1 | % Archivo de bibliografia para el libro de seguridad |
---|
2 | |
---|
3 | |
---|
4 | @Book{ NIC:03, |
---|
5 | author = "R. Nichols and P. C. Lekkas", |
---|
6 | editor = "McGraw-Hill", |
---|
7 | title = "Seguridad para comunicaciones inal{\'a}mbricas", |
---|
8 | publisher = "McGraw-Hill", |
---|
9 | year = "2003", |
---|
10 | OPTkey = "", |
---|
11 | OPTvolume = "", |
---|
12 | OPTnumber = "", |
---|
13 | OPTseries = "", |
---|
14 | OPTaddress = "Mexico", |
---|
15 | OPTedition = "", |
---|
16 | OPTmonth = "", |
---|
17 | OPTnote = "", |
---|
18 | OPTannote = "", |
---|
19 | author = "R. Nichols and P. C. Lekkas" |
---|
20 | } |
---|
21 | |
---|
22 | @Book{ ACE:03, |
---|
23 | author = "Vicente Aceituno Canal", |
---|
24 | editor = "Noriega Editores", |
---|
25 | title = "Seguridad de la informaci'on", |
---|
26 | publisher = "Noriega Editores", |
---|
27 | year = "2003", |
---|
28 | OPTkey = "", |
---|
29 | OPTvolume = "", |
---|
30 | OPTnumber = "", |
---|
31 | OPTseries = "", |
---|
32 | OPTaddress = "M'exico D.F., M'exico", |
---|
33 | OPTedition = "", |
---|
34 | OPTmonth = "M'exico D.F.", |
---|
35 | OPTnote = "", |
---|
36 | OPTannote = "", |
---|
37 | } |
---|
38 | |
---|
39 | @Book{ KURT:01, |
---|
40 | author = "Kurt Wall et al", |
---|
41 | editor = "Prentice Hall", |
---|
42 | title = "Programaci'on en Linux", |
---|
43 | publisher = "Prentice Hall", |
---|
44 | year = "2001", |
---|
45 | OPTkey = "", |
---|
46 | OPTvolume = "", |
---|
47 | OPTnumber = "", |
---|
48 | OPTseries = "", |
---|
49 | OPTaddress = "Madrid, Espa~na", |
---|
50 | OPTedition = "", |
---|
51 | OPTmonth = "", |
---|
52 | OPTnote = "", |
---|
53 | OPTannote = "", |
---|
54 | } |
---|
55 | |
---|
56 | @Book{ SARW:03, |
---|
57 | author = "Sarwar, Koretsky", |
---|
58 | editor = "Pearson, Prentice Hall", |
---|
59 | title = "El libro de Linux", |
---|
60 | publisher = "Prentice Hall", |
---|
61 | year = "2003", |
---|
62 | OPTkey = "", |
---|
63 | OPTvolume = "", |
---|
64 | OPTnumber = "", |
---|
65 | OPTseries = "", |
---|
66 | OPTaddress = "Madrid, Espa~na", |
---|
67 | OPTedition = "", |
---|
68 | OPTmonth = "", |
---|
69 | OPTnote = "", |
---|
70 | OPTannote = "", |
---|
71 | } |
---|
72 | |
---|
73 | |
---|
74 | @Book{ STRO:02, |
---|
75 | author = "Bjarne Stroustrup", |
---|
76 | editor = "Addison Wesley", |
---|
77 | title = "El lenguaje de programaci{\'o}n C++", |
---|
78 | publisher = "Addison Wesley", |
---|
79 | year = "2002", |
---|
80 | OPTkey = "", |
---|
81 | OPTvolume = "", |
---|
82 | OPTnumber = "", |
---|
83 | OPTseries = "", |
---|
84 | OPTaddress = "Madrid, Espa{\~n}a", |
---|
85 | OPTedition = "", |
---|
86 | OPTmonth = "", |
---|
87 | OPTnote = "", |
---|
88 | OPTannote = "" |
---|
89 | } |
---|
90 | |
---|
91 | @Book{ BLAN:06, |
---|
92 | author = "James Blanchette and Mark Summerfield", |
---|
93 | editor = "Prentice Hall", |
---|
94 | title = "C++ GUI Programming with Qt 4", |
---|
95 | publisher = "Prentice Hall", |
---|
96 | year = "2006", |
---|
97 | OPTkey = "", |
---|
98 | OPTvolume = "", |
---|
99 | OPTnumber = "", |
---|
100 | OPTseries = "", |
---|
101 | OPTaddress = "Massachusetts, USA", |
---|
102 | OPTedition = "", |
---|
103 | OPTmonth = "", |
---|
104 | OPTnote = "", |
---|
105 | OPTannote = "" |
---|
106 | } |
---|
107 | |
---|
108 | @Book{ STAL:03, |
---|
109 | author = "William Stallings", |
---|
110 | editor = "Pearson", |
---|
111 | title = "Fundamentos de Seguridad de Redes. Aplicaciones y Est{\'a}ndares", |
---|
112 | publisher = "Prentice Hall", |
---|
113 | year = "2003", |
---|
114 | OPTkey = "", |
---|
115 | OPTvolume = "", |
---|
116 | OPTnumber = "", |
---|
117 | OPTseries = "", |
---|
118 | OPTaddress = "Espa{\~n}a", |
---|
119 | OPTedition = "2", |
---|
120 | OPTmonth = "", |
---|
121 | OPTnote = "", |
---|
122 | OPTannote = "" |
---|
123 | } |
---|
124 | |
---|
125 | @Book{ PRESS:05, |
---|
126 | author = "Roger S. Pressman", |
---|
127 | editor = "Mc Graw-Hill", |
---|
