source: libros/maquetacion/bibliografia.bib @ b430e04

revisionfinal
Last change on this file since b430e04 was 10c2c8e, checked in by Antonio Araujo Brett <aaraujo@…>, 10 years ago

Continuación la corrección de observaciones de la sección de dispositivos de usuario del capítulo 1. Se agrega imagen de tarjeta con interfaz dual.

  • Property mode set to 100644
File size: 20.4 KB
Line 
1% Archivo de bibliografia para el libro de seguridad
2
3
4@Book{ NIC:03,
5        author = "R. Nichols and P. C. Lekkas",
6        editor = "McGraw-Hill",
7        title = "Seguridad para comunicaciones inal{\'a}mbricas",
8        publisher = "McGraw-Hill",
9        year = "2003",
10        OPTkey = "",
11        OPTvolume = "",
12        OPTnumber = "",
13        OPTseries = "",
14        OPTaddress = "Mexico",
15        OPTedition = "",
16        OPTmonth = "",
17        OPTnote = "",
18        OPTannote = "",
19        author = "R. Nichols and P. C. Lekkas"
20}
21
22@Book{ ACE:03,
23        author = "Vicente Aceituno Canal",
24        editor = "Noriega Editores",
25        title = "Seguridad de la informaci'on",
26        publisher = "Noriega Editores",
27        year = "2003",
28        OPTkey = "",
29        OPTvolume = "",
30        OPTnumber = "",
31        OPTseries = "",
32        OPTaddress = "M'exico D.F., M'exico",
33        OPTedition = "",
34        OPTmonth = "M'exico D.F.",
35        OPTnote = "",
36        OPTannote = "",
37}
38
39@Book{ KURT:01,
40        author = "Kurt Wall et al",
41        editor = "Prentice Hall",
42        title = "Programaci'on en Linux",
43        publisher = "Prentice Hall",
44        year = "2001",
45        OPTkey = "",
46        OPTvolume = "",
47        OPTnumber = "",
48        OPTseries = "",
49        OPTaddress = "Madrid, Espa~na",
50        OPTedition = "",
51        OPTmonth = "",
52        OPTnote = "",
53        OPTannote = "",
54}
55
56@Book{ SARW:03,
57        author = "Sarwar, Koretsky",
58        editor = "Pearson, Prentice Hall",
59        title = "El libro de Linux",
60        publisher = "Prentice Hall",
61        year = "2003",
62        OPTkey = "",
63        OPTvolume = "",
64        OPTnumber = "",
65        OPTseries = "",
66        OPTaddress = "Madrid, Espa~na",
67        OPTedition = "",
68        OPTmonth = "",
69        OPTnote = "",
70        OPTannote = "",
71}
72
73
74@Book{ STRO:02,
75        author = "Bjarne Stroustrup",
76        editor = "Addison Wesley",
77        title = "El lenguaje de programaci{\'o}n C++",
78        publisher = "Addison Wesley",
79        year = "2002",
80        OPTkey = "",
81        OPTvolume = "",
82        OPTnumber = "",
83        OPTseries = "",
84        OPTaddress = "Madrid, Espa{\~n}a",
85        OPTedition = "",
86        OPTmonth = "",
87        OPTnote = "",
88        OPTannote = ""
89}
90
91@Book{ BLAN:06,
92        author = "James Blanchette and Mark Summerfield",
93        editor = "Prentice Hall",
94        title = "C++ GUI Programming with Qt 4",
95        publisher = "Prentice Hall",
96        year = "2006",
97        OPTkey = "",
98        OPTvolume = "",
99        OPTnumber = "",
100        OPTseries = "",
101        OPTaddress = "Massachusetts, USA",
102        OPTedition = "",
103        OPTmonth = "",
104        OPTnote = "",
105        OPTannote = ""
106}
107
108@Book{ STAL:03,
109        author = "William Stallings",
110        editor = "Pearson",
111        title = "Fundamentos de Seguridad de Redes. Aplicaciones y Est{\'a}ndares",
112        publisher = "Prentice Hall",
113        year = "2003",
114        OPTkey = "",
115        OPTvolume = "",
116        OPTnumber = "",
