source: libros/maquetacion/bibliografia.bib @ 5347126

Last change on this file since 5347126 was 5347126, checked in by aaraujo <aaraujo@…>, 10 years ago

Mejoras en la bibliografía.

  • Property mode set to 100644
File size: 43.1 KB
Line 
1% Archivo de bibliografia para el libro de seguridad
2
3% referencias capítulo 5
4
5@Book{ NIC:03,
6        author = "R. Nichols and P. C. Lekkas",
7        title = "Seguridad para comunicaciones inal{\'a}mbricas",
8        publisher = "McGraw-Hill",
9        year = "2003",
10        address = "Mexico",
11}
12
13@Book{ ACE:03,
14        author = "Vicente Aceituno Canal",
15        title = "Seguridad de la información",
16        publisher = "Noriega Editores",
17        year = "2003",
18        address = "M'exico D.F., M'exico",
19}
20
21@Book{ KURT:01,
22        author = "Kurt Wall et al",
23        title = "Programación en Linux",
24        publisher = "Prentice Hall",
25        year = "2001",
26        address = "Madrid, Espa~na",
27}
28
29@Book{ SARW:03,
30        author = "Sarwar, Koretsky",
31        title = "El libro de Linux",
32        publisher = "Pearson, Prentice Hall",
33        year = "2003",
34        address = "Madrid, Espa~na",
35}
36
37
38@Book{ STRO:02,
39        author = "Bjarne Stroustrup",
40        title = "El lenguaje de programaci{\'o}n C++",
41        publisher = "Addison Wesley",
42        year = "2002",
43        address = "Madrid, Espa{\~n}a",
44}
45
46@Book{ BLAN:06,
47        author = "James Blanchette and Mark Summerfield",
48        title = "C++ GUI Programming with Qt 4",
49        publisher = "Prentice Hall",
50        year = "2006",
51        address = "Massachusetts, USA",
52}
53
54@Book{ STAL:03,
55        author = "William Stallings",
56        title = "Fundamentos de Seguridad de Redes. Aplicaciones y Est{\'a}ndares",
57        publisher = "Pearson, Prentice Hall",
58        year = "2003",
59        address = "Espa{\~n}a",
60        edition = "2",
61}
62
63@Book{ PRESS:05,
64        author = "Roger S. Pressman",
65        title = "Ingeniería del software. Un enfoque práctico",
66        publisher = "Mc Graw-Hill",
67        year = "2005",
68        address = "Mexico",
69        edition = "6",
70}
71
72@Book{ NASH:02,
73        author = "Andrew Nash and William Duane and Celia Joseph and Joseph Brink",
74        title = "PKI: Infraestructura de clave p{\'u}blica",
75        publisher = "McGraw-Hill",
76        year = "2002",
77        address = "Mexico",     
78}
79
80@Book{ RANKL:04,
81        author = "Wolfgang Rankl, Wolfgang Effing",
82        title = "Smart Card Handbook",
83        publisher = "Wiley",
84        year = "2004",
85        address = "Mexico",
86        edition = "3",
87}
88
89@Article{ PERL:99,
90        author = "R. Perlman",
91        title = "An overview of PKI trust models",
92        journal = "Network, IEEE",
93        year = "1999",
94}
95
96@Book{ SCHM:03,
97        title = "Aprendiendo UML en 24 horas",
98        author = "Joseph Schmuller",
99        publisher = "Prentice Hall",
100        year = "2003",
101        address = "M{\'e}xico"
102}
103
104@Book{ VIEG:2002,
105        title = "Network Security with OpenSSL",
106        author = "John Viega and Matt Messier and Pravir Chandra",
107        publisher = "O'Really",
108        edition = "384",
109        year = "2002"
110}
111
112@Book{ BOOC:99,
113        title = "UML Lenguaje Unificado de Modelado",
114        author = "G., Booch",
115        publisher = "Addison Wesley",
116        year = "1999"
117}
118
119@Book{ MULL:97,
120        title = "Modelado de objetos con UML",
121        author = "Alain Pierre-Muller",
122        publisher = "Eyrolles",
123        address = "Barcelona, Espa\~na",
124        year = "1997"
125}
126
127@Book{ PILA:04,
128        title = "Version Control with Subversion ",
129        author = "C. Michael Pilato and Ben Collins-Sussman and Brian W. Fitzpatrick",
130        publisher = "O'Really ",
131        year = "2004"
132}
133
134@misc{ XCA:03,
135        title = "{XCA, una interfaz gr\'afica para OpenSSL, Claves p\'ublicas y privadas, certificados, solicitudes y listas de revocación}",
136        howpublished = "http://www.hohnstaedt.de/xca.html",
137        year = "2003",
138        author = {Christian Hohnst\"{a}dt}
139}
140
141@misc{ IBM:98,
142        title = "IBM Corporation. An overview of the IBM SET and the IBM CommercePoint Products",
143        howpublished = "http://www.software.ibm.com/commerce/set/overview.html",
144        year = "2003",
145        author = {IBM Corporation}
146}
147
148
149
150@misc{ FSF:07,
151        title = "Free Software Definition",
152        howpublished = "http://www.fsf.org/licensing/essays/free-sw.html",
153        year = "2007",
154        author = {}
155}
156
157@misc{ TRAC:07,
158        title = "Welcome to the Trac Project",
159        howpublished = "http://trac.edgewall.org/",
160        year = "2007",
161        author = {}
162}
163
164@Book{ TONITO:14,
165        title = "Trasteando con la bibliografía",
166        author = "Antonio Araujo ",
167        editor = "CENDITEL",
168        publisher = "CENDITEL",
169        year = "2014",
170        address = "Mérida"
171}
172
173% referencias capítulo 6
174
175
176@misc{ IEEEhowto:espana,
177        title = "Portal del {DNI Electrónico Español}",
178        author = {},
179        howpublished = "http://www.dnielectronico.es/",
180        year = "2012"
181}
182
183@Article{ IEEEhowto:eID,
184        title = "Electronic Identity Cards for User Authentication Promise and Practice",
185        author = "Andreas Poller and Ulrich Waldmann and Sven Vowe and Sven Turpe",
186        journal = "IEEE Security \& Privacy",
187        year = "2013",
188        volume = "10",
189        pages = "46--54"
190}
191
192@misc{ IEEEhowto:estonia,
193        title = "Oficial Gateway to {Estonia}",
194        author = {},
195        howpublished = "http://estonia.eu/about-estonia/economy-a-it/e-estonia.html",
196        year = "2013"
197}
198
199
200
201@Book{ IEEEhowto:software,
202        title = "Ingeniería del Software",
203        author = "Campderrich Falgueras",
204        publisher = "Editorial UOC",
205        year = "2003",
206        address = "Barcelona, España"
207}
208
209@misc{ IEEEhowto:directiva,
210        title = "DIRECTIVA 1999/93/{CE} DEL {P}ARLAMENTO {E}UROPEO Y DEL {C}ONSEJO",
211        author = {},
212        howpublished = "http://www.cert.fnmt.es/legsoporte/D\_1999\_93\_CE.pdf",
213        year = "1999"
214}
215
216@misc{ IEEEhowto:x509,
217        title = "Internet {X.509} {Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile}. {Request for Comments} ({RFC}) 5280",
218        author = {Cooper, D. and Santesson, S. and others},
219        howpublished = "http://www.ietf.org/rfc/rfc5280.txt",
220        year = "2013"
221}
222
223
224@misc{ IEEEhowto:pkcs7,
225        title = "{PKCS\#7}. {Cryptographic Message Syntax}",
226        author = {},
227        howpublished = "https://tools.ietf.org/html/rfc2315",
228        year = "2013"
229}
230
231
232@misc{ IEEEhowto:pades,
233        title = "{PAdES}. {PDF Advance Electronic Signatures}",
234        author = {ETSI},
235        year = {2013},
236        howpublished = {http://www.etsi.org/standards-search},
237}
238
239@misc{ IEEEhowto:xmldsig,
240        title = "{XML Signature Syntax and Processing (Second Edition). W3C Recommendation 10 June 2008}",
241        author = {Bartel, M. and Boyer, J. and others},
242        howpublished = "http://www.w3.org/TR/xmldsig-core/",
243        year = "2013"
244}
245
246@misc{ IEEEhowto:bdoc,
247        title = "Formato para firmas electrónicas",
248        author = {},
249        howpublished = "http://www.signature.it/-TOOLS/Bdoc-1.0.pdf",