128 | title = "Ingenier'ia del software. Un enfoque pr'actico", |
---|
129 | publisher = "Mc Graw-Hill", |
---|
130 | year = "2005", |
---|
131 | OPTkey = "", |
---|
132 | OPTvolume = "", |
---|
133 | OPTnumber = "", |
---|
134 | OPTseries = "", |
---|
135 | OPTaddress = "Mexico", |
---|
136 | OPTedition = "6", |
---|
137 | OPTmonth = "", |
---|
138 | OPTnote = "", |
---|
139 | OPTannote = "" |
---|
140 | } |
---|
141 | |
---|
142 | @Book{ NASH:02, |
---|
143 | author = "Andrew Nash, William Duane, Celia Joseph and Joseph Brink", |
---|
144 | editor = "McGraw-Hill", |
---|
145 | title = "PKI: Infraestructura de clave p{\'u}blica", |
---|
146 | publisher = "McGraw-Hill", |
---|
147 | year = "2002", |
---|
148 | OPTkey = "", |
---|
149 | OPTvolume = "", |
---|
150 | OPTnumber = "", |
---|
151 | OPTseries = "", |
---|
152 | OPTaddress = "Mexico", |
---|
153 | OPTedition = "", |
---|
154 | OPTmonth = "", |
---|
155 | OPTnote = "", |
---|
156 | OPTannote = "" |
---|
157 | } |
---|
158 | |
---|
159 | @Book{ RANKL:04, |
---|
160 | author = "Wolfgang Rankl, Wolfgang Effing", |
---|
161 | title = "Smart Card Handbook", |
---|
162 | publisher = "Wiley", |
---|
163 | year = "2004", |
---|
164 | OPTkey = "", |
---|
165 | OPTvolume = "", |
---|
166 | OPTnumber = "", |
---|
167 | OPTseries = "", |
---|
168 | OPTaddress = "Mexico", |
---|
169 | OPTedition = "3", |
---|
170 | OPTmonth = "", |
---|
171 | OPTnote = "", |
---|
172 | OPTannote = "" |
---|
173 | } |
---|
174 | |
---|
175 | @Article{ PERL:99, |
---|
176 | author = "R. Perlman", |
---|
177 | title = "An overview of PKI trust models", |
---|
178 | journal = "Network, IEEE", |
---|
179 | year = "1999", |
---|
180 | OPTkey = "", |
---|
181 | OPTvolume = "", |
---|
182 | OPTnumber = "", |
---|
183 | OPTpages = "", |
---|
184 | OPTmonth = "", |
---|
185 | OPTnote = "", |
---|
186 | OPTannote = "" |
---|
187 | } |
---|
188 | |
---|
189 | @Book{ SCHM:03, |
---|
190 | title = "Aprendiendo UML en 24 horas", |
---|
191 | author = "Joseph Schmuller", |
---|
192 | editor = "Prentice Hall", |
---|
193 | publisher = "Prentice Hall", |
---|
194 | year = "2003", |
---|
195 | address = "M{\'e}xico" |
---|
196 | } |
---|
197 | |
---|
198 | @Book{ VIEG:2002, |
---|
199 | title = "Network Security with OpenSSL", |
---|
200 | author = "John Viega and Matt Messier and Pravir Chandra", |
---|
201 | publisher = "O'Really", |
---|
202 | edition = "384", |
---|
203 | year = "2002" |
---|
204 | } |
---|
205 | |
---|
206 | @Book{ BOOC:99, |
---|
207 | title = "UML Lenguaje Unificado de Modelado", |
---|
208 | author = "G., Booch", |
---|
209 | publisher = "Addison Wesley", |
---|
210 | year = "1999" |
---|
211 | } |
---|
212 | |
---|
213 | @Book{ MULL:97, |
---|
214 | title = "Modelado de objetos con UML", |
---|
215 | author = "Alain Pierre-Muller", |
---|
216 | publisher = "Eyrolles", |
---|
217 | address = "Barcelona, Espa\~na", |
---|
218 | year = "1997" |
---|
219 | } |
---|
220 | |
---|
221 | @Book{ PILA:04, |
---|
222 | title = "Version Control with Subversion ", |
---|
223 | author = "C. Michael Pilato and Ben Collins-Sussman and Brian W. Fitzpatrick", |
---|
224 | publisher = "O'Really ", |
---|
225 | year = "2004" |
---|
226 | } |
---|
227 | |
---|
228 | @Electronic{ XCA:03, |
---|
229 | title = "XCA, una interfaz gr\'afica para OpenSSL, Clave p\'ublicas y privadas, certificados, solicitudes y listas de revocaci'on", |
---|
230 | howpublished = "http://www.hohnstaedt.de/xca.html", |
---|
231 | year = "2003", |
---|
232 | author = {Christian Hohnst\"{a}dt} |
---|
233 | } |
---|
234 | |
---|
235 | @Electronic{ IBM:98, |
---|
236 | title = "IBM Corporation. An overview of the IBM SET and the IBM CommercePoint Products", |
---|
237 | howpublished = "http://www.software.ibm.com/commerce/set/overview.html", |
---|
238 | year = "2003", |
---|
239 | author = {IBM Corporation} |
---|
240 | } |
---|
241 | |
---|
242 | |
---|
243 | |
---|
244 | @Electronic{ FSF:07, |
---|
245 | title = "Free Software Definition", |
---|
