ISDN-mixes,
607  title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},
608  author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},
609  booktitle = {Proceedings of the GI/ITG Conference on Communication in Distributed
610        Systems},
611  year = {1991},
612  month = {February},
613  pages = {451--463},
614  www_tags = {selected},
615  www_section = {Anonymous communication},
616  www_ps_gz_url = {http://www.semper.org/sirene/publ/PfPW_91TelMixeGI_NTG.ps.gz},
617}
618
619@inproceedings{esorics04-mauw,
620  title = {A formalization of anonymity and onion routing},
621  author = {S. Mauw and J. Verschuren and E.P. de Vink},
622  booktitle = {Proceedings of ESORICS 2004},
623  year = {2004},
624  location = {Sophia Antipolis},
625  pages = {109--124},
626  editor = {P. Samarati and P. Ryan and D. Gollmann and R. Molva},
627  publisher = {LNCS 3193},
628  www_tags = {selected},
629  www_section = {Formal methods},
630  www_pdf_url = {http://www.win.tue.nl/~ecss/downloads/esorics04.pdf},
631}
632
633@inproceedings{onion-discex00,
634  title = {{O}nion {R}outing Access Configurations},
635  author = {Paul Syverson and Michael Reed and David Goldschlag},
636  booktitle = {Proceedings of the DARPA Information Survivability Conference and Exposition
637        (DISCEX 2000)},
638  volume = {1},
639  year = {2000},
640  pages = {34--40},
641  publisher = {IEEE CS Press},
642  www_ps_gz_url = {http://www.onion-router.net/Publications/DISCEX-2000.ps.gz},
643  www_tags = {selected},
644  www_abstract_url = {http://www.onion-router.net/Publications.html},
645  www_section = {Anonymous communication},
646  www_pdf_url = {http://www.onion-router.net/Publications/DISCEX-2000.pdf},
647  www_ps_url = {http://www.onion-router.net/Publications/DISCEX-2000.ps},
648}
649
650@inproceedings{onion-routingpet2000,
651  title = {{Towards an Analysis of Onion Routing Security}},
652  author = {Paul Syverson and Gene Tsudik and Michael Reed and Carl Landwehr},
653  booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design
654        Issues in Anonymity and Unobservability},
655  year = {2000},
656  month = {July},
657  pages = {96--114},
658  editor = {H. Federrath},
659  publisher = {Springer-Verlag, LNCS 2009},
660  www_important = {1},
661  www_tags = {selected},
662  www_section = {Anonymous communication},
663  www_ps_gz_url = {http://www.onion-router.net/Publications/WDIAU-2000.ps.gz},
664}
665
666@inproceedings{danezispet2004,
667  title = {The Traffic Analysis of Continuous-Time Mixes},
668  author = {George Danezis},
669  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
670  volume = {3424},
671  year = {2004},
672  month = {May},
673  pages = {35--50},
674  series = {LNCS},
675  www_important = {1},
676  www_tags = {selected},
677  www_section = {Traffic analysis},
678  www_pdf_url = {http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf},
679}
680
681@inproceedings{timing-fc2004,
682  title = {Timing Attacks in Low-Latency Mix-Based Systems},
683  author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew K. Wright},
684  booktitle = {Proceedings of Financial Cryptography (FC '04)},
685  year = {2004},
686  month = {February},
687  pages = {251--265},
688  editor = {Ari Juels},
689  publisher = {Springer-Verlag, LNCS 3110},
690  www_tags = {selected},
691  www_section = {Traffic analysis},
692  www_pdf_url = {http://www.cs.umass.edu/~mwright/papers/levine-timing.pdf},
693}
694
695@inproceedings{SS03,
696  title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
697  author = {Andrei Serjantov and Peter Sewell},
698  booktitle = {Proceedings of ESORICS 2003},
699  year = {2003},
700  month = {October},
701  www_tags = {selected},
702  www_remarks = {An investigation of packet counting attacks (which work best on lightly loaded networks) and connection-start timing attacks.},
703  www_ps_url = {http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps},
704  www_section = {Traffic analysis},
705}
706
707@inproceedings{flow-correlation04,
708  title = {On Flow Correlation Attacks and Countermeasures in Mix Networks},
709  author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao},
710  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
711  volume = {3424},
712  year = {2004},
713  month = {May},
714  pages = {207--225},
715  series = {LNCS},
716  www_tags = {selected},
717  www_section = {Traffic analysis},
718  www_pdf_url = {http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf},
719}
720
721@inproceedings{WangCJ05,
722  title = {Tracking anonymous peer-to-peer VoIP calls on the internet},
723  author = {Xinyuan Wang and Shiping Chen and Sushil Jajodia},
724  booktitle = {Proceedings of the ACM Conference on Computer and Communications Security},
725  year = {2005},
726  month = {November},
727  pages = {81--91},
728  www_tags = {selected},
729  www_section = {Anonymous communication},
730  www_pdf_url = {http://ise.gmu.edu/~xwangc/Publications/CCS05-VoIPTracking.pdf},
731}
732
733@inproceedings{e2e-traffic,
734  title = {Practical Traffic Analysis: Extending and Resisting Statistical Disclosure},
735  author = {Nick Mathewson and Roger Dingledine},
736  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
737  volume = {3424},