250        year = "2013"
251}
252
253
254@Article{ IEEEhowto:neubauer,
255        title = "Digital signatures with familiar appearance for e-government documents: authentic {PDF}",
256        author = "Neubauer, T. and Weippl, E. and Biffl, S.",
257        journal = "Proceedings of the First International Conference on Availability, Reliability and Security",
258        year = "2006",
259        volume = {},
260        pages = "723--731"
261}
262
263@Book{ IEEEhowto:java,
264        title = "{Professional Java, JDK}",
265        author = "Richardson Clay and Avondolio Donald and others",
266        publisher = "Wrox",
267        year = "2005",
268}
269
270@misc{ IEEEhowto:xades,
271        title = "{XML Advanced Electronic Signatures (XAdES)}",
272        author = "Cruellas, J. and Karlinger, G. and others",
273        howpublished = "http://www.w3.org/TR/XAdES/",
274        year = "2003"
275}
276
277@misc{ IEEEhowto:mime,
278        title = "{Security Multiparts for MIME. Multipart/Signed and Multipart/Encrypted}",
279        author = "Galvin, J. and Murphy, S. and Crocker, S. and Freed, N.",
280        howpublished = "http://tools.ietf.org/html/rfc1847",
281        year = "2013"
282}
283
284
285@misc{ IEEEhowto:pkcs12,
286        title = "{PKCS\#12. Personal Information Exchange Syntax Standard}",
287        author = "{RSA Laboratories}",
288        howpublished = "https://www.rsa.com/rsalabs/node.asp?id=2138",
289        year = "2013"
290}
291
292
293@Book{ IEEEhowto:bpel,
294        title = "{Business Process Execution for Web Services BPEL and BPEL4WS}",
295        author = "Matjaz Juric and Mathew Benny",
296        publisher = "Packt Publishing",
297        year = "2006",
298}
299
300
301@Article{ IEEEhowto:safet,
302        title = "{SAFET: Sistema para la generación de aplicaciones de firma electrónica}",
303        author = "Araujo, A. and Bravo, V.",
304        journal = "Revista Puente",
305        year = "2011",
306        volume = "6",
307}
308
309
310% referencias capítulo 7
311
312@misc{rlsm:terminology,
313        title = "Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology",
314        author = "Pfitzmann, A. and Hansen, M.",
315        howpublished = "http://dud.inf.tu-dresden.de/Anon\_Terminology.shtml",
316        year = "2000",
317}
318
319@Article{rlsm:diaz01,
320        title = "Towards measuring Anonymity ",
321        author = "D\'{\i}az, C. and Seys, S. and Claessens, J. and Preneel, B.",
322        journal = "Designing Privacy Enhancing Technologies",
323        year = "2002",
324        pages = "54--68",
325        volume = {},
326}
327
328@Article{rlsm:serj01,
329        title = "Towards an Information Theoretic Metric for Anonymity",
330        author = "Serjantov, A. and Danezis, G.",
331        journal = "Proceedings of Privacy Enhancing Technologies Workshop",
332        year = "2002",
333        pages = "54--68",
334        volume = {},
335}
336
337
338@Article{ rlsm:chaum-mix,
339        title = "Untraceable electronic mail, return addresses, and digital pseudonyms",
340        author = "Chaum, D.",
341        journal = "Communications of the ACM",
342        year = "1981",
343        pages = {},
344        volume = "4",
345}
346
347
348@Article{ rlsm:diaz-mixes,
349        title = "Generalising Mixes",
350        author = "D\'{\i}az, C. and Serjantov, A.",
351        journal = "Proceedings of Privacy Enhancing Technologies workshop",
352        year = "2003",
353        pages = "18--31",
354        volume = {},
355}
356
357
358@Article{ rlsm:mixminion,
359        title = "Mixminion: Design of a Type III Anonymous Remailer Protocol",
360        author = "Danezis, G. and Dingledine, R. and Mathewson, N.",
361        journal = "Proceedings of the 2003 IEEE Symposium on Security and Privacy",
362        year = "2003",
363        pages = "2--15",
364        volume = {},
365}
366
367@Article{rlsm:tor-design,
368        title = "Tor: The Second-Generation Onion Router",
369        author = "Dingledine, R. and Mathewson, N. and Syverson, P.",
370        journal = "Proceedings of the 13th USENIX Security Symposium",
371        year = "2004",
372        pages = {},
373        volume = {},
374}
375
376
377@Article{rlsm:antnet,
378        title = "AntNet: Distributed Stigmergetic Control for Communications Networks",
379        author = "Caro, G.D. and Dorigo, M.",
380        journal = "Journal of Artificial Intelligence Research",
381        year = "1998",
382        pages = {},
383        volume = {},
384}
385
386@Article{ rlsm:ants-white,
387        title = "Connection Management using Adaptive Mobile Agents",
388        author = "White, T. and Pagurek, B.",
389        journal = "Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications",
390        year = "1998",
391        pages = "802--809",
392        volume = {},
393}
394
395
396@Article{ rlsm:ants-loadbalancing,
397        title = "Ant-Based Load Balancing in Telecommunications Networks",
398        author = "Schoonderwoerd, R.",
399        journal = "Adaptive Behavior",
400        year = "1997",
401        pages = "169--207",
402        volume = "5",
403}
404
405
406@Article{ rlsm:shannon,
407        title = "The mathematical theory for communicactions",
408        author = "Shannon, C.",
409        journal = "Bell Systems Technical Journal",
410        year = "1948",
411        pages = "50--64",
412        volume = "30",
413}
414
415@Article{rlsm:yuxin,
416        title = "Measuring Anonymity with Relative Entropy",
417        author = "Deng, Y. and Pang, J. and Wu, P.",
418        journal = "Proceedings of the 4th International Workshop on Formal Aspects in Security and Trust",
419        year = "2007",
420        pages = "65--79",
421        volume = {},
422}
423
424
425@Article{rlsm:combinatorial,
426        title = "A Combinatorial Approach to Measuring Anonymity",
427        author = "Edman, M. and Sivrikaya, F. and Yener, B.",
428        journal = "Intelligence and Security Informatics",
429        year = "2007",
430        pages = "356--363",
431        volume = {},
432}
433
434
435@Article{rlsm:revisiting,
436        title = "Revisiting A Combinatorial Approach Toward Measuring Anonymity",
437        author = "Gierlichs, B. and Troncoso, C. and Diaz, C. and Preneel, B. and Verbauwhede, I.",
438        journal = "Workshop on Privacy in the Electronic Society",
439        year = "2008",
440        pages = "111--116",
441        volume = {},
442}
443
444
445@Article{rlsm:berthold,
446        title = "The Disavantages of Free Mix Routes and How to overcome them",
447        author = "Berthold, O. and Pfitzmann, A. and Standtke, R.",
448        journal = "Proceedings of Privacy Enhancing Technologies Workshop",
449        year = "2001",
450        pages = "30--45",
451        volume = {},
452}
453
454
455@Article{ rlsm:reiter,
456        title = "Crowds: Anonymity for Web Transactions",
457        author = "Reiter, M. and Rubin, A.",
458        journal = "ACM Transactions on Information and System Security",
459        year = "1998",
460        pages = {},
461        volume = "1",
462}
463
464
465@misc{ rlsm:vernier,
466        title = "What are Mean Squared Error and Root Mean Squared Error?.",
467        author = "Vernier, D., and Gastineau, J.",
468        howpublished = "http://www.vernier.com/til/1014/",
469        year = "2011"
470}
471
472
473@Article{ rlsm:jianhua,
474        title = "Divergences Measures Based in Shannon Entropy",
475        author = "Jianhua, L.",
476        journal = "IEEE Transactions on Information Theory",
477        year = "1991",
478        pages = {},
479        volume = "37",
480        number = "1",
481}
482
483% Referencias adicionales del capítulo 3.
