source: libros/maquetacion/bibliografia.bib @ dc3f04d

revisionfinal
Last change on this file since dc3f04d was dc3f04d, checked in by aaraujo <aaraujo@…>, 10 years ago

Agregando sección 5 del capítulo 10. Referencias y acrónimos.

  • Property mode set to 100644
File size: 40.9 KB
Line 
1% Archivo de bibliografia para el libro de seguridad
2
3
4@Book{ NIC:03,
5        author = "R. Nichols and P. C. Lekkas",
6        editor = "McGraw-Hill",
7        title = "Seguridad para comunicaciones inal{\'a}mbricas",
8        publisher = "McGraw-Hill",
9        year = "2003",
10        OPTkey = "",
11        OPTvolume = "",
12        OPTnumber = "",
13        OPTseries = "",
14        OPTaddress = "Mexico",
15        OPTedition = "",
16        OPTmonth = "",
17        OPTnote = "",
18        OPTannote = "",
19        author = "R. Nichols and P. C. Lekkas"
20}
21
22@Book{ ACE:03,
23        author = "Vicente Aceituno Canal",
24        editor = "Noriega Editores",
25        title = "Seguridad de la información",
26        publisher = "Noriega Editores",
27        year = "2003",
28        OPTkey = "",
29        OPTvolume = "",
30        OPTnumber = "",
31        OPTseries = "",
32        OPTaddress = "M'exico D.F., M'exico",
33        OPTedition = "",
34        OPTmonth = "M'exico D.F.",
35        OPTnote = "",
36        OPTannote = "",
37}
38
39@Book{ KURT:01,
40        author = "Kurt Wall et al",
41        editor = "Prentice Hall",
42        title = "Programación en Linux",
43        publisher = "Prentice Hall",
44        year = "2001",
45        OPTkey = "",
46        OPTvolume = "",
47        OPTnumber = "",
48        OPTseries = "",
49        OPTaddress = "Madrid, Espa~na",
50        OPTedition = "",
51        OPTmonth = "",
52        OPTnote = "",
53        OPTannote = "",
54}
55
56@Book{ SARW:03,
57        author = "Sarwar, Koretsky",
58        editor = "Pearson, Prentice Hall",
59        title = "El libro de Linux",
60        publisher = "Prentice Hall",
61        year = "2003",
62        OPTkey = "",
63        OPTvolume = "",
64        OPTnumber = "",
65        OPTseries = "",
66        OPTaddress = "Madrid, Espa~na",
67        OPTedition = "",
68        OPTmonth = "",
69        OPTnote = "",
70        OPTannote = "",
71}
72
73
74@Book{ STRO:02,
75        author = "Bjarne Stroustrup",
76        editor = "Addison Wesley",
77        title = "El lenguaje de programaci{\'o}n C++",
78        publisher = "Addison Wesley",
79        year = "2002",
80        OPTkey = "",
81        OPTvolume = "",
82        OPTnumber = "",
83        OPTseries = "",
84        OPTaddress = "Madrid, Espa{\~n}a",
85        OPTedition = "",
86        OPTmonth = "",
87        OPTnote = "",
88        OPTannote = ""
89}
90
91@Book{ BLAN:06,
92        author = "James Blanchette and Mark Summerfield",
93        editor = "Prentice Hall",
94        title = "C++ GUI Programming with Qt 4",
95        publisher = "Prentice Hall",
96        year = "2006",
97        OPTkey = "",
98        OPTvolume = "",
99        OPTnumber = "",
100        OPTseries = "",
101        OPTaddress = "Massachusetts, USA",
102        OPTedition = "",
103        OPTmonth = "",
104        OPTnote = "",
105        OPTannote = ""
106}
107
108@Book{ STAL:03,
109        author = "William Stallings",
110        editor = "Pearson",
111        title = "Fundamentos de Seguridad de Redes. Aplicaciones y Est{\'a}ndares",
112        publisher = "Prentice Hall",
113        year = "2003",
114        OPTkey = "",
115        OPTvolume = "",
116        OPTnumber = "",
117        OPTseries = "",
118        OPTaddress = "Espa{\~n}a",
119        OPTedition = "2",
120        OPTmonth = "",
121        OPTnote = "",
122        OPTannote = ""
123}
124
125@Book{ PRESS:05,
126        author = "Roger S. Pressman",
127        editor = "Mc Graw-Hill",
128        title = "Ingeniería del software. Un enfoque práctico",
129        publisher = "Mc Graw-Hill",
130        year = "2005",
131        OPTkey = "",
132        OPTvolume = "",
133        OPTnumber = "",
134        OPTseries = "",
135        OPTaddress = "Mexico",
136        OPTedition = "6",
137        OPTmonth = "",
138        OPTnote = "",
139        OPTannote = ""
140}
141
142@Book{ NASH:02,
143        author = "Andrew Nash, William Duane, Celia Joseph and Joseph Brink",
144        editor = "McGraw-Hill",
145        title = "PKI: Infraestructura de clave p{\'u}blica",
146        publisher = "McGraw-Hill",
147        year = "2002",
148        OPTkey = "",
149        OPTvolume = "",
150        OPTnumber = "",
151        OPTseries = "",
152        OPTaddress = "Mexico",
153        OPTedition = "",
154        OPTmonth = "",
155        OPTnote = "",
156        OPTannote = ""
157}
158
159@Book{ RANKL:04,
160        author = "Wolfgang Rankl, Wolfgang Effing",
161        title = "Smart Card Handbook",
162        publisher = "Wiley",
163        year = "2004",
164        OPTkey = "",
165        OPTvolume = "",
166        OPTnumber = "",
167        OPTseries = "",
168        OPTaddress = "Mexico",
169        OPTedition = "3",
170        OPTmonth = "",
171        OPTnote = "",
172        OPTannote = ""
173}
174
175@Article{ PERL:99,
176        author = "R. Perlman",
177        title = "An overview of PKI trust models",
178        journal = "Network, IEEE",
179        year = "1999",
180        OPTkey = "",
181        OPTvolume = "",
182        OPTnumber = "",
183        OPTpages = "",
184        OPTmonth = "",
185        OPTnote = "",
186        OPTannote = ""
187}
188
189@Book{ SCHM:03,
190        title = "Aprendiendo UML en 24 horas",
191        author = "Joseph Schmuller",
192        editor = "Prentice Hall",
193        publisher = "Prentice Hall",
194        year = "2003",
195        address = "M{\'e}xico"
196}
197
198@Book{ VIEG:2002,
199        title = "Network Security with OpenSSL",
200        author = "John Viega and Matt Messier and Pravir Chandra",
201        publisher = "O'Really",
202        edition = "384",
203        year = "2002"
204}
205
206@Book{ BOOC:99,