246 | howpublished = "http://www.fsf.org/licensing/essays/free-sw.html", |
---|
247 | year = "2007", |
---|
248 | author = {} |
---|
249 | } |
---|
250 | |
---|
251 | @Electronic{ TRAC:07, |
---|
252 | title = "Welcome to the Trac Project", |
---|
253 | howpublished = "http://trac.edgewall.org/", |
---|
254 | year = "2007", |
---|
255 | author = {} |
---|
256 | } |
---|
257 | |
---|
258 | @Book{ TONITO:14, |
---|
259 | title = "Trasteando con la bibliografía", |
---|
260 | author = "Antonio Araujo ", |
---|
261 | editor = "CENDITEL", |
---|
262 | publisher = "CENDITEL", |
---|
263 | year = "2014", |
---|
264 | address = "Mérida" |
---|
265 | } |
---|
266 | |
---|
267 | |
---|
268 | @Electronic{ IEEEhowto:espana, |
---|
269 | title = "Portal del DNI Electrónico Español", |
---|
270 | author = {}, |
---|
271 | howpublished = "http://www.dnielectronico.es/", |
---|
272 | year = "2012" |
---|
273 | } |
---|
274 | |
---|
275 | @Article{ IEEEhowto:eID, |
---|
276 | title = "Electronic Identity Cards for User Authentication Promise and Practice", |
---|
277 | author = "Andreas Poller, Ulrich Waldmann, Sven Vowe, Sven Turpe", |
---|
278 | journal = "IEEE Security \& Privacy", |
---|
279 | year = "2013", |
---|
280 | volume = "10", |
---|
281 | pages = "46--54" |
---|
282 | } |
---|
283 | |
---|
284 | @Electronic{ IEEEhowto:estonia, |
---|
285 | title = "Oficial Gateway to Estonia", |
---|
286 | author = {}, |
---|
287 | howpublished = "http://estonia.eu/about-estonia/economy-a-it/e-estonia.html", |
---|
288 | year = "2013" |
---|
289 | } |
---|
290 | |
---|
291 | |
---|
292 | |
---|
293 | @Book{ IEEEhowto:software, |
---|
294 | title = "Ingeniería del Software", |
---|
295 | author = "Campderrich Falgueras", |
---|
296 | publisher = "Editorial UOC", |
---|
297 | year = "2003", |
---|
298 | address = "Barcelona, España" |
---|
299 | } |
---|
300 | |
---|
301 | @Electronic{ IEEEhowto:directiva, |
---|
302 | title = "DIRECTIVA 1999/93/CE DEL PARLAMENTO EUROPEO Y DEL CONSEJO", |
---|
303 | author = {}, |
---|
304 | howpublished = "http://www.cert.fnmt.es/legsoporte/D\_1999\_93\_CE.pdf", |
---|
305 | year = "1999" |
---|
306 | } |
---|
307 | |
---|
308 | @Electronic{ IEEEhowto:x509, |
---|
309 | title = "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. Request for Comments (RFC) 5280", |
---|
310 | author = {Cooper D., Santesson S., y otros}, |
---|
311 | howpublished = "http://www.ietf.org/rfc/rfc5280.txt", |
---|
312 | year = "2013" |
---|
313 | } |
---|
314 | |
---|
315 | |
---|
316 | @Electronic{ IEEEhowto:pkcs7, |
---|
317 | title = "PKCS\#7.Cryptographic Message Syntax", |
---|
318 | author = {}, |
---|
319 | howpublished = "https://tools.ietf.org/html/rfc2315", |
---|
320 | year = "2013" |
---|
321 | } |
---|
322 | |
---|
323 | |
---|
324 | @Electronic{ IEEEhowto:pades, |
---|
325 | title = "PAdES. PDF Advance Electronic Signatures", |
---|
326 | author = {}, |
---|
327 | howpublished = "http://www.etsi.org/deliver/etsi\_ts/102700\_102799/10277801/01.01.01\_60/ts\_10277801v010101p.pdf", |
---|
328 | year = "2013" |
---|
329 | } |
---|
330 | |
---|
331 | @Electronic{ IEEEhowto:xmldsig, |
---|
332 | title = "XML Signature Syntax and Processing (Second Edition). W3C Recommendation 10 June 2008", |
---|
333 | author = {Bartel M., Boyer J., y otros}, |
---|
334 | howpublished = "http://www.w3.org/TR/xmldsig-core/", |
---|
335 | year = "2013" |
---|
336 | } |
---|
337 | |
---|
338 | @Electronic{ IEEEhowto:bdoc, |
---|
339 | title = "Formato para firmas electrónicas", |
---|
340 | author = {}, |
---|
341 | howpublished = "http://www.signature.it/-TOOLS/Bdoc-1.0.pdf", |
---|
342 | year = "2013" |
---|
343 | } |
---|
344 | |
---|
345 | |
---|
346 | @Article{ IEEEhowto:neubauer, |
---|
347 | title = "Digital signatures with familiar appearance for e-government documents: authentic PDF", |
---|
348 | author = "Neubauer, T.; Weippl, E.; Biffl, S.", |
---|
349 | journal = "Proceedings of the First International Conference on Availability, Reliability and Security", |
