source: libros/maquetacion/bibliografia.bib @ de13eae

revisionfinal
Last change on this file since de13eae was de13eae, checked in by aaraujo <aaraujo@…>, 10 years ago

Agregada sección 4 del capítulo 10 y referencias. Pendientes algunas referencias de la sección.

  • Property mode set to 100644
File size: 37.3 KB
Line 
1% Archivo de bibliografia para el libro de seguridad
2
3
4@Book{ NIC:03,
5        author = "R. Nichols and P. C. Lekkas",
6        editor = "McGraw-Hill",
7        title = "Seguridad para comunicaciones inal{\'a}mbricas",
8        publisher = "McGraw-Hill",
9        year = "2003",
10        OPTkey = "",
11        OPTvolume = "",
12        OPTnumber = "",
13        OPTseries = "",
14        OPTaddress = "Mexico",
15        OPTedition = "",
16        OPTmonth = "",
17        OPTnote = "",
18        OPTannote = "",
19        author = "R. Nichols and P. C. Lekkas"
20}
21
22@Book{ ACE:03,
23        author = "Vicente Aceituno Canal",
24        editor = "Noriega Editores",
25        title = "Seguridad de la información",
26        publisher = "Noriega Editores",
27        year = "2003",
28        OPTkey = "",
29        OPTvolume = "",
30        OPTnumber = "",
31        OPTseries = "",
32        OPTaddress = "M'exico D.F., M'exico",
33        OPTedition = "",
34        OPTmonth = "M'exico D.F.",
35        OPTnote = "",
36        OPTannote = "",
37}
38
39@Book{ KURT:01,
40        author = "Kurt Wall et al",
41        editor = "Prentice Hall",
42        title = "Programación en Linux",
43        publisher = "Prentice Hall",
44        year = "2001",
45        OPTkey = "",
46        OPTvolume = "",
47        OPTnumber = "",
48        OPTseries = "",
49        OPTaddress = "Madrid, Espa~na",
50        OPTedition = "",
51        OPTmonth = "",
52        OPTnote = "",
53        OPTannote = "",
54}
55
56@Book{ SARW:03,
57        author = "Sarwar, Koretsky",
58        editor = "Pearson, Prentice Hall",
59        title = "El libro de Linux",
60        publisher = "Prentice Hall",
61        year = "2003",
62        OPTkey = "",
63        OPTvolume = "",
64        OPTnumber = "",
65        OPTseries = "",
66        OPTaddress = "Madrid, Espa~na",
67        OPTedition = "",
68        OPTmonth = "",
69        OPTnote = "",
70        OPTannote = "",
71}
72
73
74@Book{ STRO:02,
75        author = "Bjarne Stroustrup",
76        editor = "Addison Wesley",
77        title = "El lenguaje de programaci{\'o}n C++",
78        publisher = "Addison Wesley",
79        year = "2002",
80        OPTkey = "",
81        OPTvolume = "",
82        OPTnumber = "",
83        OPTseries = "",
84        OPTaddress = "Madrid, Espa{\~n}a",
85        OPTedition = "",
86        OPTmonth = "",
87        OPTnote = "",
88        OPTannote = ""
89}
90
91@Book{ BLAN:06,
92        author = "James Blanchette and Mark Summerfield",
93        editor = "Prentice Hall",
94        title = "C++ GUI Programming with Qt 4",
95        publisher = "Prentice Hall",
96        year = "2006",
97        OPTkey = "",
98        OPTvolume = "",
99        OPTnumber = "",
100        OPTseries = "",
101        OPTaddress = "Massachusetts, USA",
102        OPTedition = "",
103        OPTmonth = "",
104        OPTnote = "",
105        OPTannote = ""
106}
107
108@Book{ STAL:03,
109        author = "William Stallings",
110        editor = "Pearson",
111        title = "Fundamentos de Seguridad de Redes. Aplicaciones y Est{\'a}ndares",
112        publisher = "Prentice Hall",
113        year = "2003",
114        OPTkey = "",
115        OPTvolume = "",
116        OPTnumber = "",
117        OPTseries = "",
118        OPTaddress = "Espa{\~n}a",
119        OPTedition = "2",
120        OPTmonth = "",
121        OPTnote = "",
122        OPTannote = ""
123}
124
125@Book{ PRESS:05,
126        author = "Roger S. Pressman",
127        editor = "Mc Graw-Hill",
128        title = "Ingeniería del software. Un enfoque práctico",
129        publisher = "Mc Graw-Hill",
130        year = "2005",
131        OPTkey = "",
132        OPTvolume = "",
133        OPTnumber = "",
134        OPTseries = "",
135        OPTaddress = "Mexico",
136        OPTedition = "6",
137        OPTmonth = "",
138        OPTnote = "",
139        OPTannote = ""
140}
141
142@Book{ NASH:02,
143        author = "Andrew Nash, William Duane, Celia Joseph and Joseph Brink",
144        editor = "McGraw-Hill",
145        title = "PKI: Infraestructura de clave p{\'u}blica",
146        publisher = "McGraw-Hill",
147        year = "2002",
148        OPTkey = "",
149        OPTvolume = "",
150        OPTnumber = "",
151        OPTseries = "",
152        OPTaddress = "Mexico",
153        OPTedition = "",
154        OPTmonth = "",
155        OPTnote = "",
156        OPTannote = ""
157}
158
159@Book{ RANKL:04,
160        author = "Wolfgang Rankl, Wolfgang Effing",
161        title = "Smart Card Handbook",
162        publisher = "Wiley",
163        year = "2004",
164        OPTkey = "",
165        OPTvolume = "",
166        OPTnumber = "",
167        OPTseries = "",
168        OPTaddress = "Mexico",
169        OPTedition = "3",
170        OPTmonth = "",
171        OPTnote = "",
172        OPTannote = ""
173}
174
175@Article{ PERL:99,
176        author = "R. Perlman",
177        title = "An overview of PKI trust models",
178        journal = "Network, IEEE",
179        year = "1999",
180        OPTkey = "",
181        OPTvolume = "",
182        OPTnumber = "",
183        OPTpages = "",
184        OPTmonth = "",
185        OPTnote = "",
186        OPTannote = ""
187}
188
189@Book{ SCHM:03,
190        title = "Aprendiendo UML en 24 horas",
191        author = "Joseph Schmuller",
192        editor = "Prentice Hall",
193        publisher = "Prentice Hall",
194        year = "2003",
195        address = "M{\'e}xico"
196}
197
198@Book{ VIEG:2002,
199        title = "Network Security with OpenSSL",
200        author = "John Viega and Matt Messier and Pravir Chandra",
201        publisher = "O'Really",
202        edition = "384",
203        year = "2002"
204}