484
485@TechReport{ico2006,
486author = {Information Commissioner Office},
487title = {Data protection technical guidance note: Privacy enhancing technologies (pets)},
488institution = {Information Commissioner Office},
489year = {2006},
490month = {April},
491}
492
493@TechReport{ONU1948,
494author = {Organización de las Naciones Unidas},
495title = {Derechos humanos para todos. Declaración Universal de los Derechos humanos},
496institution = {Organización de las Naciones Unidas},
497year = {1948}
498}
499
500@phdthesis{george-thesis,
501  title = {Better Anonymous Communications},
502  author = {George Danezis},
503  school = {University of Cambridge},
504  year = {2004},
505  month = {July},
506  www_tags = {selected},
507  www_section = {Anonymous communication},
508  www_pdf_url = {http://www.cl.cam.ac.uk/~gd216/thesis.pdf},
509}
510
511@inproceedings{ISDN-mixes,
512  title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},
513  author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},
514  booktitle = {Proceedings of the GI/ITG Conference on Communication in Distributed
515        Systems},
516  year = {1991},
517  month = {February},
518  pages = {451--463},
519  www_tags = {selected},
520  www_section = {Anonymous communication},
521  www_ps_gz_url = {http://www.semper.org/sirene/publ/PfPW_91TelMixeGI_NTG.ps.gz},
522}
523
524@inproceedings{esorics04-mauw,
525  title = {A formalization of anonymity and onion routing},
526  author = {S. Mauw and J. Verschuren and E.P. de Vink},
527  booktitle = {Proceedings of ESORICS 2004},
528  year = {2004},
529  location = {Sophia Antipolis},
530  pages = {109--124},
531  editor = {P. Samarati and P. Ryan and D. Gollmann and R. Molva},
532  publisher = {LNCS 3193},
533  www_tags = {selected},
534  www_section = {Formal methods},
535  www_pdf_url = {http://www.win.tue.nl/~ecss/downloads/esorics04.pdf},
536}
537
538@inproceedings{onion-discex00,
539  title = {{O}nion {R}outing Access Configurations},
540  author = {Paul Syverson and Michael Reed and David Goldschlag},
541  booktitle = {Proceedings of the DARPA Information Survivability Conference and Exposition
542        (DISCEX 2000)},
543  volume = {1},
544  year = {2000},
545  pages = {34--40},
546  publisher = {IEEE CS Press},
547  www_ps_gz_url = {http://www.onion-router.net/Publications/DISCEX-2000.ps.gz},
548  www_tags = {selected},
549  www_abstract_url = {http://www.onion-router.net/Publications.html},
550  www_section = {Anonymous communication},
551  www_pdf_url = {http://www.onion-router.net/Publications/DISCEX-2000.pdf},
552  www_ps_url = {http://www.onion-router.net/Publications/DISCEX-2000.ps},
553}
554
555@inproceedings{onion-routingpet2000,
556  title = {{Towards an Analysis of Onion Routing Security}},
557  author = {Paul Syverson and Gene Tsudik and Michael Reed and Carl Landwehr},
558  booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design
559        Issues in Anonymity and Unobservability},
560  year = {2000},
561  month = {July},
562  pages = {96--114},
563  editor = {H. Federrath},
564  publisher = {Springer-Verlag, LNCS 2009},
565  www_important = {1},
566  www_tags = {selected},
567  www_section = {Anonymous communication},
568  www_ps_gz_url = {http://www.onion-router.net/Publications/WDIAU-2000.ps.gz},
569}
570
571@inproceedings{danezispet2004,
572  title = {The Traffic Analysis of Continuous-Time Mixes},
573  author = {George Danezis},
574  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
575  volume = {3424},
576  year = {2004},
577  month = {May},
578  pages = {35--50},
579  series = {LNCS},
580  www_important = {1},
581  www_tags = {selected},
582  www_section = {Traffic analysis},
583  www_pdf_url = {http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf},
584}
585
586@inproceedings{timing-fc2004,
587  title = {Timing Attacks in Low-Latency Mix-Based Systems},
588  author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew K. Wright},
589  booktitle = {Proceedings of Financial Cryptography (FC '04)},
590  year = {2004},
591  month = {February},
592  pages = {251--265},
593  editor = {Ari Juels},
594  publisher = {Springer-Verlag, LNCS 3110},
595  www_tags = {selected},
596  www_section = {Traffic analysis},
597  www_pdf_url = {http://www.cs.umass.edu/~mwright/papers/levine-timing.pdf},
598}
599
600@inproceedings{SS03,
601  title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
602  author = {Andrei Serjantov and Peter Sewell},
603  booktitle = {Proceedings of ESORICS 2003},
604  year = {2003},
605  month = {October},
606  www_tags = {selected},
607  www_remarks = {An investigation of packet counting attacks (which work best on lightly loaded networks) and connection-start timing attacks.},
608  www_ps_url = {http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps},
609  www_section = {Traffic analysis},
610}
611
612@inproceedings{flow-correlation04,
613  title = {On Flow Correlation Attacks and Countermeasures in Mix Networks},
614  author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao},
615  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
616  volume = {3424},
617  year = {2004},
618  month = {May},
619  pages = {207--225},
620  series = {LNCS},
621  www_tags = {selected},
622  www_section = {Traffic analysis},
623  www_pdf_url = {http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf},
624}
625
626@inproceedings{WangCJ05,
627  title = {Tracking anonymous peer-to-peer VoIP calls on the internet},
628  author = {Xinyuan Wang and Shiping Chen and Sushil Jajodia},
629  booktitle = {Proceedings of the ACM Conference on Computer and Communications Security},
630  year = {2005},
631  month = {November},
632  pages = {81--91},
633  www_tags = {selected},
634  www_section = {Anonymous communication},
635  www_pdf_url = {http://ise.gmu.edu/~xwangc/Publications/CCS05-VoIPTracking.pdf},
636}
637
638@inproceedings{e2e-traffic,
639  title = {Practical Traffic Analysis: Extending and Resisting Statistical Disclosure},
640  author = {Nick Mathewson and Roger Dingledine},
641  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
642  volume = {3424},
643  year = {2004},
644  month = {May},
645  pages = {17--34},
646  series = {LNCS},
647  www_important = {1},
648  www_tags = {selected},
649  www_section = {Traffic analysis},
650  www_pdf_url = {http://freehaven.net/doc/e2e-traffic/e2e-traffic.pdf},