207        title = "UML Lenguaje Unificado de Modelado",
208        author = "G., Booch",
209        publisher = "Addison Wesley",
210        year = "1999"
211}
212
213@Book{ MULL:97,
214        title = "Modelado de objetos con UML",
215        author = "Alain Pierre-Muller",
216        publisher = "Eyrolles",
217        address = "Barcelona, Espa\~na",
218        year = "1997"
219}
220
221@Book{ PILA:04,
222        title = "Version Control with Subversion ",
223        author = "C. Michael Pilato and Ben Collins-Sussman and Brian W. Fitzpatrick",
224        publisher = "O'Really ",
225        year = "2004"
226}
227
228@Electronic{ XCA:03,
229        title = "XCA, una interfaz gr\'afica para OpenSSL, Clave p\'ublicas y privadas, certificados, solicitudes y listas de revocaci'on",
230        howpublished = "http://www.hohnstaedt.de/xca.html",
231        year = "2003",
232        author = {Christian Hohnst\"{a}dt}
233}
234
235@Electronic{ IBM:98,
236        title = "IBM Corporation. An overview of the IBM SET and the IBM CommercePoint Products",
237        howpublished = "http://www.software.ibm.com/commerce/set/overview.html",
238        year = "2003",
239        author = {IBM Corporation}
240}
241
242
243
244@Electronic{ FSF:07,
245        title = "Free Software Definition",
246        howpublished = "http://www.fsf.org/licensing/essays/free-sw.html",
247        year = "2007",
248        author = {}
249}
250
251@Electronic{ TRAC:07,
252        title = "Welcome to the Trac Project",
253        howpublished = "http://trac.edgewall.org/",
254        year = "2007",
255        author = {}
256}
257
258@Book{ TONITO:14,
259        title = "Trasteando con la bibliografía",
260        author = "Antonio Araujo ",
261        editor = "CENDITEL",
262        publisher = "CENDITEL",
263        year = "2014",
264        address = "Mérida"
265}
266
267
268@Electronic{ IEEEhowto:espana,
269        title = "Portal del DNI Electrónico Español",
270        author = {},
271        howpublished = "http://www.dnielectronico.es/",
272        year = "2012"
273}
274
275@Article{ IEEEhowto:eID,
276        title = "Electronic Identity Cards for User Authentication Promise and Practice",
277        author = "Andreas Poller, Ulrich Waldmann, Sven Vowe, Sven Turpe",
278        journal = "IEEE Security \& Privacy",
279        year = "2013",
280        volume = "10",
281        pages = "46--54"
282}
283
284@Electronic{ IEEEhowto:estonia,
285        title = "Oficial Gateway to Estonia",
286        author = {},
287        howpublished = "http://estonia.eu/about-estonia/economy-a-it/e-estonia.html",
288        year = "2013"
289}
290
291
292
293@Book{ IEEEhowto:software,
294        title = "Ingeniería del Software",
295        author = "Campderrich Falgueras",
296        publisher = "Editorial UOC",
297        year = "2003",
298        address = "Barcelona, España"
299}
300
301@Electronic{ IEEEhowto:directiva,
302        title = "DIRECTIVA 1999/93/CE DEL PARLAMENTO EUROPEO Y DEL CONSEJO",
303        author = {},
304        howpublished = "http://www.cert.fnmt.es/legsoporte/D\_1999\_93\_CE.pdf",
305        year = "1999"
306}
307
308@Electronic{ IEEEhowto:x509,
309        title = "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. Request for Comments (RFC) 5280",
310        author = {Cooper D.,  Santesson S., y otros},
311        howpublished = "http://www.ietf.org/rfc/rfc5280.txt",
312        year = "2013"
313}
314
315
316@Electronic{ IEEEhowto:pkcs7,
317        title = "PKCS\#7.Cryptographic Message Syntax",
318        author = {},
319        howpublished = "https://tools.ietf.org/html/rfc2315",
320        year = "2013"
321}
322
323
324@Electronic{ IEEEhowto:pades,
325        title = "PAdES. PDF Advance Electronic Signatures",
326        author = {},
327        howpublished = "http://www.etsi.org/deliver/etsi\_ts/102700\_102799/10277801/01.01.01\_60/ts\_10277801v010101p.pdf",
328        year = "2013"
329}
330
331@Electronic{ IEEEhowto:xmldsig,
332        title = "XML Signature Syntax and Processing (Second Edition). W3C Recommendation 10 June 2008",
333        author = {Bartel M., Boyer J., y otros},
334        howpublished = "http://www.w3.org/TR/xmldsig-core/",
335        year = "2013"
336}
337
338@Electronic{ IEEEhowto:bdoc,
339        title = "Formato para firmas electrónicas",
340        author = {},
341        howpublished = "http://www.signature.it/-TOOLS/Bdoc-1.0.pdf",
342        year = "2013"
343}
344
345
346@Article{ IEEEhowto:neubauer,
347        title = "Digital signatures with familiar appearance for e-government documents: authentic PDF",
348        author = "Neubauer, T.; Weippl, E.; Biffl, S.",
349        journal = "Proceedings of the First International Conference on Availability, Reliability and Security",
350        year = "2006",
351        volume = {},
352        pages = "723--731"
353}
354
355@Book{ IEEEhowto:java,
356        title = "Professional Java, JDK",
357        author = "Richardson Clay, Avondolio Donald, others",
358        publisher = "Wrox",
359        year = "2005",
360}
361
362@Electronic{ IEEEhowto:xades,
363        title = "XML Advanced Electronic Signatures (XAdES)",
364        author = "Cruellas, J. Karlinger G., y otros",
365        howpublished = "http://www.w3.org/TR/XAdES/",
366        year = "2003"
367}
368
369@Electronic{ IEEEhowto:mime,
370        title = "Security Multiparts for MIME. Multipart/Signed and Multipart/Encrypted",
371        author = "Galvin , J. Murphy, S. Crocker, S. Freed, N.",
372        howpublished = "http://tools.ietf.org/html/rfc1847",
373        year = "2013"
374}
375
376
377@Electronic{ IEEEhowto:pkcs12,
378        title = "PKCS\#12.Personal Information Exchange Syntax Standard.",
379        author = "RSA Laboratories.",
380        howpublished = "https://www.rsa.com/rsalabs/node.asp?id=2138",
381        year = "2013"
382}
383
384
385@Book{ IEEEhowto:bpel,
386        title = "Business Process Execution for Web Services BPEL and BPEL4WS",
387        author = "Matjaz Juric, Mathew Benny",
