source: libros/maquetacion/bibliografia.bib @ 75e105f

Last change on this file since 75e105f was 27df60a, checked in by aaraujo <aaraujo@…>, 10 years ago

Correcciones menores en la bibliografía y en la plantilla del libro impreso y electrónico.

  • Property mode set to 100644
File size: 44.7 KB
Line 
1% Archivo de bibliografia para el libro de seguridad
2
3% referencias capítulo 5
4
5@Book{ NIC:03,
6        author = "R. Nichols and P. C. Lekkas",
7        editor = "McGraw-Hill",
8        title = "Seguridad para comunicaciones inal{\'a}mbricas",
9        publisher = "McGraw-Hill",
10        year = "2003",
11        OPTkey = "",
12        OPTvolume = "",
13        OPTnumber = "",
14        OPTseries = "",
15        OPTaddress = "Mexico",
16        OPTedition = "",
17        OPTmonth = "",
18        OPTnote = "",
19        OPTannote = "",
20        author = "R. Nichols and P. C. Lekkas"
21}
22
23@Book{ ACE:03,
24        author = "Vicente Aceituno Canal",
25        editor = "Noriega Editores",
26        title = "Seguridad de la información",
27        publisher = "Noriega Editores",
28        year = "2003",
29        OPTkey = "",
30        OPTvolume = "",
31        OPTnumber = "",
32        OPTseries = "",
33        OPTaddress = "M'exico D.F., M'exico",
34        OPTedition = "",
35        OPTmonth = "M'exico D.F.",
36        OPTnote = "",
37        OPTannote = "",
38}
39
40@Book{ KURT:01,
41        author = "Kurt Wall et al",
42        editor = "Prentice Hall",
43        title = "Programación en Linux",
44        publisher = "Prentice Hall",
45        year = "2001",
46        OPTkey = "",
47        OPTvolume = "",
48        OPTnumber = "",
49        OPTseries = "",
50        OPTaddress = "Madrid, Espa~na",
51        OPTedition = "",
52        OPTmonth = "",
53        OPTnote = "",
54        OPTannote = "",
55}
56
57@Book{ SARW:03,
58        author = "Sarwar, Koretsky",
59        editor = "Pearson, Prentice Hall",
60        title = "El libro de Linux",
61        publisher = "Prentice Hall",
62        year = "2003",
63        OPTkey = "",
64        OPTvolume = "",
65        OPTnumber = "",
66        OPTseries = "",
67        OPTaddress = "Madrid, Espa~na",
68        OPTedition = "",
69        OPTmonth = "",
70        OPTnote = "",
71        OPTannote = "",
72}
73
74
75@Book{ STRO:02,
76        author = "Bjarne Stroustrup",
77        editor = "Addison Wesley",
78        title = "El lenguaje de programaci{\'o}n C++",
79        publisher = "Addison Wesley",
80        year = "2002",
81        OPTkey = "",
82        OPTvolume = "",
83        OPTnumber = "",
84        OPTseries = "",
85        OPTaddress = "Madrid, Espa{\~n}a",
86        OPTedition = "",
87        OPTmonth = "",
88        OPTnote = "",
89        OPTannote = ""
90}
91
92@Book{ BLAN:06,
93        author = "James Blanchette and Mark Summerfield",
94        editor = "Prentice Hall",
95        title = "C++ GUI Programming with Qt 4",
96        publisher = "Prentice Hall",
97        year = "2006",
98        OPTkey = "",
99        OPTvolume = "",
100        OPTnumber = "",
101        OPTseries = "",
102        OPTaddress = "Massachusetts, USA",
103        OPTedition = "",
104        OPTmonth = "",
105        OPTnote = "",
106        OPTannote = ""
107}
108
109@Book{ STAL:03,
110        author = "William Stallings",
111        editor = "Pearson",
112        title = "Fundamentos de Seguridad de Redes. Aplicaciones y Est{\'a}ndares",
113        publisher = "Prentice Hall",
114        year = "2003",
115        OPTkey = "",
116        OPTvolume = "",
117        OPTnumber = "",
118        OPTseries = "",
119        OPTaddress = "Espa{\~n}a",
120        OPTedition = "2",
121        OPTmonth = "",
122        OPTnote = "",
123        OPTannote = ""
124}
125
126@Book{ PRESS:05,
127        author = "Roger S. Pressman",
128        editor = "Mc Graw-Hill",
129        title = "Ingeniería del software. Un enfoque práctico",
130        publisher = "Mc Graw-Hill",
131        year = "2005",
132        OPTkey = "",
133        OPTvolume = "",
134        OPTnumber = "",
135        OPTseries = "",
136        OPTaddress = "Mexico",
137        OPTedition = "6",
138        OPTmonth = "",
139        OPTnote = "",
140        OPTannote = ""
141}
142
143@Book{ NASH:02,
144        author = "Andrew Nash, William Duane, Celia Joseph and Joseph Brink",
145        editor = "McGraw-Hill",
146        title = "PKI: Infraestructura de clave p{\'u}blica",
147        publisher = "McGraw-Hill",
148        year = "2002",
149        OPTkey = "",
150        OPTvolume = "",
151        OPTnumber = "",
152        OPTseries = "",
153        OPTaddress = "Mexico",
154        OPTedition = "",
155        OPTmonth = "",
156        OPTnote = "",
157        OPTannote = ""
158}
159
160@Book{ RANKL:04,
161        author = "Wolfgang Rankl, Wolfgang Effing",
162        title = "Smart Card Handbook",
163        publisher = "Wiley",
164        year = "2004",
165        OPTkey = "",
166        OPTvolume = "",
167        OPTnumber = "",
168        OPTseries = "",
169        OPTaddress = "Mexico",
170        OPTedition = "3",
171        OPTmonth = "",
172        OPTnote = "",
173        OPTannote = ""
174}
175
176@Article{ PERL:99,
177        author = "R. Perlman",
178        title = "An overview of PKI trust models",
179        journal = "Network, IEEE",
180        year = "1999",
181        OPTkey = "",
182        OPTvolume = "",
183        OPTnumber = "",
184        OPTpages = "",
185        OPTmonth = "",
186        OPTnote = "",
187        OPTannote = ""
188}
189
190@Book{ SCHM:03,
191        title = "Aprendiendo UML en 24 horas",
192        author = "Joseph Schmuller",
193        editor = "Prentice Hall",
194        publisher = "Prentice Hall",
195        year = "2003",
196        address = "M{\'e}xico"
197}
198
199@Book{ VIEG:2002,
200        title = "Network Security with OpenSSL",
201        author = "John Viega and Matt Messier and Pravir Chandra",
202        publisher = "O'Really",
203        edition = "384",
204        year = "2002"
205}
206
207@Book{ BOOC:99,
208        title = "UML Lenguaje Unificado de Modelado",
209        author = "G., Booch",
210        publisher = "Addison Wesley",
211        year = "1999"
212}
213
214@Book{ MULL:97,
215        title = "Modelado de objetos con UML",
216        author = "Alain Pierre-Muller",
217        publisher = "Eyrolles",
218        address = "Barcelona, Espa\~na",
219        year = "1997"
220}
221
222@Book{ PILA:04,
223        title = "Version Control with Subversion ",
224        author = "C. Michael Pilato and Ben Collins-Sussman and Brian W. Fitzpatrick",
225        publisher = "O'Really ",
226        year = "2004"
227}
228
229@Electronic{ XCA:03,
230        title = "{XCA, una interfaz gr\'afica para OpenSSL, Claves p\'ublicas y privadas, certificados, solicitudes y listas de revocación}",
231        howpublished = "http://www.hohnstaedt.de/xca.html",
232        year = "2003",
233        author = {Christian Hohnst\"{a}dt}
234}
235
236@Electronic{ IBM:98,
237        title = "IBM Corporation. An overview of the IBM SET and the IBM CommercePoint Products",
238        howpublished = "http://www.software.ibm.com/commerce/set/overview.html",
239        year = "2003",