---|
350 | year = "2006", |
---|
351 | volume = {}, |
---|
352 | pages = "723--731" |
---|
353 | } |
---|
354 | |
---|
355 | @Book{ IEEEhowto:java, |
---|
356 | title = "Professional Java, JDK", |
---|
357 | author = "Richardson Clay, Avondolio Donald, others", |
---|
358 | publisher = "Wrox", |
---|
359 | year = "2005", |
---|
360 | } |
---|
361 | |
---|
362 | @Electronic{ IEEEhowto:xades, |
---|
363 | title = "XML Advanced Electronic Signatures (XAdES)", |
---|
364 | author = "Cruellas, J. Karlinger G., y otros", |
---|
365 | howpublished = "http://www.w3.org/TR/XAdES/", |
---|
366 | year = "2003" |
---|
367 | } |
---|
368 | |
---|
369 | @Electronic{ IEEEhowto:mime, |
---|
370 | title = "Security Multiparts for MIME. Multipart/Signed and Multipart/Encrypted", |
---|
371 | author = "Galvin , J. Murphy, S. Crocker, S. Freed, N.", |
---|
372 | howpublished = "http://tools.ietf.org/html/rfc1847", |
---|
373 | year = "2013" |
---|
374 | } |
---|
375 | |
---|
376 | |
---|
377 | @Electronic{ IEEEhowto:pkcs12, |
---|
378 | title = "PKCS\#12.Personal Information Exchange Syntax Standard.", |
---|
379 | author = "RSA Laboratories.", |
---|
380 | howpublished = "https://www.rsa.com/rsalabs/node.asp?id=2138", |
---|
381 | year = "2013" |
---|
382 | } |
---|
383 | |
---|
384 | |
---|
385 | @Book{ IEEEhowto:bpel, |
---|
386 | title = "Business Process Execution for Web Services BPEL and BPEL4WS", |
---|
387 | author = "Matjaz Juric, Mathew Benny", |
---|
388 | publisher = "Packt Publishing", |
---|
389 | year = "2006", |
---|
390 | } |
---|
391 | |
---|
392 | |
---|
393 | @Article{ IEEEhowto:safet, |
---|
394 | title = "SAFET: Sistema para la generación de aplicaciones de firma electrónica", |
---|
395 | author = "Bravo, V. Araujo A.", |
---|
396 | journal = "Revista Puente", |
---|
397 | year = "2011", |
---|
398 | volume = "6", |
---|
399 | } |
---|
400 | |
---|
401 | |
---|
402 | % referencias capítulo 7 |
---|
403 | |
---|
404 | @Electronic{rlsm:terminology, |
---|
405 | title = "Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology", |
---|
406 | author = "Pfitzmann, A., Hansen, M.", |
---|
407 | howpublished = "http://dud.inf.tu-dresden.de/Anon\_Terminology.shtml", |
---|
408 | year = "2000" |
---|
409 | } |
---|
410 | |
---|
411 | @Article{rlsm:diaz01, |
---|
412 | title = "Towards measuring Anonymity ", |
---|
413 | author = "D\'{\i}az, C., Seys, S., Claessens, J., Preneel, B.", |
---|
414 | journal = "Designing Privacy Enhancing Technologies", |
---|
415 | year = "2002", |
---|
416 | pages = "54--68", |
---|
417 | volume = {}, |
---|
418 | } |
---|
419 | |
---|
420 | @Article{rlsm:serj01, |
---|
421 | title = "Towards an Information Theoretic Metric for Anonymity", |
---|
422 | author = "Serjantov, A., Danezis, G.", |
---|
423 | journal = "Proceedings of Privacy Enhancing Technologies Workshop", |
---|
424 | year = "2002", |
---|
425 | pages = "54--68", |
---|
426 | volume = {}, |
---|
427 | } |
---|
428 | |
---|
429 | |
---|
430 | @Article{ rlsm:chaum-mix, |
---|
431 | title = "Untraceable electronic mail, return addresses, and digital pseudonyms", |
---|
432 | author = "Chaum, D.", |
---|
433 | journal = "Communications of the ACM", |
---|
434 | year = "1981", |
---|
435 | pages = {}, |
---|
436 | volume = "4", |
---|
437 | } |
---|
438 | |
---|
439 | |
---|
440 | @Article{ rlsm:diaz-mixes, |
---|
441 | title = "Generalising Mixes", |
---|
442 | author = "D\'{\i}az, C., Serjantov, A.", |
---|
443 | journal = "Proceedings of Privacy Enhancing Technologies workshop", |
---|
444 | year = "2003", |
---|
445 | pages = "18--31", |
---|
446 | volume = {}, |
---|
447 | } |
---|
448 | |
---|
449 | |
---|
450 | @Article{ rlsm:mixminion, |
---|
451 | title = "Mixminion: Design of a Type III Anonymous Remailer Protocol", |
---|
452 | author = "Danezis, G., Dingledine, R., Mathewson, N.", |
---|
453 | journal = "Proceedings of the 2003 IEEE Symposium on Security and Privacy", |
---|
454 | year = "2003", |