388        publisher = "Packt Publishing",
389        year = "2006",
390}
391
392
393@Article{ IEEEhowto:safet,
394        title = "SAFET: Sistema para la generación de aplicaciones de firma electrónica",
395        author = "Araujo, A., Bravo, V.",
396        journal = "Revista Puente",
397        year = "2011",
398        volume = "6",
399}
400
401
402% referencias capítulo 7
403
404@Electronic{rlsm:terminology,
405        title = "Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology",
406        author = "Pfitzmann, A., Hansen, M.",
407        howpublished = "http://dud.inf.tu-dresden.de/Anon\_Terminology.shtml",
408        year = "2000"
409}
410
411@Article{rlsm:diaz01,
412        title = "Towards measuring Anonymity ",
413        author = "D\'{\i}az, C., Seys, S., Claessens, J., Preneel, B.",
414        journal = "Designing Privacy Enhancing Technologies",
415        year = "2002",
416        pages = "54--68",
417        volume = {},
418}
419
420@Article{rlsm:serj01,
421        title = "Towards an Information Theoretic Metric for Anonymity",
422        author = "Serjantov, A., Danezis, G.",
423        journal = "Proceedings of Privacy Enhancing Technologies Workshop",
424        year = "2002",
425        pages = "54--68",
426        volume = {},
427}
428
429
430@Article{ rlsm:chaum-mix,
431        title = "Untraceable electronic mail, return addresses, and digital pseudonyms",
432        author = "Chaum, D.",
433        journal = "Communications of the ACM",
434        year = "1981",
435        pages = {},
436        volume = "4",
437}
438
439
440@Article{ rlsm:diaz-mixes,
441        title = "Generalising Mixes",
442        author = "D\'{\i}az, C., Serjantov, A.",
443        journal = "Proceedings of Privacy Enhancing Technologies workshop",
444        year = "2003",
445        pages = "18--31",
446        volume = {},
447}
448
449
450@Article{ rlsm:mixminion,
451        title = "Mixminion: Design of a Type III Anonymous Remailer Protocol",
452        author = "Danezis, G., Dingledine, R., Mathewson, N.",
453        journal = "Proceedings of the 2003 IEEE Symposium on Security and Privacy",
454        year = "2003",
455        pages = "2--15",
456        volume = {},
457}
458
459@Article{rlsm:tor-design,
460        title = "Tor: The Second-Generation Onion Router",
461        author = "Dingledine, R., Mathewson, N., Syverson, P.",
462        journal = "Proceedings of the 13th USENIX Security Symposium",
463        year = "2004",
464        pages = {},
465        volume = {},
466}
467
468
469@Article{rlsm:antnet,
470        title = "AntNet: Distributed Stigmergetic Control for Communications Networks",
471        author = "Caro, G.D., Dorigo, M.",
472        journal = "Journal of Artificial Intelligence Research",
473        year = "1998",
474        pages = {},
475        volume = {},
476}
477
478@Article{ rlsm:ants-white,
479        title = "Connection Management using Adaptive Mobile Agents",
480        author = "White, T., Pagurek, B.",
481        journal = "Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications",
482        year = "1998",
483        pages = "802--809",
484        volume = {},
485}
486
487
488@Article{ rlsm:ants-loadbalancing,
489        title = "Ant-Based Load Balancing in Telecommunications Networks",
490        author = "Schoonderwoerd, R.",
491        journal = "Adaptive Behavior",
492        year = "1997",
493        pages = "169--207",
494        volume = "5",
495}
496
497
498@Article{ rlsm:shannon,
499        title = "The mathematical theory for communicactions",
500        author = "Shannon, C.",
501        journal = "Bell Systems Technical Journal",
502        year = "1948",
503        pages = "50--64",
504        volume = "30",
505}
506
507@Article{rlsm:yuxin,
508        title = "Measuring Anonymity with Relative Entropy",
509        author = "Deng, Y., Pang, J., Wu, P.",
510        journal = "Proceedings of the 4th International Workshop on Formal Aspects in Security and Trust",
511        year = "2007",
512        pages = "65--79",
513        volume = {},
514}
515
516
517@Article{rlsm:combinatorial,
518        title = "A Combinatorial Approach to Measuring Anonymity",
519        author = "Edman, M., Sivrikaya, F., Yener, B.",
520        journal = "Intelligence and Security Informatics",
521        year = "2007",
522        pages = "356--363",
523        volume = {},
524}
525
526
527@Article{rlsm:revisiting,
528        title = "Revisiting A Combinatorial Approach Toward Measuring Anonymity",
529        author = "Gierlichs, B., Troncoso, C., Diaz, C., Preneel, B., Verbauwhede, I.",
530        journal = "Workshop on Privacy in the Electronic Society",
531        year = "2008",
532        pages = "111--116",
533        volume = {},
534}
535
536
537@Article{rlsm:berthold,
538        title = "The Disavantages of Free Mix Routes and How to overcome them",
539        author = "Berthold, O., Pfitzmann, A., Standtke, R.",
540        journal = "Proceedings of Privacy Enhancing Technologies Workshop",
541        year = "2001",
542        pages = "30--45",
543        volume = {},
544}
545
546
547@Article{ rlsm:reiter,
548        title = "Crowds: Anonymity for Web Transactions",
549        author = "Reiter, M., Rubin, A.",
550        journal = "ACM Transactions on Information and System Security",
551        year = "1998",
552        pages = {},
553        volume = "1",
554}
555
556
557@Electronic{ rlsm:vernier,
558        title = "What are Mean Squared Error and Root Mean Squared Error?.",
559        author = "Vernier, D., and Gastineau, J.",
560        howpublished = "http://www.vernier.com/til/1014/",
561        year = "2011"
562}
563
564
565@Article{ rlsm:jianhua,
566        title = "Divergences Measures Based in Shannon Entropy",
567        author = "Jianhua, L.",
568        journal = "IEEE Transactions on Information Theory",
569        year = "1991",
570        pages = {},
571        volume = "37",
572        number = "1",
573}
574
575% Referencias adicionales del capítulo 3.