117        OPTseries = "",
118        OPTaddress = "Espa{\~n}a",
119        OPTedition = "2",
120        OPTmonth = "",
121        OPTnote = "",
122        OPTannote = ""
123}
124
125@Book{ PRESS:05,
126        author = "Roger S. Pressman",
127        editor = "Mc Graw-Hill",
128        title = "Ingenier'ia del software. Un enfoque pr'actico",
129        publisher = "Mc Graw-Hill",
130        year = "2005",
131        OPTkey = "",
132        OPTvolume = "",
133        OPTnumber = "",
134        OPTseries = "",
135        OPTaddress = "Mexico",
136        OPTedition = "6",
137        OPTmonth = "",
138        OPTnote = "",
139        OPTannote = ""
140}
141
142@Book{ NASH:02,
143        author = "Andrew Nash, William Duane, Celia Joseph and Joseph Brink",
144        editor = "McGraw-Hill",
145        title = "PKI: Infraestructura de clave p{\'u}blica",
146        publisher = "McGraw-Hill",
147        year = "2002",
148        OPTkey = "",
149        OPTvolume = "",
150        OPTnumber = "",
151        OPTseries = "",
152        OPTaddress = "Mexico",
153        OPTedition = "",
154        OPTmonth = "",
155        OPTnote = "",
156        OPTannote = ""
157}
158
159@Book{ RANKL:04,
160        author = "Wolfgang Rankl, Wolfgang Effing",
161        title = "Smart Card Handbook",
162        publisher = "Wiley",
163        year = "2004",
164        OPTkey = "",
165        OPTvolume = "",
166        OPTnumber = "",
167        OPTseries = "",
168        OPTaddress = "Mexico",
169        OPTedition = "3",
170        OPTmonth = "",
171        OPTnote = "",
172        OPTannote = ""
173}
174
175@Article{ PERL:99,
176        author = "R. Perlman",
177        title = "An overview of PKI trust models",
178        journal = "Network, IEEE",
179        year = "1999",
180        OPTkey = "",
181        OPTvolume = "",
182        OPTnumber = "",
183        OPTpages = "",
184        OPTmonth = "",
185        OPTnote = "",
186        OPTannote = ""
187}
188
189@Book{ SCHM:03,
190        title = "Aprendiendo UML en 24 horas",
191        author = "Joseph Schmuller",
192        editor = "Prentice Hall",
193        publisher = "Prentice Hall",
194        year = "2003",
195        address = "M{\'e}xico"
196}
197
198@Book{ VIEG:2002,
199        title = "Network Security with OpenSSL",
200        author = "John Viega and Matt Messier and Pravir Chandra",
201        publisher = "O'Really",
202        edition = "384",
203        year = "2002"
204}
205
206@Book{ BOOC:99,
207        title = "UML Lenguaje Unificado de Modelado",
208        author = "G., Booch",
209        publisher = "Addison Wesley",
210        year = "1999"
211}
212
213@Book{ MULL:97,
214        title = "Modelado de objetos con UML",
215        author = "Alain Pierre-Muller",
216        publisher = "Eyrolles",
217        address = "Barcelona, Espa\~na",
218        year = "1997"
219}
220
221@Book{ PILA:04,
222        title = "Version Control with Subversion ",
223        author = "C. Michael Pilato and Ben Collins-Sussman and Brian W. Fitzpatrick",
224        publisher = "O'Really ",
225        year = "2004"
226}
227
228@Electronic{ XCA:03,
229        title = "XCA, una interfaz gr\'afica para OpenSSL, Clave p\'ublicas y privadas, certificados, solicitudes y listas de revocaci'on",
230        howpublished = "http://www.hohnstaedt.de/xca.html",
231        year = "2003",
232        author = {Christian Hohnst\"{a}dt}
233}
234
235@Electronic{ IBM:98,
236        title = "IBM Corporation. An overview of the IBM SET and the IBM CommercePoint Products",
237        howpublished = "http://www.software.ibm.com/commerce/set/overview.html",