205
206@Book{ BOOC:99,
207        title = "UML Lenguaje Unificado de Modelado",
208        author = "G., Booch",
209        publisher = "Addison Wesley",
210        year = "1999"
211}
212
213@Book{ MULL:97,
214        title = "Modelado de objetos con UML",
215        author = "Alain Pierre-Muller",
216        publisher = "Eyrolles",
217        address = "Barcelona, Espa\~na",
218        year = "1997"
219}
220
221@Book{ PILA:04,
222        title = "Version Control with Subversion ",
223        author = "C. Michael Pilato and Ben Collins-Sussman and Brian W. Fitzpatrick",
224        publisher = "O'Really ",
225        year = "2004"
226}
227
228@Electronic{ XCA:03,
229        title = "XCA, una interfaz gr\'afica para OpenSSL, Clave p\'ublicas y privadas, certificados, solicitudes y listas de revocaci'on",
230        howpublished = "http://www.hohnstaedt.de/xca.html",
231        year = "2003",
232        author = {Christian Hohnst\"{a}dt}
233}
234
235@Electronic{ IBM:98,
236        title = "IBM Corporation. An overview of the IBM SET and the IBM CommercePoint Products",
237        howpublished = "http://www.software.ibm.com/commerce/set/overview.html",
238        year = "2003",
239        author = {IBM Corporation}
240}
241
242
243
244@Electronic{ FSF:07,
245        title = "Free Software Definition",
246        howpublished = "http://www.fsf.org/licensing/essays/free-sw.html",
247        year = "2007",
248        author = {}
249}
250
251@Electronic{ TRAC:07,
252        title = "Welcome to the Trac Project",
253        howpublished = "http://trac.edgewall.org/",
254        year = "2007",
255        author = {}
256}
257
258@Book{ TONITO:14,
259        title = "Trasteando con la bibliografía",
260        author = "Antonio Araujo ",
261        editor = "CENDITEL",
262        publisher = "CENDITEL",
263        year = "2014",
264        address = "Mérida"
265}
266
267
268@Electronic{ IEEEhowto:espana,
269        title = "Portal del DNI Electrónico Español",
270        author = {},
271        howpublished = "http://www.dnielectronico.es/",
272        year = "2012"
273}
274
275@Article{ IEEEhowto:eID,
276        title = "Electronic Identity Cards for User Authentication Promise and Practice",
277        author = "Andreas Poller, Ulrich Waldmann, Sven Vowe, Sven Turpe",
278        journal = "IEEE Security \& Privacy",
279        year = "2013",
280        volume = "10",
281        pages = "46--54"
282}
283
284@Electronic{ IEEEhowto:estonia,
285        title = "Oficial Gateway to Estonia",
286        author = {},
287        howpublished = "http://estonia.eu/about-estonia/economy-a-it/e-estonia.html",
288        year = "2013"
289}
290
291
292
293@Book{ IEEEhowto:software,
294        title = "Ingeniería del Software",
295        author = "Campderrich Falgueras",
296        publisher = "Editorial UOC",
297        year = "2003",
298        address = "Barcelona, España"
299}
300
301@Electronic{ IEEEhowto:directiva,
302        title = "DIRECTIVA 1999/93/CE DEL PARLAMENTO EUROPEO Y DEL CONSEJO",
303        author = {},
304        howpublished = "http://www.cert.fnmt.es/legsoporte/D\_1999\_93\_CE.pdf",
305        year = "1999"
306}
307
308@Electronic{ IEEEhowto:x509,
309        title = "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. Request for Comments (RFC) 5280",
310        author = {Cooper D.,  Santesson S., y otros},
311        howpublished = "http://www.ietf.org/rfc/rfc5280.txt",
312        year = "2013"
313}
314
315
316@Electronic{ IEEEhowto:pkcs7,
317        title = "PKCS\#7.Cryptographic Message Syntax",
318        author = {},
319        howpublished = "https://tools.ietf.org/html/rfc2315",
320        year = "2013"
321}
322
323
324@Electronic{ IEEEhowto:pades,
325        title = "PAdES. PDF Advance Electronic Signatures",
326        author = {},
327        howpublished = "http://www.etsi.org/deliver/etsi\_ts/102700\_102799/10277801/01.01.01\_60/ts\_10277801v010101p.pdf",
328        year = "2013"
329}
330
331@Electronic{ IEEEhowto:xmldsig,
332        title = "XML Signature Syntax and Processing (Second Edition). W3C Recommendation 10 June 2008",
333        author = {Bartel M., Boyer J., y otros},
334        howpublished = "http://www.w3.org/TR/xmldsig-core/",
335        year = "2013"
336}
337
338@Electronic{ IEEEhowto:bdoc,
339        title = "Formato para firmas electrónicas",
340        author = {},
341        howpublished = "http://www.signature.it/-TOOLS/Bdoc-1.0.pdf",
342        year = "2013"
343}
344
345
346@Article{ IEEEhowto:neubauer,
347        title = "Digital signatures with familiar appearance for e-government documents: authentic PDF",
348        author = "Neubauer, T.; Weippl, E.; Biffl, S.",
349        journal = "Proceedings of the First International Conference on Availability, Reliability and Security",
350        year = "2006",
351        volume = {},
352        pages = "723--731"
353}
354
355@Book{ IEEEhowto:java,
356        title = "Professional Java, JDK",
357        author = "Richardson Clay, Avondolio Donald, others",
358        publisher = "Wrox",
359        year = "2005",
360}
361
362@Electronic{ IEEEhowto:xades,
363        title = "XML Advanced Electronic Signatures (XAdES)",
364        author = "Cruellas, J. Karlinger G., y otros",
365        howpublished = "http://www.w3.org/TR/XAdES/",
366        year = "2003"
367}
368
369@Electronic{ IEEEhowto:mime,
370        title = "Security Multiparts for MIME. Multipart/Signed and Multipart/Encrypted",
371        author = "Galvin , J. Murphy, S. Crocker, S. Freed, N.",
372        howpublished = "http://tools.ietf.org/html/rfc1847",
373        year = "2013"
374}
375
376
377@Electronic{ IEEEhowto:pkcs12,
378        title = "PKCS\#12.Personal Information Exchange Syntax Standard.",
379        author = "RSA Laboratories.",
380        howpublished = "https://www.rsa.com/rsalabs/node.asp?id=2138",
381        year = "2013"
382}
383
384
385@Book{ IEEEhowto:bpel,
386        title = "Business Process Execution for Web Services BPEL and BPEL4WS",
387        author = "Matjaz Juric, Mathew Benny",