651}
652
653@inproceedings{back01,
654  title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
655  author = {Adam Back and Ulf M\"oller and Anton Stiglic},
656  booktitle = {Proceedings of Information Hiding Workshop (IH 2001)},
657  year = {2001},
658  month = {April},
659  pages = {245--257},
660  editor = {Ira S. Moskowitz},
661  publisher = {Springer-Verlag, LNCS 2137},
662  www_important = {1},
663  www_tags = {selected},
664  www_section = {Traffic analysis},
665  www_pdf_url = {http://www.cypherspace.org/adam/pubs/traffic.pdf},
666}
667
668@inproceedings{hs-attack06,
669  title = {Locating Hidden Servers},
670  author = {Lasse {\O}verlier and Paul Syverson},
671  booktitle = {Proceedings of the 2006 IEEE Symposium on Security and Privacy},
672  year = {2006},
673  month = {May},
674  publisher = {IEEE CS},
675  www_important = {1},
676  www_tags = {selected},
677  www_pdf_url = {http://www.onion-router.net/Publications/locating-hidden-servers.pdf},
678  www_remarks = {Motivates and describes Tor's entry guard design.},
679  www_section = {Traffic analysis},
680}
681
682
683@MastersThesis{maestriaRSumoza,
684author = {Rodolfo Sumoza},
685title = {Sistemas Anónimos en Escenarios Globales},
686school = {Universidad Complutense de Madrid},
687year = {2008},
688}
689
690@inproceedings{traffic_analysis,
691author = {J. F. Raymond},
692editor = {H. Federrath},
693title = {Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems},
694booktitle = {Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability - Springer-Verlag, LNCS},
695year = {2000},
696}
697
698@inproceedings{timing_ssh,
699author = {Dawn Xiaodong Song; David Wagner; Xuqing Tian},
700editor = {USENIX Association},
701title = {Timing Analysis of Keystrokes and Timing Attacks on SSH},
702booktitle = {Proceedings of the 10th USENIX Security Symposium},
703year = {2001},
704}
705
706@misc{cenditel_anonimato,
707author = {Endira Mora et. al},
708title = {Gestión de Anonimato},
709year = {2014},
710howpublished = {https://tibisay.cenditel.gob.ve/gestionanonimato/wiki/PlanDeTrabajo\%3A},
711}
712
713@inproceedings{cebolla,
714  title = {{Cebolla: Pragmatic IP Anonymity}},
715  author = {Zach Brown},
716  booktitle = {Proceedings of the 2002 Ottawa Linux Symposium},
717  year = {2002},
718  month = {June},
719  www_tags = {selected},
720  www_pdf_url = {http://cypherspace.org/cebolla/cebolla.pdf},
721  www_remarks = {Written by a former Freedom developer, Cebolla has a UDP-based design
722        similar to second-generation Freedom. The initiator incrementally builds her
723        circuit, giving her end-to-end forward-secrecy and also better recovery from
724        broken nodes.},
725  www_section = {Anonymous communication},
726}
727
728@misc{ SCHNEIER:14,
729        title = "Choosing Secure Passwords",
730        howpublished = "http://boingboing.net/2014/02/25/choosing-a-secure-password.html",
731        year = "2014",
732        author = {Bruce Schneier}
733}
734
735% referencias capitulo 4
736
737@misc{CHALBAUD:13,
738        author = {Chalbaud, R.},
739        title = {Derechos Humanos y su protección Constitucional},
740        year = {2013},
741        url = {http},
742}
743
744@Article{ OBERTO-GOVEA,
745        title = {Algunas Consideraciones sobre {Habeas Data}},
746        author = "Oberto, M. and Govea, M.",
747        journal = "Revista Telematique",
748        year = "2008",
749        pages = {},
750        volume = "7",
751        number = "3",
752}
753
754@misc{UTAH:2014,
755        author = {Horacio Fernandez Delpech},
756        title = {Ley del Estado de {Utah} sobre la {Firma Digital}. {Código Comentado. Título 46, Capítulo 3}},
757        year = {1996},
758        url = {http://www.hfernandezdelpech.com.ar/LegislacionYproExtEEEUUELeyEstadoUtahFirmaDig.htm},
759}
760
761
762
763
764@Article{ PAREDES:2008,
765        title = "Transformación de la cultura de servicios de información: una visión legal y de tecnologías",
766        author = "Paredes, A.",
767        journal = "Enl@ce revista Venezolana de Información, Tecnología y Conocimiento",
768        year = "2008",
769        volume = "5",
770       
771}
772
773@Article{ SALAZAR,
774        title = "Habeas Data en el derecho Comparado",
775        author = "Salazar, E.",
776        journal = "Anuario del Instituto de Derecho Comparado de la Universidad de Carabobo",
777        year = "2006",
778}
779
780@Book{ OBERTO-GUERRERO,
781        title = "Algunas consideraciones sobre Habeas Data en Venezuela",
782        author = "Oberto y Guerrero",
783        publisher = "",
784        year = "2008",
785}
786
787@Book{ ZAGARRA:2010,
788        title = "Marco Legal de las Tecnologías de la Información y comunicación",
789        author = "Zagarra R. Marco",
790        publisher = "",
791        year = "2010",
792}
793
794
795@Book{ FUENTES:2007,
796        title = "Marco Legal de la Informática y la computación",
797        author = "Fuentes, F.",
798        publisher = "Vadell Hermanos",
799        year = "2007",
800        country="Venezuela",
801}
802
803@misc{UNIVERSIDADABIERTA:MEXICO,
804        author = {Beatriz Di Totto},
805        title = {Delitos Informáticos},
806        year = {},
807        howpublished = {http://www.universidadabierta.edu.mx},
808       
809}
810@misc{Bracho:2010,
811        author = {Pedro Bracho},
812        title = {Jurísprudencia. {Concepto y Características}},
813        year = {2010},
814        howpublished = {http://es.scribd.com/doc/81250967/JURISPRUDENCIA-Concepto-y-Caracteristicas},
815       
816}
817@misc{TIPOSPENALES:2014,
818        author = {René De Sola},
819        title = {Los tipos penales en la {Ley Especial contra Delitos Informáticos}},
820        year = {},
821        howpublished = {http://beatrizditotto.net/2010/01/01/introduccion/},
822        urldate = {01-08-2014}
823}
824
825
826@Book{ LOGRERIA:2008,
827        title = "Análisis critico de la tipicidad prevista en algunos artículos de la {Ley Especial Contra Delitos Informáticos Venezolana}",
828        author = "Logreria, C., Fuentes F.",
829        publisher = "Revista Electrónica de Estudios Telemáticos URBE",
830        year = "2008",
831        country="Venezuela",
832}
833
834@Book{ PENARANDA:2011,
835        title = "{La Firma Electrónica Digital en Venezuela}",
836        author = "Peñaranda, H., Héctor R.",