240        author = {IBM Corporation}
241}
242
243
244
245@Electronic{ FSF:07,
246        title = "Free Software Definition",
247        howpublished = "http://www.fsf.org/licensing/essays/free-sw.html",
248        year = "2007",
249        author = {}
250}
251
252@Electronic{ TRAC:07,
253        title = "Welcome to the Trac Project",
254        howpublished = "http://trac.edgewall.org/",
255        year = "2007",
256        author = {}
257}
258
259@Book{ TONITO:14,
260        title = "Trasteando con la bibliografía",
261        author = "Antonio Araujo ",
262        editor = "CENDITEL",
263        publisher = "CENDITEL",
264        year = "2014",
265        address = "Mérida"
266}
267
268% referencias capítulo 6
269
270
271@Electronic{ IEEEhowto:espana,
272        title = "Portal del {DNI Electrónico Español}",
273        author = {},
274        howpublished = "http://www.dnielectronico.es/",
275        year = "2012"
276}
277
278@Article{ IEEEhowto:eID,
279        title = "Electronic Identity Cards for User Authentication Promise and Practice",
280        author = "Andreas Poller and Ulrich Waldmann and Sven Vowe and Sven Turpe",
281        journal = "IEEE Security \& Privacy",
282        year = "2013",
283        volume = "10",
284        pages = "46--54"
285}
286
287@Electronic{ IEEEhowto:estonia,
288        title = "Oficial Gateway to {Estonia}",
289        author = {},
290        howpublished = "http://estonia.eu/about-estonia/economy-a-it/e-estonia.html",
291        year = "2013"
292}
293
294
295
296@Book{ IEEEhowto:software,
297        title = "Ingeniería del Software",
298        author = "Campderrich Falgueras",
299        publisher = "Editorial UOC",
300        year = "2003",
301        address = "Barcelona, España"
302}
303
304@Electronic{ IEEEhowto:directiva,
305        title = "DIRECTIVA 1999/93/{CE} DEL {P}ARLAMENTO {E}UROPEO Y DEL {C}ONSEJO",
306        author = {},
307        howpublished = "http://www.cert.fnmt.es/legsoporte/D\_1999\_93\_CE.pdf",
308        year = "1999"
309}
310
311@Electronic{ IEEEhowto:x509,
312        title = "Internet {X.509} {Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile}. {Request for Comments} ({RFC}) 5280",
313        author = {Cooper, D. and Santesson, S. and others},
314        howpublished = "http://www.ietf.org/rfc/rfc5280.txt",
315        year = "2013"
316}
317
318
319@Electronic{ IEEEhowto:pkcs7,
320        title = "{PKCS\#7}. {Cryptographic Message Syntax}",
321        author = {},
322        howpublished = "https://tools.ietf.org/html/rfc2315",
323        year = "2013"
324}
325
326
327@Electronic{ IEEEhowto:pades,
328        title = "{PAdES}. {PDF Advance Electronic Signatures}",
329        author = {ETSI},
330        year = {2013},
331        howpublished = {http://www.etsi.org/deliver/etsi\_ts/102700\_102799/10277801/01.01.01\_60/ts\_10277801 v010101p.pdf},
332}
333
334@Electronic{ IEEEhowto:xmldsig,
335        title = "{XML Signature Syntax and Processing (Second Edition). W3C Recommendation 10 June 2008}",
336        author = {Bartel, M. and Boyer, J. and others},
337        howpublished = "http://www.w3.org/TR/xmldsig-core/",
338        year = "2013"
339}
340
341@Electronic{ IEEEhowto:bdoc,
342        title = "Formato para firmas electrónicas",
343        author = {},
344        howpublished = "http://www.signature.it/-TOOLS/Bdoc-1.0.pdf",
345        year = "2013"
346}
347
348
349@Article{ IEEEhowto:neubauer,
350        title = "Digital signatures with familiar appearance for e-government documents: authentic {PDF}",
351        author = "Neubauer, T. and Weippl, E. and Biffl, S.",
352        journal = "Proceedings of the First International Conference on Availability, Reliability and Security",
353        year = "2006",
354        volume = {},
355        pages = "723--731"
356}
357
358@Book{ IEEEhowto:java,
359        title = "{Professional Java, JDK}",
360        author = "Richardson Clay and Avondolio Donald and others",
361        publisher = "Wrox",
362        year = "2005",
363}
364
365@Electronic{ IEEEhowto:xades,
366        title = "{XML Advanced Electronic Signatures (XAdES)}",
367        author = "Cruellas, J. and Karlinger, G. and others",
368        howpublished = "http://www.w3.org/TR/XAdES/",
369        year = "2003"
370}
371
372@Electronic{ IEEEhowto:mime,
373        title = "{Security Multiparts for MIME. Multipart/Signed and Multipart/Encrypted}",
374        author = "Galvin, J. and Murphy, S. and Crocker, S. and Freed, N.",
375        howpublished = "http://tools.ietf.org/html/rfc1847",
376        year = "2013"
377}
378
379
380@Electronic{ IEEEhowto:pkcs12,
381        title = "{PKCS\#12. Personal Information Exchange Syntax Standard}",
382        author = "{RSA Laboratories}",
383        howpublished = "https://www.rsa.com/rsalabs/node.asp?id=2138",
384        year = "2013"
385}
386
387
388@Book{ IEEEhowto:bpel,
389        title = "{Business Process Execution for Web Services BPEL and BPEL4WS}",
390        author = "Matjaz Juric and Mathew Benny",
391        publisher = "Packt Publishing",
392        year = "2006",
393}
394
395
396@Article{ IEEEhowto:safet,
397        title = "{SAFET: Sistema para la generación de aplicaciones de firma electrónica}",
398        author = "Araujo, A. and Bravo, V.",
399        journal = "Revista Puente",
400        year = "2011",
401        volume = "6",
402}
403
404
405% referencias capítulo 7
406
407@Electronic{rlsm:terminology,
408        title = "Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology",
409        author = "Pfitzmann, A., Hansen, M.",
410        howpublished = "http://dud.inf.tu-dresden.de/Anon\_Terminology.shtml",
411        year = "2000"
412}
413
414@Article{rlsm:diaz01,
415        title = "Towards measuring Anonymity ",
416        author = "D\'{\i}az, C., Seys, S., Claessens, J., Preneel, B.",
417        journal = "Designing Privacy Enhancing Technologies",
418        year = "2002",
419        pages = "54--68",
420        volume = {},
421}
422
423@Article{rlsm:serj01,
424        title = "Towards an Information Theoretic Metric for Anonymity",
425        author = "Serjantov, A., Danezis, G.",
426        journal = "Proceedings of Privacy Enhancing Technologies Workshop",
427        year = "2002",
428        pages = "54--68",
429        volume = {},
430}
431
432
433@Article{ rlsm:chaum-mix,
434        title = "Untraceable electronic mail, return addresses, and digital pseudonyms",
435        author = "Chaum, D.",
436        journal = "Communications of the ACM",
437        year = "1981",
438        pages = {},
439        volume = "4",
440}
441
442
443@Article{ rlsm:diaz-mixes,
444        title = "Generalising Mixes",
445        author = "D\'{\i}az, C., Serjantov, A.",
446        journal = "Proceedings of Privacy Enhancing Technologies workshop",
447        year = "2003",
448        pages = "18--31",
449        volume = {},
450}
451
452
453@Article{ rlsm:mixminion,
454        title = "Mixminion: Design of a Type III Anonymous Remailer Protocol",
455        author = "Danezis, G., Dingledine, R., Mathewson, N.",
456        journal = "Proceedings of the 2003 IEEE Symposium on Security and Privacy",
457        year = "2003",
458        pages = "2--15",
