source: libros/maquetacion/bibliography.bib @ c267779

Last change on this file since c267779 was c267779, checked in by José Joaquín Contreras <joaquin@…>, 10 years ago

Merge branch 'master' of https://tibisay.cenditel.gob.ve/publicaciones/scm/git/libros

Conflicts:

maquetacion/capitulo9/capitulo9.tex

  • Property mode set to 100644
File size: 44.5 KB
Line 
1% Archivo de bibliografia para el libro de seguridad
2
3% referencias capítulo 5
4
5@Book{ NIC:03,
6        author = "R. Nichols and P. C. Lekkas",
7        editor = "McGraw-Hill",
8        title = "Seguridad para comunicaciones inal{\'a}mbricas",
9        publisher = "McGraw-Hill",
10        year = "2003",
11        OPTkey = "",
12        OPTvolume = "",
13        OPTnumber = "",
14        OPTseries = "",
15        OPTaddress = "Mexico",
16        OPTedition = "",
17        OPTmonth = "",
18        OPTnote = "",
19        OPTannote = "",
20        author = "R. Nichols and P. C. Lekkas"
21}
22
23@Book{ ACE:03,
24        author = "Vicente Aceituno Canal",
25        editor = "Noriega Editores",
26        title = "Seguridad de la información",
27        publisher = "Noriega Editores",
28        year = "2003",
29        OPTkey = "",
30        OPTvolume = "",
31        OPTnumber = "",
32        OPTseries = "",
33        OPTaddress = "M'exico D.F., M'exico",
34        OPTedition = "",
35        OPTmonth = "M'exico D.F.",
36        OPTnote = "",
37        OPTannote = "",
38}
39
40@Book{ KURT:01,
41        author = "Kurt Wall et al",
42        editor = "Prentice Hall",
43        title = "Programación en Linux",
44        publisher = "Prentice Hall",
45        year = "2001",
46        OPTkey = "",
47        OPTvolume = "",
48        OPTnumber = "",
49        OPTseries = "",
50        OPTaddress = "Madrid, Espa~na",
51        OPTedition = "",
52        OPTmonth = "",
53        OPTnote = "",
54        OPTannote = "",
55}
56
57@Book{ SARW:03,
58        author = "Sarwar, Koretsky",
59        editor = "Pearson, Prentice Hall",
60        title = "El libro de Linux",
61        publisher = "Prentice Hall",
62        year = "2003",
63        OPTkey = "",
64        OPTvolume = "",
65        OPTnumber = "",
66        OPTseries = "",
67        OPTaddress = "Madrid, Espa~na",
68        OPTedition = "",
69        OPTmonth = "",
70        OPTnote = "",
71        OPTannote = "",
72}
73
74
75@Book{ STRO:02,
76        author = "Bjarne Stroustrup",
77        editor = "Addison Wesley",
78        title = "El lenguaje de programaci{\'o}n C++",
79        publisher = "Addison Wesley",
80        year = "2002",
81        OPTkey = "",
82        OPTvolume = "",
83        OPTnumber = "",
84        OPTseries = "",
85        OPTaddress = "Madrid, Espa{\~n}a",
86        OPTedition = "",
87        OPTmonth = "",
88        OPTnote = "",
89        OPTannote = ""
90}
91
92@Book{ BLAN:06,
93        author = "James Blanchette and Mark Summerfield",
94        editor = "Prentice Hall",
95        title = "C++ GUI Programming with Qt 4",
96        publisher = "Prentice Hall",
97        year = "2006",
98        OPTkey = "",
99        OPTvolume = "",
100        OPTnumber = "",
101        OPTseries = "",
102        OPTaddress = "Massachusetts, USA",
103        OPTedition = "",
104        OPTmonth = "",
105        OPTnote = "",
106        OPTannote = ""
107}
108
109@Book{ STAL:03,
110        author = "William Stallings",
111        editor = "Pearson",
112        title = "Fundamentos de Seguridad de Redes. Aplicaciones y Est{\'a}ndares",
113        publisher = "Prentice Hall",
114        year = "2003",
115        OPTkey = "",
116        OPTvolume = "",
117        OPTnumber = "",
118        OPTseries = "",
119        OPTaddress = "Espa{\~n}a",
120        OPTedition = "2",
121        OPTmonth = "",
122        OPTnote = "",
123        OPTannote = ""
124}
125
126@Book{ PRESS:05,
127        author = "Roger S. Pressman",
128        editor = "Mc Graw-Hill",
129        title = "Ingeniería del software. Un enfoque práctico",
130        publisher = "Mc Graw-Hill",
131        year = "2005",
132        OPTkey = "",
133        OPTvolume = "",
134        OPTnumber = "",
135        OPTseries = "",
136        OPTaddress = "Mexico",
137        OPTedition = "6",
138        OPTmonth = "",
139        OPTnote = "",
140        OPTannote = ""
141}
142
143@Book{ NASH:02,
144        author = "Andrew Nash, William Duane, Celia Joseph and Joseph Brink",
145        editor = "McGraw-Hill",
146        title = "PKI: Infraestructura de clave p{\'u}blica",
147        publisher = "McGraw-Hill",
148        year = "2002",
149        OPTkey = "",
150        OPTvolume = "",
151        OPTnumber = "",
152        OPTseries = "",
153        OPTaddress = "Mexico",
154        OPTedition = "",
155        OPTmonth = "",
156        OPTnote = "",
157        OPTannote = ""
158}
159
160@Book{ RANKL:04,
161        author = "Wolfgang Rankl, Wolfgang Effing",
162        title = "Smart Card Handbook",
163        publisher = "Wiley",
164        year = "2004",
165        OPTkey = "",
166        OPTvolume = "",
167        OPTnumber = "",
168        OPTseries = "",
169        OPTaddress = "Mexico",
170        OPTedition = "3",
171        OPTmonth = "",
172        OPTnote = "",
173        OPTannote = ""
174}
175
176@Article{ PERL:99,
177        author = "R. Perlman",
178        title = "An overview of PKI trust models",
179        journal = "Network, IEEE",
180        year = "1999",
181        OPTkey = "",
182        OPTvolume = "",
183        OPTnumber = "",
184        OPTpages = "",
185        OPTmonth = "",
186        OPTnote = "",
187        OPTannote = ""
188}
189
190@Book{ SCHM:03,
191        title = "Aprendiendo UML en 24 horas",
192        author = "Joseph Schmuller",
193        editor = "Prentice Hall",
194        publisher = "Prentice Hall",
195        year = "2003",
196        address = "M{\'e}xico"
197}
198
199@Book{ VIEG:2002,
200        title = "Network Security with OpenSSL",
201        author = "John Viega and Matt Messier and Pravir Chandra",
202        publisher = "O'Really",
203        edition = "384",
204        year = "2002"
205}
206
207@Book{ BOOC:99,
208        title = "UML Lenguaje Unificado de Modelado",
209        author = "G., Booch",
210        publisher = "Addison Wesley",
211        year = "1999"
212}
213
214@Book{ MULL:97,
215        title = "Modelado de objetos con UML",
216        author = "Alain Pierre-Muller",
217        publisher = "Eyrolles",
218        address = "Barcelona, Espa\~na",
219        year = "1997"
220}
221
222@Book{ PILA:04,
223        title = "Version Control with Subversion ",
224        author = "C. Michael Pilato and Ben Collins-Sussman and Brian W. Fitzpatrick",
225        publisher = "O'Really ",
226        year = "2004"
227}
228
229@Electronic{ XCA:03,
230        title = "XCA, una interfaz gr\'afica para OpenSSL, Claves p\'ublicas y privadas, certificados, solicitudes y listas de revocaci'on",
231        howpublished = "http://www.hohnstaedt.de/xca.html",
232        year = "2003",
233        author = {Christian Hohnst\"{a}dt}
234}
235
236@Electronic{ IBM:98,
237        title = "IBM Corporation. An overview of the IBM SET and the IBM CommercePoint Products",