837        publisher = "Universidad del Zulia",
838        year = "2011",
839        country="Venezuela",
840}
841
842
843@Book{ ODREMAN:2003,
844        title = "{Eficacia Probatoria del mensaje de datos y de la Firma electrónica según la nueva Ley de Mensaje de Datos y Firmas Electrónicas}",
845        author = "Odreman, G.",
846        publisher = "UCAB",
847        year = "2003",
848        country="Venezuela",
849}
850
851
852@Book{ LONRENZETTI:2000,
853        title = "{Comercio Electrónico}",
854        author = "Lonrenzetti, R.",
855        publisher = "Abeledo-Perrot",
856        year = "2000",
857        country="Argentina",
858}
859
860@Book{ URDANETA:2010,
861        title = "{Los Mensajes de Datos y la Firma Electrónica (Seguridad Jurídica que ofrecen y Valor Probatorio)}",
862        author = "Urdaneta B., José V.",
863        publisher = "ACADEMIA DE CIENCIAS POLÍTICAS Y SOCIALES",
864        year = "2010",
865        country="Venezuela",
866}
867
868@Article{ RONDON,
869        title = "{Comentarios generales al Decreto ley de Mensaje de  Datos y Firmas electrónicas de la República Bolivariana de Venezuela}",
870        author = "Rondón, A.",
871        journal = "Revista de la Facultad de Ciencias Jurídicas y Políticas",
872        year = "2002",
873}
874
875@misc{LEYMODELOCNUDMI:1996,
876        author = {Comisión de las Naciones Unidas para el Derecho Mercantil Internacional},
877        title = {{Ley Modelo de la CNUDMI sobre Comercio Electrónico con la Guía para su incorporación al derecho interno}},
878        year = {1996},
879        url = {http://www.uncitral.org/pdf/spanish/texts/electcom/05-89453_S_Ebook.pdf},
880}
881
882@Article{CLIC:13,
883        title = "{Ley de Infogobierno}",
884        author = "Montilla, M. and Roca, S.",
885        journal = "Revista El Clic",
886        year = "2013",
887        pages = "",
888        volume = "6",
889}
890
891@misc{GOBIERNOELECTRONICOENVENEZUELA,
892        author = {UCV},
893        title = {Gobierno Eelctrónico},
894        year = {2014},
895        url = {},
896}
897
898@Book{ COLINA:05,
899        title = "Seducir y Controlar.",
900        author = "Colina, C.",
901        publisher = "UCV",
902        year = "2005",
903        country="Venezuela",
904}
905
906@Article{CRISTOS:03,
907        title = "{Privacidad y Protección de Datos Personales en Internet, ¿Es necesario contar con una regulación específica en México?}",
908        author = "Cristos Velasco",
909        journal = "Boletín de Política Informática I",
910        year = "2003",
911        pages = "",
912        volume = "",
913}
914
915@Book{ FLORES:09,
916        title = "Derecho Informático.",
917        author = "Flores, L.",
918        publisher = "Grupo Editorial Patria",
919        year = "2009",
920        country="México",
921}
922
923@Book{ GAMBA:10,
924        title = "Panorama del derecho Informático en América Latina y el Caribe.",
925        author = "Gamba, J.",
926        publisher = "CEPAL",
927        year = "2010",
928        country="",
929}
930
931
932
933
934
935
936% referencias del prologo
937
938@Article{GOMARA:07,
939        title = "Frankenstein, un espejo de la identidad humana",
940        author = "Ramalle Gómara, E.",
941        journal = "Berceo",
942        year = "2007",
943        pages = "81-96",
944        volume = "153",
945}
946
947@misc{BOLIVAR:1819,
948        author = "Bolívar, S.",
949        title = "{Discurso ante el Congreso de Angostura el 15 de Febrero de 1819}",
950        year = "1819",
951        howpublished = {http://es.wikisource.org/},
952}
953
954@Book{ ANDERSON:1983,
955        title = "Imagined Communities. Reflections on the Origin and Spread of Nationalism.",
956        author = "Anderson, B.",
957        publisher = "Verso",
958        year = "1998",
959        country="EE.UU.",
960        address="New York"
961}
962
963
964@Book{ MACINTYRE:1981,
965        title = "After Virtue. A Study in Moral Theory.",
966        author = "MacIntyre, A",
967        publisher = "University of Notre Dame Press",
968        address = "Indiana",
969        year = "1984",
970        country="EE.UU."
971}
972
973
974@Book{ ARENDT:1958,
975        title = "The Human Condition.",
976        author = "Arendt, H.",
977        publisher = "The University of Chicago Press",
978        year = "1998",
979        country="EE.UU."
980}
981
982@misc{SHELLEY:1818,
983        author = {Shelley, M.},
984        title = {Frankenstein o el Moderno Prometeo},
985        year = {2004},
986        url = {http://www.librosenred.com/},
987        translator = {La edición no menciona el nombre del traductor}
988}
989
990@Book{ IDENTIDADDIGITAL:2014,
991        title = "Seguridad Informática y la Identidad Digital",
992        author = "Araujo, A., Bravo, V., Sumoza, R.",
993        publisher = "Centro Nacional de Desarrollo e Investigación en Tecnologías Libres",
994        year = "2014",
995        country="Venezuela"
996}
997
998@Book{ MATTHEWS:2008,
999        title = "Identity and Information Technology. En Information Technology and Moral Philosophy",
1000        author = "Matthews, S.",
1001        publisher = "Cambridge",
1002        year = "2006",
1003        country="EE.UU."
1004}
1005
1006
1007@Book{ NAIM:2006,
1008        title = "Ilícito. Cómo traficantes, contrabandistas y piratas están cambiando el mundo.",
1009        author = "Naím, M.",
1010        publisher = "Debate",
1011        year = "2006",
1012        country="Caracas, Venezuela",
1013        translator = "Francisco Ramos"
1014}
1015
1016@Book{ ETZIONI:1999,
1017        title = "The Limits of Privacy",
1018        author = "Etzioni, A.",
1019        publisher = "Basic Book",
1020        year = "2006",
1021        country="New York, EE.UU."
1022}
1023
1024
1025@Article{FUENMAYOR:1991,
1026        title = "The Roots of Reductionism: a Counter-Ontoepistemology for a Systems Approach",
1027        author = "Fuenmayor, R.",
1028        journal = "Systems Practice",
1029        year = "1991",
1030        pages = "",
1031        volume = "4",
1032}
1033
1034@Book{ PETTIT:2008,
1035        title = "Trust, reliance and the internet. En Information Technology and Moral Philosophy",
1036        author = "Pettit, P.",
1037        publisher = "Cambridge",
1038        year = "2008",
1039        country="EE.UU."