388        publisher = "Packt Publishing",
389        year = "2006",
390}
391
392
393@Article{ IEEEhowto:safet,
394        title = "SAFET: Sistema para la generación de aplicaciones de firma electrónica",
395        author = "Araujo, A., Bravo, V.",
396        journal = "Revista Puente",
397        year = "2011",
398        volume = "6",
399}
400
401
402% referencias capítulo 7
403
404@Electronic{rlsm:terminology,
405        title = "Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology",
406        author = "Pfitzmann, A., Hansen, M.",
407        howpublished = "http://dud.inf.tu-dresden.de/Anon\_Terminology.shtml",
408        year = "2000"
409}
410
411@Article{rlsm:diaz01,
412        title = "Towards measuring Anonymity ",
413        author = "D\'{\i}az, C., Seys, S., Claessens, J., Preneel, B.",
414        journal = "Designing Privacy Enhancing Technologies",
415        year = "2002",
416        pages = "54--68",
417        volume = {},
418}
419
420@Article{rlsm:serj01,
421        title = "Towards an Information Theoretic Metric for Anonymity",
422        author = "Serjantov, A., Danezis, G.",
423        journal = "Proceedings of Privacy Enhancing Technologies Workshop",
424        year = "2002",
425        pages = "54--68",
426        volume = {},
427}
428
429
430@Article{ rlsm:chaum-mix,
431        title = "Untraceable electronic mail, return addresses, and digital pseudonyms",
432        author = "Chaum, D.",
433        journal = "Communications of the ACM",
434        year = "1981",
435        pages = {},
436        volume = "4",
437}
438
439
440@Article{ rlsm:diaz-mixes,
441        title = "Generalising Mixes",
442        author = "D\'{\i}az, C., Serjantov, A.",
443        journal = "Proceedings of Privacy Enhancing Technologies workshop",
444        year = "2003",
445        pages = "18--31",
446        volume = {},
447}
448
449
450@Article{ rlsm:mixminion,
451        title = "Mixminion: Design of a Type III Anonymous Remailer Protocol",
452        author = "Danezis, G., Dingledine, R., Mathewson, N.",
453        journal = "Proceedings of the 2003 IEEE Symposium on Security and Privacy",
454        year = "2003",
455        pages = "2--15",
456        volume = {},
457}
458
459@Article{rlsm:tor-design,
460        title = "Tor: The Second-Generation Onion Router",
461        author = "Dingledine, R., Mathewson, N., Syverson, P.",
462        journal = "Proceedings of the 13th USENIX Security Symposium",
463        year = "2004",
464        pages = {},
465        volume = {},
466}
467
468
469@Article{rlsm:antnet,
470        title = "AntNet: Distributed Stigmergetic Control for Communications Networks",
471        author = "Caro, G.D., Dorigo, M.",
472        journal = "Journal of Artificial Intelligence Research",
473        year = "1998",
474        pages = {},
475        volume = {},
476}
477
478@Article{ rlsm:ants-white,
479        title = "Connection Management using Adaptive Mobile Agents",
480        author = "White, T., Pagurek, B.",
481        journal = "Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications",
482        year = "1998",
483        pages = "802--809",
484        volume = {},
485}
486
487
488@Article{ rlsm:ants-loadbalancing,
489        title = "Ant-Based Load Balancing in Telecommunications Networks",
490        author = "Schoonderwoerd, R.",
491        journal = "Adaptive Behavior",
492        year = "1997",
493        pages = "169--207",
494        volume = "5",
495}
496
497
498@Article{ rlsm:shannon,
499        title = "The mathematical theory for communicactions",
500        author = "Shannon, C.",
501        journal = "Bell Systems Technical Journal",
502        year = "1948",
503        pages = "50--64",
504        volume = "30",
505}
506
507@Article{rlsm:yuxin,
508        title = "Measuring Anonymity with Relative Entropy",
509        author = "Deng, Y., Pang, J., Wu, P.",
510        journal = "Proceedings of the 4th International Workshop on Formal Aspects in Security and Trust",
511        year = "2007",
512        pages = "65--79",
513        volume = {},
514}
515
516
517@Article{rlsm:combinatorial,
518        title = "A Combinatorial Approach to Measuring Anonymity",
519        author = "Edman, M., Sivrikaya, F., Yener, B.",
520        journal = "Intelligence and Security Informatics",
521        year = "2007",
522        pages = "356--363",
523        volume = {},
524}
525
526
527@Article{rlsm:revisiting,
528        title = "Revisiting A Combinatorial Approach Toward Measuring Anonymity",
529        author = "Gierlichs, B., Troncoso, C., Diaz, C., Preneel, B., Verbauwhede, I.",
530        journal = "Workshop on Privacy in the Electronic Society",
531        year = "2008",
532        pages = "111--116",
533        volume = {},
534}
535
536
537@Article{rlsm:berthold,
538        title = "The Disavantages of Free Mix Routes and How to overcome them",
539        author = "Berthold, O., Pfitzmann, A., Standtke, R.",
540        journal = "Proceedings of Privacy Enhancing Technologies Workshop",
541        year = "2001",
542        pages = "30--45",
543        volume = {},
544}
545
546
547@Article{ rlsm:reiter,
548        title = "Crowds: Anonymity for Web Transactions",
549        author = "Reiter, M., Rubin, A.",
550        journal = "ACM Transactions on Information and System Security",
551        year = "1998",
552        pages = {},
553        volume = "1",
554}
555
556
557@Electronic{ rlsm:vernier,
558        title = "What are Mean Squared Error and Root Mean Squared Error?.",
559        author = "Vernier, D., and Gastineau, J.",
560        howpublished = "http://www.vernier.com/til/1014/",
561        year = "2011"
562}
563
564
565@Article{ rlsm:jianhua,
566        title = "Divergences Measures Based in Shannon Entropy",
567        author = "Jianhua, L.",
568        journal = "IEEE Transactions on Information Theory",
569        year = "1991",
570        pages = {},
571        volume = "37",
572        number = "1",
573}
574
575% Referencias adicionales del capítulo 3.