238        howpublished = "http://www.software.ibm.com/commerce/set/overview.html",
239        year = "2003",
240        author = {IBM Corporation}
241}
242
243
244
245@Electronic{ FSF:07,
246        title = "Free Software Definition",
247        howpublished = "http://www.fsf.org/licensing/essays/free-sw.html",
248        year = "2007",
249        author = {}
250}
251
252@Electronic{ TRAC:07,
253        title = "Welcome to the Trac Project",
254        howpublished = "http://trac.edgewall.org/",
255        year = "2007",
256        author = {}
257}
258
259@Book{ TONITO:14,
260        title = "Trasteando con la bibliografía",
261        author = "Antonio Araujo ",
262        editor = "CENDITEL",
263        publisher = "CENDITEL",
264        year = "2014",
265        address = "Mérida"
266}
267
268% referencias capítulo 6
269
270
271@Electronic{ IEEEhowto:espana,
272        title = "Portal del {DNI Electrónico Español}",
273        author = {},
274        howpublished = "http://www.dnielectronico.es/",
275        year = "2012"
276}
277
278@Article{ IEEEhowto:eID,
279        title = "Electronic Identity Cards for User Authentication Promise and Practice",
280        author = "Andreas Poller and Ulrich Waldmann and Sven Vowe and Sven Turpe",
281        journal = "IEEE Security \& Privacy",
282        year = "2013",
283        volume = "10",
284        pages = "46--54"
285}
286
287@Electronic{ IEEEhowto:estonia,
288        title = "Oficial Gateway to {Estonia}",
289        author = {},
290        howpublished = "http://estonia.eu/about-estonia/economy-a-it/e-estonia.html",
291        year = "2013"
292}
293
294
295
296@Book{ IEEEhowto:software,
297        title = "Ingeniería del Software",
298        author = "Campderrich Falgueras",
299        publisher = "Editorial UOC",
300        year = "2003",
301        address = "Barcelona, España"
302}
303
304@Electronic{ IEEEhowto:directiva,
305        title = "DIRECTIVA 1999/93/{CE} DEL {P}ARLAMENTO {E}UROPEO Y DEL {C}ONSEJO",
306        author = {},
307        howpublished = "http://www.cert.fnmt.es/legsoporte/D\_1999\_93\_CE.pdf",
308        year = "1999"
309}
310
311@Electronic{ IEEEhowto:x509,
312        title = "Internet {X.509} {Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile}. {Request for Comments} ({RFC}) 5280",
313        author = {Cooper, D. and Santesson, S. and others},
314        howpublished = "http://www.ietf.org/rfc/rfc5280.txt",
315        year = "2013"
316}
317
318
319@Electronic{ IEEEhowto:pkcs7,
320        title = "{PKCS\#7}. {Cryptographic Message Syntax}",
321        author = {},
322        howpublished = "https://tools.ietf.org/html/rfc2315",
323        year = "2013"
324}
325
326
327@Electronic{ IEEEhowto:pades,
328        title = "{PAdES}. {PDF Advance Electronic Signatures}",
329        author = {ETSI},
330        year = {2013},
331        howpublished = {http://www.etsi.org/deliver/etsi\_ts/102700\_102799/10277801/01.01.01\_60/ts\_10277801 v010101p.pdf},
332}
333
334@Electronic{ IEEEhowto:xmldsig,
335        title = "{XML Signature Syntax and Processing (Second Edition). W3C Recommendation 10 June 2008}",
336        author = {Bartel, M. and Boyer, J. and others},
337        howpublished = "http://www.w3.org/TR/xmldsig-core/",
338        year = "2013"
339}
340
341@Electronic{ IEEEhowto:bdoc,
342        title = "Formato para firmas electrónicas",
343        author = {},
344        howpublished = "http://www.signature.it/-TOOLS/Bdoc-1.0.pdf",
345        year = "2013"
346}
347
348
349@Article{ IEEEhowto:neubauer,
350        title = "Digital signatures with familiar appearance for e-government documents: authentic {PDF}",
351        author = "Neubauer, T. and Weippl, E. and Biffl, S.",
352        journal = "Proceedings of the First International Conference on Availability, Reliability and Security",
353        year = "2006",
354        volume = {},
355        pages = "723--731"
356}
357
358@Book{ IEEEhowto:java,
359        title = "{Professional Java, JDK}",
360        author = "Richardson Clay and Avondolio Donald and others",
361        publisher = "Wrox",
362        year = "2005",
363}
364
365@Electronic{ IEEEhowto:xades,
366        title = "{XML Advanced Electronic Signatures (XAdES)}",
367        author = "Cruellas, J. and Karlinger, G. and others",
368        howpublished = "http://www.w3.org/TR/XAdES/",
369        year = "2003"
370}
371
372@Electronic{ IEEEhowto:mime,
373        title = "{Security Multiparts for MIME. Multipart/Signed and Multipart/Encrypted}",
374        author = "Galvin, J. and Murphy, S. and Crocker, S. and Freed, N.",
375        howpublished = "http://tools.ietf.org/html/rfc1847",
376        year = "2013"
377}
378
379
380@Electronic{ IEEEhowto:pkcs12,
381        title = "{PKCS\#12. Personal Information Exchange Syntax Standard}",
382        author = "{RSA Laboratories}",
383        howpublished = "https://www.rsa.com/rsalabs/node.asp?id=2138",
384        year = "2013"
385}
386
387
388@Book{ IEEEhowto:bpel,
389        title = "{Business Process Execution for Web Services BPEL and BPEL4WS}",
390        author = "Matjaz Juric and Mathew Benny",
391        publisher = "Packt Publishing",
392        year = "2006",
393}
394
395
396@Article{ IEEEhowto:safet,
397        title = "{SAFET: Sistema para la generación de aplicaciones de firma electrónica}",
398        author = "Araujo, A. and Bravo, V.",
399        journal = "Revista Puente",
400        year = "2011",
401        volume = "6",
402}
403
404
405% referencias capítulo 7
406
407@Electronic{rlsm:terminology,
408        title = "Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology",
409        author = "Pfitzmann, A., Hansen, M.",
410        howpublished = "http://dud.inf.tu-dresden.de/Anon\_Terminology.shtml",
411        year = "2000"
412}
413
414@Article{rlsm:diaz01,
415        title = "Towards measuring Anonymity ",
416        author = "D\'{\i}az, C., Seys, S., Claessens, J., Preneel, B.",
417        journal = "Designing Privacy Enhancing Technologies",
418        year = "2002",
419        pages = "54--68",
420        volume = {},
421}
422
423@Article{rlsm:serj01,
424        title = "Towards an Information Theoretic Metric for Anonymity",
425        author = "Serjantov, A., Danezis, G.",
426        journal = "Proceedings of Privacy Enhancing Technologies Workshop",
427        year = "2002",
428        pages = "54--68",
429        volume = {},
430}
431
432
433@Article{ rlsm:chaum-mix,
434        title = "Untraceable electronic mail, return addresses, and digital pseudonyms",
435        author = "Chaum, D.",
436        journal = "Communications of the ACM",
437        year = "1981",
438        pages = {},
439        volume = "4",
440}
441
442
443@Article{ rlsm:diaz-mixes,
444        title = "Generalising Mixes",
445        author = "D\'{\i}az, C., Serjantov, A.",
446        journal = "Proceedings of Privacy Enhancing Technologies workshop",
447        year = "2003",
448        pages = "18--31",
449        volume = {},
450}
451
452
453@Article{ rlsm:mixminion,
454        title = "Mixminion: Design of a Type III Anonymous Remailer Protocol",
455        author = "Danezis, G., Dingledine, R., Mathewson, N.",
456        journal = "Proceedings of the 2003 IEEE Symposium on Security and Privacy",