738  year = {2004},
739  month = {May},
740  pages = {17--34},
741  series = {LNCS},
742  www_important = {1},
743  www_tags = {selected},
744  www_section = {Traffic analysis},
745  www_pdf_url = {http://freehaven.net/doc/e2e-traffic/e2e-traffic.pdf},
746}
747
748@inproceedings{back01,
749  title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
750  author = {Adam Back and Ulf M\"oller and Anton Stiglic},
751  booktitle = {Proceedings of Information Hiding Workshop (IH 2001)},
752  year = {2001},
753  month = {April},
754  pages = {245--257},
755  editor = {Ira S. Moskowitz},
756  publisher = {Springer-Verlag, LNCS 2137},
757  www_important = {1},
758  www_tags = {selected},
759  www_section = {Traffic analysis},
760  www_pdf_url = {http://www.cypherspace.org/adam/pubs/traffic.pdf},
761}
762
763@inproceedings{hs-attack06,
764  title = {Locating Hidden Servers},
765  author = {Lasse {\O}verlier and Paul Syverson},
766  booktitle = {Proceedings of the 2006 IEEE Symposium on Security and Privacy},
767  year = {2006},
768  month = {May},
769  publisher = {IEEE CS},
770  www_important = {1},
771  www_tags = {selected},
772  www_pdf_url = {http://www.onion-router.net/Publications/locating-hidden-servers.pdf},
773  www_remarks = {Motivates and describes Tor's entry guard design.},
774  www_section = {Traffic analysis},
775}
776
777
778@MastersThesis{maestriaRSumoza,
779author = {Rodolfo Sumoza},
780title = {Sistemas Anónimos en Escenarios Globales},
781school = {Universidad Complutense de Madrid},
782year = {2008},
783}
784
785@inproceedings{traffic_analysis,
786author = {J. F. Raymond},
787editor = {H. Federrath},
788title = {Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems},
789booktitle = {Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability - Springer-Verlag, LNCS},
790year = {2000},
791}
792
793@inproceedings{timing_ssh,
794author = {Dawn Xiaodong Song; David Wagner; Xuqing Tian},
795editor = {USENIX Association},
796title = {Timing Analysis of Keystrokes and Timing Attacks on SSH},
797booktitle = {Proceedings of the 10th USENIX Security Symposium},
798year = {2001},
799}
800
801@Electronic{cenditel_anonimato,
802author = {Endira Mora et. al},
803title = {Gestión de Anonimato},
804year = {2014},
805howpublished = {https://tibisay.cenditel.gob.ve/gestionanonimato/wiki/PlanDeTrabajo%3A},
806}
807
808@inproceedings{cebolla,
809  title = {{Cebolla: Pragmatic IP Anonymity}},
810  author = {Zach Brown},
811  booktitle = {Proceedings of the 2002 Ottawa Linux Symposium},
812  year = {2002},
813  month = {June},
814  www_tags = {selected},
815  www_pdf_url = {http://cypherspace.org/cebolla/cebolla.pdf},
816  www_remarks = {Written by a former Freedom developer, Cebolla has a UDP-based design
817        similar to second-generation Freedom. The initiator incrementally builds her
818        circuit, giving her end-to-end forward-secrecy and also better recovery from
819        broken nodes.},
820  www_section = {Anonymous communication},
821}
822
823@Electronic{ SCHNEIER:14,
824        title = "Choosing Secure Passwords",
825        howpublished = "http://boingboing.net/2014/02/25/choosing-a-secure-password.html",
826        year = "2014",
827        author = {Bruce Schneier}
828}
829
830
831@online{CHALBAUD:13,
832        author = {Chalbaud, R.},
833        title = {Derechos Humanos y su protección Constitucional},
834        year = {2013},
835        url = {http},
836}
837
838@Article{ OBERTO-GOVEA,
839        title = "Algunas Consideraciones sobre Habeas Data",
840        author = "Oberto, M., Govea, M.",
841        journal = "revista Telematique",
842        year = "2008",
843        pages = {},
844        volume = "7",
845        number = "3",
846}
847
848@online{UTAH:2014,
849        author = {Horacio Fernandez Delpech},
850        title = {Ley del Estado de Utah sobre la Firma Digital. Código Comentado. Título 46, Capítulo 3},
851        year = {1996},
852        url = {http://www.hfernandezdelpech.com.ar/LegislacionYproExtEEEUUELeyEstadoUtahFirmaDig.htm},
853}
854
855
856
857
858@Book{ PAREDES:2008,
859        title = "Transformación de la cultura de servicios de información: una visión legal y de tecnologías",
860        author = "Paredes, A.",
861        publisher = "",
862        year = "2008",
863}
864
865@Book{ SALAZAR,
866        title = "Habeas Data en el derecho Comparado",
867        author = "Salazar, E.",
868        publisher = "",
869        year = "2008",
870}
871
872@Book{ OBERTO-GUERRERO,
873        title = "Preguntarle a Endira",
874        author = "Oberto y Guerrero",
875        publisher = "",
876        year = "0000",
877}
878
879@Book{ ZAGARRA:2010,
880        title = "Marco Legal de las Tecnologías de la Información y comunicación",
881        author = "Zagarra R. Marco",
882        publisher = "",
883        year = "2010",
884}
885
886
887@Book{ FUENTES:2007,
888        title = "Marco Legal de la Informática y la computación",
889        author = "Fuentes, F.",
890        publisher = "Vadell Hermanos",
891        year = "2007",
892        country="Venezuela",
893}
894
895@Electronic{UNIVERSIDADABIERTA:MEXICO,
896        author = {Universidad Abierta},
897        title = {Delitos Informáticos},
898        year = {},