576
577@TechReport{ico2006,
578author = {Information Commissioner Office},
579title = {Data protection technical guidance note: Privacy enhancing technologies (pets)},
580institution = {Information Commissioner Office},
581year = {2006},
582month = {April},
583}
584
585@TechReport{ONU1948,
586author = {Organización de las Naciones Unidas},
587title = {Derechos humanos para todos. Declaración Universal de los Derechos humanos},
588institution = {Organización de las Naciones Unidas},
589year = {1948}
590}
591
592@phdthesis{george-thesis,
593  title = {Better Anonymous Communications},
594  author = {George Danezis},
595  school = {University of Cambridge},
596  year = {2004},
597  month = {July},
598  www_tags = {selected},
599  www_section = {Anonymous communication},
600  www_pdf_url = {http://www.cl.cam.ac.uk/~gd216/thesis.pdf},
601}
602
603@inproceedings{ISDN-mixes,
604  title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},
605  author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},
606  booktitle = {Proceedings of the GI/ITG Conference on Communication in Distributed
607        Systems},
608  year = {1991},
609  month = {February},
610  pages = {451--463},
611  www_tags = {selected},
612  www_section = {Anonymous communication},
613  www_ps_gz_url = {http://www.semper.org/sirene/publ/PfPW_91TelMixeGI_NTG.ps.gz},
614}
615
616@inproceedings{esorics04-mauw,
617  title = {A formalization of anonymity and onion routing},
618  author = {S. Mauw and J. Verschuren and E.P. de Vink},
619  booktitle = {Proceedings of ESORICS 2004},
620  year = {2004},
621  location = {Sophia Antipolis},
622  pages = {109--124},
623  editor = {P. Samarati and P. Ryan and D. Gollmann and R. Molva},
624  publisher = {LNCS 3193},
625  www_tags = {selected},
626  www_section = {Formal methods},
627  www_pdf_url = {http://www.win.tue.nl/~ecss/downloads/esorics04.pdf},
628}
629
630@inproceedings{onion-discex00,
631  title = {{O}nion {R}outing Access Configurations},
632  author = {Paul Syverson and Michael Reed and David Goldschlag},
633  booktitle = {Proceedings of the DARPA Information Survivability Conference and Exposition
634        (DISCEX 2000)},
635  volume = {1},
636  year = {2000},
637  pages = {34--40},
638  publisher = {IEEE CS Press},
639  www_ps_gz_url = {http://www.onion-router.net/Publications/DISCEX-2000.ps.gz},
640  www_tags = {selected},
641  www_abstract_url = {http://www.onion-router.net/Publications.html},
642  www_section = {Anonymous communication},
643  www_pdf_url = {http://www.onion-router.net/Publications/DISCEX-2000.pdf},
644  www_ps_url = {http://www.onion-router.net/Publications/DISCEX-2000.ps},
645}
646
647@inproceedings{onion-routingpet2000,
648  title = {{Towards an Analysis of Onion Routing Security}},
649  author = {Paul Syverson and Gene Tsudik and Michael Reed and Carl Landwehr},
650  booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design
651        Issues in Anonymity and Unobservability},
652  year = {2000},
653  month = {July},
654  pages = {96--114},
655  editor = {H. Federrath},
656  publisher = {Springer-Verlag, LNCS 2009},
657  www_important = {1},
658  www_tags = {selected},
659  www_section = {Anonymous communication},
660  www_ps_gz_url = {http://www.onion-router.net/Publications/WDIAU-2000.ps.gz},
661}
662
663@inproceedings{danezispet2004,
664  title = {The Traffic Analysis of Continuous-Time Mixes},
665  author = {George Danezis},
666  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
667  volume = {3424},
668  year = {2004},
669  month = {May},
670  pages = {35--50},
671  series = {LNCS},
672  www_important = {1},
673  www_tags = {selected},
674  www_section = {Traffic analysis},
675  www_pdf_url = {http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf},
676}
677
678@inproceedings{timing-fc2004,
679  title = {Timing Attacks in Low-Latency Mix-Based Systems},
680  author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew K. Wright},
681  booktitle = {Proceedings of Financial Cryptography (FC '04)},
682  year = {2004},
683  month = {February},
684  pages = {251--265},
685  editor = {Ari Juels},
686  publisher = {Springer-Verlag, LNCS 3110},
687  www_tags = {selected},
688  www_section = {Traffic analysis},
689  www_pdf_url = {http://www.cs.umass.edu/~mwright/papers/levine-timing.pdf},
690}
691
692@inproceedings{SS03,
693  title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
694  author = {Andrei Serjantov and Peter Sewell},
695  booktitle = {Proceedings of ESORICS 2003},
696  year = {2003},
697  month = {October},
698  www_tags = {selected},
699  www_remarks = {An investigation of packet counting attacks (which work best on lightly loaded networks) and connection-start timing attacks.},
700  www_ps_url = {http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps},
701  www_section = {Traffic analysis},
702}
703
704@inproceedings{flow-correlation04,
705  title = {On Flow Correlation Attacks and Countermeasures in Mix Networks},
706  author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao},
707  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
708  volume = {3424},
709  year = {2004},
710  month = {May},
711  pages = {207--225},
712  series = {LNCS},
713  www_tags = {selected},
714  www_section = {Traffic analysis},
715  www_pdf_url = {http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf},
716}
717
718@inproceedings{WangCJ05,
719  title = {Tracking anonymous peer-to-peer VoIP calls on the internet},
720  author = {Xinyuan Wang and Shiping Chen and Sushil Jajodia},
721  booktitle = {Proceedings of the ACM Conference on Computer and Communications Security},
722  year = {2005},
723  month = {November},
724  pages = {81--91},
725  www_tags = {selected},
726  www_section = {Anonymous communication},
727  www_pdf_url = {http://ise.gmu.edu/~xwangc/Publications/CCS05-VoIPTracking.pdf},
728}
729
730@inproceedings{e2e-traffic,
731  title = {Practical Traffic Analysis: Extending and Resisting Statistical Disclosure},