457        year = "2003",
458        pages = "2--15",
459        volume = {},
460}
461
462@Article{rlsm:tor-design,
463        title = "Tor: The Second-Generation Onion Router",
464        author = "Dingledine, R., Mathewson, N., Syverson, P.",
465        journal = "Proceedings of the 13th USENIX Security Symposium",
466        year = "2004",
467        pages = {},
468        volume = {},
469}
470
471
472@Article{rlsm:antnet,
473        title = "AntNet: Distributed Stigmergetic Control for Communications Networks",
474        author = "Caro, G.D., Dorigo, M.",
475        journal = "Journal of Artificial Intelligence Research",
476        year = "1998",
477        pages = {},
478        volume = {},
479}
480
481@Article{ rlsm:ants-white,
482        title = "Connection Management using Adaptive Mobile Agents",
483        author = "White, T., Pagurek, B.",
484        journal = "Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications",
485        year = "1998",
486        pages = "802--809",
487        volume = {},
488}
489
490
491@Article{ rlsm:ants-loadbalancing,
492        title = "Ant-Based Load Balancing in Telecommunications Networks",
493        author = "Schoonderwoerd, R.",
494        journal = "Adaptive Behavior",
495        year = "1997",
496        pages = "169--207",
497        volume = "5",
498}
499
500
501@Article{ rlsm:shannon,
502        title = "The mathematical theory for communicactions",
503        author = "Shannon, C.",
504        journal = "Bell Systems Technical Journal",
505        year = "1948",
506        pages = "50--64",
507        volume = "30",
508}
509
510@Article{rlsm:yuxin,
511        title = "Measuring Anonymity with Relative Entropy",
512        author = "Deng, Y., Pang, J., Wu, P.",
513        journal = "Proceedings of the 4th International Workshop on Formal Aspects in Security and Trust",
514        year = "2007",
515        pages = "65--79",
516        volume = {},
517}
518
519
520@Article{rlsm:combinatorial,
521        title = "A Combinatorial Approach to Measuring Anonymity",
522        author = "Edman, M., Sivrikaya, F., Yener, B.",
523        journal = "Intelligence and Security Informatics",
524        year = "2007",
525        pages = "356--363",
526        volume = {},
527}
528
529
530@Article{rlsm:revisiting,
531        title = "Revisiting A Combinatorial Approach Toward Measuring Anonymity",
532        author = "Gierlichs, B., Troncoso, C., Diaz, C., Preneel, B., Verbauwhede, I.",
533        journal = "Workshop on Privacy in the Electronic Society",
534        year = "2008",
535        pages = "111--116",
536        volume = {},
537}
538
539
540@Article{rlsm:berthold,
541        title = "The Disavantages of Free Mix Routes and How to overcome them",
542        author = "Berthold, O., Pfitzmann, A., Standtke, R.",
543        journal = "Proceedings of Privacy Enhancing Technologies Workshop",
544        year = "2001",
545        pages = "30--45",
546        volume = {},
547}
548
549
550@Article{ rlsm:reiter,
551        title = "Crowds: Anonymity for Web Transactions",
552        author = "Reiter, M., Rubin, A.",
553        journal = "ACM Transactions on Information and System Security",
554        year = "1998",
555        pages = {},
556        volume = "1",
557}
558
559
560@Electronic{ rlsm:vernier,
561        title = "What are Mean Squared Error and Root Mean Squared Error?.",
562        author = "Vernier, D., and Gastineau, J.",
563        howpublished = "http://www.vernier.com/til/1014/",
564        year = "2011"
565}
566
567
568@Article{ rlsm:jianhua,
569        title = "Divergences Measures Based in Shannon Entropy",
570        author = "Jianhua, L.",
571        journal = "IEEE Transactions on Information Theory",
572        year = "1991",
573        pages = {},
574        volume = "37",
575        number = "1",
576}
577
578% Referencias adicionales del capítulo 3.
579
580@TechReport{ico2006,
581author = {Information Commissioner Office},
582title = {Data protection technical guidance note: Privacy enhancing technologies (pets)},
583institution = {Information Commissioner Office},
584year = {2006},
585month = {April},
586}
587
588@TechReport{ONU1948,
589author = {Organización de las Naciones Unidas},
590title = {Derechos humanos para todos. Declaración Universal de los Derechos humanos},
591institution = {Organización de las Naciones Unidas},
592year = {1948}
593}
594
595@phdthesis{george-thesis,
596  title = {Better Anonymous Communications},
597  author = {George Danezis},
598  school = {University of Cambridge},
599  year = {2004},
600  month = {July},
601  www_tags = {selected},
602  www_section = {Anonymous communication},
603  www_pdf_url = {http://www.cl.cam.ac.uk/~gd216/thesis.pdf},
604}
605
606@inproceedings{ISDN-mixes,
607  title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},
608  author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},
609  booktitle = {Proceedings of the GI/ITG Conference on Communication in Distributed
610        Systems},
611  year = {1991},
612  month = {February},
613  pages = {451--463},
614  www_tags = {selected},
615  www_section = {Anonymous communication},
616  www_ps_gz_url = {http://www.semper.org/sirene/publ/PfPW_91TelMixeGI_NTG.ps.gz},
617}
618
619@inproceedings{esorics04-mauw,
620  title = {A formalization of anonymity and onion routing},
621  author = {S. Mauw and J. Verschuren and E.P. de Vink},
622  booktitle = {Proceedings of ESORICS 2004},
623  year = {2004},
624  location = {Sophia Antipolis},
625  pages = {109--124},
626  editor = {P. Samarati and P. Ryan and D. Gollmann and R. Molva},
627  publisher = {LNCS 3193},
628  www_tags = {selected},
629  www_section = {Formal methods},
630  www_pdf_url = {http://www.win.tue.nl/~ecss/downloads/esorics04.pdf},
631}
632
633@inproceedings{onion-discex00,
634  title = {{O}nion {R}outing Access Configurations},
635  author = {Paul Syverson and Michael Reed and David Goldschlag},
636  booktitle = {Proceedings of the DARPA Information Survivability Conference and Exposition
637        (DISCEX 2000)},
638  volume = {1},
639  year = {2000},
640  pages = {34--40},
641  publisher = {IEEE CS Press},
642  www_ps_gz_url = {http://www.onion-router.net/Publications/DISCEX-2000.ps.gz},
643  www_tags = {selected},
644  www_abstract_url = {http://www.onion-router.net/Publications.html},
645  www_section = {Anonymous communication},
646  www_pdf_url = {http://www.onion-router.net/Publications/DISCEX-2000.pdf},
647  www_ps_url = {http://www.onion-router.net/Publications/DISCEX-2000.ps},
648}
649
650@inproceedings{onion-routingpet2000,
651  title = {{Towards an Analysis of Onion Routing Security}},
652  author = {Paul Syverson and Gene Tsudik and Michael Reed and Carl Landwehr},
653  booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design
654        Issues in Anonymity and Unobservability},
655  year = {2000},
656  month = {July},
657  pages = {96--114},
658  editor = {H. Federrath},
659  publisher = {Springer-Verlag, LNCS 2009},
660  www_important = {1},
661  www_tags = {selected},
662  www_section = {Anonymous communication},
663  www_ps_gz_url = {http://www.onion-router.net/Publications/WDIAU-2000.ps.gz},