1040}
1041
1042@Article{SANDEL:1989,
1043        title = "Moral Argument and Liberal Toleration: Abortion and Homosexuality.",
1044        author = "Sandel, M.",
1045        journal = "California Law Review.",
1046        year = "1989",
1047        pages = "",
1048        volume = "77",
1049}
1050
1051
1052@Article{OHARROW:1998,
1053        title = "Health Plans' Access to Pharmacy Data Raises Concerns about Privacy.",
1054        author = "O'harrow, R.",
1055        journal = "The Seattle Times",
1056        year = "1998",
1057        pages = "",
1058        volume = "",
1059}
1060
1061@Article{MARKOFF:2002,
1062        title = "Pentagon Plans a Computer Systems that Would Peek at Personal Data of Americans.",
1063        author = "Markoff, J.",
1064        journal = "The New York Times",
1065        year = "2002",
1066        pages = "",
1067        volume = "",
1068}
1069
1070@Article{GREENWALD:2013,
1071        title = "NSA collecting phone records of millions of Verizon customers daily.",
1072        author = "Greenwald, G.",
1073        journal = "The Guardian",
1074        year = "2013",
1075        pages = "",
1076        volume = "",
1077}
1078
1079@Book{ GREENWALD:2014,
1080        title = "No Place to Hide. Edward Snowden, the NSA and the Surveillance State.",
1081        author = "Greenwald, G.",
1082        publisher = "Penguin Books Ltd.",
1083        year = "2014",
1084        country="United Kingdom"
1085}
1086
1087@Article{GELLMANSOLTANI:2013,
1088        title = "NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say.",
1089        author = "Gellman, B. y Soltani, A.",
1090        journal = "The Washington Post.",
1091        year = "2013",
1092        pages = "",
1093        volume = "",
1094}
1095
1096@Article{NEWYORKTIMES:2013,
1097        title = "Documents Show N.S.A. Efforts to Spy Both Enemies and Allies.",
1098        author = "New York Times",
1099        journal = "New York Times.",
1100        year = "2013",
1101        pages = "",
1102        volume = "",
1103}
1104
1105
1106@Book{ VANDENHOVEN:2008,
1107        title = "Information Technology, privacy, and the protection of personal data. En Information Technology and Moral Philosophy",
1108        author = "Van den Hoven, J.",
1109        publisher = "Cambridge",
1110        year = "2008",
1111        country="EE.UU."
1112}
1113
1114
1115
1116@Article{RORTY:1996,
1117        title = "Who are we? Moral Universalism and Economic Triage.",
1118        author = "Rorty, R.",
1119        journal = "Segundo Foro de Filosofía de la Unesco",
1120        year = "1996",
1121        pages = "",
1122        volume = "",
1123}
1124
1125
1126% referencias del capitulo 10
1127
1128@misc{DRAE:CIBERNETICA,
1129        author = {Real Academia de la Lengua Española},
1130        title = {Diccionario de la Lengua Española (DRAE)},
1131        year = {2001},
1132        howpublished = {http://lema.rae.es/drae/?val=cibernética},
1133}
1134
1135@Book{ WIENER:1998,
1136        title = "Human use of human beings: Cybernetics and society.",
1137        author = "Wiener, N.",
1138        publisher = "Da Capo Press",
1139        year = "1998",
1140        country=""
1141}
1142
1143
1144@Article{BURTSEVA:2013,
1145        title = "Norbert Wiener: Padre de la cibernética.",
1146        author = "Burtseva, L. and Tyrsa, V. and Ríos, B. and Flores, L.",
1147        journal = "Revista UABC",
1148        year = "2013",
1149        pages = "48",
1150        volume = "4",
1151        number = "54",
1152}
1153
1154@Book{ ASHBY:1957,
1155        title = "An introduction to cybernetics",
1156        author = "Ashby, R",
1157        publisher = "Chapman \& Hall",
1158        year = "1957",
1159        country=""
1160}
1161
1162@Book{ GIBSON:1984,
1163        title = "Neuromante",
1164        author = "Gibson, W.",
1165        publisher = "Minotauro",
1166        year = "1984",
1167        country=""
1168}
1169
1170@Article{CICOGNANI:1998,
1171        title = "On the linguistic nature of cyberspace and virtual communities",
1172        author = "Cicognani, A.",
1173        journal = "Virtual reality",
1174        year = "1998",
1175        pages = "20",
1176        volume = "3",
1177        number = "1",
1178}
1179
1180@Article{POST:2013,
1181        title = "Against’Against Cyberanarchy",
1182        author = "Post, D.",
1183        journal = "Berkeley Technology Law Journal",
1184        year = "2002",
1185        pages = "10",
1186        volume = "17",
1187        number = "",
1188}
1189
1190@Article{ANDERS:2001,
1191        title = "Anthropic cyberspace: Defining electronic space from first principles",
1192        author = "Andres, P.",
1193        journal = "Leonardo",
1194        year = "2001",
1195        pages = "405",
1196        volume = "34",
1197        number = "5",
1198}
1199
1200
1201@Article{FLORES:2012,
1202        title = "Los Ámbitos no Terrestres en la Guerra Futura: Ciberespacio",
1203        author = "Flores, H.",
1204        journal = "Centro Superior de Estudios de la Defensa Nacional Monografías del Ceseden",
1205        year = "2012",
1206        pages = "18",
1207        volume = "",
1208        number = "128",
1209}
1210
1211@Article{FRITZ:2013,
1212        title = "The Semantics of Cyber Warfare",
1213        author = "Fritz, J.",
1214        journal = "East Asia Security Symposium and Conference",
1215        year = "2013",
1216        pages = "2",
1217        volume = "1",
1218        number = "7",
1219}
1220
1221
1222@Book{ WINTERFELD:2012,
1223        title = "The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice",
1224        author = "Winterfeld, S. and Andress, J.",
1225        publisher = "Elsevier Inc.",
1226        year = "2012",
1227        country=""
1228}
1229
1230@Article{MCGRAW:2013,
1231        title = "Cyber War is Inevitable (Unless We Build Security In)",
1232        author = "McGraw, G.",
1233        journal = "Journal of Strategic Studies",
1234        year = "2013",
1235        pages = "111--112",
1236        volume = "36",
1237        number = "1",
1238}
1239
1240@inproceedings{ALI:2013,
1241author = {Kostyuk N. and Alí M.},
1242editor = {The Society of Digital Information and Wireless Communication},
1243title = {The Cyber Dogs of War: Joint Efforts of Future World Leaders in The Prevention of Cyberwarfare},
1244booktitle = {The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013)},
1245year = {2013},
1246}
1247
1248@Article{LEWIS:2010,
1249        title = "The cyber war has not begun",
1250        author = "Lewis, J.",
1251        journal = "Center for Strategic and International Studies",
1252        year = "2010",
1253        pages = "",
1254        volume = "",
1255        number = "",
1256}
1257
1258@Article{FERRERO:2013,