---|
455 | pages = "2--15", |
---|
456 | volume = {}, |
---|
457 | } |
---|
458 | |
---|
459 | @Article{rlsm:tor-design, |
---|
460 | title = "Tor: The Second-Generation Onion Router", |
---|
461 | author = "Dingledine, R., Mathewson, N., Syverson, P.", |
---|
462 | journal = "Proceedings of the 13th USENIX Security Symposium", |
---|
463 | year = "2004", |
---|
464 | pages = {}, |
---|
465 | volume = {}, |
---|
466 | } |
---|
467 | |
---|
468 | |
---|
469 | @Article{rlsm:antnet, |
---|
470 | title = "AntNet: Distributed Stigmergetic Control for Communications Networks", |
---|
471 | author = "Caro, G.D., Dorigo, M.", |
---|
472 | journal = "Journal of Artificial Intelligence Research", |
---|
473 | year = "1998", |
---|
474 | pages = {}, |
---|
475 | volume = {}, |
---|
476 | } |
---|
477 | |
---|
478 | @Article{ rlsm:ants-white, |
---|
479 | title = "Connection Management using Adaptive Mobile Agents", |
---|
480 | author = "White, T., Pagurek, B.", |
---|
481 | journal = "Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications", |
---|
482 | year = "1998", |
---|
483 | pages = "802--809", |
---|
484 | volume = {}, |
---|
485 | } |
---|
486 | |
---|
487 | |
---|
488 | @Article{ rlsm:ants-loadbalancing, |
---|
489 | title = "Ant-Based Load Balancing in Telecommunications Networks", |
---|
490 | author = "Schoonderwoerd, R.", |
---|
491 | journal = "Adaptive Behavior", |
---|
492 | year = "1997", |
---|
493 | pages = "169--207", |
---|
494 | volume = "5", |
---|
495 | } |
---|
496 | |
---|
497 | |
---|
498 | @Article{ rlsm:shannon, |
---|
499 | title = "The mathematical theory for communicactions", |
---|
500 | author = "Shannon, C.", |
---|
501 | journal = "Bell Systems Technical Journal", |
---|
502 | year = "1948", |
---|
503 | pages = "50--64", |
---|
504 | volume = "30", |
---|
505 | } |
---|
506 | |
---|
507 | @Article{rlsm:yuxin, |
---|
508 | title = "Measuring Anonymity with Relative Entropy", |
---|
509 | author = "Deng, Y., Pang, J., Wu, P.", |
---|
510 | journal = "Proceedings of the 4th International Workshop on Formal Aspects in Security and Trust", |
---|
511 | year = "2007", |
---|
512 | pages = "65--79", |
---|
513 | volume = {}, |
---|
514 | } |
---|
515 | |
---|
516 | |
---|
517 | @Article{rlsm:combinatorial, |
---|
518 | title = "A Combinatorial Approach to Measuring Anonymity", |
---|
519 | author = "Edman, M., Sivrikaya, F., Yener, B.", |
---|
520 | journal = "Intelligence and Security Informatics", |
---|
521 | year = "2007", |
---|
522 | pages = "356--363", |
---|
523 | volume = {}, |
---|
524 | } |
---|
525 | |
---|
526 | |
---|
527 | @Article{rlsm:revisiting, |
---|
528 | title = "Revisiting A Combinatorial Approach Toward Measuring Anonymity", |
---|
529 | author = "Gierlichs, B., Troncoso, C., Diaz, C., Preneel, B., Verbauwhede, I.", |
---|
530 | journal = "Workshop on Privacy in the Electronic Society", |
---|
531 | year = "2008", |
---|
532 | pages = "111--116", |
---|
533 | volume = {}, |
---|
534 | } |
---|
535 | |
---|
536 | |
---|
537 | @Article{rlsm:berthold, |
---|
538 | title = "The Disavantages of Free Mix Routes and How to overcome them", |
---|
539 | author = "Berthold, O., Pfitzmann, A., Standtke, R.", |
---|
540 | journal = "Proceedings of Privacy Enhancing Technologies Workshop", |
---|
541 | year = "2001", |
---|
542 | pages = "30--45", |
---|
543 | volume = {}, |
---|
544 | } |
---|
545 | |
---|
546 | |
---|
547 | @Article{ rlsm:reiter, |
---|
548 | title = "Crowds: Anonymity for Web Transactions", |
---|
549 | author = "Reiter, M., Rubin, A.", |
---|
550 | journal = "ACM Transactions on Information and System Security", |
---|
551 | year = "1998", |
---|
552 | pages = {}, |
---|
553 | volume = "1", |
---|
554 | } |
---|
555 | |
---|
556 | |
---|
557 | @Electronic{ rlsm:vernier, |
---|
558 | title = "What are Mean Squared Error and Root Mean Squared Error?.", |
---|
559 | author = "Vernier, D., and Gastineau, J.", |
---|
560 | howpublished = "http://www.vernier.com/til/1014/", |