664}
665
666@inproceedings{danezispet2004,
667  title = {The Traffic Analysis of Continuous-Time Mixes},
668  author = {George Danezis},
669  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
670  volume = {3424},
671  year = {2004},
672  month = {May},
673  pages = {35--50},
674  series = {LNCS},
675  www_important = {1},
676  www_tags = {selected},
677  www_section = {Traffic analysis},
678  www_pdf_url = {http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf},
679}
680
681@inproceedings{timing-fc2004,
682  title = {Timing Attacks in Low-Latency Mix-Based Systems},
683  author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew K. Wright},
684  booktitle = {Proceedings of Financial Cryptography (FC '04)},
685  year = {2004},
686  month = {February},
687  pages = {251--265},
688  editor = {Ari Juels},
689  publisher = {Springer-Verlag, LNCS 3110},
690  www_tags = {selected},
691  www_section = {Traffic analysis},
692  www_pdf_url = {http://www.cs.umass.edu/~mwright/papers/levine-timing.pdf},
693}
694
695@inproceedings{SS03,
696  title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
697  author = {Andrei Serjantov and Peter Sewell},
698  booktitle = {Proceedings of ESORICS 2003},
699  year = {2003},
700  month = {October},
701  www_tags = {selected},
702  www_remarks = {An investigation of packet counting attacks (which work best on lightly loaded networks) and connection-start timing attacks.},
703  www_ps_url = {http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps},
704  www_section = {Traffic analysis},
705}
706
707@inproceedings{flow-correlation04,
708  title = {On Flow Correlation Attacks and Countermeasures in Mix Networks},
709  author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao},
710  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
711  volume = {3424},
712  year = {2004},
713  month = {May},
714  pages = {207--225},
715  series = {LNCS},
716  www_tags = {selected},
717  www_section = {Traffic analysis},
718  www_pdf_url = {http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf},
719}
720
721@inproceedings{WangCJ05,
722  title = {Tracking anonymous peer-to-peer VoIP calls on the internet},
723  author = {Xinyuan Wang and Shiping Chen and Sushil Jajodia},
724  booktitle = {Proceedings of the ACM Conference on Computer and Communications Security},
725  year = {2005},
726  month = {November},
727  pages = {81--91},
728  www_tags = {selected},
729  www_section = {Anonymous communication},
730  www_pdf_url = {http://ise.gmu.edu/~xwangc/Publications/CCS05-VoIPTracking.pdf},
731}
732
733@inproceedings{e2e-traffic,
734  title = {Practical Traffic Analysis: Extending and Resisting Statistical Disclosure},
735  author = {Nick Mathewson and Roger Dingledine},
736  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
737  volume = {3424},
738  year = {2004},
739  month = {May},
740  pages = {17--34},
741  series = {LNCS},
742  www_important = {1},
743  www_tags = {selected},
744  www_section = {Traffic analysis},
745  www_pdf_url = {http://freehaven.net/doc/e2e-traffic/e2e-traffic.pdf},
746}
747
748@inproceedings{back01,
749  title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
750  author = {Adam Back and Ulf M\"oller and Anton Stiglic},
751  booktitle = {Proceedings of Information Hiding Workshop (IH 2001)},
752  year = {2001},
753  month = {April},
754  pages = {245--257},
755  editor = {Ira S. Moskowitz},
756  publisher = {Springer-Verlag, LNCS 2137},
757  www_important = {1},
758  www_tags = {selected},
759  www_section = {Traffic analysis},
760  www_pdf_url = {http://www.cypherspace.org/adam/pubs/traffic.pdf},
761}
762
763@inproceedings{hs-attack06,
764  title = {Locating Hidden Servers},
765  author = {Lasse {\O}verlier and Paul Syverson},
766  booktitle = {Proceedings of the 2006 IEEE Symposium on Security and Privacy},
767  year = {2006},
768  month = {May},
769  publisher = {IEEE CS},
770  www_important = {1},
771  www_tags = {selected},
772  www_pdf_url = {http://www.onion-router.net/Publications/locating-hidden-servers.pdf},
773  www_remarks = {Motivates and describes Tor's entry guard design.},
774  www_section = {Traffic analysis},
775}
776
777
778@MastersThesis{maestriaRSumoza,
779author = {Rodolfo Sumoza},
780title = {Sistemas Anónimos en Escenarios Globales},
781school = {Universidad Complutense de Madrid},
782year = {2008},
783}
784
785@inproceedings{traffic_analysis,
786author = {J. F. Raymond},
787editor = {H. Federrath},
788title = {Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems},
789booktitle = {Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability - Springer-Verlag, LNCS},
790year = {2000},
791}
792
793@inproceedings{timing_ssh,
794author = {Dawn Xiaodong Song; David Wagner; Xuqing Tian},
795editor = {USENIX Association},
796title = {Timing Analysis of Keystrokes and Timing Attacks on SSH},
797booktitle = {Proceedings of the 10th USENIX Security Symposium},
798year = {2001},
799}
800
801@Electronic{cenditel_anonimato,
802author = {Endira Mora et. al},
803title = {Gestión de Anonimato},
804year = {2014},
805howpublished = {https://tibisay.cenditel.gob.ve/gestionanonimato/wiki/PlanDeTrabajo%3A},
806}
807
808@inproceedings{cebolla,
809  title = {{Cebolla: Pragmatic IP Anonymity}},
810  author = {Zach Brown},
811  booktitle = {Proceedings of the 2002 Ottawa Linux Symposium},
812  year = {2002},
813  month = {June},
814  www_tags = {selected},
815  www_pdf_url = {http://cypherspace.org/cebolla/cebolla.pdf},
816  www_remarks = {Written by a former Freedom developer, Cebolla has a UDP-based design
817        similar to second-generation Freedom. The initiator incrementally builds her
818        circuit, giving her end-to-end forward-secrecy and also better recovery from
819        broken nodes.},
820  www_section = {Anonymous communication},
821}
822
823@Electronic{ SCHNEIER:14,
824        title = "Choosing Secure Passwords",
825        howpublished = "http://boingboing.net/2014/02/25/choosing-a-secure-password.html",
826        year = "2014",
827        author = {Bruce Schneier}
828}
829
830
831@online{CHALBAUD:13,
832        author = {Chalbaud, R.},
833        title = {Derechos Humanos y su protección Constitucional},
834        year = {2013},
835        url = {http},
836}
837
838@Article{ OBERTO-GOVEA,
839        title = "Algunas Consideraciones sobre Habeas Data",
840        author = "Oberto, M., Govea, M.",
841        journal = "revista Telematique",
842        year = "2008",
843        pages = {},
844        volume = "7",
845        number = "3",
846}
847
848@online{UTAH:2014,
849        author = {Horacio Fernandez Delpech},
850        title = {Ley del Estado de Utah sobre la Firma Digital. Código Comentado. Título 46, Capítulo 3},
851        year = {1996},
852        url = {http://www.hfernandezdelpech.com.ar/LegislacionYproExtEEEUUELeyEstadoUtahFirmaDig.htm},
853}
854
855
856
857
858@Book{ PAREDES:2008,
859        title = "Transformación de la cultura de servicios de información: una visión legal y de tecnologías",
860        author = "Paredes, A.",
861        publisher = "",
862        year = "2008",
863}
864
865@Book{ SALAZAR,
866        title = "Habeas Data en el derecho Comparado",