732  author = {Nick Mathewson and Roger Dingledine},
733  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
734  volume = {3424},
735  year = {2004},
736  month = {May},
737  pages = {17--34},
738  series = {LNCS},
739  www_important = {1},
740  www_tags = {selected},
741  www_section = {Traffic analysis},
742  www_pdf_url = {http://freehaven.net/doc/e2e-traffic/e2e-traffic.pdf},
743}
744
745@inproceedings{back01,
746  title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
747  author = {Adam Back and Ulf M\"oller and Anton Stiglic},
748  booktitle = {Proceedings of Information Hiding Workshop (IH 2001)},
749  year = {2001},
750  month = {April},
751  pages = {245--257},
752  editor = {Ira S. Moskowitz},
753  publisher = {Springer-Verlag, LNCS 2137},
754  www_important = {1},
755  www_tags = {selected},
756  www_section = {Traffic analysis},
757  www_pdf_url = {http://www.cypherspace.org/adam/pubs/traffic.pdf},
758}
759
760@inproceedings{hs-attack06,
761  title = {Locating Hidden Servers},
762  author = {Lasse {\O}verlier and Paul Syverson},
763  booktitle = {Proceedings of the 2006 IEEE Symposium on Security and Privacy},
764  year = {2006},
765  month = {May},
766  publisher = {IEEE CS},
767  www_important = {1},
768  www_tags = {selected},
769  www_pdf_url = {http://www.onion-router.net/Publications/locating-hidden-servers.pdf},
770  www_remarks = {Motivates and describes Tor's entry guard design.},
771  www_section = {Traffic analysis},
772}
773
774
775@MastersThesis{maestriaRSumoza,
776author = {Rodolfo Sumoza},
777title = {Sistemas Anónimos en Escenarios Globales},
778school = {Universidad Complutense de Madrid},
779year = {2008},
780}
781
782@inproceedings{traffic_analysis,
783author = {J. F. Raymond},
784editor = {H. Federrath},
785title = {Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems},
786booktitle = {Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability - Springer-Verlag, LNCS},
787year = {2000},
788}
789
790@inproceedings{timing_ssh,
791author = {Dawn Xiaodong Song; David Wagner; Xuqing Tian},
792editor = {USENIX Association},
793title = {Timing Analysis of Keystrokes and Timing Attacks on SSH},
794booktitle = {Proceedings of the 10th USENIX Security Symposium},
795year = {2001},
796}
797
798@online{cenditel_anonimato,
799author = {Endira Mora et. al},
800title = {Gestión de Anonimato},
801year = {2014},
802url = {https://tibisay.cenditel.gob.ve/gestionanonimato/wiki/PlanDeTrabajo%3A},
803}
804
805@inproceedings{cebolla,
806  title = {{Cebolla: Pragmatic IP Anonymity}},
807  author = {Zach Brown},
808  booktitle = {Proceedings of the 2002 Ottawa Linux Symposium},
809  year = {2002},
810  month = {June},
811  www_tags = {selected},
812  www_pdf_url = {http://cypherspace.org/cebolla/cebolla.pdf},
813  www_remarks = {Written by a former Freedom developer, Cebolla has a UDP-based design
814        similar to second-generation Freedom. The initiator incrementally builds her
815        circuit, giving her end-to-end forward-secrecy and also better recovery from
816        broken nodes.},
817  www_section = {Anonymous communication},
818}
819
820@Electronic{ SCHNEIER:14,
821        title = "Choosing Secure Passwords",
822        howpublished = "http://boingboing.net/2014/02/25/choosing-a-secure-password.html",
823        year = "2014",
824        author = {Bruce Schneier}
825}
826
827
828@online{CHALBAUD:13,
829        author = {Chalbaud, R.},
830        title = {Derechos Humanos y su protección Constitucional},
831        year = {2013},
832        url = {http},
833}
834
835@Article{ OBERTO-GOVEA,
836        title = "Algunas Consideraciones sobre Habeas Data",
837        author = "Oberto, M., Govea, M.",
838        journal = "revista Telematique",
839        year = "2008",
840        pages = {},
841        volume = "7",
842        number = "3",
843}
844
845@online{UTAH:2014,
846        author = {Horacio Fernandez Delpech},
847        title = {Ley del Estado de Utah sobre la Firma Digital. Código Comentado. Título 46, Capítulo 3},
848        year = {1996},
849        url = {http://www.hfernandezdelpech.com.ar/LegislacionYproExtEEEUUELeyEstadoUtahFirmaDig.htm},
850}
851
852
853
854
855@Book{ PAREDES:2008,
856        title = "Transformación de la cultura de servicios de información: una visión legal y de tecnologías",
857        author = "Paredes, A.",
858        publisher = "",
859        year = "2008",
860}
861
862@Book{ SALAZAR,
863        title = "Habeas Data en el derecho Comparado",
864        author = "Salazar, E.",
865        publisher = "",
866        year = "2008",
867}
868
869@Book{ OBERTO-GUERRERO,
870        title = "Preguntarle a Endira",
871        author = "Oberto y Guerrero",
872        publisher = "",
873        year = "0000",
874}
875
876@Book{ ZAGARRA:2010,
877        title = "Marco Legal de las Tecnologías de la Información y comunicación",
878        author = "Zagarra R. Marco",
879        publisher = "",
880        year = "2010",
881}
882
883
884@Book{ FUENTES:2007,
885        title = "Marco Legal de la Informática y la computación",
886        author = "Fuentes, F.",
887        publisher = "Vadell Hermanos",
888        year = "2007",
889        country="Venezuela",
890}
891
892@Electronic{UNIVERSIDADABIERTA:MEXICO,
893        author = {Universidad Abierta},
894        title = {Delitos Informáticos},
895        year = {},
896        howpublished = {http://www.universidadabierta.edu.mx},
897       
898}
899
900@Electronic{TIPOSPENALES:2014,
901        author = {},
902        title = {Los tipos penales en la Ley Especial contra Delitos Informáticos},
903        year = {},
904        howpublished = {http://beatrizditotto.net/2010/01/01/introduccion/},
905        urldate = {01-08-2014}
906}
907
908
909@Book{ LOGRERIA:2008,
910        title = "Análisis critico de la tipicidad prevista en algunos artículos de la ley especial contra delitos Informáticos venezolana",