238        year = "2003",
239        author = {IBM Corporation}
240}
241
242
243
244@Electronic{ FSF:07,
245        title = "Free Software Definition",
246        howpublished = "http://www.fsf.org/licensing/essays/free-sw.html",
247        year = "2007",
248        author = {}
249}
250
251@Electronic{ TRAC:07,
252        title = "Welcome to the Trac Project",
253        howpublished = "http://trac.edgewall.org/",
254        year = "2007",
255        author = {}
256}
257
258@Book{ TONITO:14,
259        title = "Trasteando con la bibliografía",
260        author = "Antonio Araujo ",
261        editor = "CENDITEL",
262        publisher = "CENDITEL",
263        year = "2014",
264        address = "Mérida"
265}
266
267
268@Electronic{ IEEEhowto:espana,
269        title = "Portal del DNI Electrónico Español",
270        author = {},
271        howpublished = "http://www.dnielectronico.es/",
272        year = "2012"
273}
274
275@Article{ IEEEhowto:eID,
276        title = "Electronic Identity Cards for User Authentication Promise and Practice",
277        author = "Andreas Poller, Ulrich Waldmann, Sven Vowe, Sven Turpe",
278        journal = "IEEE Security \& Privacy",
279        year = "2013",
280        volume = "10",
281        pages = "46--54"
282}
283
284@Electronic{ IEEEhowto:estonia,
285        title = "Oficial Gateway to Estonia",
286        author = {},
287        howpublished = "http://estonia.eu/about-estonia/economy-a-it/e-estonia.html",
288        year = "2013"
289}
290
291
292
293@Book{ IEEEhowto:software,
294        title = "Ingeniería del Software",
295        author = "Campderrich Falgueras",
296        publisher = "Editorial UOC",
297        year = "2003",
298        address = "Barcelona, España"
299}
300
301@Electronic{ IEEEhowto:directiva,
302        title = "DIRECTIVA 1999/93/CE DEL PARLAMENTO EUROPEO Y DEL CONSEJO",
303        author = {},
304        howpublished = "http://www.cert.fnmt.es/legsoporte/D\_1999\_93\_CE.pdf",
305        year = "1999"
306}
307
308@Electronic{ IEEEhowto:x509,
309        title = "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. Request for Comments (RFC) 5280",
310        author = {Cooper D.,  Santesson S., y otros},
311        howpublished = "http://www.ietf.org/rfc/rfc5280.txt",
312        year = "2013"
313}
314
315
316@Electronic{ IEEEhowto:pkcs7,
317        title = "PKCS\#7.Cryptographic Message Syntax",
318        author = {},
319        howpublished = "https://tools.ietf.org/html/rfc2315",
320        year = "2013"
321}
322
323
324@Electronic{ IEEEhowto:pades,
325        title = "PAdES. PDF Advance Electronic Signatures",
326        author = {},
327        howpublished = "http://www.etsi.org/deliver/etsi\_ts/102700\_102799/10277801/01.01.01\_60/ts\_10277801v010101p.pdf",
328        year = "2013"
329}
330
331@Electronic{ IEEEhowto:xmldsig,
332        title = "XML Signature Syntax and Processing (Second Edition). W3C Recommendation 10 June 2008",
333        author = {Bartel M., Boyer J., y otros},
334        howpublished = "http://www.w3.org/TR/xmldsig-core/",
335        year = "2013"
336}
337
338@Electronic{ IEEEhowto:bdoc,
339        title = "Formato para firmas electrónicas",
340        author = {},
341        howpublished = "http://www.signature.it/-TOOLS/Bdoc-1.0.pdf",
342        year = "2013"
343}
344
345
346@Article{ IEEEhowto:neubauer,
347        title = "Digital signatures with familiar appearance for e-government documents: authentic PDF",
348        author = "Neubauer, T.; Weippl, E.; Biffl, S.",
349        journal = "Proceedings of the First International Conference on Availability, Reliability and Security",