899        howpublished = {http://www.universidadabierta.edu.mx},
900       
901}
902@Electronic{Bracho:2010,
903        author = {Pedro Bracho},
904        title = {JURISPRUDENCIA Concepto y Caracteristicas},
905        year = {2010},
906        howpublished = {http://es.scribd.com/doc/81250967/JURISPRUDENCIA-Concepto-y-Caracteristicas},
907       
908}
909@Electronic{TIPOSPENALES:2014,
910        author = {},
911        title = {Los tipos penales en la Ley Especial contra Delitos Informáticos},
912        year = {},
913        howpublished = {http://beatrizditotto.net/2010/01/01/introduccion/},
914        urldate = {01-08-2014}
915}
916
917
918@Book{ LOGRERIA:2008,
919        title = "Análisis critico de la tipicidad prevista en algunos artículos de la ley especial contra delitos Informáticos venezolana",
920        author = "Logreria, C., Fuentes F.",
921        publisher = "Revista Electrónica de Estudios Telemáticos URBE",
922        year = "2008",
923        country="Venezuela",
924}
925
926@Book{ PENARANDA:2011,
927        title = "La Firma Electrónica Digital en Venezuela",
928        author = "Peñaranda, H., Héctor R.",
929        publisher = "Universidad del Zulia",
930        year = "2011",
931        country="Venezuela",
932}
933
934
935@Book{ ODREMAN:2003,
936        title = "Eficacia Probatoria del mensaje de datos y de la Firma electrónica según la nueva Ley de Mensaje de Datos y Firmas Electrónicas",
937        author = "Odreman, G.",
938        publisher = "UCAB",
939        year = "2003",
940        country="Venezuela",
941}
942
943
944@Book{ LONRENZETTI:2000,
945        title = "Comercio Electrónico",
946        author = "Lonrenzetti, R.",
947        publisher = "Abeledo-Perrot",
948        year = "2000",
949        country="Argentina",
950}
951
952@Book{ URDANETA:2010,
953        title = "Los Mensajes de Datos y la Firma Electrónica (Seguridad Jurídica que ofrecen y Valor Probatorio) ",
954        author = "Urdaneta B., José V.",
955        publisher = "",
956        year = "2010",
957        country="Venezuela",
958}
959
960@Book{ RONDON,
961        title = "Comentarios generales al Decreto ley de Mensaje de  Datos y Firmas electrónicas de la República Bolivariana de Venezuela",
962        author = "Rondón, A.",
963        publisher = "",
964        year = "0000",
965        country="Venezuela",
966}
967
968@online{LEYMODELOCNUDMI:1996,
969        author = {Comisión de las Naciones Unidas para el Derecho Mercantil Internacional},
970        title = {Ley Modelo de la CNUDMI sobre Comercio Electrónico con la Guía para su incorporación al derecho interno},
971        year = {1996},
972        url = {http://www.uncitral.org/pdf/spanish/texts/electcom/05-89453_S_Ebook.pdf},
973}
974
975@Article{CLIC:13,
976        title = "Título",
977        author = "Autor",
978        journal = "Revista El Clic",
979        year = "2013",
980        pages = "",
981        volume = "1",
982}
983
984@online{GOBIERNOELECTRONICOENVENEZUELA,
985        author = {UCB},
986        title = {Gobierno Eelctrónico},
987        year = {2014},
988        url = {},
989}
990
991@Book{ COLINA:05,
992        title = "Seducir y Controlar.",
993        author = "Colina, C.",
994        publisher = "UCB",
995        year = "2005",
996        country="Venezuela",
997}
998
999@Article{CRISTOS:03,
1000        title = "Privacidad y Protección de Datos Personales en Internet, ¿Es necesario contar con una regulación especifica en México?",
1001        author = "Cristos Velasco",
1002        journal = "Boletín de Política Informática I",
1003        year = "2003",
1004        pages = "",
1005        volume = "",
1006}
1007
1008@Book{ FLORES:09,
1009        title = "Derecho Informático.",
1010        author = "Flores, L.",
1011        publisher = "Grupo Editorial Patria",
1012        year = "2009",
1013        country="México",
1014}
1015
1016@Book{ GAMBA:10,
1017        title = "Panorama del derecho Informático en América Latina y el Caribe.",
1018        author = "Gamba, J.",
1019        publisher = "CEPAL",
1020        year = "2010",
1021        country="",
1022}
1023
1024
1025% referencias del prologo
1026
1027@Article{GOMARA:07,
1028        title = "Frankenstein, un espejo de la identidad humana",
1029        author = "Ramalle Gómara, E.",
1030        journal = "Berceo",
1031        year = "2007",
1032        pages = "81-96",
1033        volume = "153",
1034}
1035
1036@Electronic{BOLIVAR:1819,
1037        author = {Bolívar, S.},
1038        title = {Discurso ante el Congreso de Angostura el 15 de Febrero de 1819},
1039        year = {1819},
1040        howpublished = {http://es.wikisource.org/},
1041}
1042
1043@Book{ ANDERSON:1983,
1044        title = "Imagined Communities. Reflections on the Origin and Spread of Nationalism.",
1045        author = "Anderson, B.",
1046        publisher = "Verso",
1047        year = "1998",
1048        country="EE.UU.",
1049        address="New York"
1050}
1051
1052
1053@Book{ MACINTYRE:1981,
1054        title = "After Virtue. A Study in Moral Theory.",
1055        author = "MacIntyre, A",
1056        publisher = "University of Notre Dame Press",
1057        address = "Indiana",
1058        year = "1984",
1059        country="EE.UU."