1259        title = "La Ciberguerra. Génesis y Evolución",
1260        author = "Ferrero, J.",
1261        journal = "Revista General de Marina",
1262        year = "2013",
1263        pages = "87",
1264        volume = "",
1265        number = "Enero-Febrero",
1266}
1267
1268@Article{KIRAVUO:2013,
1269        title = "Offensive Cyber-capabilities against Critical Infrastructure",
1270        author = "Kiravuo, T.",
1271        journal = "Cyber Warfare. National Defence University. Department of Military Technology",
1272        year = "2013",
1273        pages = "90",
1274        volume = "",
1275        number = "34",
1276}
1277
1278@Article{FOJON:2011,
1279        title = "Ciberespacio: La Nueva Dimensión del Entorno Operativo",
1280        author = "Sanz, A. and Fojón, E.",
1281        journal = "Centro Superior de Estudios de la Defensa Nacional Monografías del Ceseden",
1282        year = "2011",
1283        pages = "43",
1284        volume = "",
1285        number = "44",
1286}
1287
1288@Article{SALMINEN:2013,
1289        title = "The Fog of Cyber Defence",
1290        author = "Rantapelkonen, J. and Salminen, M.",
1291        journal = "National Defence University. Department of Leadership and Military Pedagogy",
1292        year = "2013",
1293        pages = "11",
1294        volume = "",
1295        number = "2",
1296}
1297
1298
1299
1300@Article{STARR:2009,
1301        title = "Towards an Evolving Theory of Cyberpower",
1302        author = "Starr, S.",
1303        journal = "The Virtual Battlefield: Perspectives on Cyber Warfare",
1304        year = "2013",
1305        pages = "22--24",
1306        volume = "3",
1307        number = "",
1308}
1309
1310@Article{OLSON:2012,
1311        title = "El boxeo con un contrincante imaginario. La guerra cibernética y el ataque económico estratégico",
1312        author = "Olson, S.",
1313        journal = "Military Review",
1314        year = "2012",
1315        pages = "67",
1316        volume = "",
1317        number = "Noviembre-Diciembre",
1318}
1319
1320@Article{COLOM:2009,
1321        title = "El nuevo concepto estadounidense para el empleo de la fuerza militar",
1322        author = "Colom, G.",
1323        journal = "ARI: Seguridad y Defensa",
1324        year = "2009",
1325        pages = "2",
1326        volume = "",
1327        number = "70",
1328}
1329
1330
1331@misc{DoD:2012,
1332        author = {Panetta, L.},
1333        title = {Remarks by Secretary Panetta on Cybersecurity to the Business Executives for National Security},
1334        year = {2012},
1335        howpublished = {http://www.defense.gov/transcripts/transcript.aspx?transcriptid=5136},
1336}
1337
1338@misc{CHINESE:2013,
1339        author = {Chinese People's Liberation Army},
1340        title = {Pentagon's cyberattack accusations irresponsible: expert},
1341        year = {2013},
1342        howpublished = {http://eng.chinamil.com.cn/news-channels/pla-daily-commentary/2013-05/08/content\_5333521.htm},
1343}
1344
1345@Article{STONE:2013,
1346        title = "Cyber War Will Take Place!",
1347        author = "Stone, J.",
1348        journal = "Journal of Strategic Studies",
1349        year = "2013",
1350        pages = "107",
1351        volume = "36",
1352        number = "1",
1353}
1354
1355@Book{ HARRISON:2012,
1356        title = "Cyber Warfare and the Laws of War",
1357        author = "Harrison, H.",
1358        publisher = "Cambridge University Press",
1359        year = "2012",
1360        country=""
1361}
1362
1363@Article{RID:2012,
1364        title = "Cyber war will not take place",
1365        author = "Stone, J.",
1366        journal = "Journal of Strategic Studies",
1367        year = "2013",
1368        pages = "9",
1369        volume = "35",
1370        number = "1",
1371}
1372
1373
1374@Article{JUNIO:2013,
1375        title = "How Probable is Cyber War? Bringing IR Theory Back In to the Cyber Conflict Debate",
1376        author = "Junio, T.",
1377        journal = "Journal of Strategic Studies",
1378        year = "2013",
1379        pages = "130",
1380        volume = "36",
1381        number = "1",
1382}
1383
1384@misc{BEIDLEMAN:2009,
1385    author    = "Beidleman, S.",
1386    title     = "Defining and Deterring Cyber War",
1387    year     = "2009",
1388}
1389
1390@Article{SANCHEZ:2010,
1391        title = "La nueva estrategia comunicativa de los grupos terroristas",
1392        author = "Sánchez, G.",
1393        journal = "Revista Enfoques",
1394        year = "2010",
1395        pages = "203",
1396        volume = "VIII",
1397        number = "12",
1398}
1399
1400@Article{GOLDSMITH:2010,
1401        title = "The New Vulnerability (How Cyber Changes the Laws of War).",
1402        author = "Goldsmith, J.",
1403        journal = "The New Republic",
1404        year = "2010",
1405        pages = "",
1406        volume = "",
1407        number = "",
1408}
1409
1410@Article{BRENNER:2007,
1411        title = "“At light speed”: Attribution and response to cybercrime/terrorism/warfare",
1412        author = "Brenner, S.",
1413        journal = "The Journal of Criminal Law and Criminology",
1414        year = "2007",
1415        pages = "382",
1416        volume = "",
1417        number = "",
1418}
1419
1420@Book{ JANCZEWSKI:2008,
1421        title = "Cyber warfare and cyber terrorism",
1422        author = "Janczewski, L. and  Colarik, A.",
1423        publisher = "IGI Global",
1424        year = "2008",
1425        country=""
1426}
1427
1428@misc{ONU:1945,
1429    author    = "Organización de las Naciones Unidas",
1430    title     = "Carta de las Naciones Unidas. Entrada en vigor: 24 de octubre de 1945, de conformidad con el artículo 110",
1431    year     = "1945",
1432}
1433
1434@Article{HOISINGTON:2009,
1435        title = "Cyberwarfare and the Use of Force Giving Rise to the Right of Self-Defense",
1436        author = "Hoisington, M.",
1437        journal = "Boston College International and Comparative Law Review",
1438        year = "2009",
1439        pages = "446",
1440        volume = "32",
1441        number = "",
1442}
1443
1444@Article{BANKS:2013,
1445        title = "The Role of Counterterrorism Law in Shaping Ad Bellum Norms for Cyber War",
1446        author = "Banks, W.",
1447        journal = "89 INT’L L. STUD. 157. Available at SSRN 2160078",
1448        year = "2013",
1449        pages = "162",
1450        volume = "",
1451        number = "",
1452}
1453
1454
1455
1456@Article{BERNAL:1999,
1457        title = "Mercosur ¿Regionalismo o globalización? Tres aspectos para la decisión de políticas",
1458        author = "Bernal-Meza, R.",
1459        journal = "Revista Realidad Económica",
1460        year = "1999",
1461        pages = "2",
1462        volume = "",
1463        number = "165",