350        year = "2006",
351        volume = {},
352        pages = "723--731"
353}
354
355@Book{ IEEEhowto:java,
356        title = "Professional Java, JDK",
357        author = "Richardson Clay, Avondolio Donald, others",
358        publisher = "Wrox",
359        year = "2005",
360}
361
362@Electronic{ IEEEhowto:xades,
363        title = "XML Advanced Electronic Signatures (XAdES)",
364        author = "Cruellas, J. Karlinger G., y otros",
365        howpublished = "http://www.w3.org/TR/XAdES/",
366        year = "2003"
367}
368
369@Electronic{ IEEEhowto:mime,
370        title = "Security Multiparts for MIME. Multipart/Signed and Multipart/Encrypted",
371        author = "Galvin , J. Murphy, S. Crocker, S. Freed, N.",
372        howpublished = "http://tools.ietf.org/html/rfc1847",
373        year = "2013"
374}
375
376
377@Electronic{ IEEEhowto:pkcs12,
378        title = "PKCS\#12.Personal Information Exchange Syntax Standard.",
379        author = "RSA Laboratories.",
380        howpublished = "https://www.rsa.com/rsalabs/node.asp?id=2138",
381        year = "2013"
382}
383
384
385@Book{ IEEEhowto:bpel,
386        title = "Business Process Execution for Web Services BPEL and BPEL4WS",
387        author = "Matjaz Juric, Mathew Benny",
388        publisher = "Packt Publishing",
389        year = "2006",
390}
391
392
393@Article{ IEEEhowto:safet,
394        title = "SAFET: Sistema para la generación de aplicaciones de firma electrónica",
395        author = "Bravo, V. Araujo A.",
396        journal = "Revista Puente",
397        year = "2011",
398        volume = "6",
399}
400
401
402% referencias capítulo 7
403
404@Electronic{ rlsm:terminology,
405        title = "Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology",
406        author = "Pfitzmann, A., Hansen, M.",
407        howpublished = "http://dud.inf.tu-dresden.de/Anon\_Terminology.shtml",
408        year = "2000"
409}
410
411@Article{ rlsm:diaz01,
412        title = "Towards measuring Anonymity ",
413        author = "D\'{\i}az, C., Seys, S., Claessens, J., Preneel, B.",
414        journal = "Designing Privacy Enhancing Technologies",
415        year = "2002",
416        pages = "54--68",
417        volume = {},
418}
419
420@Article{ rlsm:serj01,
421        title = "Towards an Information Theoretic Metric for Anonymity",
422        author = "Serjantov, A., Danezis, G.",
423        journal = "Proceedings of Privacy Enhancing Technologies Workshop",
424        year = "2002",
425        pages = "54--68",
426        volume = {},
427}
428
429
430@Article{ rlsm:chaum-mix,
431        title = "Untraceable electronic mail, return addresses, and digital pseudonyms",
432        author = "Chaum, D.",
433        journal = "Communications of the ACM",
434        year = "1981",
435        pages = {},
436        volume = "4",
437}
438
439
440@Article{ rlsm:diaz-mixes,
441        title = "Generalising Mixes",
442        author = "D\'{\i}az, C., Serjantov, A.",
443        journal = "Proceedings of Privacy Enhancing Technologies workshop",
444        year = "2003",
445        pages = "18--31",
446        volume = {},
447}
448
449
450@Article{ rlsm:mixminion,
451        title = "Mixminion: Design of a Type III Anonymous Remailer Protocol",
452        author = "Danezis, G., Dingledine, R., Mathewson, N.",
453        journal = "Proceedings of the 2003 IEEE Symposium on Security and Privacy",
454        year = "2003",
455        pages = "2--15",
456        volume = {},
457}
458
459@Article{rlsm:tor-design,
460        title = "Tor: The Second-Generation Onion Router",
461        author = "Dingledine, R., Mathewson, N., Syverson, P.",