1060}
1061
1062
1063@Book{ ARENDT:1958,
1064        title = "The Human Condition.",
1065        author = "Arendt, H.",
1066        publisher = "The University of Chicago Press",
1067        year = "1998",
1068        country="EE.UU."
1069}
1070
1071@online{SHELLEY:1818,
1072        author = {Shelley, M.},
1073        title = {Frankenstein o el Moderno Prometeo},
1074        year = {2004},
1075        url = {http://www.librosenred.com/},
1076}
1077
1078
1079@Book{ IDENTIDADDIGITAL:2014,
1080        title = "Seguridad Informática y la Identidad Digital",
1081        author = "Araujo, A., Bravo, V., Sumoza, R.",
1082        publisher = "Centro Nacional de Desarrollo e Investigación en Tecnologías Libres",
1083        year = "2014",
1084        country="Venezuela"
1085}
1086
1087@Book{ MATTHEWS:2008,
1088        title = "Identity and Information Technology. En Information Technology and Moral Philosophy",
1089        author = "Matthews, S.",
1090        publisher = "Cambridge",
1091        year = "2006",
1092        country="EE.UU."
1093}
1094
1095
1096@Book{ NAIM:2006,
1097        title = "Ilícito. Cómo traficantes, contrabandistas y piratas están cambiando el mundo.",
1098        author = "Naím, M.",
1099        publisher = "Debate",
1100        year = "2006",
1101        country="Caracas, Venezuela"
1102}
1103
1104@Book{ ETZIONI:1999,
1105        title = "The Limits of Privacy",
1106        author = "Etzioni, A.",
1107        publisher = "Basic Book",
1108        year = "2006",
1109        country="New York, EE.UU."
1110}
1111
1112
1113@Article{FUENMAYOR:1991,
1114        title = "The Roots of Reductionism: a Counter-Ontoepistemology for a Systems Approach",
1115        author = "Fuenmayor, R.",
1116        journal = "Systems Practice",
1117        year = "1991",
1118        pages = "",
1119        volume = "4",
1120}
1121
1122@Book{ PETTIT:2008,
1123        title = "Trust, reliance and the internet. En Information Technology and Moral Philosophy",
1124        author = "Pettit, P.",
1125        publisher = "Cambridge",
1126        year = "2008",
1127        country="EE.UU."
1128}
1129
1130@Article{SANDEL:1989,
1131        title = "Moral Argument and Liberal Toleration: Abortion and Homosexuality.",
1132        author = "Sandel, M.",
1133        journal = "California Law Review.",
1134        year = "1989",
1135        pages = "",
1136        volume = "77",
1137}
1138
1139
1140@Article{OHARROW:1998,
1141        title = "Health Plans' Access to Pharmacy Data Raises Concerns about Privacy.",
1142        author = "O'harrow, R.",
1143        journal = "The Seattle Times",
1144        year = "1998",
1145        pages = "",
1146        volume = "",
1147}
1148
1149@Article{MARKOFF:2002,
1150        title = "Pentagon Plans a Computer Systems that Would Peek at Personal Data of Americans.",
1151        author = "Markoff, J.",
1152        journal = "The New York Times",
1153        year = "2002",
1154        pages = "",
1155        volume = "",
1156}
1157
1158@Article{GREENWALD:2013,
1159        title = "NSA collecting phone records of millions of Verizon customers daily.",
1160        author = "Greenwald, G.",
1161        journal = "The Guardian",
1162        year = "2013",
1163        pages = "",
1164        volume = "",
1165}
1166
1167@Book{ GREENWALD:2014,
1168        title = "No Place to Hide. Edward Snowden, the NSA and the Surveillance State.",
1169        author = "Greenwald, G.",
1170        publisher = "Penguin Books Ltd.",
1171        year = "2014",
1172        country="United Kingdom"
1173}
1174
1175@Article{GELLMANSOLTANI:2013,
1176        title = "NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say.",
1177        author = "Gellman, B. y Soltani, A.",
1178        journal = "The Washington Post.",
1179        year = "2013",
1180        pages = "",
1181        volume = "",
1182}
1183
1184@Article{NEWYORKTIMES:2013,
1185        title = "Documents Show N.S.A. Efforts to Spy Both Enemies and Allies.",
1186        author = "New York Times",
1187        journal = "New York Times.",
1188        year = "2013",
1189        pages = "",
1190        volume = "",
1191}
1192
1193
1194@Book{ VANDENHOVEN:2008,
1195        title = "Information Technology, privacy, and the protection of personal data. En Information Technology and Moral Philosophy",
1196        author = "Van den Hoven, J.",
1197        publisher = "Cambridge",
1198        year = "2008",
1199        country="EE.UU."