1464}
1465
1466
1467@Article{BIZZOZERO:2011,
1468        title = "América Latina a inicios de la segunda década del siglo XXI: entre el regionalismo estratégico y la regionalización fragmentada",
1469        author = "Bizzozero, Lincoln",
1470        journal = "Revista Brasileira de Política Internacional",
1471        year = "2011",
1472        pages = "36",
1473        volume = "54",
1474        number = "1",
1475}
1476
1477@misc{UNASUR:2008,
1478    author    = "UNASUR",
1479    title     = "Tratado Constitutivo de la Unión de Naciones Suramericanas",
1480    year     = "2008",
1481}
1482
1483@Article{SAINTPIERRE:2008,
1484        title = "El Consejo Sudamericano de Defensa",
1485        author = "Saint-Pierre, H.; Castro, G.",
1486        journal = "Boletín RESDAL",
1487        year = "2008",
1488        pages = "1",
1489        volume = "6",
1490        number = "29",
1491}
1492
1493@Book{ CLAUSEWITZ:2002,
1494        title = "De La Guerra.",
1495        author = "Clausewitz, C.",
1496        publisher = "Editorial Librodot",
1497        year = "2002",
1498        country=""
1499}
1500
1501
1502
1503@misc{CDS:2008,
1504        author = {Consejo de Defensa Sudamericano},
1505        title = {Objetivos Consejo de Defensa Suramericano UNASUR},
1506        year = {2008},
1507        howpublished = {http://www.unasursg.org/inicio/organizacion/consejos/cds},
1508}
1509
1510@misc{CEED:2012,
1511    author    = "CEED",
1512    title     = "Informe de Avance a diciembre de 2012 sobre Conceptos e
1513Institucionalidad de Seguridad y Defensa, Amenazas, Factores de Riesgo y Desafíos
1514del Consejo Sudamericano de Defensa",
1515    year     = "2012",
1516}
1517
1518@Article{MENEZES:2010,
1519        author = "Menezes, A.",
1520        title = "Regionalismo y seguridad sudamericana: ¿son relevantes el Mercosur y la Unasur? Íconos",
1521        journal = "Revista de Ciencias Sociales",
1522        year = "2010",
1523        pages = "41--53",
1524        volume = "",
1525        number = "38",
1526}
1527
1528@misc{DANTAS:2013,
1529        author = {Dantas, C. y Jeronimo, J.},
1530        title = {Como eles espionam. Istoe.},
1531        year = {2013},
1532        howpublished = {http://www.istoe.com.br/reportagens/paginar/323087\_COMO+ ELES+ESPIONAM/12},
1533}
1534
1535@Article{LIMNELL:2013,
1536        title = "Limnéll, J.",
1537        author = "Offensive Cyber Capabilities are Needed Because of Deterrence",
1538        journal = "The Fog of Cyber Defence",
1539        year = "2013",
1540        pages = "202--205",
1541        volume = "",
1542        number = "10",
1543}
1544
1545@misc{FORTI:2013,
1546    author    = "Forti, A.",
1547    title     = "El papel de la Defensa en una Estrategia Suramericana para el
1548    Aprovechamiento de los Recursos Naturales. Conferencia Suramericana Visiones
1549    Hacia Una Estrategia Para El Aprovechamiento de Los Recursos Naturales",
1550    year     = "2013",
1551}
1552
1553@misc{CDS:2012,
1554    author    = "Consejo de Defensa Sudamericano",
1555    title     = "Plan de Acción 2012 – CDS",
1556    year     = "2012",
1557}
1558
1559@Book{ ZEDONG:1976,
1560        title = "Problemas de la Guerra y de La Estrategia. ",
1561        author = "Zedong, M.",
1562        publisher = "Ediciones En Lenguas Extranjeras Pekín",
1563        year = "1976",
1564        country=""
1565}
1566
1567
1568@misc{ZIBECHI:2011,
1569        author = {Zibechi, R.},
1570        title = {La silenciosa revolución suramericana},
1571        year = {2011},
1572        howpublished = {http://www.jornada.unam.mx/2011/12/02/politica/025a1pol},
1573}
1574
1575@Article{HUOPIO:2013,
1576        title = "A Rugged Nation",
1577        author = "Hupio, S.",
1578        journal = "The Fog of Cyber Defence",
1579        year = "2013",
1580        pages = "127",
1581        volume = "",
1582        number = "10",
1583}
1584
1585@Book{ LIANG:1999,
1586        title = "Unrestricted Warfare",
1587        author = "Liang, Q. y Xiangsui, W.",
1588        publisher = "PLA Literature and Arts Publishing House",
1589        year = "1999",
1590        country="China"
1591}
1592
1593
1594@misc{UNASUR:2013,
1595    author    = "UNASUR",
1596    title     = "{VII} Reunión Ordinaria del Consejo de Jefas y Jefes de Estado y de
1597    Gobierno de la Unión de Naciones Suramericanas Declaración de Paramaribo",
1598    year     = "2013",
1599}
1600
1601@Article{KARKKAINEN:2013,
1602        title = "The Origins and the Future of Cyber Security in the Finnish Defence Forces",
1603        author = {K\"arkk\"ainen, A.},
1604        journal = "The Fog of Cyber Defence",
1605        year = "2013",
1606        pages = "",
1607        volume = "",
1608        number = "10",
1609}
1610
1611@misc{UNASUR:2009,
1612    author    = "UNASUR",
1613    title     = "Declaración de Santiago de Chile. Primera Reunión del Consejo de
1614Defensa Suramericano (CDS) de la Unión de Naciones Suramericanas (UNASUR)",
1615    year     = "2009",
1616}
1617
1618@misc{TELAM:2014,
1619        author = {Assange, J.},
1620        title = {No hay elección, tenemos que pasarnos al software libre para nuestra mejor protección},
1621        year = {2014},
1622        howpublished = {http://www.telam.com.ar/notas/201409/79058-julian-assan-software-libre-ciberseguridad-espionaje.html},
1623}
1624
1625@Book{ LIDDELL:1946,
1626        title = "La Estrategia de Aproximación Indirecta",
1627        author = "Liddell, B.",
1628        publisher = "Atalaya: Iberia-Joaquín Gil, Editores, S.A.",
1629        year = "1946",
1630        country=""
1631}
1632
1633@Book{LENIN:1973,
1634title = {Vladímir Lenin Obras Tomo XII (1921-1923)},
1635author = {Vladímir Lenin},
1636publisher = {PROGRESO},
1637year = {1973},
1638address = {MOSCU},
1639
1640}
1641
1642
1643@Book{NATO:2013,
1644author = {NATO Cooperative Cyber Defence Centre of Excellence Tallinn},
1645title = {Tallinn Manual on the International Law Applicable to Cyber Warfare},
1646publisher = {Schmitt},
1647year = {2013},
1648note = {www.ccdcoe.org/249.html},
1649
1650}
1651
1652@Manual{NSA:2012,
1653title = {Presidential Policy Directive 20},
1654author = {NSA},
1655year = {2012},
1656note = {"https://www.hsdl.org/?abstract\&did=725668"},
1657
1658}
1659
1660@Misc{Infogobierno:2013,
1661author = {Asamblea Nacional},
1662title = {Ley de Infogobierno},
1663howpublished = {Gaceta Oficial de la República Bolivariana de Venezuela Número: 40.274 del 17/10/2013},
1664year = {2013},
1665
1666}
1667
1668@misc{NSA:2009,
1669        author = {NSA},
1670        title = {SIGINT Frequently Asked Questions},
1671        year = {2009},
1672        howpublished = {https://www.nsa.gov/sigint/faqs.shtml\#sigint1},
1673}
Note: See TracBrowser for help on using the repository browser.