867        author = "Salazar, E.",
868        publisher = "",
869        year = "2008",
870}
871
872@Book{ OBERTO-GUERRERO,
873        title = "Preguntarle a Endira",
874        author = "Oberto y Guerrero",
875        publisher = "",
876        year = "0000",
877}
878
879@Book{ ZAGARRA:2010,
880        title = "Marco Legal de las Tecnologías de la Información y comunicación",
881        author = "Zagarra R. Marco",
882        publisher = "",
883        year = "2010",
884}
885
886
887@Book{ FUENTES:2007,
888        title = "Marco Legal de la Informática y la computación",
889        author = "Fuentes, F.",
890        publisher = "Vadell Hermanos",
891        year = "2007",
892        country="Venezuela",
893}
894
895@Electronic{UNIVERSIDADABIERTA:MEXICO,
896        author = {Universidad Abierta},
897        title = {Delitos Informáticos},
898        year = {},
899        howpublished = {http://www.universidadabierta.edu.mx},
900       
901}
902@Electronic{Bracho:2010,
903        author = {Pedro Bracho},
904        title = {JURISPRUDENCIA Concepto y Caracteristicas},
905        year = {2010},
906        howpublished = {http://es.scribd.com/doc/81250967/JURISPRUDENCIA-Concepto-y-Caracteristicas},
907       
908}
909@Electronic{TIPOSPENALES:2014,
910        author = {},
911        title = {Los tipos penales en la Ley Especial contra Delitos Informáticos},
912        year = {},
913        howpublished = {http://beatrizditotto.net/2010/01/01/introduccion/},
914        urldate = {01-08-2014}
915}
916
917
918@Book{ LOGRERIA:2008,
919        title = "Análisis critico de la tipicidad prevista en algunos artículos de la ley especial contra delitos Informáticos venezolana",
920        author = "Logreria, C., Fuentes F.",
921        publisher = "Revista Electrónica de Estudios Telemáticos URBE",
922        year = "2008",
923        country="Venezuela",
924}
925
926@Book{ PENARANDA:2011,
927        title = "La Firma Electrónica Digital en Venezuela",
928        author = "Peñaranda, H., Héctor R.",
929        publisher = "Universidad del Zulia",
930        year = "2011",
931        country="Venezuela",
932}
933
934
935@Book{ ODREMAN:2003,
936        title = "Eficacia Probatoria del mensaje de datos y de la Firma electrónica según la nueva Ley de Mensaje de Datos y Firmas Electrónicas",
937        author = "Odreman, G.",
938        publisher = "UCAB",
939        year = "2003",
940        country="Venezuela",
941}
942
943
944@Book{ LONRENZETTI:2000,
945        title = "Comercio Electrónico",
946        author = "Lonrenzetti, R.",
947        publisher = "Abeledo-Perrot",
948        year = "2000",
949        country="Argentina",
950}
951
952@Book{ URDANETA:2010,
953        title = "Los Mensajes de Datos y la Firma Electrónica (Seguridad Jurídica que ofrecen y Valor Probatorio) ",
954        author = "Urdaneta B., José V.",
955        publisher = "",
956        year = "2010",
957        country="Venezuela",
958}
959
960@Book{ RONDON,
961        title = "Comentarios generales al Decreto ley de Mensaje de  Datos y Firmas electrónicas de la República Bolivariana de Venezuela",
962        author = "Rondón, A.",
963        publisher = "",
964        year = "0000",
965        country="Venezuela",
966}
967
968@online{LEYMODELOCNUDMI:1996,
969        author = {Comisión de las Naciones Unidas para el Derecho Mercantil Internacional},
970        title = {Ley Modelo de la CNUDMI sobre Comercio Electrónico con la Guía para su incorporación al derecho interno},
971        year = {1996},
972        url = {http://www.uncitral.org/pdf/spanish/texts/electcom/05-89453_S_Ebook.pdf},
973}
974
975@Article{CLIC:13,
976        title = "Título",
977        author = "Autor",
978        journal = "Revista El Clic",
979        year = "2013",
980        pages = "",
981        volume = "1",
982}
983
984@online{GOBIERNOELECTRONICOENVENEZUELA,
985        author = {UCB},
986        title = {Gobierno Eelctrónico},
987        year = {2014},
988        url = {},
989}
990
991@Book{ COLINA:05,
992        title = "Seducir y Controlar.",
993        author = "Colina, C.",
994        publisher = "UCB",
995        year = "2005",
996        country="Venezuela",
997}
998
999@Article{CRISTOS:03,
1000        title = "Privacidad y Protección de Datos Personales en Internet, ¿Es necesario contar con una regulación especifica en México?",
1001        author = "Cristos Velasco",
1002        journal = "Boletín de Política Informática I",
1003        year = "2003",
1004        pages = "",
1005        volume = "",
1006}
1007
1008@Book{ FLORES:09,
1009        title = "Derecho Informático.",
1010        author = "Flores, L.",
1011        publisher = "Grupo Editorial Patria",
1012        year = "2009",
1013        country="México",
1014}
1015
1016@Book{ GAMBA:10,
1017        title = "Panorama del derecho Informático en América Latina y el Caribe.",
1018        author = "Gamba, J.",
1019        publisher = "CEPAL",
1020        year = "2010",
1021        country="",
1022}
1023
1024
1025% referencias del prologo
1026
1027@Article{GOMARA:07,
1028        title = "Frankenstein, un espejo de la identidad humana",
1029        author = "Ramalle Gómara, E.",
1030        journal = "Berceo",
1031        year = "2007",
1032        pages = "81-96",
1033        volume = "153",
1034}
1035
1036@Electronic{BOLIVAR:1819,
1037        author = {Bolívar, S.},
1038        title = {Discurso ante el Congreso de Angostura el 15 de Febrero de 1819},
1039        year = {1819},
1040        howpublished = {http://es.wikisource.org/},
1041}
1042
1043@Book{ ANDERSON:1983,
1044        title = "Imagined Communities. Reflections on the Origin and Spread of Nationalism.",
1045        author = "Anderson, B.",
1046        publisher = "Verso",
1047        year = "1998",
1048        country="EE.UU.",
1049        address="New York"
1050}
1051
1052
1053@Book{ MACINTYRE:1981,
1054        title = "After Virtue. A Study in Moral Theory.",
1055        author = "MacIntyre, A",
1056        publisher = "University of Notre Dame Press",
1057        address = "Indiana",
1058        year = "1984",
1059        country="EE.UU."
1060}
1061
1062
1063@Book{ ARENDT:1958,
1064        title = "The Human Condition.",
1065        author = "Arendt, H.",
1066        publisher = "The University of Chicago Press",
1067        year = "1998",
1068        country="EE.UU."
1069}
1070
1071@online{SHELLEY:1818,
1072        author = {Shelley, M.},
1073        title = {Frankenstein o el Moderno Prometeo},
1074        year = {2004},
1075        url = {http://www.librosenred.com/},
1076        translator = {La edición no menciona el nombre del traductor}
1077}
1078
1079@Book{ IDENTIDADDIGITAL:2014,
1080        title = "Seguridad Informática y la Identidad Digital",
1081        author = "Araujo, A., Bravo, V., Sumoza, R.",
1082        publisher = "Centro Nacional de Desarrollo e Investigación en Tecnologías Libres",
1083        year = "2014",
1084        country="Venezuela"
1085}
1086
1087@Book{ MATTHEWS:2008,
1088        title = "Identity and Information Technology. En Information Technology and Moral Philosophy",
1089        author = "Matthews, S.",
1090        publisher = "Cambridge",
1091        year = "2006",
1092        country="EE.UU."