1200}
1201
1202
1203
1204@Article{RORTY:1996,
1205        title = "Who are we? Moral Universalism and Economic Triage.",
1206        author = "Rorty, R.",
1207        journal = "Segundo Foro de Filosofía de la Unesco",
1208        year = "1996",
1209        pages = "",
1210        volume = "",
1211}
1212
1213
1214% referencias del capitulo 10
1215
1216@Electronic{DRAE:CIBERNETICA,
1217        author = {Real Academia de la Lengua Española},
1218        title = {Diccionario de la Lengua Española (DRAE)},
1219        year = {2001},
1220        howpublished = {http://lema.rae.es/drae/?val=cibernética},
1221}
1222
1223@Book{ WIENER:1998,
1224        title = "Human use of human beings: Cybernetics and society.",
1225        author = "Wiener, N.",
1226        publisher = "Da Capo Press",
1227        year = "1998",
1228        country=""
1229}
1230
1231
1232@Article{BURTSEVA:2013,
1233        title = "Norbert Wiener: Padre de la cibernética.",
1234        author = "Burtseva, L., Tyrsa, V., Ríos, B., Flores, L.",
1235        journal = "Revista UABC",
1236        year = "2013",
1237        pages = "48",
1238        volume = "4",
1239        number = "54",
1240}
1241
1242@Book{ ASHBY:1957,
1243        title = "An introduction to cybernetics",
1244        author = "Ashby, R",
1245        publisher = "Chapman \& Hall",
1246        year = "1957",
1247        country=""
1248}
1249
1250@Book{ GIBSON:1984,
1251        title = "Neuromante",
1252        author = "Gibson, W.",
1253        publisher = "Minotauro",
1254        year = "1984",
1255        country=""
1256}
1257
1258@Article{CICOGNANI:1998,
1259        title = "On the linguistic nature of cyberspace and virtual communities",
1260        author = "Cicognani, A.",
1261        journal = "Virtual reality",
1262        year = "1998",
1263        pages = "20",
1264        volume = "3",
1265        number = "1",
1266}
1267
1268@Article{POST:2013,
1269        title = "Against’Against Cyberanarchy",
1270        author = "Post, D.",
1271        journal = "Berkeley Technology Law Journal",
1272        year = "2002",
1273        pages = "10",
1274        volume = "17",
1275        number = "",
1276}
1277
1278@Article{ANDERS:2001,
1279        title = "Anthropic cyberspace: Defining electronic space from first principles",
1280        author = "Andres, P.",
1281        journal = "Leonardo",
1282        year = "2001",
1283        pages = "405",
1284        volume = "34",
1285        number = "5",
1286}
1287
1288
1289@Article{FLORES:2012,
1290        title = "Los Ámbitos no Terrestres en la Guerra Futura: Ciberespacio",
1291        author = "Flores, H.",
1292        journal = "Centro Superior de Estudios de la Defensa Nacional Monografías del Ceseden",
1293        year = "2012",
1294        pages = "18",
1295        volume = "",
1296        number = "128",
1297}
1298
1299@Article{FRITZ:2013,
1300        title = "The Semantics of Cyber Warfare",
1301        author = "Fritz, J.",
1302        journal = "East Asia Security Symposium and Conference",
1303        year = "2013",
1304        pages = "2",
1305        volume = "1",
1306        number = "7",
1307}
1308
1309
1310@Book{ WINTERFELD:2012,
1311        title = "The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice",
1312        author = "Winterfeld, S., Andress, J.",
1313        publisher = "Elsevier Inc.",
1314        year = "2012",
1315        country=""
1316}
1317
1318@Article{MCGRAW:2013,
1319        title = "Cyber War is Inevitable (Unless We Build Security In)",
1320        author = "McGraw, G.",
1321        journal = "Journal of Strategic Studies",
1322        year = "2013",
1323        pages = "111--112",
1324        volume = "36",
1325        number = "1",
1326}
1327
1328@inproceedings{ALI:2013,
1329author = {Kostyuk N. and Alí M.},
1330editor = {The Society of Digital Information and Wireless Communication},
1331title = {The Cyber Dogs of War: Joint Efforts of Future World Leaders in The Prevention of Cyberwarfare},
1332booktitle = {The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013)},
1333year = {2013},
1334}
1335
1336@Article{LEWIS:2010,
1337        title = "The cyber war has not begun",
1338        author = "Lewis, J.",
1339        journal = "Center for Strategic and International Studies",
1340        year = "2010",
1341        pages = "",
1342        volume = "",
1343        number = "",
1344}
1345
1346@Article{FERRERO:2013,