576
577@TechReport{ico2006,
578author = {Information Commissioner Office},
579title = {Data protection technical guidance note: Privacy enhancing technologies (pets)},
580institution = {Information Commissioner Office},
581year = {2006},
582month = {April},
583}
584
585@TechReport{ONU1948,
586author = {Organización de las Naciones Unidas},
587title = {Derechos humanos para todos. Declaración Universal de los Derechos humanos},
588institution = {Organización de las Naciones Unidas},
589year = {1948}
590}
591
592@phdthesis{george-thesis,
593  title = {Better Anonymous Communications},
594  author = {George Danezis},
595  school = {University of Cambridge},
596  year = {2004},
597  month = {July},
598  www_tags = {selected},
599  www_section = {Anonymous communication},
600  www_pdf_url = {http://www.cl.cam.ac.uk/~gd216/thesis.pdf},
601}
602
603@inproceedings{ISDN-mixes,
604  title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},
605  author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},
606  booktitle = {Proceedings of the GI/ITG Conference on Communication in Distributed
607        Systems},
608  year = {1991},
609  month = {February},
610  pages = {451--463},
611  www_tags = {selected},
612  www_section = {Anonymous communication},
613  www_ps_gz_url = {http://www.semper.org/sirene/publ/PfPW_91TelMixeGI_NTG.ps.gz},
614}
615
616@inproceedings{esorics04-mauw,
617  title = {A formalization of anonymity and onion routing},
618  author = {S. Mauw and J. Verschuren and E.P. de Vink},
619  booktitle = {Proceedings of ESORICS 2004},
620  year = {2004},
621  location = {Sophia Antipolis},
622  pages = {109--124},
623  editor = {P. Samarati and P. Ryan and D. Gollmann and R. Molva},
624  publisher = {LNCS 3193},
625  www_tags = {selected},
626  www_section = {Formal methods},
627  www_pdf_url = {http://www.win.tue.nl/~ecss/downloads/esorics04.pdf},
628}
629
630@inproceedings{onion-discex00,
631  title = {{O}nion {R}outing Access Configurations},
632  author = {Paul Syverson and Michael Reed and David Goldschlag},
633  booktitle = {Proceedings of the DARPA Information Survivability Conference and Exposition
634        (DISCEX 2000)},
635  volume = {1},
636  year = {2000},
637  pages = {34--40},
638  publisher = {IEEE CS Press},
639  www_ps_gz_url = {http://www.onion-router.net/Publications/DISCEX-2000.ps.gz},
640  www_tags = {selected},
641  www_abstract_url = {http://www.onion-router.net/Publications.html},
642  www_section = {Anonymous communication},
643  www_pdf_url = {http://www.onion-router.net/Publications/DISCEX-2000.pdf},
644  www_ps_url = {http://www.onion-router.net/Publications/DISCEX-2000.ps},
645}
646
647@inproceedings{onion-routingpet2000,
648  title = {{Towards an Analysis of Onion Routing Security}},
649  author = {Paul Syverson and Gene Tsudik and Michael Reed and Carl Landwehr},
650  booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design
651        Issues in Anonymity and Unobservability},
652  year = {2000},
653  month = {July},
654  pages = {96--114},
655  editor = {H. Federrath},
656  publisher = {Springer-Verlag, LNCS 2009},
657  www_important = {1},
658  www_tags = {selected},
659  www_section = {Anonymous communication},
660  www_ps_gz_url = {http://www.onion-router.net/Publications/WDIAU-2000.ps.gz},
661}
662
663@inproceedings{danezispet2004,
664  title = {The Traffic Analysis of Continuous-Time Mixes},
665  author = {George Danezis},
666  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
667  volume = {3424},
668  year = {2004},
669  month = {May},
670  pages = {35--50},
671  series = {LNCS},
672  www_important = {1},
673  www_tags = {selected},
674  www_section = {Traffic analysis},
675  www_pdf_url = {http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf},
676}
677
678@inproceedings{timing-fc2004,
679  title = {Timing Attacks in Low-Latency Mix-Based Systems},
680  author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew K. Wright},
681  booktitle = {Proceedings of Financial Cryptography (FC '04)},
682  year = {2004},
683  month = {February},
684  pages = {251--265},
685  editor = {Ari Juels},
686  publisher = {Springer-Verlag, LNCS 3110},
687  www_tags = {selected},
688  www_section = {Traffic analysis},
689  www_pdf_url = {http://www.cs.umass.edu/~mwright/papers/levine-timing.pdf},
690}
691
692@inproceedings{SS03,
693  title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
694  author = {Andrei Serjantov and Peter Sewell},
695  booktitle = {Proceedings of ESORICS 2003},
696  year = {2003},
697  month = {October},
698  www_tags = {selected},
699  www_remarks = {An investigation of packet counting attacks (which work best on lightly loaded networks) and connection-start timing attacks.},
700  www_ps_url = {http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps},
701  www_section = {Traffic analysis},
702}
703
704@inproceedings{flow-correlation04,
705  title = {On Flow Correlation Attacks and Countermeasures in Mix Networks},
706  author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao},
707  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
708  volume = {3424},
709  year = {2004},
710  month = {May},
711  pages = {207--225},
712  series = {LNCS},
713  www_tags = {selected},
714  www_section = {Traffic analysis},
715  www_pdf_url = {http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf},
716}
717
718@inproceedings{WangCJ05,
719  title = {Tracking anonymous peer-to-peer VoIP calls on the internet},
720  author = {Xinyuan Wang and Shiping Chen and Sushil Jajodia},
721  booktitle = {Proceedings of the ACM Conference on Computer and Communications Security},
722  year = {2005},
723  month = {November},
724  pages = {81--91},
725  www_tags = {selected},
726  www_section = {Anonymous communication},
727  www_pdf_url = {http://ise.gmu.edu/~xwangc/Publications/CCS05-VoIPTracking.pdf},
728}
729
730@inproceedings{e2e-traffic,
731  title = {Practical Traffic Analysis: Extending and Resisting Statistical Disclosure},
732  author = {Nick Mathewson and Roger Dingledine},
733  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
734  volume = {3424},
735  year = {2004},
736  month = {May},
737  pages = {17--34},
738  series = {LNCS},
739  www_important = {1},
740  www_tags = {selected},
741  www_section = {Traffic analysis},
742  www_pdf_url = {http://freehaven.net/doc/e2e-traffic/e2e-traffic.pdf},
743}
744
745@inproceedings{back01,
746  title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
747  author = {Adam Back and Ulf M\"oller and Anton Stiglic},
748  booktitle = {Proceedings of Information Hiding Workshop (IH 2001)},
749  year = {2001},
750  month = {April},
751  pages = {245--257},
752  editor = {Ira S. Moskowitz},
753  publisher = {Springer-Verlag, LNCS 2137},
754  www_important = {1},
755  www_tags = {selected},
756  www_section = {Traffic analysis},
757  www_pdf_url = {http://www.cypherspace.org/adam/pubs/traffic.pdf},
758}
759
760@inproceedings{hs-attack06,
761  title = {Locating Hidden Servers},
762  author = {Lasse {\O}verlier and Paul Syverson},
763  booktitle = {Proceedings of the 2006 IEEE Symposium on Security and Privacy},
764  year = {2006},
765  month = {May},
766  publisher = {IEEE CS},
767  www_important = {1},
768  www_tags = {selected},
769  www_pdf_url = {http://www.onion-router.net/Publications/locating-hidden-servers.pdf},
770  www_remarks = {Motivates and describes Tor's entry guard design.},
771  www_section = {Traffic analysis},
772}
773
774
775@MastersThesis{maestriaRSumoza,
776author = {Rodolfo Sumoza},
777title = {Sistemas Anónimos en Escenarios Globales},
778school = {Universidad Complutense de Madrid},
779year = {2008},
780}
781
782@inproceedings{traffic_analysis,
783author = {J. F. Raymond},
784editor = {H. Federrath},
785title = {Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems},
786booktitle = {Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability - Springer-Verlag, LNCS},
787year = {2000},
788}
789
790@inproceedings{timing_ssh,
791author = {Dawn Xiaodong Song; David Wagner; Xuqing Tian},
792editor = {USENIX Association},
793title = {Timing Analysis of Keystrokes and Timing Attacks on SSH},