462        journal = "Proceedings of the 13th USENIX Security Symposium",
463        year = "2004",
464        pages = {},
465        volume = {},
466}
467
468
469@Article{rlsm:antnet,
470        title = "AntNet: Distributed Stigmergetic Control for Communications Networks",
471        author = "Caro, G.D., Dorigo, M.",
472        journal = "Journal of Artificial Intelligence Research",
473        year = "1998",
474        pages = {},
475        volume = {},
476}
477
478@Article{ rlsm:ants-white,
479        title = "Connection Management using Adaptive Mobile Agents",
480        author = "White, T., Pagurek, B.",
481        journal = "Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications",
482        year = "1998",
483        pages = "802--809",
484        volume = {},
485}
486
487
488@Article{ rlsm:ants-loadbalancing,
489        title = "Ant-Based Load Balancing in Telecommunications Networks",
490        author = "Schoonderwoerd, R.",
491        journal = "Adaptive Behavior",
492        year = "1997",
493        pages = "169--207",
494        volume = "5",
495}
496
497
498@Article{ rlsm:shannon,
499        title = "The mathematical theory for communicactions",
500        author = "Shannon, C.",
501        journal = "Bell Systems Technical Journal",
502        year = "1948",
503        pages = "50--64",
504        volume = "30",
505}
506
507@Article{ rlsm:yuxin,
508        title = "Measuring Anonymity with Relative Entropy",
509        author = "Deng, Y., Pang, J., Wu, P.",
510        journal = "Proceedings of the 4th International Workshop on Formal Aspects in Security and Trust",
511        year = "2007",
512        pages = "65--79",
513        volume = {},
514}
515
516
517@Article{ rlsm:combinatorial,
518        title = "A Combinatorial Approach to Measuring Anonymity",
519        author = "Edman, M., Sivrikaya, F., Yener, B.",
520        journal = "Intelligence and Security Informatics",
521        year = "2007",
522        pages = "356--363",
523        volume = {},
524}
525
526
527@Article{ rlsm:revisiting,
528        title = "Revisiting A Combinatorial Approach Toward Measuring Anonymity",
529        author = "Gierlichs, B., Troncoso, C., Diaz, C., Preneel, B., Verbauwhede, I.",
530        journal = "Workshop on Privacy in the Electronic Society",
531        year = "2008",
532        pages = "111--116",
533        volume = {},
534}
535
536
537@Article{ rlsm:berthold,
538        title = "The Disavantages of Free Mix Routes and How to overcome them",
539        author = "Berthold, O., Pfitzmann, A., Standtke, R.",
540        journal = "Proceedings of Privacy Enhancing Technologies Workshop",
541        year = "2001",
542        pages = "30--45",
543        volume = {},
544}
545
546
547@Article{ rlsm:reiter,
548        title = "Crowds: Anonymity for Web Transactions",
549        author = "Reiter, M., Rubin, A.",
550        journal = "ACM Transactions on Information and System Security",
551        year = "1998",
552        pages = {},
553        volume = "1",
554}
555
556
557@Electronic{ rlsm:vernier,
558        title = "What are Mean Squared Error and Root Mean Squared Error?.",
559        author = "Vernier, D., and Gastineau, J.",
560        howpublished = "http://www.vernier.com/til/1014/",
561        year = "2011"
562}
563
564
565@Article{ rlsm:jianhua,
566        title = "Divergences Measures Based in Shannon Entropy",
567        author = "Jianhua, L.",
568        journal = "IEEE Transactions on Information Theory",
569        year = "1991",
570        pages = {},
571        volume = "37",
572        number = "1",
573}
574
575% Referencias adicionales del capítulo 3.