1347        title = "La Ciberguerra. Génesis y Evolución",
1348        author = "Ferrero, J.",
1349        journal = "Revista General de Marina",
1350        year = "2013",
1351        pages = "87",
1352        volume = "",
1353        number = "Enero-Febrero",
1354}
1355
1356@Article{KIRAVUO:2013,
1357        title = "Offensive Cyber-capabilities against Critical Infrastructure",
1358        author = "Kiravuo, T.",
1359        journal = "Cyber Warfare. National Defence University. Department of Military Technology",
1360        year = "2013",
1361        pages = "90",
1362        volume = "",
1363        number = "34",
1364}
1365
1366@Article{FOJON:2011,
1367        title = "Ciberespacio: La Nueva Dimensión del Entorno Operativo",
1368        author = "Sanz, A., Fojón, E.",
1369        journal = "Centro Superior de Estudios de la Defensa Nacional Monografías del Ceseden",
1370        year = "2011",
1371        pages = "43",
1372        volume = "",
1373        number = "44",
1374}
1375
1376@Article{SALMINEN:2013,
1377        title = "The Fog of Cyber Defence",
1378        author = "Rantapelkonen, J., Salminen, M.",
1379        journal = "National Defence University. Department of Leadership and Military Pedagogy",
1380        year = "2013",
1381        pages = "11",
1382        volume = "",
1383        number = "2",
1384}
1385
1386
1387
1388@Article{STARR:2009,
1389        title = "Towards an Evolving Theory of Cyberpower",
1390        author = "Starr, S.",
1391        journal = "The Virtual Battlefield: Perspectives on Cyber Warfare",
1392        year = "2013",
1393        pages = "22--24",
1394        volume = "3",
1395        number = "",
1396}
1397
1398@Article{OLSON:2012,
1399        title = "El boxeo con un contrincante imaginario. La guerra cibernética y el ataque económico estratégico",
1400        author = "Olson, S.",
1401        journal = "Military Review",
1402        year = "2012",
1403        pages = "67",
1404        volume = "",
1405        number = "Noviembre-Diciembre",
1406}
1407
1408@Article{COLOM:2009,
1409        title = "El nuevo concepto estadounidense para el empleo de la fuerza militar",
1410        author = "Colom, G.",
1411        journal = "ARI: Seguridad y Defensa",
1412        year = "2009",
1413        pages = "2",
1414        volume = "",
1415        number = "70",
1416}
1417
1418
1419@Electronic{DoD:2012,
1420        author = {Panetta, L.},
1421        title = {Remarks by Secretary Panetta on Cybersecurity to the Business Executives for National Security},
1422        year = {2012},
1423        howpublished = {http://www.defense.gov/transcripts/transcript.aspx?transcriptid=5136},
1424}
1425
1426@Electronic{CHINESE:2013,
1427        author = {Chinese People's Liberation Army},
1428        title = {Pentagon's cyberattack accusations irresponsible: expert},
1429        year = {2013},
1430        howpublished = {http://eng.chinamil.com.cn/news-channels/pla-daily-commentary/2013-05/08/content\_5333521.htm},
1431}
1432
1433@Article{STONE:2013,
1434        title = "Cyber War Will Take Place!",
1435        author = "Stone, J.",
1436        journal = "Journal of Strategic Studies",
1437        year = "2013",
1438        pages = "107",
1439        volume = "36",
1440        number = "1",
1441}
1442
1443@Book{ HARRISON:2012,
1444        title = "Cyber Warfare and the Laws of War",
1445        author = "Harrison, H.",
1446        publisher = "Cambridge University Press",
1447        year = "2012",
1448        country=""
1449}
1450
1451@Article{RID:2012,
1452        title = "Cyber war will not take place",
1453        author = "Stone, J.",
1454        journal = "Journal of Strategic Studies",
1455        year = "2013",
1456        pages = "9",
1457        volume = "35",
1458        number = "1",
1459}
1460
1461
1462@Article{JUNIO:2013,
1463        title = "How Probable is Cyber War? Bringing IR Theory Back In to the Cyber Conflict Debate",
1464        author = "Junio, T.",
1465        journal = "Journal of Strategic Studies",
1466        year = "2013",
1467        pages = "130",
1468        volume = "36",
1469        number = "1",
1470}
1471
1472@misc{BEIDLEMAN:2009,
1473    author    = "Beidleman, S.",
1474    title     = "Defining and Deterring Cyber War",
1475    year     = "2009",
1476}
1477
1478@Article{SANCHEZ:2010,
1479        title = "La nueva estrategia comunicativa de los grupos terroristas",
1480        author = "Sánchez, G.",
1481        journal = "Revista Enfoques",