794booktitle = {Proceedings of the 10th USENIX Security Symposium},
795year = {2001},
796}
797
798@online{cenditel_anonimato,
799author = {Endira Mora et. al},
800title = {Gestión de Anonimato},
801year = {2014},
802url = {https://tibisay.cenditel.gob.ve/gestionanonimato/wiki/PlanDeTrabajo%3A},
803}
804
805@inproceedings{cebolla,
806  title = {{Cebolla: Pragmatic IP Anonymity}},
807  author = {Zach Brown},
808  booktitle = {Proceedings of the 2002 Ottawa Linux Symposium},
809  year = {2002},
810  month = {June},
811  www_tags = {selected},
812  www_pdf_url = {http://cypherspace.org/cebolla/cebolla.pdf},
813  www_remarks = {Written by a former Freedom developer, Cebolla has a UDP-based design
814        similar to second-generation Freedom. The initiator incrementally builds her
815        circuit, giving her end-to-end forward-secrecy and also better recovery from
816        broken nodes.},
817  www_section = {Anonymous communication},
818}
819
820@Electronic{ SCHNEIER:14,
821        title = "Choosing Secure Passwords",
822        howpublished = "http://boingboing.net/2014/02/25/choosing-a-secure-password.html",
823        year = "2014",
824        author = {Bruce Schneier}
825}
826
827
828@online{CHALBAUD:13,
829        author = {Chalbaud, R.},
830        title = {Derechos Humanos y su protección Constitucional},
831        year = {2013},
832        url = {http},
833}
834
835@Article{ OBERTO-GOVEA,
836        title = "Algunas Consideraciones sobre Habeas Data",
837        author = "Oberto, M., Govea, M.",
838        journal = "revista Telematique",
839        year = "2008",
840        pages = {},
841        volume = "7",
842        number = "3",
843}
844
845@online{UTAH:2014,
846        author = {Horacio Fernandez Delpech},
847        title = {Ley del Estado de Utah sobre la Firma Digital. Código Comentado. Título 46, Capítulo 3},
848        year = {1996},
849        url = {http://www.hfernandezdelpech.com.ar/LegislacionYproExtEEEUUELeyEstadoUtahFirmaDig.htm},
850}
851
852
853
854
855@Book{ PAREDES:2008,
856        title = "Transformación de la cultura de servicios de información: una visión legal y de tecnologías",
857        author = "Paredes, A.",
858        publisher = "",
859        year = "2008",
860}
861
862@Book{ SALAZAR,
863        title = "Habeas Data en el derecho Comparado",
864        author = "Salazar, E.",
865        publisher = "",
866        year = "2008",
867}
868
869@Book{ OBERTO-GUERRERO,
870        title = "Preguntarle a Endira",
871        author = "Oberto y Guerrero",
872        publisher = "",
873        year = "0000",
874}
875
876@Book{ ZAGARRA:2010,
877        title = "Marco Legal de las Tecnologías de la Información y comunicación",
878        author = "Zagarra R. Marco",
879        publisher = "",
880        year = "2010",
881}
882
883
884@Book{ FUENTES:2007,
885        title = "Marco Legal de la Informática y la computación",
886        author = "Fuentes, F.",
887        publisher = "Vadell Hermanos",
888        year = "2007",
889        country="Venezuela",
890}
891
892@Electronic{UNIVERSIDADABIERTA:MEXICO,
893        author = {Universidad Abierta},
894        title = {Delitos Informáticos},
895        year = {},
896        howpublished = {http://www.universidadabierta.edu.mx},
897       
898}
899
900@Electronic{TIPOSPENALES:2014,
901        author = {},
902        title = {Los tipos penales en la Ley Especial contra Delitos Informáticos},
903        year = {},
904        howpublished = {http://beatrizditotto.net/2010/01/01/introduccion/},
905        urldate = {01-08-2014}
906}
907
908
909@Book{ LOGRERIA:2008,
910        title = "Análisis critico de la tipicidad prevista en algunos artículos de la ley especial contra delitos Informáticos venezolana",
911        author = "Logreria, C., Fuentes F.",
912        publisher = "Revista Electrónica de Estudios Telemáticos URBE",
913        year = "2008",
914        country="Venezuela",
915}
916
917@Book{ PENARANDA:2011,
918        title = "La Firma Electrónica Digital en Venezuela",
919        author = "Peñaranda, H., Héctor R.",
920        publisher = "Universidad del Zulia",
921        year = "2011",
922        country="Venezuela",
923}
924
925
926@Book{ ODREMAN:2003,
927        title = "Eficacia Probatoria del mensaje de datos y de la Firma electrónica según la nueva Ley de Mensaje de Datos y Firmas Electrónicas",
928        author = "Odreman, G.",
929        publisher = "UCAB",
930        year = "2003",
931        country="Venezuela",
932}
933
934
935@Book{ LONRENZETTI:2000,
936        title = "Comercio Electrónico",
937        author = "Lonrenzetti, R.",
938        publisher = "Abeledo-Perrot",
939        year = "2000",
940        country="Argentina",
941}
942
943@Book{ URDANETA:2010,
944        title = "Los Mensajes de Datos y la Firma Electrónica (Seguridad Jurídica que ofrecen y Valor Probatorio) ",
945        author = "Urdaneta B., José V.",
946        publisher = "",
947        year = "2010",
948        country="Venezuela",
949}
950
951@Book{ RONDON,
952        title = "Comentarios generales al Decreto ley de Mensaje de  Datos y Firmas electrónicas de la República Bolivariana de Venezuela",
953        author = "Rondón, A.",
954        publisher = "",
955        year = "0000",
956        country="Venezuela",
957}
958
959@online{LEYMODELOCNUDMI:1996,
960        author = {Comisión de las Naciones Unidas para el Derecho Mercantil Internacional},
961        title = {Ley Modelo de la CNUDMI sobre Comercio Electrónico con la Guía para su incorporación al derecho interno},
962        year = {1996},
963        url = {http://www.uncitral.org/pdf/spanish/texts/electcom/05-89453_S_Ebook.pdf},
964}
965
966@Article{CLIC:13,
967        title = "Título",
968        author = "Autor",
969        journal = "Revista El Clic",
970        year = "2013",
971        pages = "",
972        volume = "1",
973}
974
975@online{GOBIERNOELECTRONICOENVENEZUELA,
976        author = {UCB},
977        title = {Gobierno Eelctrónico},
978        year = {2014},
979        url = {},
980}
981
982@Book{ COLINA:05,
983        title = "Seducir y Controlar.",
984        author = "Colina, C.",
985        publisher = "UCB",
986        year = "2005",
987        country="Venezuela",
988}
989
990@Article{CRISTOS:03,
991        title = "Privacidad y Protección de Datos Personales en Internet, ¿Es necesario contar con una regulación especifica en México?",
992        author = "Cristos Velasco",
993        journal = "Boletín de Política Informática I",
994        year = "2003",
995        pages = "",
996        volume = "",
997}
998
999@Book{ FLORES:09,
1000        title = "Derecho Informático.",
1001        author = "Flores, L.",
1002        publisher = "Grupo Editorial Patria",
1003        year = "2009",
1004        country="México",
1005}
1006
1007@Book{ GAMBA:10,
1008        title = "Panorama del derecho Informático en América Latina y el Caribe.",
1009        author = "Gamba, J.",
1010        publisher = "CEPAL",
1011        year = "2010",
1012        country="",
1013}
1014
1015
1016% referencias del prologo
1017
1018@Article{GOMARA:07,
1019        title = "Frankenstein, un espejo de la identidad humana",
1020        author = "Ramalle Gómara, E.",
1021        journal = "Berceo",
1022        year = "2007",
1023        pages = "81-96",
1024        volume = "153",
1025}
1026
1027@Electronic{BOLIVAR:1819,
1028        author = {Bolívar, S.},
1029        title = {Discurso ante el Congreso de Angostura el 15 de Febrero de 1819},
1030        year = {1819},
1031        howpublished = {http://es.wikisource.org/},
1032}
1033
1034@Book{ ANDERSON:1983,
1035        title = "Imagined Communities. Reflections on the Origin and Spread of Nationalism.",
1036        author = "Anderson, B.",
1037        publisher = "Verso",
1038        year = "1998",
1039        country="EE.UU.",
1040        address="New York"
1041}
1042
1043
1044@Book{ MACINTYRE:1981,
1045        title = "After Virtue. A Study in Moral Theory.",
1046        author = "MacIntyre, A",
1047        publisher = "University of Notre Dame Press",
1048        address = "Indiana",
1049        year = "1984",
1050        country="EE.UU."