---|
561 | year = "2011" |
---|
562 | } |
---|
563 | |
---|
564 | |
---|
565 | @Article{ rlsm:jianhua, |
---|
566 | title = "Divergences Measures Based in Shannon Entropy", |
---|
567 | author = "Jianhua, L.", |
---|
568 | journal = "IEEE Transactions on Information Theory", |
---|
569 | year = "1991", |
---|
570 | pages = {}, |
---|
571 | volume = "37", |
---|
572 | number = "1", |
---|
573 | } |
---|
574 | |
---|
575 | % Referencias adicionales del capítulo 3. |
---|
576 | |
---|
577 | @TechReport{ico2006, |
---|
578 | author = {Information Commissioner Office}, |
---|
579 | title = {Data protection technical guidance note: Privacy enhancing technologies (pets)}, |
---|
580 | institution = {Information Commissioner Office}, |
---|
581 | year = {2006}, |
---|
582 | month = {April}, |
---|
583 | } |
---|
584 | |
---|
585 | @TechReport{ONU1948, |
---|
586 | author = {Organización de las Naciones Unidas}, |
---|
587 | title = {Derechos humanos para todos. Declaración Universal de los Derechos humanos}, |
---|
588 | institution = {Organización de las Naciones Unidas}, |
---|
589 | year = {1948} |
---|
590 | } |
---|
591 | |
---|
592 | @phdthesis{george-thesis, |
---|
593 | title = {Better Anonymous Communications}, |
---|
594 | author = {George Danezis}, |
---|
595 | school = {University of Cambridge}, |
---|
596 | year = {2004}, |
---|
597 | month = {July}, |
---|
598 | www_tags = {selected}, |
---|
599 | www_section = {Anonymous communication}, |
---|
600 | www_pdf_url = {http://www.cl.cam.ac.uk/~gd216/thesis.pdf}, |
---|
601 | } |
---|
602 | |
---|
603 | @inproceedings{ISDN-mixes, |
---|
604 | title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}}, |
---|
605 | author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner}, |
---|
606 | booktitle = {Proceedings of the GI/ITG Conference on Communication in Distributed |
---|
607 | Systems}, |
---|
608 | year = {1991}, |
---|
609 | month = {February}, |
---|
610 | pages = {451--463}, |
---|
611 | www_tags = {selected}, |
---|
612 | www_section = {Anonymous communication}, |
---|
613 | www_ps_gz_url = {http://www.semper.org/sirene/publ/PfPW_91TelMixeGI_NTG.ps.gz}, |
---|
614 | } |
---|
615 | |
---|
616 | @inproceedings{esorics04-mauw, |
---|
617 | title = {A formalization of anonymity and onion routing}, |
---|
618 | author = {S. Mauw and J. Verschuren and E.P. de Vink}, |
---|
619 | booktitle = {Proceedings of ESORICS 2004}, |
---|
620 | year = {2004}, |
---|
621 | location = {Sophia Antipolis}, |
---|
622 | pages = {109--124}, |
---|
623 | editor = {P. Samarati and P. Ryan and D. Gollmann and R. Molva}, |
---|
624 | publisher = {LNCS 3193}, |
---|
625 | www_tags = {selected}, |
---|
626 | www_section = {Formal methods}, |
---|
627 | www_pdf_url = {http://www.win.tue.nl/~ecss/downloads/esorics04.pdf}, |
---|
628 | } |
---|
629 | |
---|
630 | @inproceedings{onion-discex00, |
---|
631 | title = {{O}nion {R}outing Access Configurations}, |
---|
632 | author = {Paul Syverson and Michael Reed and David Goldschlag}, |
---|
633 | booktitle = {Proceedings of the DARPA Information Survivability Conference and Exposition |
---|
634 | (DISCEX 2000)}, |
---|
635 | volume = {1}, |
---|
636 | year = {2000}, |
---|
637 | pages = {34--40}, |
---|
638 | publisher = {IEEE CS Press}, |
---|
639 | www_ps_gz_url = {http://www.onion-router.net/Publications/DISCEX-2000.ps.gz}, |
---|
640 | www_tags = {selected}, |
---|
641 | www_abstract_url = {http://www.onion-router.net/Publications.html}, |
---|
642 | www_section = {Anonymous communication}, |
---|
643 | www_pdf_url = {http://www.onion-router.net/Publications/DISCEX-2000.pdf}, |
---|
644 | www_ps_url = {http://www.onion-router.net/Publications/DISCEX-2000.ps}, |
---|
645 | } |
---|
646 | |
---|
647 | @inproceedings{onion-routingpet2000, |
---|
648 | title = {{Towards an Analysis of Onion Routing Security}}, |
---|
649 | author = {Paul Syverson and Gene Tsudik and Michael Reed and Carl Landwehr}, |
---|