459        volume = {},
460}
461
462@Article{rlsm:tor-design,
463        title = "Tor: The Second-Generation Onion Router",
464        author = "Dingledine, R., Mathewson, N., Syverson, P.",
465        journal = "Proceedings of the 13th USENIX Security Symposium",
466        year = "2004",
467        pages = {},
468        volume = {},
469}
470
471
472@Article{rlsm:antnet,
473        title = "AntNet: Distributed Stigmergetic Control for Communications Networks",
474        author = "Caro, G.D., Dorigo, M.",
475        journal = "Journal of Artificial Intelligence Research",
476        year = "1998",
477        pages = {},
478        volume = {},
479}
480
481@Article{ rlsm:ants-white,
482        title = "Connection Management using Adaptive Mobile Agents",
483        author = "White, T., Pagurek, B.",
484        journal = "Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications",
485        year = "1998",
486        pages = "802--809",
487        volume = {},
488}
489
490
491@Article{ rlsm:ants-loadbalancing,
492        title = "Ant-Based Load Balancing in Telecommunications Networks",
493        author = "Schoonderwoerd, R.",
494        journal = "Adaptive Behavior",
495        year = "1997",
496        pages = "169--207",
497        volume = "5",
498}
499
500
501@Article{ rlsm:shannon,
502        title = "The mathematical theory for communicactions",
503        author = "Shannon, C.",
504        journal = "Bell Systems Technical Journal",
505        year = "1948",
506        pages = "50--64",
507        volume = "30",
508}
509
510@Article{rlsm:yuxin,
511        title = "Measuring Anonymity with Relative Entropy",
512        author = "Deng, Y., Pang, J., Wu, P.",
513        journal = "Proceedings of the 4th International Workshop on Formal Aspects in Security and Trust",
514        year = "2007",
515        pages = "65--79",
516        volume = {},
517}
518
519
520@Article{rlsm:combinatorial,
521        title = "A Combinatorial Approach to Measuring Anonymity",
522        author = "Edman, M., Sivrikaya, F., Yener, B.",
523        journal = "Intelligence and Security Informatics",
524        year = "2007",
525        pages = "356--363",
526        volume = {},
527}
528
529
530@Article{rlsm:revisiting,
531        title = "Revisiting A Combinatorial Approach Toward Measuring Anonymity",
532        author = "Gierlichs, B., Troncoso, C., Diaz, C., Preneel, B., Verbauwhede, I.",
533        journal = "Workshop on Privacy in the Electronic Society",
534        year = "2008",
535        pages = "111--116",
536        volume = {},
537}
538
539
540@Article{rlsm:berthold,
541        title = "The Disavantages of Free Mix Routes and How to overcome them",
542        author = "Berthold, O., Pfitzmann, A., Standtke, R.",
543        journal = "Proceedings of Privacy Enhancing Technologies Workshop",
544        year = "2001",
545        pages = "30--45",
546        volume = {},
547}
548
549
550@Article{ rlsm:reiter,
551        title = "Crowds: Anonymity for Web Transactions",
552        author = "Reiter, M., Rubin, A.",
553        journal = "ACM Transactions on Information and System Security",
554        year = "1998",
555        pages = {},
556        volume = "1",
557}
558
559
560@Electronic{ rlsm:vernier,
561        title = "What are Mean Squared Error and Root Mean Squared Error?.",
562        author = "Vernier, D., and Gastineau, J.",
563        howpublished = "http://www.vernier.com/til/1014/",
564        year = "2011"
565}
566
567
568@Article{ rlsm:jianhua,
569        title = "Divergences Measures Based in Shannon Entropy",
570        author = "Jianhua, L.",
571        journal = "IEEE Transactions on Information Theory",
572        year = "1991",
573        pages = {},
574        volume = "37",
575        number = "1",
576}
577
578% Referencias adicionales del capítulo 3.
579
580@TechReport{ico2006,
581author = {Information Commissioner Office},
582title = {Data protection technical guidance note: Privacy enhancing technologies (pets)},
583institution = {Information Commissioner Office},
584year = {2006},
585month = {April},
586}
587
588@TechReport{ONU1948,
589author = {Organización de las Naciones Unidas},
590title = {Derechos humanos para todos. Declaración Universal de los Derechos humanos},
591institution = {Organización de las Naciones Unidas},
592year = {1948}
593}
594
595@phdthesis{george-thesis,
596  title = {Better Anonymous Communications},
597  author = {George Danezis},
598  school = {University of Cambridge},
599  year = {2004},
600  month = {July},
601  www_tags = {selected},
602  www_section = {Anonymous communication},
603  www_pdf_url = {http://www.cl.cam.ac.uk/~gd216/thesis.pdf},
604}
605
606@inproceedings{ISDN-mixes,
607  title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},
608  author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},
609  booktitle = {Proceedings of the GI/ITG Conference on Communication in Distributed
610        Systems},
611  year = {1991},
612  month = {February},
613  pages = {451--463},
614  www_tags = {selected},
615  www_section = {Anonymous communication},
616  www_ps_gz_url = {http://www.semper.org/sirene/publ/PfPW_91TelMixeGI_NTG.ps.gz},
617}
618
619@inproceedings{esorics04-mauw,
620  title = {A formalization of anonymity and onion routing},
621  author = {S. Mauw and J. Verschuren and E.P. de Vink},
622  booktitle = {Proceedings of ESORICS 2004},
623  year = {2004},
624  location = {Sophia Antipolis},
625  pages = {109--124},
626  editor = {P. Samarati and P. Ryan and D. Gollmann and R. Molva},
627  publisher = {LNCS 3193},
628  www_tags = {selected},
629  www_section = {Formal methods},
630  www_pdf_url = {http://www.win.tue.nl/~ecss/downloads/esorics04.pdf},
631}
632
633@inproceedings{onion-discex00,
634  title = {{O}nion {R}outing Access Configurations},
635  author = {Paul Syverson and Michael Reed and David Goldschlag},
636  booktitle = {Proceedings of the DARPA Information Survivability Conference and Exposition
637        (DISCEX 2000)},
638  volume = {1},
639  year = {2000},
640  pages = {34--40},
641  publisher = {IEEE CS Press},
642  www_ps_gz_url = {http://www.onion-router.net/Publications/DISCEX-2000.ps.gz},
643  www_tags = {selected},
644  www_abstract_url = {http://www.onion-router.net/Publications.html},
645  www_section = {Anonymous communication},
646  www_pdf_url = {http://www.onion-router.net/Publications/DISCEX-2000.pdf},
647  www_ps_url = {http://www.onion-router.net/Publications/DISCEX-2000.ps},
648}
649
650@inproceedings{onion-routingpet2000,
651  title = {{Towards an Analysis of Onion Routing Security}},
652  author = {Paul Syverson and Gene Tsudik and Michael Reed and Carl Landwehr},
653  booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design
654        Issues in Anonymity and Unobservability},
655  year = {2000},
656  month = {July},
657  pages = {96--114},
658  editor = {H. Federrath},
659  publisher = {Springer-Verlag, LNCS 2009},
660  www_important = {1},
661  www_tags = {selected},
662  www_section = {Anonymous communication},
663  www_ps_gz_url = {http://www.onion-router.net/Publications/WDIAU-2000.ps.gz},
664}
665
666@inproceedings{danezispet2004,
667  title = {The Traffic Analysis of Continuous-Time Mixes},