1051}
1052
1053
1054@Book{ ARENDT:1958,
1055        title = "The Human Condition.",
1056        author = "Arendt, H.",
1057        publisher = "The University of Chicago Press",
1058        year = "1998",
1059        country="EE.UU."
1060}
1061
1062@online{SHELLEY:1818,
1063        author = {Shelley, M.},
1064        title = {Frankenstein o el Moderno Prometeo},
1065        year = {2004},
1066        url = {http://www.librosenred.com/},
1067}
1068
1069
1070@Book{ IDENTIDADDIGITAL:2014,
1071        title = "Seguridad Informática y la Identidad Digital",
1072        author = "Araujo, A., Bravo, V., Sumoza, R.",
1073        publisher = "Centro Nacional de Desarrollo e Investigación en Tecnologías Libres",
1074        year = "2014",
1075        country="Venezuela"
1076}
1077
1078@Book{ MATTHEWS:2008,
1079        title = "Identity and Information Technology. En Information Technology and Moral Philosophy",
1080        author = "Matthews, S.",
1081        publisher = "Cambridge",
1082        year = "2006",
1083        country="EE.UU."
1084}
1085
1086
1087@Book{ NAIM:2006,
1088        title = "Ilícito. Cómo traficantes, contrabandistas y piratas están cambiando el mundo.",
1089        author = "Naím, M.",
1090        publisher = "Debate",
1091        year = "2006",
1092        country="Caracas, Venezuela"
1093}
1094
1095@Book{ ETZIONI:1999,
1096        title = "The Limits of Privacy",
1097        author = "Etzioni, A.",
1098        publisher = "Basic Book",
1099        year = "2006",
1100        country="New York, EE.UU."
1101}
1102
1103
1104@Article{FUENMAYOR:1991,
1105        title = "The Roots of Reductionism: a Counter-Ontoepistemology for a Systems Approach",
1106        author = "Fuenmayor, R.",
1107        journal = "Systems Practice",
1108        year = "1991",
1109        pages = "",
1110        volume = "4",
1111}
1112
1113@Book{ PETTIT:2008,
1114        title = "Trust, reliance and the internet. En Information Technology and Moral Philosophy",
1115        author = "Pettit, P.",
1116        publisher = "Cambridge",
1117        year = "2008",
1118        country="EE.UU."
1119}
1120
1121@Article{SANDEL:1989,
1122        title = "Moral Argument and Liberal Toleration: Abortion and Homosexuality.",
1123        author = "Sandel, M.",
1124        journal = "California Law Review.",
1125        year = "1989",
1126        pages = "",
1127        volume = "77",
1128}
1129
1130
1131@Article{OHARROW:1998,
1132        title = "Health Plans' Access to Pharmacy Data Raises Concerns about Privacy.",
1133        author = "O'harrow, R.",
1134        journal = "The Seattle Times",
1135        year = "1998",
1136        pages = "",
1137        volume = "",
1138}
1139
1140@Article{MARKOFF:2002,
1141        title = "Pentagon Plans a Computer Systems that Would Peek at Personal Data of Americans.",
1142        author = "Markoff, J.",
1143        journal = "The New York Times",
1144        year = "2002",
1145        pages = "",
1146        volume = "",
1147}
1148
1149@Article{GREENWALD:2013,
1150        title = "NSA collecting phone records of millions of Verizon customers daily.",
1151        author = "Greenwald, G.",
1152        journal = "The Guardian",
1153        year = "2013",
1154        pages = "",
1155        volume = "",
1156}
1157
1158@Book{ GREENWALD:2014,
1159        title = "No Place to Hide. Edward Snowden, the NSA and the Surveillance State.",
1160        author = "Greenwald, G.",
1161        publisher = "Penguin Books Ltd.",
1162        year = "2014",
1163        country="United Kingdom"
1164}
1165
1166@Article{GELLMANSOLTANI:2013,
1167        title = "NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say.",
1168        author = "Gellman, B. y Soltani, A.",
1169        journal = "The Washington Post.",
1170        year = "2013",
1171        pages = "",
1172        volume = "",
1173}
1174
1175@Article{NEWYORKTIMES:2013,
1176        title = "Documents Show N.S.A. Efforts to Spy Both Enemies and Allies.",
1177        author = "New York Times",
1178        journal = "New York Times.",
1179        year = "2013",
1180        pages = "",
1181        volume = "",
1182}
1183
1184
1185@Book{ VANDENHOVEN:2008,
1186        title = "Information Technology, privacy, and the protection of personal data. En Information Technology and Moral Philosophy",
1187        author = "Van den Hoven, J.",
1188        publisher = "Cambridge",
1189        year = "2008",
1190        country="EE.UU."