1093}
1094
1095
1096@Book{ NAIM:2006,
1097        title = "Ilícito. Cómo traficantes, contrabandistas y piratas están cambiando el mundo.",
1098        author = "Naím, M.",
1099        publisher = "Debate",
1100        year = "2006",
1101        country="Caracas, Venezuela",
1102        translator = "Francisco Ramos"
1103}
1104
1105@Book{ ETZIONI:1999,
1106        title = "The Limits of Privacy",
1107        author = "Etzioni, A.",
1108        publisher = "Basic Book",
1109        year = "2006",
1110        country="New York, EE.UU."
1111}
1112
1113
1114@Article{FUENMAYOR:1991,
1115        title = "The Roots of Reductionism: a Counter-Ontoepistemology for a Systems Approach",
1116        author = "Fuenmayor, R.",
1117        journal = "Systems Practice",
1118        year = "1991",
1119        pages = "",
1120        volume = "4",
1121}
1122
1123@Book{ PETTIT:2008,
1124        title = "Trust, reliance and the internet. En Information Technology and Moral Philosophy",
1125        author = "Pettit, P.",
1126        publisher = "Cambridge",
1127        year = "2008",
1128        country="EE.UU."
1129}
1130
1131@Article{SANDEL:1989,
1132        title = "Moral Argument and Liberal Toleration: Abortion and Homosexuality.",
1133        author = "Sandel, M.",
1134        journal = "California Law Review.",
1135        year = "1989",
1136        pages = "",
1137        volume = "77",
1138}
1139
1140
1141@Article{OHARROW:1998,
1142        title = "Health Plans' Access to Pharmacy Data Raises Concerns about Privacy.",
1143        author = "O'harrow, R.",
1144        journal = "The Seattle Times",
1145        year = "1998",
1146        pages = "",
1147        volume = "",
1148}
1149
1150@Article{MARKOFF:2002,
1151        title = "Pentagon Plans a Computer Systems that Would Peek at Personal Data of Americans.",
1152        author = "Markoff, J.",
1153        journal = "The New York Times",
1154        year = "2002",
1155        pages = "",
1156        volume = "",
1157}
1158
1159@Article{GREENWALD:2013,
1160        title = "NSA collecting phone records of millions of Verizon customers daily.",
1161        author = "Greenwald, G.",
1162        journal = "The Guardian",
1163        year = "2013",
1164        pages = "",
1165        volume = "",
1166}
1167
1168@Book{ GREENWALD:2014,
1169        title = "No Place to Hide. Edward Snowden, the NSA and the Surveillance State.",
1170        author = "Greenwald, G.",
1171        publisher = "Penguin Books Ltd.",
1172        year = "2014",
1173        country="United Kingdom"
1174}
1175
1176@Article{GELLMANSOLTANI:2013,
1177        title = "NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say.",
1178        author = "Gellman, B. y Soltani, A.",
1179        journal = "The Washington Post.",
1180        year = "2013",
1181        pages = "",
1182        volume = "",
1183}
1184
1185@Article{NEWYORKTIMES:2013,
1186        title = "Documents Show N.S.A. Efforts to Spy Both Enemies and Allies.",
1187        author = "New York Times",
1188        journal = "New York Times.",
1189        year = "2013",
1190        pages = "",
1191        volume = "",
1192}
1193
1194
1195@Book{ VANDENHOVEN:2008,
1196        title = "Information Technology, privacy, and the protection of personal data. En Information Technology and Moral Philosophy",
1197        author = "Van den Hoven, J.",
1198        publisher = "Cambridge",
1199        year = "2008",
1200        country="EE.UU."
1201}
1202
1203
1204
1205@Article{RORTY:1996,
1206        title = "Who are we? Moral Universalism and Economic Triage.",
1207        author = "Rorty, R.",
1208        journal = "Segundo Foro de Filosofía de la Unesco",
1209        year = "1996",
1210        pages = "",
1211        volume = "",
1212}
1213
1214
1215% referencias del capitulo 10
1216
1217@Electronic{DRAE:CIBERNETICA,
1218        author = {Real Academia de la Lengua Española},
1219        title = {Diccionario de la Lengua Española (DRAE)},
1220        year = {2001},
1221        howpublished = {http://lema.rae.es/drae/?val=cibernética},
1222}
1223
1224@Book{ WIENER:1998,
1225        title = "Human use of human beings: Cybernetics and society.",
1226        author = "Wiener, N.",
1227        publisher = "Da Capo Press",
1228        year = "1998",
1229        country=""
1230}
1231
1232
1233@Article{BURTSEVA:2013,
1234        title = "Norbert Wiener: Padre de la cibernética.",
1235        author = "Burtseva, L., Tyrsa, V., Ríos, B., Flores, L.",
1236        journal = "Revista UABC",
1237        year = "2013",
1238        pages = "48",
1239        volume = "4",
1240        number = "54",
1241}
1242
1243@Book{ ASHBY:1957,
1244        title = "An introduction to cybernetics",
1245        author = "Ashby, R",
1246        publisher = "Chapman \& Hall",
1247        year = "1957",
1248        country=""
1249}
1250
1251@Book{ GIBSON:1984,
1252        title = "Neuromante",
1253        author = "Gibson, W.",
1254        publisher = "Minotauro",
1255        year = "1984",
1256        country=""
1257}
1258
1259@Article{CICOGNANI:1998,
1260        title = "On the linguistic nature of cyberspace and virtual communities",
1261        author = "Cicognani, A.",
1262        journal = "Virtual reality",
1263        year = "1998",
1264        pages = "20",
1265        volume = "3",
1266        number = "1",
1267}
1268
1269@Article{POST:2013,
1270        title = "Against’Against Cyberanarchy",
1271        author = "Post, D.",
1272        journal = "Berkeley Technology Law Journal",
1273        year = "2002",
1274        pages = "10",
1275        volume = "17",
1276        number = "",
1277}
1278
1279@Article{ANDERS:2001,
1280        title = "Anthropic cyberspace: Defining electronic space from first principles",
1281        author = "Andres, P.",
1282        journal = "Leonardo",
1283        year = "2001",
1284        pages = "405",
1285        volume = "34",
1286        number = "5",
1287}
1288
1289
1290@Article{FLORES:2012,
1291        title = "Los Ámbitos no Terrestres en la Guerra Futura: Ciberespacio",
1292        author = "Flores, H.",
1293        journal = "Centro Superior de Estudios de la Defensa Nacional Monografías del Ceseden",
1294        year = "2012",
1295        pages = "18",
1296        volume = "",
1297        number = "128",
1298}
1299
1300@Article{FRITZ:2013,
1301        title = "The Semantics of Cyber Warfare",
1302        author = "Fritz, J.",
1303        journal = "East Asia Security Symposium and Conference",
1304        year = "2013",
1305        pages = "2",
1306        volume = "1",
1307        number = "7",
1308}
1309
1310
1311@Book{ WINTERFELD:2012,
1312        title = "The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice",
1313        author = "Winterfeld, S., Andress, J.",
1314        publisher = "Elsevier Inc.",
1315        year = "2012",
1316        country=""
1317}
1318
1319@Article{MCGRAW:2013,
1320        title = "Cyber War is Inevitable (Unless We Build Security In)",