668  author = {George Danezis},
669  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
670  volume = {3424},
671  year = {2004},
672  month = {May},
673  pages = {35--50},
674  series = {LNCS},
675  www_important = {1},
676  www_tags = {selected},
677  www_section = {Traffic analysis},
678  www_pdf_url = {http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf},
679}
680
681@inproceedings{timing-fc2004,
682  title = {Timing Attacks in Low-Latency Mix-Based Systems},
683  author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew K. Wright},
684  booktitle = {Proceedings of Financial Cryptography (FC '04)},
685  year = {2004},
686  month = {February},
687  pages = {251--265},
688  editor = {Ari Juels},
689  publisher = {Springer-Verlag, LNCS 3110},
690  www_tags = {selected},
691  www_section = {Traffic analysis},
692  www_pdf_url = {http://www.cs.umass.edu/~mwright/papers/levine-timing.pdf},
693}
694
695@inproceedings{SS03,
696  title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
697  author = {Andrei Serjantov and Peter Sewell},
698  booktitle = {Proceedings of ESORICS 2003},
699  year = {2003},
700  month = {October},
701  www_tags = {selected},
702  www_remarks = {An investigation of packet counting attacks (which work best on lightly loaded networks) and connection-start timing attacks.},
703  www_ps_url = {http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps},
704  www_section = {Traffic analysis},
705}
706
707@inproceedings{flow-correlation04,
708  title = {On Flow Correlation Attacks and Countermeasures in Mix Networks},
709  author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao},
710  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
711  volume = {3424},
712  year = {2004},
713  month = {May},
714  pages = {207--225},
715  series = {LNCS},
716  www_tags = {selected},
717  www_section = {Traffic analysis},
718  www_pdf_url = {http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf},
719}
720
721@inproceedings{WangCJ05,
722  title = {Tracking anonymous peer-to-peer VoIP calls on the internet},
723  author = {Xinyuan Wang and Shiping Chen and Sushil Jajodia},
724  booktitle = {Proceedings of the ACM Conference on Computer and Communications Security},
725  year = {2005},
726  month = {November},
727  pages = {81--91},
728  www_tags = {selected},
729  www_section = {Anonymous communication},
730  www_pdf_url = {http://ise.gmu.edu/~xwangc/Publications/CCS05-VoIPTracking.pdf},
731}
732
733@inproceedings{e2e-traffic,
734  title = {Practical Traffic Analysis: Extending and Resisting Statistical Disclosure},
735  author = {Nick Mathewson and Roger Dingledine},
736  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
737  volume = {3424},
738  year = {2004},
739  month = {May},
740  pages = {17--34},
741  series = {LNCS},
742  www_important = {1},
743  www_tags = {selected},
744  www_section = {Traffic analysis},
745  www_pdf_url = {http://freehaven.net/doc/e2e-traffic/e2e-traffic.pdf},
746}
747
748@inproceedings{back01,
749  title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
750  author = {Adam Back and Ulf M\"oller and Anton Stiglic},
751  booktitle = {Proceedings of Information Hiding Workshop (IH 2001)},
752  year = {2001},
753  month = {April},
754  pages = {245--257},
755  editor = {Ira S. Moskowitz},
756  publisher = {Springer-Verlag, LNCS 2137},
757  www_important = {1},
758  www_tags = {selected},
759  www_section = {Traffic analysis},
760  www_pdf_url = {http://www.cypherspace.org/adam/pubs/traffic.pdf},
761}
762
763@inproceedings{hs-attack06,
764  title = {Locating Hidden Servers},
765  author = {Lasse {\O}verlier and Paul Syverson},
766  booktitle = {Proceedings of the 2006 IEEE Symposium on Security and Privacy},
767  year = {2006},
768  month = {May},
769  publisher = {IEEE CS},
770  www_important = {1},
771  www_tags = {selected},
772  www_pdf_url = {http://www.onion-router.net/Publications/locating-hidden-servers.pdf},
773  www_remarks = {Motivates and describes Tor's entry guard design.},
774  www_section = {Traffic analysis},
775}
776
777
778@MastersThesis{maestriaRSumoza,
779author = {Rodolfo Sumoza},
780title = {Sistemas Anónimos en Escenarios Globales},
781school = {Universidad Complutense de Madrid},
782year = {2008},
783}
784
785@inproceedings{traffic_analysis,
786author = {J. F. Raymond},
787editor = {H. Federrath},
788title = {Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems},
789booktitle = {Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability - Springer-Verlag, LNCS},
790year = {2000},
791}
792
793@inproceedings{timing_ssh,
794author = {Dawn Xiaodong Song; David Wagner; Xuqing Tian},
795editor = {USENIX Association},
796title = {Timing Analysis of Keystrokes and Timing Attacks on SSH},
797booktitle = {Proceedings of the 10th USENIX Security Symposium},
798year = {2001},
799}
800
801@Electronic{cenditel_anonimato,
802author = {Endira Mora et. al},
803title = {Gestión de Anonimato},
804year = {2014},
805howpublished = {https://tibisay.cenditel.gob.ve/gestionanonimato/wiki/PlanDeTrabajo%3A},
806}
807
808@inproceedings{cebolla,
809  title = {{Cebolla: Pragmatic IP Anonymity}},
810  author = {Zach Brown},
811  booktitle = {Proceedings of the 2002 Ottawa Linux Symposium},
812  year = {2002},
813  month = {June},
814  www_tags = {selected},
815  www_pdf_url = {http://cypherspace.org/cebolla/cebolla.pdf},
816  www_remarks = {Written by a former Freedom developer, Cebolla has a UDP-based design
817        similar to second-generation Freedom. The initiator incrementally builds her
818        circuit, giving her end-to-end forward-secrecy and also better recovery from
819        broken nodes.},
820  www_section = {Anonymous communication},
821}
822
823@Electronic{ SCHNEIER:14,
824        title = "Choosing Secure Passwords",
825        howpublished = "http://boingboing.net/2014/02/25/choosing-a-secure-password.html",
826        year = "2014",
827        author = {Bruce Schneier}
828}
829
830% referencias capitulo 4
831
832@online{CHALBAUD:13,
833        author = {Chalbaud, R.},
834        title = {Derechos Humanos y su protección Constitucional},
835        year = {2013},
836        url = {http},
837}
838
839@Article{ OBERTO-GOVEA,
840        title = {Algunas Consideraciones sobre {Habeas Data}},
841        author = "Oberto, M., Govea, M.",
842        journal = "Revista Telematique",
843        year = "2008",
844        pages = {},
845        volume = "7",
846        number = "3",
847}
848
849@online{UTAH:2014,
850        author = {Horacio Fernandez Delpech},
851        title = {Ley del Estado de {Utah} sobre la {Firma Digital}. {Código Comentado. Título 46, Capítulo 3}},
852        year = {1996},
853        url = {http://www.hfernandezdelpech.com.ar/LegislacionYproExtEEEUUELeyEstadoUtahFirmaDig.htm},
854}
855
856
857
858
859@Book{ PAREDES:2008,
860        title = "Transformación de la cultura de servicios de información: una visión legal y de tecnologías",
861        author = "Paredes, A.",
862        publisher = "",
863        year = "2008",
864}
865
866@Book{ SALAZAR,
867        title = "Habeas Data en el derecho Comparado",
868        author = "Salazar, E.",
869        publisher = "",
870        year = "2008",
871}
872
873@Book{ OBERTO-GUERRERO,