1191}
1192
1193
1194
1195@Article{RORTY:1996,
1196        title = "Who are we? Moral Universalism and Economic Triage.",
1197        author = "Rorty, R.",
1198        journal = "Segundo Foro de Filosofía de la Unesco",
1199        year = "1996",
1200        pages = "",
1201        volume = "",
1202}
1203
1204
1205% referencias del capitulo 10
1206
1207@Electronic{DRAE:CIBERNETICA,
1208        author = {Real Academia de la Lengua Española},
1209        title = {Diccionario de la Lengua Española (DRAE)},
1210        year = {2001},
1211        howpublished = {http://lema.rae.es/drae/?val=cibernética},
1212}
1213
1214@Book{ WIENER:1998,
1215        title = "Human use of human beings: Cybernetics and society.",
1216        author = "Wiener, N.",
1217        publisher = "Da Capo Press",
1218        year = "1998",
1219        country=""
1220}
1221
1222
1223@Article{BURTSEVA:2013,
1224        title = "Norbert Wiener: Padre de la cibernética.",
1225        author = "Burtseva, L., Tyrsa, V., Ríos, B., Flores, L.",
1226        journal = "Revista UABC",
1227        year = "2013",
1228        pages = "48",
1229        volume = "4",
1230        number = "54",
1231}
1232
1233@Book{ ASHBY:1957,
1234        title = "An introduction to cybernetics",
1235        author = "Ashby, R",
1236        publisher = "Chapman \& Hall",
1237        year = "1957",
1238        country=""
1239}
1240
1241@Book{ GIBSON:1984,
1242        title = "Neuromante",
1243        author = "Gibson, W.",
1244        publisher = "Minotauro",
1245        year = "1984",
1246        country=""
1247}
1248
1249@Article{CICOGNANI:1998,
1250        title = "On the linguistic nature of cyberspace and virtual communities",
1251        author = "Cicognani, A.",
1252        journal = "Virtual reality",
1253        year = "1998",
1254        pages = "20",
1255        volume = "3",
1256        number = "1",
1257}
1258
1259@Article{POST:2013,
1260        title = "Against’Against Cyberanarchy",
1261        author = "Cicognani, A.",
1262        journal = "Berkeley Technology Law Journal",
1263        year = "2002",
1264        pages = "10",
1265        volume = "17",
1266        number = "",
1267}
1268
1269@Article{ANDERS:2001,
1270        title = "Anthropic cyberspace: Defining electronic space from first principles",
1271        author = "Andres, P.",
1272        journal = "Leonardo",
1273        year = "2001",
1274        pages = "405",
1275        volume = "34",
1276        number = "5",
1277}
1278
1279
1280@Article{FLORES:2012,
1281        title = "Los Ámbitos no Terrestres en la Guerra Futura: Ciberespacio",
1282        author = "Flores, H.",
1283        journal = "Centro Superior de Estudios de la Defensa Nacional Monografías del Ceseden",
1284        year = "2012",
1285        pages = "18",
1286        volume = "",
1287        number = "128",
1288}
1289
1290@Article{FRITZ:2013,
1291        title = "The Semantics of Cyber Warfare",
1292        author = "Fritz, J.",
1293        journal = "East Asia Security Symposium and Conference",
1294        year = "2013",
1295        pages = "2",
1296        volume = "1",
1297        number = "7",
1298}
1299
1300
1301@Book{ WINTERFELD:2012,
1302        title = "The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice",
1303        author = "Winterfeld, S., Andress, J.",
1304        publisher = "Elsevier Inc.",
1305        year = "2012",
1306        country=""
1307}
1308
1309@Article{MCGRAW:2013,
1310        title = "Cyber War is Inevitable (Unless We Build Security In)",
1311        author = "McGraw, G.",
1312        journal = "Journal of Strategic Studies",
1313        year = "2013",
1314        pages = "111--112",
1315        volume = "36",
1316        number = "1",
1317}
1318
1319@inproceedings{ALI:2013,
1320author = {Kostyuk Nadiya; Alí Marielle},
1321editor = {The Society of Digital Information and Wireless Communication},
1322title = {The Cyber Dogs of War: Joint Efforts of Future World Leaders in The Prevention of Cyberwarfare},
1323booktitle = {The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013)},
1324year = {2013},
1325}
1326
1327@Article{LEWIS:2010,
1328        title = "The cyber war has not begun",
1329        author = "Lewis, J.",
1330        journal = "Center for Strategic and International Studies",
1331        year = "2010",
1332        pages = "",
1333        volume = "",
1334        number = "",
1335}
1336
1337@Article{FERRERO:2013,
1338        title = "La Ciberguerra. Génesis y Evolución",
1339        author = "Ferrero, J.",
1340        journal = "Revista General de Marina",
1341        year = "2013",
1342        pages = "87",
1343        volume = "",
1344        number = "Enero-Febrero",
1345}
1346
1347@Article{KIRAVUO:2013,
1348        title = "Offensive Cyber-capabilities against Critical Infrastructure",
1349        author = "Kiravuo, T.",
1350        journal = "Cyber Warfare. National Defence University. Department of Military Technology",
1351        year = "2013",
1352        pages = "90",
1353        volume = "",
1354        number = "34",
1355}
1356
1357@Article{FOJON:2011,
1358        title = "Ciberespacio: La Nueva Dimensión del Entorno Operativo",
1359        author = "Sanz, A., Fojón, E.",
1360        journal = "Centro Superior de Estudios de la Defensa Nacional Monografías del Ceseden",
1361        year = "2011",
1362        pages = "43",
1363        volume = "",
1364        number = "44",
1365}
1366
1367@Article{SALMINEN:2013,
1368        title = "The Fog of Cyber Defence",
1369        author = "Rantapelkonen, J., Salminen, M.",
1370        journal = "National Defence University. Department of Leadership and Military Pedagogy",
1371        year = "2013",
1372        pages = "11",
1373        volume = "",
1374        number = "2",
1375}
1376
1377
1378
1379@Article{STARR:2009,
1380        title = "Towards an Evolving Theory of Cyberpower",
1381        author = "Starr, S.",
1382        journal = "The Virtual Battlefield: Perspectives on Cyber Warfare",
1383        year = "2013",
1384        pages = "22--24",
1385        volume = "3",
1386        number = "",
1387}
1388
1389@Article{OLSON:2012,
1390        title = "El boxeo con un contrincante imaginario. La guerra cibernética y el ataque económico estratégico",
1391        author = "Olson, S.",
1392        journal = "Military Review",
1393        year = "2012",
1394        pages = "67",
1395        volume = "",
1396        number = "Noviembre-Diciembre",
1397}
1398
1399@Article{COLOM:2009,
1400        title = "El nuevo concepto estadounidense para el empleo de la fuerza militar",
1401        author = "Colom, G.",
1402        journal = "ARI: Seguridad y Defensa",
1403        year = "2009",
1404        pages = "2",
1405        volume = "",
1406        number = "70",
1407}
1408
1409
1410@Electronic{DoD:2012,
1411        author = {Panetta, L.},
1412        title = {Remarks by Secretary Panetta on Cybersecurity to the Business Executives for National Security},
1413        year = {2012},