911        author = "Logreria, C., Fuentes F.",
912        publisher = "Revista Electrónica de Estudios Telemáticos URBE",
913        year = "2008",
914        country="Venezuela",
915}
916
917@Book{ PENARANDA:2011,
918        title = "La Firma Electrónica Digital en Venezuela",
919        author = "Peñaranda, H., Héctor R.",
920        publisher = "Universidad del Zulia",
921        year = "2011",
922        country="Venezuela",
923}
924
925
926@Book{ ODREMAN:2003,
927        title = "Eficacia Probatoria del mensaje de datos y de la Firma electrónica según la nueva Ley de Mensaje de Datos y Firmas Electrónicas",
928        author = "Odreman, G.",
929        publisher = "UCAB",
930        year = "2003",
931        country="Venezuela",
932}
933
934
935@Book{ LONRENZETTI:2000,
936        title = "Comercio Electrónico",
937        author = "Lonrenzetti, R.",
938        publisher = "Abeledo-Perrot",
939        year = "2000",
940        country="Argentina",
941}
942
943@Book{ URDANETA:2010,
944        title = "Los Mensajes de Datos y la Firma Electrónica (Seguridad Jurídica que ofrecen y Valor Probatorio) ",
945        author = "Urdaneta B., José V.",
946        publisher = "",
947        year = "2010",
948        country="Venezuela",
949}
950
951@Book{ RONDON,
952        title = "Comentarios generales al Decreto ley de Mensaje de  Datos y Firmas electrónicas de la República Bolivariana de Venezuela",
953        author = "Rondón, A.",
954        publisher = "",
955        year = "0000",
956        country="Venezuela",
957}
958
959@online{LEYMODELOCNUDMI:1996,
960        author = {Comisión de las Naciones Unidas para el Derecho Mercantil Internacional},
961        title = {Ley Modelo de la CNUDMI sobre Comercio Electrónico con la Guía para su incorporación al derecho interno},
962        year = {1996},
963        url = {http://www.uncitral.org/pdf/spanish/texts/electcom/05-89453_S_Ebook.pdf},
964}
965
966@Article{CLIC:13,
967        title = "Título",
968        author = "Autor",
969        journal = "Revista El Clic",
970        year = "2013",
971        pages = "",
972        volume = "1",
973}
974
975@online{GOBIERNOELECTRONICOENVENEZUELA,
976        author = {UCB},
977        title = {Gobierno Eelctrónico},
978        year = {2014},
979        url = {},
980}
981
982@Book{ COLINA:05,
983        title = "Seducir y Controlar.",
984        author = "Colina, C.",
985        publisher = "UCB",
986        year = "2005",
987        country="Venezuela",
988}
989
990@Article{CRISTOS:03,
991        title = "Privacidad y Protección de Datos Personales en Internet, ¿Es necesario contar con una regulación especifica en México?",
992        author = "Cristos Velasco",
993        journal = "Boletín de Política Informática I",
994        year = "2003",
995        pages = "",
996        volume = "",
997}
998
999@Book{ FLORES:09,
1000        title = "Derecho Informático.",
1001        author = "Flores, L.",
1002        publisher = "Grupo Editorial Patria",
1003        year = "2009",
1004        country="México",
1005}
1006
1007@Book{ GAMBA:10,
1008        title = "Panorama del derecho Informático en América Latina y el Caribe.",
1009        author = "Gamba, J.",
1010        publisher = "CEPAL",
1011        year = "2010",
1012        country="",
1013}
1014
1015
1016% referencias del prologo
1017
1018@Article{GOMARA:07,
1019        title = "Frankenstein, un espejo de la identidad humana",
1020        author = "Ramalle Gómara, E.",
1021        journal = "Berceo",
1022        year = "2007",
1023        pages = "81-96",
1024        volume = "153",
1025}
1026
1027@Electronic{BOLIVAR:1819,
1028        author = {Bolívar, S.},
1029        title = {Discurso ante el Congreso de Angostura el 15 de Febrero de 1819},
1030        year = {1819},
1031        howpublished = {http://es.wikisource.org/},
1032}
1033
1034@Book{ ANDERSON:1983,
1035        title = "Imagined Communities. Reflections on the Origin and Spread of Nationalism.",
1036        author = "Anderson, B.",
1037        publisher = "Verso",
1038        year = "1998",
1039        country="EE.UU.",
1040        address="New York"
1041}
1042
1043
1044@Book{ MACINTYRE:1981,
1045        title = "After Virtue. A Study in Moral Theory.",
1046        author = "MacIntyre, A",
1047        publisher = "University of Notre Dame Press",
1048        address = "Indiana",
1049        year = "1984",
1050        country="EE.UU."
1051}
1052
1053
1054@Book{ ARENDT:1958,
1055        title = "The Human Condition.",
1056        author = "Arendt, H.",
1057        publisher = "The University of Chicago Press",
1058        year = "1998",
1059        country="EE.UU."
1060}
1061
1062@online{SHELLEY:1818,
1063        author = {Shelley, M.},
1064        title = {Frankenstein o el Moderno Prometeo},
1065        year = {2004},
1066        url = {http://www.librosenred.com/},
1067}
1068
1069
1070@Book{ IDENTIDADDIGITAL:2014,
1071        title = "Seguridad Informática y la Identidad Digital",
1072        author = "Araujo, A., Bravo, V., Sumoza, R.",
1073        publisher = "Centro Nacional de Desarrollo e Investigación en Tecnologías Libres",
1074        year = "2014",
1075        country="Venezuela"
1076}
1077
1078@Book{ MATTHEWS:2008,
1079        title = "Identity and Information Technology. En Information Technology and Moral Philosophy",
1080        author = "Matthews, S.",
1081        publisher = "Cambridge",
1082        year = "2006",
1083        country="EE.UU."
1084}
1085
1086
1087@Book{ NAIM:2006,
1088        title = "Ilícito. Cómo traficantes, contrabandistas y piratas están cambiando el mundo.",
1089        author = "Naím, M.",
1090        publisher = "Debate",
1091        year = "2006",
1092        country="Caracas, Venezuela"
1093}
1094
1095@Book{ ETZIONI:1999,
1096        title = "The Limits of Privacy",
1097        author = "Etzioni, A.",
1098        publisher = "Basic Book",
1099        year = "2006",
1100        country="New York, EE.UU."