874        title = "Algunas consideraciones sobre Habeas Data en Venezuela",
875        author = "Oberto y Guerrero",
876        publisher = "",
877        year = "2008",
878}
879
880@Book{ ZAGARRA:2010,
881        title = "Marco Legal de las Tecnologías de la Información y comunicación",
882        author = "Zagarra R. Marco",
883        publisher = "",
884        year = "2010",
885}
886
887
888@Book{ FUENTES:2007,
889        title = "Marco Legal de la Informática y la computación",
890        author = "Fuentes, F.",
891        publisher = "Vadell Hermanos",
892        year = "2007",
893        country="Venezuela",
894}
895
896@Electronic{UNIVERSIDADABIERTA:MEXICO,
897        author = {Beatriz Di Totto},
898        title = {Delitos Informáticos},
899        year = {},
900        howpublished = {http://www.universidadabierta.edu.mx},
901       
902}
903@Electronic{Bracho:2010,
904        author = {Pedro Bracho},
905        title = {Jurísprudencia. {Concepto y Características}},
906        year = {2010},
907        howpublished = {http://es.scribd.com/doc/81250967/JURISPRUDENCIA-Concepto-y-Caracteristicas},
908       
909}
910@Electronic{TIPOSPENALES:2014,
911        author = {René De Sola},
912        title = {Los tipos penales en la {Ley Especial contra Delitos Informáticos}},
913        year = {},
914        howpublished = {http://beatrizditotto.net/2010/01/01/introduccion/},
915        urldate = {01-08-2014}
916}
917
918
919@Book{ LOGRERIA:2008,
920        title = "Análisis critico de la tipicidad prevista en algunos artículos de la {Ley Especial Contra Delitos Informáticos Venezolana}",
921        author = "Logreria, C., Fuentes F.",
922        publisher = "Revista Electrónica de Estudios Telemáticos URBE",
923        year = "2008",
924        country="Venezuela",
925}
926
927@Book{ PENARANDA:2011,
928        title = "{La Firma Electrónica Digital en Venezuela}",
929        author = "Peñaranda, H., Héctor R.",
930        publisher = "Universidad del Zulia",
931        year = "2011",
932        country="Venezuela",
933}
934
935
936@Book{ ODREMAN:2003,
937        title = "{Eficacia Probatoria del mensaje de datos y de la Firma electrónica según la nueva Ley de Mensaje de Datos y Firmas Electrónicas}",
938        author = "Odreman, G.",
939        publisher = "UCAB",
940        year = "2003",
941        country="Venezuela",
942}
943
944
945@Book{ LONRENZETTI:2000,
946        title = "{Comercio Electrónico}",
947        author = "Lonrenzetti, R.",
948        publisher = "Abeledo-Perrot",
949        year = "2000",
950        country="Argentina",
951}
952
953@Book{ URDANETA:2010,
954        title = "{Los Mensajes de Datos y la Firma Electrónica (Seguridad Jurídica que ofrecen y Valor Probatorio)}",
955        author = "Urdaneta B., José V.",
956        publisher = "",
957        year = "2010",
958        country="Venezuela",
959}
960
961@Book{ RONDON,
962        title = "{Comentarios generales al Decreto ley de Mensaje de  Datos y Firmas electrónicas de la República Bolivariana de Venezuela}",
963        author = "Rondón, A.",
964        publisher = "",
965        year = "0000",
966        country="Venezuela",
967}
968
969@online{LEYMODELOCNUDMI:1996,
970        author = {Comisión de las Naciones Unidas para el Derecho Mercantil Internacional},
971        title = {{Ley Modelo de la CNUDMI sobre Comercio Electrónico con la Guía para su incorporación al derecho interno}},
972        year = {1996},
973        url = {http://www.uncitral.org/pdf/spanish/texts/electcom/05-89453_S_Ebook.pdf},
974}
975
976@Article{CLIC:13,
977        title = "{Ley de Infogobierno}",
978        author = "Montilla, M. and Roca, S.",
979        journal = "Revista El Clic",
980        year = "2013",
981        pages = "",
982        volume = "6",
983}
984
985@online{GOBIERNOELECTRONICOENVENEZUELA,
986        author = {UCV},
987        title = {Gobierno Eelctrónico},
988        year = {2014},
989        url = {},
990}
991
992@Book{ COLINA:05,
993        title = "Seducir y Controlar.",
994        author = "Colina, C.",
995        publisher = "UCV",
996        year = "2005",
997        country="Venezuela",
998}
999
1000@Article{CRISTOS:03,
1001        title = "{Privacidad y Protección de Datos Personales en Internet, ¿Es necesario contar con una regulación específica en México?}",
1002        author = "Cristos Velasco",
1003        journal = "Boletín de Política Informática I",
1004        year = "2003",
1005        pages = "",
1006        volume = "",
1007}
1008
1009@Book{ FLORES:09,
1010        title = "Derecho Informático.",
1011        author = "Flores, L.",
1012        publisher = "Grupo Editorial Patria",
1013        year = "2009",
1014        country="México",
1015}
1016
1017@Book{ GAMBA:10,
1018        title = "Panorama del derecho Informático en América Latina y el Caribe.",
1019        author = "Gamba, J.",
1020        publisher = "CEPAL",
1021        year = "2010",
1022        country="",
1023}
1024
1025
1026
1027
1028
1029
1030% referencias del prologo
1031
1032@Article{GOMARA:07,
1033        title = "Frankenstein, un espejo de la identidad humana",
1034        author = "Ramalle Gómara, E.",
1035        journal = "Berceo",
1036        year = "2007",
1037        pages = "81-96",
1038        volume = "153",
1039}
1040
1041@Electronic{BOLIVAR:1819,
1042        author = "Bolívar, S.",
1043        title = "{Discurso ante el Congreso de Angostura el 15 de Febrero de 1819}",
1044        year = "1819",
1045        howpublished = {http://es.wikisource.org/},
1046}
1047
1048@Book{ ANDERSON:1983,
1049        title = "Imagined Communities. Reflections on the Origin and Spread of Nationalism.",
1050        author = "Anderson, B.",
1051        publisher = "Verso",
1052        year = "1998",
1053        country="EE.UU.",
1054        address="New York"
1055}
1056
1057
1058@Book{ MACINTYRE:1981,
1059        title = "After Virtue. A Study in Moral Theory.",
1060        author = "MacIntyre, A",
1061        publisher = "University of Notre Dame Press",
1062        address = "Indiana",
1063        year = "1984",
1064        country="EE.UU."
1065}
1066
1067
1068@Book{ ARENDT:1958,
1069        title = "The Human Condition.",
1070        author = "Arendt, H.",
1071        publisher = "The University of Chicago Press",
1072        year = "1998",
1073        country="EE.UU."
1074}
1075
1076@online{SHELLEY:1818,
1077        author = {Shelley, M.},
1078        title = {Frankenstein o el Moderno Prometeo},
1079        year = {2004},
1080        url = {http://www.librosenred.com/},
1081        translator = {La edición no menciona el nombre del traductor}
1082}
1083
1084@Book{ IDENTIDADDIGITAL:2014,
1085        title = "Seguridad Informática y la Identidad Digital",
1086        author = "Araujo, A., Bravo, V., Sumoza, R.",
1087        publisher = "Centro Nacional de Desarrollo e Investigación en Tecnologías Libres",
1088        year = "2014",
1089        country="Venezuela"
1090}
1091
1092@Book{ MATTHEWS:2008,
1093        title = "Identity and Information Technology. En Information Technology and Moral Philosophy",
1094        author = "Matthews, S.",
1095        publisher = "Cambridge",
1096        year = "2006",
1097        country="EE.UU."