1482        year = "2010",
1483        pages = "203",
1484        volume = "VIII",
1485        number = "12",
1486}
1487
1488@Article{GOLDSMITH:2010,
1489        title = "The New Vulnerability (How Cyber Changes the Laws of War).",
1490        author = "Goldsmith, J.",
1491        journal = "The New Republic",
1492        year = "2010",
1493        pages = "",
1494        volume = "",
1495        number = "",
1496}
1497
1498@Article{BRENNER:2007,
1499        title = "“At light speed”: Attribution and response to cybercrime/terrorism/warfare",
1500        author = "Brenner, S.",
1501        journal = "The Journal of Criminal Law and Criminology",
1502        year = "2007",
1503        pages = "382",
1504        volume = "",
1505        number = "",
1506}
1507
1508@Book{ JANCZEWSKI:2008,
1509        title = "Cyber warfare and cyber terrorism",
1510        author = "Janczewski, L.,  Colarik, A.",
1511        publisher = "IGI Global",
1512        year = "2008",
1513        country=""
1514}
1515
1516@misc{ONU:1945,
1517    author    = "Organización de las Naciones Unidas",
1518    title     = "Carta de las Naciones Unidas. Entrada en vigor: 24 de octubre de 1945, de conformidad con el artículo 110",
1519    year     = "1945",
1520}
1521
1522@Article{HOISINGTON:2009,
1523        title = "Cyberwarfare and the Use of Force Giving Rise to the Right of Self-Defense",
1524        author = "Hoisington, M.",
1525        journal = "Boston College International and Comparative Law Review",
1526        year = "2009",
1527        pages = "446",
1528        volume = "32",
1529        number = "",
1530}
1531
1532@Article{BANKS:2013,
1533        title = "The Role of Counterterrorism Law in Shaping Ad Bellum Norms for Cyber War",
1534        author = "Banks, W.",
1535        journal = "89 INT’L L. STUD. 157. Available at SSRN 2160078",
1536        year = "2013",
1537        pages = "162",
1538        volume = "",
1539        number = "",
1540}
1541
1542
1543
1544@Article{BERNAL:1999,
1545        title = "Mercosur ¿Regionalismo o globalización? Tres aspectos para la decisión de políticas",
1546        author = "Bernal-Meza, R.",
1547        journal = "Revista Realidad Económica",
1548        year = "1999",
1549        pages = "2",
1550        volume = "",
1551        number = "165",
1552}
1553
1554
1555@Article{BIZZOZERO:2011,
1556        title = "América Latina a inicios de la segunda década del siglo XXI: entre el regionalismo estratégico y la regionalización fragmentada",
1557        author = "Bizzozero, Lincoln",
1558        journal = "Revista Brasileira de Política Internacional",
1559        year = "2011",
1560        pages = "36",
1561        volume = "54",
1562        number = "1",
1563}
1564
1565@misc{UNASUR:2008,
1566    author    = "UNASUR",
1567    title     = "Tratado Constitutivo de la Unión de Naciones Suramericanas",
1568    year     = "2008",
1569}
1570
1571@Article{SAINTPIERRE:2008,
1572        title = "El Consejo Sudamericano de Defensa",
1573        author = "Saint-Pierre, H.; Castro, G.",
1574        journal = "Boletín RESDAL",
1575        year = "2008",
1576        pages = "1",
1577        volume = "6",
1578        number = "29",
1579}
1580
1581@Book{ CLAUSEWITZ:2002,
1582        title = "De La Guerra.",
1583        author = "Clausewitz, C.",
1584        publisher = "Editorial Librodot",
1585        year = "2002",
1586        country=""
1587}
1588
1589
1590
1591@Electronic{CDS:2008,
1592        author = {Consejo de Defensa Sudamericano},
1593        title = {Objetivos Consejo de Defensa Suramericano UNASUR},
1594        year = {2008},
1595        howpublished = {http://www.unasursg.org/inicio/organizacion/consejos/cds},
1596}
1597
1598@misc{CEED:2012,
1599    author    = "CEED",
1600    title     = "Informe de Avance a diciembre de 2012 sobre Conceptos e
1601Institucionalidad de Seguridad y Defensa, Amenazas, Factores de Riesgo y Desafíos
1602del Consejo Sudamericano de Defensa",
1603    year     = "2012",
1604}
1605
1606@Article{MENEZES:2010,
1607        author = "Menezes, A.",
1608        title = "Regionalismo y seguridad sudamericana: ¿son relevantes el Mercosur y la Unasur? Íconos",
1609        journal = "Revista de Ciencias Sociales",
1610        year = "2010",
1611        pages = "41--53",
1612        volume = "",
1613        number = "38",
1614}
1615
1616@Electronic{DANTAS:2013,
1617        author = {Dantas, C. y Jeronimo, J.},