1101}
1102
1103
1104@Article{FUENMAYOR:1991,
1105        title = "The Roots of Reductionism: a Counter-Ontoepistemology for a Systems Approach",
1106        author = "Fuenmayor, R.",
1107        journal = "Systems Practice",
1108        year = "1991",
1109        pages = "",
1110        volume = "4",
1111}
1112
1113@Book{ PETTIT:2008,
1114        title = "Trust, reliance and the internet. En Information Technology and Moral Philosophy",
1115        author = "Pettit, P.",
1116        publisher = "Cambridge",
1117        year = "2008",
1118        country="EE.UU."
1119}
1120
1121@Article{SANDEL:1989,
1122        title = "Moral Argument and Liberal Toleration: Abortion and Homosexuality.",
1123        author = "Sandel, M.",
1124        journal = "California Law Review.",
1125        year = "1989",
1126        pages = "",
1127        volume = "77",
1128}
1129
1130
1131@Article{OHARROW:1998,
1132        title = "Health Plans' Access to Pharmacy Data Raises Concerns about Privacy.",
1133        author = "O'harrow, R.",
1134        journal = "The Seattle Times",
1135        year = "1998",
1136        pages = "",
1137        volume = "",
1138}
1139
1140@Article{MARKOFF:2002,
1141        title = "Pentagon Plans a Computer Systems that Would Peek at Personal Data of Americans.",
1142        author = "Markoff, J.",
1143        journal = "The New York Times",
1144        year = "2002",
1145        pages = "",
1146        volume = "",
1147}
1148
1149@Article{GREENWALD:2013,
1150        title = "NSA collecting phone records of millions of Verizon customers daily.",
1151        author = "Greenwald, G.",
1152        journal = "The Guardian",
1153        year = "2013",
1154        pages = "",
1155        volume = "",
1156}
1157
1158@Book{ GREENWALD:2014,
1159        title = "No Place to Hide. Edward Snowden, the NSA and the Surveillance State.",
1160        author = "Greenwald, G.",
1161        publisher = "Penguin Books Ltd.",
1162        year = "2014",
1163        country="United Kingdom"
1164}
1165
1166@Article{GELLMANSOLTANI:2013,
1167        title = "NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say.",
1168        author = "Gellman, B. y Soltani, A.",
1169        journal = "The Washington Post.",
1170        year = "2013",
1171        pages = "",
1172        volume = "",
1173}
1174
1175@Article{NEWYORKTIMES:2013,
1176        title = "Documents Show N.S.A. Efforts to Spy Both Enemies and Allies.",
1177        author = "New York Times",
1178        journal = "New York Times.",
1179        year = "2013",
1180        pages = "",
1181        volume = "",
1182}
1183
1184
1185@Book{ VANDENHOVEN:2008,
1186        title = "Information Technology, privacy, and the protection of personal data. En Information Technology and Moral Philosophy",
1187        author = "Van den Hoven, J.",
1188        publisher = "Cambridge",
1189        year = "2008",
1190        country="EE.UU."
1191}
1192
1193
1194
1195@Article{RORTY:1996,
1196        title = "Who are we? Moral Universalism and Economic Triage.",
1197        author = "Rorty, R.",
1198        journal = "Segundo Foro de Filosofía de la Unesco",
1199        year = "1996",
1200        pages = "",
1201        volume = "",
1202}
1203
1204
1205% referencias del capitulo 10
1206
1207@Electronic{DRAE:CIBERNETICA,
1208        author = {Real Academia de la Lengua Española},
1209        title = {Diccionario de la Lengua Española (DRAE)},
1210        year = {2001},
1211        howpublished = {http://lema.rae.es/drae/?val=cibernética},
1212}
1213
1214@Book{ WIENER:1998,
1215        title = "Human use of human beings: Cybernetics and society.",
1216        author = "Wiener, N.",
1217        publisher = "Da Capo Press",
1218        year = "1998",
1219        country=""
1220}
1221
1222
1223@Article{BURTSEVA:2013,
1224        title = "Norbert Wiener: Padre de la cibernética.",
1225        author = "Burtseva, L., Tyrsa, V., Ríos, B., Flores, L.",
1226        journal = "Revista UABC",
1227        year = "2013",
1228        pages = "48",
1229        volume = "4",
1230        number = "54",
1231}
1232
1233@Book{ ASHBY:1957,
1234        title = "An introduction to cybernetics",
1235        author = "Ashby, R",
1236        publisher = "Chapman \& Hall",
1237        year = "1957",
1238        country=""
1239}
1240
1241@Book{ GIBSON:1984,
1242        title = "Neuromante",
1243        author = "Gibson, W.",
1244        publisher = "Minotauro",
1245        year = "1984",
1246        country=""
1247}
1248
1249@Article{CICOGNANI:1998,
1250        title = "On the linguistic nature of cyberspace and virtual communities",
1251        author = "Cicognani, A.",
1252        journal = "Virtual reality",
1253        year = "1998",
1254        pages = "20",
1255        volume = "3",
1256        number = "1",
1257}
1258
1259@Article{POST:2013,
1260        title = "Against’Against Cyberanarchy",
1261        author = "Cicognani, A.",
1262        journal = "Berkeley Technology Law Journal",
1263        year = "2002",
1264        pages = "10",
1265        volume = "17",
1266        number = "",
1267}
1268
1269@Article{ANDERS:2001,
1270        title = "Anthropic cyberspace: Defining electronic space from first principles",
1271        author = "Andres, P.",
1272        journal = "Leonardo",
1273        year = "2001",
1274        pages = "405",
1275        volume = "34",
1276        number = "5",
1277}
1278
1279
1280@Article{FLORES:2012,
1281        title = "Los Ámbitos no Terrestres en la Guerra Futura: Ciberespacio",
1282        author = "Flores, H.",
1283        journal = "Centro Superior de Estudios de la Defensa Nacional Monografías del Ceseden",
1284        year = "2012",
1285        pages = "18",
1286        volume = "",
1287        number = "128",
1288}
1289
1290@Article{FRITZ:2013,
1291        title = "The Semantics of Cyber Warfare",
1292        author = "Fritz, J.",
1293        journal = "East Asia Security Symposium and Conference",
1294        year = "2013",
1295        pages = "2",
1296        volume = "1",