1098}
1099
1100
1101@Book{ NAIM:2006,
1102        title = "Ilícito. Cómo traficantes, contrabandistas y piratas están cambiando el mundo.",
1103        author = "Naím, M.",
1104        publisher = "Debate",
1105        year = "2006",
1106        country="Caracas, Venezuela",
1107        translator = "Francisco Ramos"
1108}
1109
1110@Book{ ETZIONI:1999,
1111        title = "The Limits of Privacy",
1112        author = "Etzioni, A.",
1113        publisher = "Basic Book",
1114        year = "2006",
1115        country="New York, EE.UU."
1116}
1117
1118
1119@Article{FUENMAYOR:1991,
1120        title = "The Roots of Reductionism: a Counter-Ontoepistemology for a Systems Approach",
1121        author = "Fuenmayor, R.",
1122        journal = "Systems Practice",
1123        year = "1991",
1124        pages = "",
1125        volume = "4",
1126}
1127
1128@Book{ PETTIT:2008,
1129        title = "Trust, reliance and the internet. En Information Technology and Moral Philosophy",
1130        author = "Pettit, P.",
1131        publisher = "Cambridge",
1132        year = "2008",
1133        country="EE.UU."
1134}
1135
1136@Article{SANDEL:1989,
1137        title = "Moral Argument and Liberal Toleration: Abortion and Homosexuality.",
1138        author = "Sandel, M.",
1139        journal = "California Law Review.",
1140        year = "1989",
1141        pages = "",
1142        volume = "77",
1143}
1144
1145
1146@Article{OHARROW:1998,
1147        title = "Health Plans' Access to Pharmacy Data Raises Concerns about Privacy.",
1148        author = "O'harrow, R.",
1149        journal = "The Seattle Times",
1150        year = "1998",
1151        pages = "",
1152        volume = "",
1153}
1154
1155@Article{MARKOFF:2002,
1156        title = "Pentagon Plans a Computer Systems that Would Peek at Personal Data of Americans.",
1157        author = "Markoff, J.",
1158        journal = "The New York Times",
1159        year = "2002",
1160        pages = "",
1161        volume = "",
1162}
1163
1164@Article{GREENWALD:2013,
1165        title = "NSA collecting phone records of millions of Verizon customers daily.",
1166        author = "Greenwald, G.",
1167        journal = "The Guardian",
1168        year = "2013",
1169        pages = "",
1170        volume = "",
1171}
1172
1173@Book{ GREENWALD:2014,
1174        title = "No Place to Hide. Edward Snowden, the NSA and the Surveillance State.",
1175        author = "Greenwald, G.",
1176        publisher = "Penguin Books Ltd.",
1177        year = "2014",
1178        country="United Kingdom"
1179}
1180
1181@Article{GELLMANSOLTANI:2013,
1182        title = "NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say.",
1183        author = "Gellman, B. y Soltani, A.",
1184        journal = "The Washington Post.",
1185        year = "2013",
1186        pages = "",
1187        volume = "",
1188}
1189
1190@Article{NEWYORKTIMES:2013,
1191        title = "Documents Show N.S.A. Efforts to Spy Both Enemies and Allies.",
1192        author = "New York Times",
1193        journal = "New York Times.",
1194        year = "2013",
1195        pages = "",
1196        volume = "",
1197}
1198
1199
1200@Book{ VANDENHOVEN:2008,
1201        title = "Information Technology, privacy, and the protection of personal data. En Information Technology and Moral Philosophy",
1202        author = "Van den Hoven, J.",
1203        publisher = "Cambridge",
1204        year = "2008",
1205        country="EE.UU."
1206}
1207
1208
1209
1210@Article{RORTY:1996,
1211        title = "Who are we? Moral Universalism and Economic Triage.",
1212        author = "Rorty, R.",
1213        journal = "Segundo Foro de Filosofía de la Unesco",
1214        year = "1996",
1215        pages = "",
1216        volume = "",
1217}
1218
1219
1220% referencias del capitulo 10
1221
1222@Electronic{DRAE:CIBERNETICA,
1223        author = {Real Academia de la Lengua Española},
1224        title = {Diccionario de la Lengua Española (DRAE)},
1225        year = {2001},
1226        howpublished = {http://lema.rae.es/drae/?val=cibernética},
1227}
1228
1229@Book{ WIENER:1998,
1230        title = "Human use of human beings: Cybernetics and society.",
1231        author = "Wiener, N.",
1232        publisher = "Da Capo Press",
1233        year = "1998",
1234        country=""
1235}
1236
1237
1238@Article{BURTSEVA:2013,
1239        title = "Norbert Wiener: Padre de la cibernética.",
1240        author = "Burtseva, L., Tyrsa, V., Ríos, B., Flores, L.",
1241        journal = "Revista UABC",
1242        year = "2013",
1243        pages = "48",
1244        volume = "4",
1245        number = "54",
1246}
1247
1248@Book{ ASHBY:1957,
1249        title = "An introduction to cybernetics",
1250        author = "Ashby, R",
1251        publisher = "Chapman \& Hall",
1252        year = "1957",
1253        country=""
1254}
1255
1256@Book{ GIBSON:1984,
1257        title = "Neuromante",
1258        author = "Gibson, W.",
1259        publisher = "Minotauro",
1260        year = "1984",
1261        country=""
1262}
1263
1264@Article{CICOGNANI:1998,
1265        title = "On the linguistic nature of cyberspace and virtual communities",
1266        author = "Cicognani, A.",
1267        journal = "Virtual reality",
1268        year = "1998",
1269        pages = "20",
1270        volume = "3",
1271        number = "1",
1272}
1273
1274@Article{POST:2013,
1275        title = "Against’Against Cyberanarchy",
1276        author = "Post, D.",
1277        journal = "Berkeley Technology Law Journal",
1278        year = "2002",
1279        pages = "10",
1280        volume = "17",
1281        number = "",
1282}
1283
1284@Article{ANDERS:2001,
1285        title = "Anthropic cyberspace: Defining electronic space from first principles",
1286        author = "Andres, P.",
1287        journal = "Leonardo",
1288        year = "2001",
1289        pages = "405",
1290        volume = "34",
1291        number = "5",
1292}
1293
1294
1295@Article{FLORES:2012,
1296        title = "Los Ámbitos no Terrestres en la Guerra Futura: Ciberespacio",
1297        author = "Flores, H.",
1298        journal = "Centro Superior de Estudios de la Defensa Nacional Monografías del Ceseden",
1299        year = "2012",
1300        pages = "18",
1301        volume = "",
1302        number = "128",
1303}
1304
1305@Article{FRITZ:2013,
1306        title = "The Semantics of Cyber Warfare",
1307        author = "Fritz, J.",
1308        journal = "East Asia Security Symposium and Conference",
1309        year = "2013",
1310        pages = "2",
1311        volume = "1",
1312        number = "7",
1313}
1314
1315
1316@Book{ WINTERFELD:2012,
1317        title = "The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice",
1318        author = "Winterfeld, S., Andress, J.",
1319        publisher = "Elsevier Inc.",
1320        year = "2012",
1321        country=""
1322}
1323
1324@Article{MCGRAW:2013,
1325        title = "Cyber War is Inevitable (Unless We Build Security In)",
1326        author = "McGraw, G.",
1327        journal = "Journal of Strategic Studies",
1328        year = "2013",
1329        pages = "111--112",
1330        volume = "36",