650 | booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design |
---|
651 | Issues in Anonymity and Unobservability}, |
---|
652 | year = {2000}, |
---|
653 | month = {July}, |
---|
654 | pages = {96--114}, |
---|
655 | editor = {H. Federrath}, |
---|
656 | publisher = {Springer-Verlag, LNCS 2009}, |
---|
657 | www_important = {1}, |
---|
658 | www_tags = {selected}, |
---|
659 | www_section = {Anonymous communication}, |
---|
660 | www_ps_gz_url = {http://www.onion-router.net/Publications/WDIAU-2000.ps.gz}, |
---|
661 | } |
---|
662 | |
---|
663 | @inproceedings{danezispet2004, |
---|
664 | title = {The Traffic Analysis of Continuous-Time Mixes}, |
---|
665 | author = {George Danezis}, |
---|
666 | booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, |
---|
667 | volume = {3424}, |
---|
668 | year = {2004}, |
---|
669 | month = {May}, |
---|
670 | pages = {35--50}, |
---|
671 | series = {LNCS}, |
---|
672 | www_important = {1}, |
---|
673 | www_tags = {selected}, |
---|
674 | www_section = {Traffic analysis}, |
---|
675 | www_pdf_url = {http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf}, |
---|
676 | } |
---|
677 | |
---|
678 | @inproceedings{timing-fc2004, |
---|
679 | title = {Timing Attacks in Low-Latency Mix-Based Systems}, |
---|
680 | author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew K. Wright}, |
---|
681 | booktitle = {Proceedings of Financial Cryptography (FC '04)}, |
---|
682 | year = {2004}, |
---|
683 | month = {February}, |
---|
684 | pages = {251--265}, |
---|
685 | editor = {Ari Juels}, |
---|
686 | publisher = {Springer-Verlag, LNCS 3110}, |
---|
687 | www_tags = {selected}, |
---|
688 | www_section = {Traffic analysis}, |
---|
689 | www_pdf_url = {http://www.cs.umass.edu/~mwright/papers/levine-timing.pdf}, |
---|
690 | } |
---|
691 | |
---|
692 | @inproceedings{SS03, |
---|
693 | title = {Passive Attack Analysis for Connection-Based Anonymity Systems}, |
---|
694 | author = {Andrei Serjantov and Peter Sewell}, |
---|
695 | booktitle = {Proceedings of ESORICS 2003}, |
---|
696 | year = {2003}, |
---|
697 | month = {October}, |
---|
698 | www_tags = {selected}, |
---|
699 | www_remarks = {An investigation of packet counting attacks (which work best on lightly loaded networks) and connection-start timing attacks.}, |
---|
700 | www_ps_url = {http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps}, |
---|
701 | www_section = {Traffic analysis}, |
---|
702 | } |
---|
703 | |
---|
704 | @inproceedings{flow-correlation04, |
---|
705 | title = {On Flow Correlation Attacks and Countermeasures in Mix Networks}, |
---|
706 | author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao}, |
---|
707 | booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, |
---|
708 | volume = {3424}, |
---|
709 | year = {2004}, |
---|
710 | month = {May}, |
---|
711 | pages = {207--225}, |
---|
712 | series = {LNCS}, |
---|
713 | www_tags = {selected}, |
---|
714 | www_section = {Traffic analysis}, |
---|
715 | www_pdf_url = {http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf}, |
---|
716 | } |
---|
717 | |
---|
718 | @inproceedings{WangCJ05, |
---|
719 | title = {Tracking anonymous peer-to-peer VoIP calls on the internet}, |
---|
720 | author = {Xinyuan Wang and Shiping Chen and Sushil Jajodia}, |
---|
721 | booktitle = {Proceedings of the ACM Conference on Computer and Communications Security}, |
---|
722 | year = {2005}, |
---|
723 | month = {November}, |
---|
724 | pages = {81--91}, |
---|
725 | www_tags = {selected}, |
---|
726 | www_section = {Anonymous communication}, |
---|
727 | www_pdf_url = {http://ise.gmu.edu/~xwangc/Publications/CCS05-VoIPTracking.pdf}, |
---|
728 | } |
---|
729 | |
---|
730 | @inproceedings{e2e-traffic, |
---|
731 | title = {Practical Traffic Analysis: Extending and Resisting Statistical Disclosure}, |
---|
732 | author = {Nick Mathewson and Roger Dingledine}, |
---|
733 | booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, |
---|
734 | volume = {3424}, |
---|
735 | year = {2004}, |