576
577@TechReport{ico2006,
578author = {Information Commissioner Office},
579title = {Data protection technical guidance note: Privacy enhancing technologies (pets)},
580institution = {Information Commissioner Office},
581year = {2006},
582month = {April},
583}
584
585@TechReport{ONU1948,
586author = {Organización de las Naciones Unidas},
587title = {Derechos humanos para todos. Declaración Universal de los Derechos humanos},
588institution = {Organización de las Naciones Unidas},
589year = {1948}
590}
591
592@phdthesis{george-thesis,
593  title = {Better Anonymous Communications},
594  author = {George Danezis},
595  school = {University of Cambridge},
596  year = {2004},
597  month = {July},
598  www_tags = {selected},
599  www_section = {Anonymous communication},
600  www_pdf_url = {http://www.cl.cam.ac.uk/~gd216/thesis.pdf},
601}
602
603@inproceedings{ISDN-mixes,
604  title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},
605  author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},
606  booktitle = {Proceedings of the GI/ITG Conference on Communication in Distributed
607        Systems},
608  year = {1991},
609  month = {February},
610  pages = {451--463},
611  www_tags = {selected},
612  www_section = {Anonymous communication},
613  www_ps_gz_url = {http://www.semper.org/sirene/publ/PfPW_91TelMixeGI_NTG.ps.gz},
614}
615
616@inproceedings{esorics04-mauw,
617  title = {A formalization of anonymity and onion routing},
618  author = {S. Mauw and J. Verschuren and E.P. de Vink},
619  booktitle = {Proceedings of ESORICS 2004},
620  year = {2004},
621  location = {Sophia Antipolis},
622  pages = {109--124},
623  editor = {P. Samarati and P. Ryan and D. Gollmann and R. Molva},
624  publisher = {LNCS 3193},
625  www_tags = {selected},
626  www_section = {Formal methods},
627  www_pdf_url = {http://www.win.tue.nl/~ecss/downloads/esorics04.pdf},
628}
629
630@inproceedings{onion-discex00,
631  title = {{O}nion {R}outing Access Configurations},
632  author = {Paul Syverson and Michael Reed and David Goldschlag},
633  booktitle = {Proceedings of the DARPA Information Survivability Conference and Exposition
634        (DISCEX 2000)},
635  volume = {1},
636  year = {2000},
637  pages = {34--40},
638  publisher = {IEEE CS Press},
639  www_ps_gz_url = {http://www.onion-router.net/Publications/DISCEX-2000.ps.gz},
640  www_tags = {selected},
641  www_abstract_url = {http://www.onion-router.net/Publications.html},
642  www_section = {Anonymous communication},
643  www_pdf_url = {http://www.onion-router.net/Publications/DISCEX-2000.pdf},
644  www_ps_url = {http://www.onion-router.net/Publications/DISCEX-2000.ps},
645}
646
647@inproceedings{onion-routing:pet2000,
648  title = {{Towards an Analysis of Onion Routing Security}},
649  author = {Paul Syverson and Gene Tsudik and Michael Reed and Carl Landwehr},
650  booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design
651        Issues in Anonymity and Unobservability},
652  year = {2000},
653  month = {July},
654  pages = {96--114},
655  editor = {H. Federrath},
656  publisher = {Springer-Verlag, LNCS 2009},
657  www_important = {1},
658  www_tags = {selected},
659  www_section = {Anonymous communication},
660  www_ps_gz_url = {http://www.onion-router.net/Publications/WDIAU-2000.ps.gz},
661}
662
663@inproceedings{danezis:pet2004,
664  title = {The Traffic Analysis of Continuous-Time Mixes},
665  author = {George Danezis},
666  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
667  volume = {3424},
668  year = {2004},
669  month = {May},
670  pages = {35--50},
671  series = {LNCS},
672  www_important = {1},
673  www_tags = {selected},
674  www_section = {Traffic analysis},
675  www_pdf_url = {http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf},