1331        number = "1",
1332}
1333
1334@inproceedings{ALI:2013,
1335author = {Kostyuk N. and Alí M.},
1336editor = {The Society of Digital Information and Wireless Communication},
1337title = {The Cyber Dogs of War: Joint Efforts of Future World Leaders in The Prevention of Cyberwarfare},
1338booktitle = {The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013)},
1339year = {2013},
1340}
1341
1342@Article{LEWIS:2010,
1343        title = "The cyber war has not begun",
1344        author = "Lewis, J.",
1345        journal = "Center for Strategic and International Studies",
1346        year = "2010",
1347        pages = "",
1348        volume = "",
1349        number = "",
1350}
1351
1352@Article{FERRERO:2013,
1353        title = "La Ciberguerra. Génesis y Evolución",
1354        author = "Ferrero, J.",
1355        journal = "Revista General de Marina",
1356        year = "2013",
1357        pages = "87",
1358        volume = "",
1359        number = "Enero-Febrero",
1360}
1361
1362@Article{KIRAVUO:2013,
1363        title = "Offensive Cyber-capabilities against Critical Infrastructure",
1364        author = "Kiravuo, T.",
1365        journal = "Cyber Warfare. National Defence University. Department of Military Technology",
1366        year = "2013",
1367        pages = "90",
1368        volume = "",
1369        number = "34",
1370}
1371
1372@Article{FOJON:2011,
1373        title = "Ciberespacio: La Nueva Dimensión del Entorno Operativo",
1374        author = "Sanz, A., Fojón, E.",
1375        journal = "Centro Superior de Estudios de la Defensa Nacional Monografías del Ceseden",
1376        year = "2011",
1377        pages = "43",
1378        volume = "",
1379        number = "44",
1380}
1381
1382@Article{SALMINEN:2013,
1383        title = "The Fog of Cyber Defence",
1384        author = "Rantapelkonen, J., Salminen, M.",
1385        journal = "National Defence University. Department of Leadership and Military Pedagogy",
1386        year = "2013",
1387        pages = "11",
1388        volume = "",
1389        number = "2",
1390}
1391
1392
1393
1394@Article{STARR:2009,
1395        title = "Towards an Evolving Theory of Cyberpower",
1396        author = "Starr, S.",
1397        journal = "The Virtual Battlefield: Perspectives on Cyber Warfare",
1398        year = "2013",
1399        pages = "22--24",
1400        volume = "3",
1401        number = "",
1402}
1403
1404@Article{OLSON:2012,
1405        title = "El boxeo con un contrincante imaginario. La guerra cibernética y el ataque económico estratégico",
1406        author = "Olson, S.",
1407        journal = "Military Review",
1408        year = "2012",
1409        pages = "67",
1410        volume = "",
1411        number = "Noviembre-Diciembre",
1412}
1413
1414@Article{COLOM:2009,
1415        title = "El nuevo concepto estadounidense para el empleo de la fuerza militar",
1416        author = "Colom, G.",
1417        journal = "ARI: Seguridad y Defensa",
1418        year = "2009",
1419        pages = "2",
1420        volume = "",
1421        number = "70",
1422}
1423
1424
1425@Electronic{DoD:2012,
1426        author = {Panetta, L.},
1427        title = {Remarks by Secretary Panetta on Cybersecurity to the Business Executives for National Security},
1428        year = {2012},
1429        howpublished = {http://www.defense.gov/transcripts/transcript.aspx?transcriptid=5136},
1430}
1431
1432@Electronic{CHINESE:2013,
1433        author = {Chinese People's Liberation Army},
1434        title = {Pentagon's cyberattack accusations irresponsible: expert},
1435        year = {2013},
1436        howpublished = {http://eng.chinamil.com.cn/news-channels/pla-daily-commentary/2013-05/08/content\_5333521.htm},
1437}
1438
1439@Article{STONE:2013,
1440        title = "Cyber War Will Take Place!",
1441        author = "Stone, J.",
1442        journal = "Journal of Strategic Studies",
1443        year = "2013",
1444        pages = "107",
1445        volume = "36",
1446        number = "1",
1447}
1448
1449@Book{ HARRISON:2012,
1450        title = "Cyber Warfare and the Laws of War",
1451        author = "Harrison, H.",
1452        publisher = "Cambridge University Press",
1453        year = "2012",
1454        country=""
1455}
1456
1457@Article{RID:2012,
1458        title = "Cyber war will not take place",
1459        author = "Stone, J.",
1460        journal = "Journal of Strategic Studies",
1461        year = "2013",
1462        pages = "9",
1463        volume = "35",
1464        number = "1",
1465}
1466
1467
1468@Article{JUNIO:2013,
1469        title = "How Probable is Cyber War? Bringing IR Theory Back In to the Cyber Conflict Debate",
1470        author = "Junio, T.",
1471        journal = "Journal of Strategic Studies",
1472        year = "2013",
1473        pages = "130",
1474        volume = "36",
1475        number = "1",
1476}
1477
1478@misc{BEIDLEMAN:2009,
1479    author    = "Beidleman, S.",
1480    title     = "Defining and Deterring Cyber War",
1481    year     = "2009",
1482}
1483
1484@Article{SANCHEZ:2010,
1485        title = "La nueva estrategia comunicativa de los grupos terroristas",
1486        author = "Sánchez, G.",
1487        journal = "Revista Enfoques",
1488        year = "2010",
1489        pages = "203",
1490        volume = "VIII",
1491        number = "12",
1492}
1493
1494@Article{GOLDSMITH:2010,
1495        title = "The New Vulnerability (How Cyber Changes the Laws of War).",
1496        author = "Goldsmith, J.",
1497        journal = "The New Republic",
1498        year = "2010",
1499        pages = "",
1500        volume = "",
1501        number = "",
1502}
1503
1504@Article{BRENNER:2007,
1505        title = "“At light speed”: Attribution and response to cybercrime/terrorism/warfare",
1506        author = "Brenner, S.",
1507        journal = "The Journal of Criminal Law and Criminology",
1508        year = "2007",
1509        pages = "382",
1510        volume = "",
1511        number = "",
1512}
1513
1514@Book{ JANCZEWSKI:2008,
1515        title = "Cyber warfare and cyber terrorism",
1516        author = "Janczewski, L.,  Colarik, A.",
1517        publisher = "IGI Global",
1518        year = "2008",
1519        country=""
1520}
1521
1522@misc{ONU:1945,
1523    author    = "Organización de las Naciones Unidas",
1524    title     = "Carta de las Naciones Unidas. Entrada en vigor: 24 de octubre de 1945, de conformidad con el artículo 110",
1525    year     = "1945",
1526}
1527
1528@Article{HOISINGTON:2009,
1529        title = "Cyberwarfare and the Use of Force Giving Rise to the Right of Self-Defense",
1530        author = "Hoisington, M.",
1531        journal = "Boston College International and Comparative Law Review",
1532        year = "2009",
1533        pages = "446",
1534        volume = "32",
1535        number = "",
1536}
1537
1538@Article{BANKS:2013,
1539        title = "The Role of Counterterrorism Law in Shaping Ad Bellum Norms for Cyber War",
1540        author = "Banks, W.",
1541        journal = "89 INT’L L. STUD. 157. Available at SSRN 2160078",
1542        year = "2013",
1543        pages = "162",
1544        volume = "",