---|
736 | month = {May}, |
---|
737 | pages = {17--34}, |
---|
738 | series = {LNCS}, |
---|
739 | www_important = {1}, |
---|
740 | www_tags = {selected}, |
---|
741 | www_section = {Traffic analysis}, |
---|
742 | www_pdf_url = {http://freehaven.net/doc/e2e-traffic/e2e-traffic.pdf}, |
---|
743 | } |
---|
744 | |
---|
745 | @inproceedings{back01, |
---|
746 | title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems}, |
---|
747 | author = {Adam Back and Ulf M\"oller and Anton Stiglic}, |
---|
748 | booktitle = {Proceedings of Information Hiding Workshop (IH 2001)}, |
---|
749 | year = {2001}, |
---|
750 | month = {April}, |
---|
751 | pages = {245--257}, |
---|
752 | editor = {Ira S. Moskowitz}, |
---|
753 | publisher = {Springer-Verlag, LNCS 2137}, |
---|
754 | www_important = {1}, |
---|
755 | www_tags = {selected}, |
---|
756 | www_section = {Traffic analysis}, |
---|
757 | www_pdf_url = {http://www.cypherspace.org/adam/pubs/traffic.pdf}, |
---|
758 | } |
---|
759 | |
---|
760 | @inproceedings{hs-attack06, |
---|
761 | title = {Locating Hidden Servers}, |
---|
762 | author = {Lasse {\O}verlier and Paul Syverson}, |
---|
763 | booktitle = {Proceedings of the 2006 IEEE Symposium on Security and Privacy}, |
---|
764 | year = {2006}, |
---|
765 | month = {May}, |
---|
766 | publisher = {IEEE CS}, |
---|
767 | www_important = {1}, |
---|
768 | www_tags = {selected}, |
---|
769 | www_pdf_url = {http://www.onion-router.net/Publications/locating-hidden-servers.pdf}, |
---|
770 | www_remarks = {Motivates and describes Tor's entry guard design.}, |
---|
771 | www_section = {Traffic analysis}, |
---|
772 | } |
---|
773 | |
---|
774 | |
---|
775 | @MastersThesis{maestriaRSumoza, |
---|
776 | author = {Rodolfo Sumoza}, |
---|
777 | title = {Sistemas Anónimos en Escenarios Globales}, |
---|
778 | school = {Universidad Complutense de Madrid}, |
---|
779 | year = {2008}, |
---|
780 | } |
---|
781 | |
---|
782 | @inproceedings{traffic_analysis, |
---|
783 | author = {J. F. Raymond}, |
---|
784 | editor = {H. Federrath}, |
---|
785 | title = {Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems}, |
---|
786 | booktitle = {Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability - Springer-Verlag, LNCS}, |
---|
787 | year = {2000}, |
---|
788 | } |
---|
789 | |
---|
790 | @inproceedings{timing_ssh, |
---|
791 | author = {Dawn Xiaodong Song; David Wagner; Xuqing Tian}, |
---|
792 | editor = {USENIX Association}, |
---|
793 | title = {Timing Analysis of Keystrokes and Timing Attacks on SSH}, |
---|
794 | booktitle = {Proceedings of the 10th USENIX Security Symposium}, |
---|
795 | year = {2001}, |
---|
796 | } |
---|
797 | |
---|
798 | @online{cenditel_anonimato, |
---|
799 | author = {Endira Mora et. al}, |
---|
800 | title = {Gestión de Anonimato}, |
---|
801 | year = {2014}, |
---|
802 | url = {https://tibisay.cenditel.gob.ve/gestionanonimato/wiki/PlanDeTrabajo%3A}, |
---|
803 | } |
---|
804 | |
---|
805 | @inproceedings{cebolla, |
---|
806 | title = {{Cebolla: Pragmatic IP Anonymity}}, |
---|
807 | author = {Zach Brown}, |
---|
808 | booktitle = {Proceedings of the 2002 Ottawa Linux Symposium}, |
---|
809 | year = {2002}, |
---|
810 | month = {June}, |
---|
811 | www_tags = {selected}, |
---|
812 | www_pdf_url = {http://cypherspace.org/cebolla/cebolla.pdf}, |
---|
813 | www_remarks = {Written by a former Freedom developer, Cebolla has a UDP-based design |
---|
814 | similar to second-generation Freedom. The initiator incrementally builds her |
---|
815 | circuit, giving her end-to-end forward-secrecy and also better recovery from |
---|
816 | broken nodes.}, |
---|
817 | www_section = {Anonymous communication}, |
---|
818 | } |
---|
819 | |
---|
820 | @Electronic{ SCHNEIER:14, |
---|
821 | title = "Choosing Secure Passwords", |
---|
822 | howpublished = "http://boingboing.net/2014/02/25/choosing-a-secure-password.html", |
---|
823 | year = "2014", |
---|
824 | author = {Bruce Schneier} |
---|
825 | } |
---|
826 | |
---|