676}
677
678@inproceedings{timing-fc2004,
679  title = {Timing Attacks in Low-Latency Mix-Based Systems},
680  author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew K. Wright},
681  booktitle = {Proceedings of Financial Cryptography (FC '04)},
682  year = {2004},
683  month = {February},
684  pages = {251--265},
685  editor = {Ari Juels},
686  publisher = {Springer-Verlag, LNCS 3110},
687  www_tags = {selected},
688  www_section = {Traffic analysis},
689  www_pdf_url = {http://www.cs.umass.edu/~mwright/papers/levine-timing.pdf},
690}
691
692@inproceedings{SS03,
693  title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
694  author = {Andrei Serjantov and Peter Sewell},
695  booktitle = {Proceedings of ESORICS 2003},
696  year = {2003},
697  month = {October},
698  www_tags = {selected},
699  www_remarks = {An investigation of packet counting attacks (which work best on lightly loaded networks) and connection-start timing attacks.},
700  www_ps_url = {http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps},
701  www_section = {Traffic analysis},
702}
703
704@inproceedings{flow-correlation04,
705  title = {On Flow Correlation Attacks and Countermeasures in Mix Networks},
706  author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao},
707  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
708  volume = {3424},
709  year = {2004},
710  month = {May},
711  pages = {207--225},
712  series = {LNCS},
713  www_tags = {selected},
714  www_section = {Traffic analysis},
715  www_pdf_url = {http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf},
716}
717
718@inproceedings{WangCJ05,
719  title = {Tracking anonymous peer-to-peer VoIP calls on the internet},
720  author = {Xinyuan Wang and Shiping Chen and Sushil Jajodia},
721  booktitle = {Proceedings of the ACM Conference on Computer and Communications Security},
722  year = {2005},
723  month = {November},
724  pages = {81--91},
725  www_tags = {selected},
726  www_section = {Anonymous communication},
727  www_pdf_url = {http://ise.gmu.edu/~xwangc/Publications/CCS05-VoIPTracking.pdf},
728}
729
730@inproceedings{e2e-traffic,
731  title = {Practical Traffic Analysis: Extending and Resisting Statistical Disclosure},
732  author = {Nick Mathewson and Roger Dingledine},
733  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
734  volume = {3424},
735  year = {2004},
736  month = {May},
737  pages = {17--34},
738  series = {LNCS},
739  www_important = {1},
740  www_tags = {selected},
741  www_section = {Traffic analysis},
742  www_pdf_url = {http://freehaven.net/doc/e2e-traffic/e2e-traffic.pdf},
743}
744
745@inproceedings{back01,
746  title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
747  author = {Adam Back and Ulf M\"oller and Anton Stiglic},
748  booktitle = {Proceedings of Information Hiding Workshop (IH 2001)},
749  year = {2001},
750  month = {April},
751  pages = {245--257},
752  editor = {Ira S. Moskowitz},
753  publisher = {Springer-Verlag, LNCS 2137},
754  www_important = {1},
755  www_tags = {selected},
756  www_section = {Traffic analysis},
757  www_pdf_url = {http://www.cypherspace.org/adam/pubs/traffic.pdf},
758}
759
760@inproceedings{hs-attack06,
761  title = {Locating Hidden Servers},
762  author = {Lasse {\O}verlier and Paul Syverson},
763  booktitle = {Proceedings of the 2006 IEEE Symposium on Security and Privacy},
764  year = {2006},
765  month = {May},
766  publisher = {IEEE CS},
767  www_important = {1},
768  www_tags = {selected},
769  www_pdf_url = {http://www.onion-router.net/Publications/locating-hidden-servers.pdf},
770  www_remarks = {Motivates and describes Tor's entry guard design.},
771  www_section = {Traffic analysis},
772}
Note: See TracBrowser for help on using the repository browser.