1545        number = "",
1546}
1547
1548
1549
1550@Article{BERNAL:1999,
1551        title = "Mercosur ¿Regionalismo o globalización? Tres aspectos para la decisión de políticas",
1552        author = "Bernal-Meza, R.",
1553        journal = "Revista Realidad Económica",
1554        year = "1999",
1555        pages = "2",
1556        volume = "",
1557        number = "165",
1558}
1559
1560
1561@Article{BIZZOZERO:2011,
1562        title = "América Latina a inicios de la segunda década del siglo XXI: entre el regionalismo estratégico y la regionalización fragmentada",
1563        author = "Bizzozero, Lincoln",
1564        journal = "Revista Brasileira de Política Internacional",
1565        year = "2011",
1566        pages = "36",
1567        volume = "54",
1568        number = "1",
1569}
1570
1571@misc{UNASUR:2008,
1572    author    = "UNASUR",
1573    title     = "Tratado Constitutivo de la Unión de Naciones Suramericanas",
1574    year     = "2008",
1575}
1576
1577@Article{SAINTPIERRE:2008,
1578        title = "El Consejo Sudamericano de Defensa",
1579        author = "Saint-Pierre, H.; Castro, G.",
1580        journal = "Boletín RESDAL",
1581        year = "2008",
1582        pages = "1",
1583        volume = "6",
1584        number = "29",
1585}
1586
1587@Book{ CLAUSEWITZ:2002,
1588        title = "De La Guerra.",
1589        author = "Clausewitz, C.",
1590        publisher = "Editorial Librodot",
1591        year = "2002",
1592        country=""
1593}
1594
1595
1596
1597@Electronic{CDS:2008,
1598        author = {Consejo de Defensa Sudamericano},
1599        title = {Objetivos Consejo de Defensa Suramericano UNASUR},
1600        year = {2008},
1601        howpublished = {http://www.unasursg.org/inicio/organizacion/consejos/cds},
1602}
1603
1604@misc{CEED:2012,
1605    author    = "CEED",
1606    title     = "Informe de Avance a diciembre de 2012 sobre Conceptos e
1607Institucionalidad de Seguridad y Defensa, Amenazas, Factores de Riesgo y Desafíos
1608del Consejo Sudamericano de Defensa",
1609    year     = "2012",
1610}
1611
1612@Article{MENEZES:2010,
1613        author = "Menezes, A.",
1614        title = "Regionalismo y seguridad sudamericana: ¿son relevantes el Mercosur y la Unasur? Íconos",
1615        journal = "Revista de Ciencias Sociales",
1616        year = "2010",
1617        pages = "41--53",
1618        volume = "",
1619        number = "38",
1620}
1621
1622@Electronic{DANTAS:2013,
1623        author = {Dantas, C. y Jeronimo, J.},
1624        title = {Como eles espionam. Istoe.},
1625        year = {2013},
1626        howpublished = {http://www.istoe.com.br/reportagens/paginar/323087\_COMO+ ELES+ESPIONAM/12},
1627}
1628
1629@Article{LIMNELL:2013,
1630        title = "Limnéll, J.",
1631        author = "Offensive Cyber Capabilities are Needed Because of Deterrence",
1632        journal = "The Fog of Cyber Defence",
1633        year = "2013",
1634        pages = "202--205",
1635        volume = "",
1636        number = "10",
1637}
1638
1639@misc{FORTI:2013,
1640    author    = "Forti, A.",
1641    title     = "El papel de la Defensa en una Estrategia Suramericana para el
1642    Aprovechamiento de los Recursos Naturales. Conferencia Suramericana Visiones
1643    Hacia Una Estrategia Para El Aprovechamiento de Los Recursos Naturales",
1644    year     = "2013",
1645}
1646
1647@misc{CDS:2012,
1648    author    = "Consejo de Defensa Sudamericano",
1649    title     = "Plan de Acción 2012 – CDS",
1650    year     = "2012",
1651}
1652
1653@Book{ ZEDONG:1976,
1654        title = "Problemas de la Guerra y de La Estrategia. ",
1655        author = "Zedong, M.",
1656        publisher = "Ediciones En Lenguas Extranjeras Pekín",
1657        year = "1976",
1658        country=""
1659}
1660
1661
1662@Electronic{ZIBECHI:2011,
1663        author = {Zibechi, R.},
1664        title = {La silenciosa revolución suramericana},
1665        year = {2011},
1666        howpublished = {http://www.jornada.unam.mx/2011/12/02/politica/025a1pol},
1667}
1668
1669@Article{HUOPIO:2013,
1670        title = "A Rugged Nation",
1671        author = "Hupio, S.",
1672        journal = "The Fog of Cyber Defence",
1673        year = "2013",
1674        pages = "127",
1675        volume = "",
1676        number = "10",
1677}
1678
1679@Book{ LIANG:1999,
1680        title = "Unrestricted Warfare",
1681        author = "Liang, Q. y Xiangsui, W.",
1682        publisher = "PLA Literature and Arts Publishing House",
1683        year = "1999",
1684        country="China"
1685}
1686
1687
1688@misc{UNASUR:2013,
1689    author    = "UNASUR",
1690    title     = "{VII} Reunión Ordinaria del Consejo de Jefas y Jefes de Estado y de
1691    Gobierno de la Unión de Naciones Suramericanas Declaración de Paramaribo",
1692    year     = "2013",
1693}
1694
1695@Article{KARKKAINEN:2013,
1696        title = "The Origins and the Future of Cyber Security in the Finnish Defence Forces",
1697        author = {K\"arkk\"ainen, A.},
1698        journal = "The Fog of Cyber Defence",
1699        year = "2013",
1700        pages = "",
1701        volume = "",
1702        number = "10",
1703}
1704
1705@misc{UNASUR:2009,
1706    author    = "UNASUR",
1707    title     = "Declaración de Santiago de Chile. Primera Reunión del Consejo de
1708Defensa Suramericano (CDS) de la Unión de Naciones Suramericanas (UNASUR)",
1709    year     = "2009",
1710}
1711
1712@Electronic{TELAM:2014,
1713        author = {Assange, J.},
1714        title = {No hay elección, tenemos que pasarnos al software libre para nuestra mejor protección},
1715        year = {2014},
1716        howpublished = {http://www.telam.com.ar/notas/201409/79058-julian-assan-software-libre-ciberseguridad-espionaje.html},
1717}
1718
1719@Book{ LIDDELL:1946,
1720        title = "La Estrategia de Aproximación Indirecta",
1721        author = "Liddell, B.",
1722        publisher = "Atalaya: Iberia-Joaquín Gil, Editores, S.A.",
1723        year = "1946",
1724        country=""
1725}
1726
1727@Book{LENIN:1973,
1728title = {Vladímir Lenin Obras Tomo XII (1921-1923)},
1729publisher = {PROGRESO},
1730year = {1973},
1731address = {MOSCU},
1732
1733}
1734
1735
1736@Book{NATO:2013,
1737author = {NATO Cooperative Cyber Defence Centre of Excellence Tallinn},
1738title = {Tallinn Manual on the International Law Applicable to Cyber Warfare},
1739publisher = {Schmitt},
1740year = {2013},
1741note = {www.ccdcoe.org/249.html},
1742
1743}
1744
1745@Manual{NSA:2012,
1746title = {Presidential Policy Directive 20},
1747author = {NSA},
1748year = {2012},
1749note = {"https://www.hsdl.org/?abstract\&did=725668"},
1750
1751}
1752
1753@Misc{Infogobierno:2013,
1754author = {Asamblea Nacional},
1755title = {Ley de Infogobierno},
1756howpublished = {Gaceta Oficial de la República Bolivariana de Venezuela Número: 40.274 del 17/10/2013},
1757year = {2013},
1758
1759}
1760
1761@Electronic{NSA:2009,
1762        author = {NSA},
1763        title = {SIGINT Frequently Asked Questions},
1764        year = {2009},
1765        howpublished = {https://www.nsa.gov/sigint/faqs.shtml\#sigint1},
1766}
Note: See TracBrowser for help on using the repository browser.