1321        author = "McGraw, G.",
1322        journal = "Journal of Strategic Studies",
1323        year = "2013",
1324        pages = "111--112",
1325        volume = "36",
1326        number = "1",
1327}
1328
1329@inproceedings{ALI:2013,
1330author = {Kostyuk N. and Alí M.},
1331editor = {The Society of Digital Information and Wireless Communication},
1332title = {The Cyber Dogs of War: Joint Efforts of Future World Leaders in The Prevention of Cyberwarfare},
1333booktitle = {The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013)},
1334year = {2013},
1335}
1336
1337@Article{LEWIS:2010,
1338        title = "The cyber war has not begun",
1339        author = "Lewis, J.",
1340        journal = "Center for Strategic and International Studies",
1341        year = "2010",
1342        pages = "",
1343        volume = "",
1344        number = "",
1345}
1346
1347@Article{FERRERO:2013,
1348        title = "La Ciberguerra. Génesis y Evolución",
1349        author = "Ferrero, J.",
1350        journal = "Revista General de Marina",
1351        year = "2013",
1352        pages = "87",
1353        volume = "",
1354        number = "Enero-Febrero",
1355}
1356
1357@Article{KIRAVUO:2013,
1358        title = "Offensive Cyber-capabilities against Critical Infrastructure",
1359        author = "Kiravuo, T.",
1360        journal = "Cyber Warfare. National Defence University. Department of Military Technology",
1361        year = "2013",
1362        pages = "90",
1363        volume = "",
1364        number = "34",
1365}
1366
1367@Article{FOJON:2011,
1368        title = "Ciberespacio: La Nueva Dimensión del Entorno Operativo",
1369        author = "Sanz, A., Fojón, E.",
1370        journal = "Centro Superior de Estudios de la Defensa Nacional Monografías del Ceseden",
1371        year = "2011",
1372        pages = "43",
1373        volume = "",
1374        number = "44",
1375}
1376
1377@Article{SALMINEN:2013,
1378        title = "The Fog of Cyber Defence",
1379        author = "Rantapelkonen, J., Salminen, M.",
1380        journal = "National Defence University. Department of Leadership and Military Pedagogy",
1381        year = "2013",
1382        pages = "11",
1383        volume = "",
1384        number = "2",
1385}
1386
1387
1388
1389@Article{STARR:2009,
1390        title = "Towards an Evolving Theory of Cyberpower",
1391        author = "Starr, S.",
1392        journal = "The Virtual Battlefield: Perspectives on Cyber Warfare",
1393        year = "2013",
1394        pages = "22--24",
1395        volume = "3",
1396        number = "",
1397}
1398
1399@Article{OLSON:2012,
1400        title = "El boxeo con un contrincante imaginario. La guerra cibernética y el ataque económico estratégico",
1401        author = "Olson, S.",
1402        journal = "Military Review",
1403        year = "2012",
1404        pages = "67",
1405        volume = "",
1406        number = "Noviembre-Diciembre",
1407}
1408
1409@Article{COLOM:2009,
1410        title = "El nuevo concepto estadounidense para el empleo de la fuerza militar",
1411        author = "Colom, G.",
1412        journal = "ARI: Seguridad y Defensa",
1413        year = "2009",
1414        pages = "2",
1415        volume = "",
1416        number = "70",
1417}
1418
1419
1420@Electronic{DoD:2012,
1421        author = {Panetta, L.},
1422        title = {Remarks by Secretary Panetta on Cybersecurity to the Business Executives for National Security},
1423        year = {2012},
1424        howpublished = {http://www.defense.gov/transcripts/transcript.aspx?transcriptid=5136},
1425}
1426
1427@Electronic{CHINESE:2013,
1428        author = {Chinese People's Liberation Army},
1429        title = {Pentagon's cyberattack accusations irresponsible: expert},
1430        year = {2013},
1431        howpublished = {http://eng.chinamil.com.cn/news-channels/pla-daily-commentary/2013-05/08/content\_5333521.htm},
1432}
1433
1434@Article{STONE:2013,
1435        title = "Cyber War Will Take Place!",
1436        author = "Stone, J.",
1437        journal = "Journal of Strategic Studies",
1438        year = "2013",
1439        pages = "107",
1440        volume = "36",
1441        number = "1",
1442}
1443
1444@Book{ HARRISON:2012,
1445        title = "Cyber Warfare and the Laws of War",
1446        author = "Harrison, H.",
1447        publisher = "Cambridge University Press",
1448        year = "2012",
1449        country=""
1450}
1451
1452@Article{RID:2012,
1453        title = "Cyber war will not take place",
1454        author = "Stone, J.",
1455        journal = "Journal of Strategic Studies",
1456        year = "2013",
1457        pages = "9",
1458        volume = "35",
1459        number = "1",
1460}
1461
1462
1463@Article{JUNIO:2013,
1464        title = "How Probable is Cyber War? Bringing IR Theory Back In to the Cyber Conflict Debate",
1465        author = "Junio, T.",
1466        journal = "Journal of Strategic Studies",
1467        year = "2013",
1468        pages = "130",
1469        volume = "36",
1470        number = "1",
1471}
1472
1473@misc{BEIDLEMAN:2009,
1474    author    = "Beidleman, S.",
1475    title     = "Defining and Deterring Cyber War",
1476    year     = "2009",
1477}
1478
1479@Article{SANCHEZ:2010,
1480        title = "La nueva estrategia comunicativa de los grupos terroristas",
1481        author = "Sánchez, G.",
1482        journal = "Revista Enfoques",
1483        year = "2010",
1484        pages = "203",
1485        volume = "VIII",
1486        number = "12",
1487}
1488
1489@Article{GOLDSMITH:2010,
1490        title = "The New Vulnerability (How Cyber Changes the Laws of War).",
1491        author = "Goldsmith, J.",
1492        journal = "The New Republic",
1493        year = "2010",
1494        pages = "",
1495        volume = "",
1496        number = "",
1497}
1498
1499@Article{BRENNER:2007,
1500        title = "“At light speed”: Attribution and response to cybercrime/terrorism/warfare",
1501        author = "Brenner, S.",
1502        journal = "The Journal of Criminal Law and Criminology",
1503        year = "2007",
1504        pages = "382",
1505        volume = "",
1506        number = "",
1507}
1508
1509@Book{ JANCZEWSKI:2008,
1510        title = "Cyber warfare and cyber terrorism",
1511        author = "Janczewski, L.,  Colarik, A.",
1512        publisher = "IGI Global",
1513        year = "2008",
1514        country=""
1515}
1516
1517@misc{ONU:1945,
1518    author    = "Organización de las Naciones Unidas",
1519    title     = "Carta de las Naciones Unidas. Entrada en vigor: 24 de octubre de 1945, de conformidad con el artículo 110",
1520    year     = "1945",
1521}
1522
1523@Article{HOISINGTON:2009,
1524        title = "Cyberwarfare and the Use of Force Giving Rise to the Right of Self-Defense",
1525        author = "Hoisington, M.",
1526        journal = "Boston College International and Comparative Law Review",
1527        year = "2009",
1528        pages = "446",
1529        volume = "32",
1530        number = "",