1297        number = "7",
1298}
1299
1300
1301@Book{ WINTERFELD:2012,
1302        title = "The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice",
1303        author = "Winterfeld, S., Andress, J.",
1304        publisher = "Elsevier Inc.",
1305        year = "2012",
1306        country=""
1307}
1308
1309@Article{MCGRAW:2013,
1310        title = "Cyber War is Inevitable (Unless We Build Security In)",
1311        author = "McGraw, G.",
1312        journal = "Journal of Strategic Studies",
1313        year = "2013",
1314        pages = "111--112",
1315        volume = "36",
1316        number = "1",
1317}
1318
1319@inproceedings{ALI:2013,
1320author = {Kostyuk Nadiya; Alí Marielle},
1321editor = {The Society of Digital Information and Wireless Communication},
1322title = {The Cyber Dogs of War: Joint Efforts of Future World Leaders in The Prevention of Cyberwarfare},
1323booktitle = {The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013)},
1324year = {2013},
1325}
1326
1327@Article{LEWIS:2010,
1328        title = "The cyber war has not begun",
1329        author = "Lewis, J.",
1330        journal = "Center for Strategic and International Studies",
1331        year = "2010",
1332        pages = "",
1333        volume = "",
1334        number = "",
1335}
1336
1337@Article{FERRERO:2013,
1338        title = "La Ciberguerra. Génesis y Evolución",
1339        author = "Ferrero, J.",
1340        journal = "Revista General de Marina",
1341        year = "2013",
1342        pages = "87",
1343        volume = "",
1344        number = "Enero-Febrero",
1345}
1346
1347@Article{KIRAVUO:2013,
1348        title = "Offensive Cyber-capabilities against Critical Infrastructure",
1349        author = "Kiravuo, T.",
1350        journal = "Cyber Warfare. National Defence University. Department of Military Technology",
1351        year = "2013",
1352        pages = "90",
1353        volume = "",
1354        number = "34",
1355}
1356
1357@Article{FOJON:2011,
1358        title = "Ciberespacio: La Nueva Dimensión del Entorno Operativo",
1359        author = "Sanz, A., Fojón, E.",
1360        journal = "Centro Superior de Estudios de la Defensa Nacional Monografías del Ceseden",
1361        year = "2011",
1362        pages = "43",
1363        volume = "",
1364        number = "44",
1365}
1366
1367@Article{SALMINEN:2013,
1368        title = "The Fog of Cyber Defence",
1369        author = "Rantapelkonen, J., Salminen, M.",
1370        journal = "National Defence University. Department of Leadership and Military Pedagogy",
1371        year = "2013",
1372        pages = "11",
1373        volume = "",
1374        number = "2",
1375}
1376
1377
1378
1379@Article{STARR:2009,
1380        title = "Towards an Evolving Theory of Cyberpower",
1381        author = "Starr, S.",
1382        journal = "The Virtual Battlefield: Perspectives on Cyber Warfare",
1383        year = "2013",
1384        pages = "22--24",
1385        volume = "3",
1386        number = "",
1387}
1388
1389@Article{OLSON:2012,
1390        title = "El boxeo con un contrincante imaginario. La guerra cibernética y el ataque económico estratégico",
1391        author = "Olson, S.",
1392        journal = "Military Review",
1393        year = "2012",
1394        pages = "67",
1395        volume = "",
1396        number = "Noviembre-Diciembre",
1397}
1398
1399@Article{COLOM:2009,
1400        title = "El nuevo concepto estadounidense para el empleo de la fuerza militar",
1401        author = "Colom, G.",
1402        journal = "ARI: Seguridad y Defensa",
1403        year = "2009",
1404        pages = "2",
1405        volume = "",
1406        number = "70",
1407}
1408
1409
1410@Electronic{DoD:2012,
1411        author = {Panetta, L.},
1412        title = {Remarks by Secretary Panetta on Cybersecurity to the Business Executives for National Security},
1413        year = {2012},
1414        howpublished = {http://www.defense.gov/transcripts/transcript.aspx?transcriptid=5136},
1415}
1416
1417@Electronic{CHINESE:2013,
1418        author = {Chinese People's Liberation Army},
1419        title = {Pentagon's cyberattack accusations irresponsible: expert},
1420        year = {2013},
1421        howpublished = {http://eng.chinamil.com.cn/news-channels/pla-daily-commentary/2013-05/08/content\_5333521.htm},
1422}
1423
1424@Article{STONE:2013,
1425        title = "Cyber War Will Take Place!",
1426        author = "Stone, J.",
1427        journal = "Journal of Strategic Studies",
1428        year = "2013",
1429        pages = "107",
1430        volume = "36",
1431        number = "1",
1432}
1433
1434@Book{ HARRISON:2012,
1435        title = "Cyber Warfare and the Laws of War",
1436        author = "Harrison, H.",
1437        publisher = "Cambridge University Press",
1438        year = "2012",
1439        country=""
1440}
1441
1442@Article{RID:2012,
1443        title = "Cyber war will not take place",
1444        author = "Stone, J.",
1445        journal = "Journal of Strategic Studies",
1446        year = "2013",
1447        pages = "9",
1448        volume = "35",
1449        number = "1",
1450}
1451
1452
1453@Article{JUNIO:2013,
1454        title = "How Probable is Cyber War? Bringing IR Theory Back In to the Cyber Conflict Debate",
1455        author = "Junio, T.",
1456        journal = "Journal of Strategic Studies",
1457        year = "2013",
1458        pages = "130",
1459        volume = "36",
1460        number = "1",
1461}
1462
1463@misc{BEIDLEMAN:2009,
1464    author    = "Beidleman, S.",
1465    title     = "Defining and Deterring Cyber War",
1466    year     = "2009",
1467}
1468
1469@Article{SANCHEZ:2010,
1470        title = "La nueva estrategia comunicativa de los grupos terroristas",
1471        author = "Sánchez, G.",
1472        journal = "Revista Enfoques",
1473        year = "2010",
1474        pages = "203",
1475        volume = "VIII",
1476        number = "12",
1477}
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
Note: See TracBrowser for help on using the repository browser.