1618        title = {Como eles espionam. Istoe.},
1619        year = {2013},
1620        howpublished = {http://www.istoe.com.br/reportagens/paginar/323087\_COMO+ ELES+ESPIONAM/12},
1621}
1622
1623@Article{LIMNELL:2013,
1624        title = "Limnéll, J.",
1625        author = "Offensive Cyber Capabilities are Needed Because of Deterrence",
1626        journal = "The Fog of Cyber Defence",
1627        year = "2013",
1628        pages = "202--205",
1629        volume = "",
1630        number = "10",
1631}
1632
1633@misc{FORTI:2013,
1634    author    = "Forti, A.",
1635    title     = "El papel de la Defensa en una Estrategia Suramericana para el
1636    Aprovechamiento de los Recursos Naturales. Conferencia Suramericana Visiones
1637    Hacia Una Estrategia Para El Aprovechamiento de Los Recursos Naturales",
1638    year     = "2013",
1639}
1640
1641@misc{CDS:2012,
1642    author    = "Consejo de Defensa Sudamericano",
1643    title     = "Plan de Acción 2012 – CDS",
1644    year     = "2012",
1645}
1646
1647@Book{ ZEDONG:1976,
1648        title = "Problemas de la Guerra y de La Estrategia. ",
1649        author = "Zedong, M.",
1650        publisher = "Ediciones En Lenguas Extranjeras Pekín",
1651        year = "1976",
1652        country=""
1653}
1654
1655
1656@Electronic{ZIBECHI:2011,
1657        author = {Zibechi, R.},
1658        title = {La silenciosa revolución suramericana},
1659        year = {2011},
1660        howpublished = {http://www.jornada.unam.mx/2011/12/02/politica/025a1pol},
1661}
1662
1663@Article{HUOPIO:2013,
1664        title = "A Rugged Nation",
1665        author = "Hupio, S.",
1666        journal = "The Fog of Cyber Defence",
1667        year = "2013",
1668        pages = "127",
1669        volume = "",
1670        number = "10",
1671}
1672
1673@Book{ LIANG:1999,
1674        title = "Unrestricted Warfare",
1675        author = "Liang, Q. y Xiangsui, W.",
1676        publisher = "PLA Literature and Arts Publishing House",
1677        year = "1999",
1678        country="China"
1679}
1680
1681
1682@misc{UNASUR:2013,
1683    author    = "UNASUR",
1684    title     = "{VII} Reunión Ordinaria del Consejo de Jefas y Jefes de Estado y de
1685    Gobierno de la Unión de Naciones Suramericanas Declaración de Paramaribo",
1686    year     = "2013",
1687}
1688
1689@Article{KARKKAINEN:2013,
1690        title = "The Origins and the Future of Cyber Security in the Finnish Defence Forces",
1691        author = {K\"arkk\"ainen, A.},
1692        journal = "The Fog of Cyber Defence",
1693        year = "2013",
1694        pages = "",
1695        volume = "",
1696        number = "10",
1697}
1698
1699@misc{UNASUR:2009,
1700    author    = "UNASUR",
1701    title     = "Declaración de Santiago de Chile. Primera Reunión del Consejo de
1702Defensa Suramericano (CDS) de la Unión de Naciones Suramericanas (UNASUR)",
1703    year     = "2009",
1704}
1705
1706@Electronic{TELAM:2014,
1707        author = {Assange, J.},
1708        title = {No hay elección, tenemos que pasarnos al software libre para nuestra mejor protección},
1709        year = {2014},
1710        howpublished = {http://www.telam.com.ar/notas/201409/79058-julian-assan-software-libre-ciberseguridad-espionaje.html},
1711}
1712
1713@Book{ LIDDELL:1946,
1714        title = "La Estrategia de Aproximación Indirecta",
1715        author = "Liddell, B.",
1716        publisher = "Atalaya: Iberia-Joaquín Gil, Editores, S.A.",
1717        year = "1946",
1718        country=""
1719}
1720
1721@Book{LENIN:1973,
1722title = {Vladímir Lenin Obras Tomo XII (1921-1923)},
1723publisher = {PROGRESO},
1724year = {1973},
1725address = {MOSCU},
1726
1727}
1728
1729
1730@Book{NATO:2013,
1731author = {NATO Cooperative Cyber Defence Centre of Excellence Tallinn},
1732title = {Tallinn Manual on the International Law Applicable to Cyber Warfare},
1733publisher = {Schmitt},
1734year = {2013},
1735note = {www.ccdcoe.org/249.html},
1736
1737}
1738
1739@Manual{NSA:2012,
1740title = {Presidential Policy Directive 20},
1741author = {NSA},
1742year = {2012},
1743note = {"https://www.hsdl.org/?abstract\&did=725668"},
1744
1745}
1746
1747@Misc{Infogobierno:2013,
1748author = {Asamblea Nacional},
1749title = {Ley de Infogobierno},
1750howpublished = {Gaceta Oficial de la República Bolivariana de Venezuela Número: 40.274 del 17/10/2013},
1751year = {2013},
1752
1753}
1754
Note: See TracBrowser for help on using the repository browser.