1414        howpublished = {http://www.defense.gov/transcripts/transcript.aspx?transcriptid=5136},
1415}
1416
1417@Electronic{CHINESE:2013,
1418        author = {Chinese People's Liberation Army},
1419        title = {Pentagon's cyberattack accusations irresponsible: expert},
1420        year = {2013},
1421        howpublished = {http://eng.chinamil.com.cn/news-channels/pla-daily-commentary/2013-05/08/content\_5333521.htm},
1422}
1423
1424@Article{STONE:2013,
1425        title = "Cyber War Will Take Place!",
1426        author = "Stone, J.",
1427        journal = "Journal of Strategic Studies",
1428        year = "2013",
1429        pages = "107",
1430        volume = "36",
1431        number = "1",
1432}
1433
1434@Book{ HARRISON:2012,
1435        title = "Cyber Warfare and the Laws of War",
1436        author = "Harrison, H.",
1437        publisher = "Cambridge University Press",
1438        year = "2012",
1439        country=""
1440}
1441
1442@Article{RID:2012,
1443        title = "Cyber war will not take place",
1444        author = "Stone, J.",
1445        journal = "Journal of Strategic Studies",
1446        year = "2013",
1447        pages = "9",
1448        volume = "35",
1449        number = "1",
1450}
1451
1452
1453@Article{JUNIO:2013,
1454        title = "How Probable is Cyber War? Bringing IR Theory Back In to the Cyber Conflict Debate",
1455        author = "Junio, T.",
1456        journal = "Journal of Strategic Studies",
1457        year = "2013",
1458        pages = "130",
1459        volume = "36",
1460        number = "1",
1461}
1462
1463@misc{BEIDLEMAN:2009,
1464    author    = "Beidleman, S.",
1465    title     = "Defining and Deterring Cyber War",
1466    year     = "2009",
1467}
1468
1469@Article{SANCHEZ:2010,
1470        title = "La nueva estrategia comunicativa de los grupos terroristas",
1471        author = "Sánchez, G.",
1472        journal = "Revista Enfoques",
1473        year = "2010",
1474        pages = "203",
1475        volume = "VIII",
1476        number = "12",
1477}
1478
1479@Article{GOLDSMITH:2010,
1480        title = "The New Vulnerability (How Cyber Changes the Laws of War).",
1481        author = "Goldsmith, J.",
1482        journal = "The New Republic",
1483        year = "2010",
1484        pages = "",
1485        volume = "",
1486        number = "",
1487}
1488
1489@Article{BRENNER:2007,
1490        title = "“At light speed”: Attribution and response to cybercrime/terrorism/warfare",
1491        author = "Brenner, S.",
1492        journal = "The Journal of Criminal Law and Criminology",
1493        year = "2007",
1494        pages = "382",
1495        volume = "",
1496        number = "",
1497}
1498
1499@Book{ JANCZEWSKI:2008,
1500        title = "Cyber warfare and cyber terrorism",
1501        author = "Janczewski, L.,  Colarik, A.",
1502        publisher = "IGI Global",
1503        year = "2008",
1504        country=""
1505}
1506
1507@misc{ONU:1945,
1508    author    = "Organización de las Naciones Unidas",
1509    title     = "Carta de las Naciones Unidas. Entrada en vigor: 24 de octubre de 1945, de conformidad con el artículo 110",
1510    year     = "1945",
1511}
1512
1513@Article{HOISINGTON:2009,
1514        title = "Cyberwarfare and the Use of Force Giving Rise to the Right of Self-Defense",
1515        author = "Hoisington, M.",
1516        journal = "Boston College International and Comparative Law Review",
1517        year = "2009",
1518        pages = "446",
1519        volume = "32",
1520        number = "",
1521}
1522
1523@Article{BANKS:2013,
1524        title = "The Role of Counterterrorism Law in Shaping Ad Bellum Norms for Cyber War",
1525        author = "Banks, W.",
1526        journal = "89 INT’L L. STUD. 157. Available at SSRN 2160078",
1527        year = "2013",
1528        pages = "162",
1529        volume = "",
1530        number = "",
1531}
1532
1533
1534
1535@Article{BERNAL:1999,
1536        title = "Mercosur ¿Regionalismo o globalización? Tres aspectos para la decisión de políticas",
1537        author = "Bernal-Meza, R.",
1538        journal = "Revista Realidad Económica",
1539        year = "1999",
1540        pages = "2",
1541        volume = "",
1542        number = "165",
1543}
1544
1545
1546@Article{BIZZOZERO:2011,
1547        title = "América Latina a inicios de la segunda década del siglo XXI: entre el regionalismo estratégico y la regionalización fragmentada",
1548        author = "Bizzozero, Lincoln",
1549        journal = "Revista Brasileira de Política Internacional",
1550        year = "2011",
1551        pages = "36",
1552        volume = "54",
1553        number = "1",
1554}
1555
1556@misc{UNASUR:2008,
1557    author    = "UNASUR",
1558    title     = "Tratado Constitutivo de la Unión de Naciones Suramericanas",
1559    year     = "2008",
1560}
1561
1562@Article{SAINTPIERRE:2008,
1563        title = "El Consejo Sudamericano de Defensa",
1564        author = "Saint-Pierre, H.; Castro, G.",
1565        journal = "Boletín RESDAL",
1566        year = "2008",
1567        pages = "1",
1568        volume = "6",
1569        number = "29",
1570}
1571
1572@Book{ CLAUSEWITZ:2002,
1573        title = "De La Guerra.",
1574        author = "Clausewitz, C.",
1575        publisher = "Editorial Librodot",
1576        year = "2002",
1577        country=""
1578}
1579
1580
1581
1582@Electronic{CDS:2008,
1583        author = {Consejo de Defensa Sudamericano},
1584        title = {Objetivos Consejo de Defensa Suramericano UNASUR},
1585        year = {2008},
1586        howpublished = {http://www.unasursg.org/inicio/organizacion/consejos/cds},
1587}
1588
1589@misc{CEED:2012,
1590    author    = "CEED",
1591    title     = "Informe de Avance a diciembre de 2012 sobre Conceptos e
1592Institucionalidad de Seguridad y Defensa, Amenazas, Factores de Riesgo y Desafíos
1593del Consejo Sudamericano de Defensa",
1594    year     = "2012",
1595}
1596
1597@Article{MENEZES:2010,
1598        title = "Menezes, A.",
1599        author = "Regionalismo y seguridad sudamericana: ¿son relevantes el Mercosur y la Unasur? Íconos",
1600        journal = "Revista de Ciencias Sociales",
1601        year = "2010",
1602        pages = "41--53",
1603        volume = "",
1604        number = "38",
1605}
1606
1607@Electronic{DANTAS:2013,
1608        author = {Dantas, C. y Jeronimo, J.},
1609        title = {Como eles espionam. Istoe.},
1610        year = {2013},
1611        howpublished = {http://www.istoe.com.br/reportagens/paginar/323087\_COMO+ELES+ESPIONAM/12},
1612}
1613
1614@Article{LIMNELL:2013,
1615        title = "Limnéll, J.",
1616        author = "Offensive Cyber Capabilities are Needed Because of Deterrence",
1617        journal = "The Fog of Cyber Defence",
1618        year = "2013",
1619        pages = "202--205",
1620        volume = "",
1621        number = "10",
1622}
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
Note: See TracBrowser for help on using the repository browser.