1531}
1532
1533@Article{BANKS:2013,
1534        title = "The Role of Counterterrorism Law in Shaping Ad Bellum Norms for Cyber War",
1535        author = "Banks, W.",
1536        journal = "89 INT’L L. STUD. 157. Available at SSRN 2160078",
1537        year = "2013",
1538        pages = "162",
1539        volume = "",
1540        number = "",
1541}
1542
1543
1544
1545@Article{BERNAL:1999,
1546        title = "Mercosur ¿Regionalismo o globalización? Tres aspectos para la decisión de políticas",
1547        author = "Bernal-Meza, R.",
1548        journal = "Revista Realidad Económica",
1549        year = "1999",
1550        pages = "2",
1551        volume = "",
1552        number = "165",
1553}
1554
1555
1556@Article{BIZZOZERO:2011,
1557        title = "América Latina a inicios de la segunda década del siglo XXI: entre el regionalismo estratégico y la regionalización fragmentada",
1558        author = "Bizzozero, Lincoln",
1559        journal = "Revista Brasileira de Política Internacional",
1560        year = "2011",
1561        pages = "36",
1562        volume = "54",
1563        number = "1",
1564}
1565
1566@misc{UNASUR:2008,
1567    author    = "UNASUR",
1568    title     = "Tratado Constitutivo de la Unión de Naciones Suramericanas",
1569    year     = "2008",
1570}
1571
1572@Article{SAINTPIERRE:2008,
1573        title = "El Consejo Sudamericano de Defensa",
1574        author = "Saint-Pierre, H.; Castro, G.",
1575        journal = "Boletín RESDAL",
1576        year = "2008",
1577        pages = "1",
1578        volume = "6",
1579        number = "29",
1580}
1581
1582@Book{ CLAUSEWITZ:2002,
1583        title = "De La Guerra.",
1584        author = "Clausewitz, C.",
1585        publisher = "Editorial Librodot",
1586        year = "2002",
1587        country=""
1588}
1589
1590
1591
1592@Electronic{CDS:2008,
1593        author = {Consejo de Defensa Sudamericano},
1594        title = {Objetivos Consejo de Defensa Suramericano UNASUR},
1595        year = {2008},
1596        howpublished = {http://www.unasursg.org/inicio/organizacion/consejos/cds},
1597}
1598
1599@misc{CEED:2012,
1600    author    = "CEED",
1601    title     = "Informe de Avance a diciembre de 2012 sobre Conceptos e
1602Institucionalidad de Seguridad y Defensa, Amenazas, Factores de Riesgo y Desafíos
1603del Consejo Sudamericano de Defensa",
1604    year     = "2012",
1605}
1606
1607@Article{MENEZES:2010,
1608        author = "Menezes, A.",
1609        title = "Regionalismo y seguridad sudamericana: ¿son relevantes el Mercosur y la Unasur? Íconos",
1610        journal = "Revista de Ciencias Sociales",
1611        year = "2010",
1612        pages = "41--53",
1613        volume = "",
1614        number = "38",
1615}
1616
1617@Electronic{DANTAS:2013,
1618        author = {Dantas, C. y Jeronimo, J.},
1619        title = {Como eles espionam. Istoe.},
1620        year = {2013},
1621        howpublished = {http://www.istoe.com.br/reportagens/paginar/323087\_COMO+ ELES+ESPIONAM/12},
1622}
1623
1624@Article{LIMNELL:2013,
1625        title = "Limnéll, J.",
1626        author = "Offensive Cyber Capabilities are Needed Because of Deterrence",
1627        journal = "The Fog of Cyber Defence",
1628        year = "2013",
1629        pages = "202--205",
1630        volume = "",
1631        number = "10",
1632}
1633
1634@misc{FORTI:2013,
1635    author    = "Forti, A.",
1636    title     = "El papel de la Defensa en una Estrategia Suramericana para el
1637    Aprovechamiento de los Recursos Naturales. Conferencia Suramericana Visiones
1638    Hacia Una Estrategia Para El Aprovechamiento de Los Recursos Naturales",
1639    year     = "2013",
1640}
1641
1642@misc{CDS:2012,
1643    author    = "Consejo de Defensa Sudamericano",
1644    title     = "Plan de Acción 2012 – CDS",
1645    year     = "2012",
1646}
1647
1648@Book{ ZEDONG:1976,
1649        title = "Problemas de la Guerra y de La Estrategia. ",
1650        author = "Zedong, M.",
1651        publisher = "Ediciones En Lenguas Extranjeras Pekín",
1652        year = "1976",
1653        country=""
1654}
1655
1656
1657@Electronic{ZIBECHI:2011,
1658        author = {Zibechi, R.},
1659        title = {La silenciosa revolución suramericana},
1660        year = {2011},
1661        howpublished = {http://www.jornada.unam.mx/2011/12/02/politica/025a1pol},
1662}
1663
1664@Article{HUOPIO:2013,
1665        title = "A Rugged Nation",
1666        author = "Hupio, S.",
1667        journal = "The Fog of Cyber Defence",
1668        year = "2013",
1669        pages = "127",
1670        volume = "",
1671        number = "10",
1672}
1673
1674@Book{ LIANG:1999,
1675        title = "Unrestricted Warfare",
1676        author = "Liang, Q. y Xiangsui, W.",
1677        publisher = "PLA Literature and Arts Publishing House",
1678        year = "1999",
1679        country="China"
1680}
1681
1682
1683@misc{UNASUR:2013,
1684    author    = "UNASUR",
1685    title     = "{VII} Reunión Ordinaria del Consejo de Jefas y Jefes de Estado y de
1686    Gobierno de la Unión de Naciones Suramericanas Declaración de Paramaribo",
1687    year     = "2013",
1688}
1689
1690@Article{KARKKAINEN:2013,
1691        title = "The Origins and the Future of Cyber Security in the Finnish Defence Forces",
1692        author = {K\"arkk\"ainen, A.},
1693        journal = "The Fog of Cyber Defence",
1694        year = "2013",
1695        pages = "",
1696        volume = "",
1697        number = "10",
1698}
1699
1700@misc{UNASUR:2009,
1701    author    = "UNASUR",
1702    title     = "Declaración de Santiago de Chile. Primera Reunión del Consejo de
1703Defensa Suramericano (CDS) de la Unión de Naciones Suramericanas (UNASUR)",
1704    year     = "2009",
1705}
1706
1707@Electronic{TELAM:2014,
1708        author = {Assange, J.},
1709        title = {No hay elección, tenemos que pasarnos al software libre para nuestra mejor protección},
1710        year = {2014},
1711        howpublished = {http://www.telam.com.ar/notas/201409/79058-julian-assan-software-libre-ciberseguridad-espionaje.html},
1712}
1713
1714@Book{ LIDDELL:1946,
1715        title = "La Estrategia de Aproximación Indirecta",
1716        author = "Liddell, B.",
1717        publisher = "Atalaya: Iberia-Joaquín Gil, Editores, S.A.",
1718        year = "1946",
1719        country=""
1720}
1721
1722@Book{LENIN:1973,
1723title = {Vladímir Lenin Obras Tomo XII (1921-1923)},
1724publisher = {PROGRESO},
1725year = {1973},
1726address = {MOSCU},
1727
1728}
1729
1730
1731@Book{NATO:2013,
1732author = {NATO Cooperative Cyber Defence Centre of Excellence Tallinn},
1733title = {Tallinn Manual on the International Law Applicable to Cyber Warfare},
1734publisher = {Schmitt},
1735year = {2013},
1736note = {www.ccdcoe.org/249.html},
1737
1738}
1739
1740@Manual{NSA:2012,
1741title = {Presidential Policy Directive 20},
1742author = {NSA},
1743year = {2012},
1744note = {"https://www.hsdl.org/?abstract\&did=725668"},
1745
1746}
1747
1748@Misc{Infogobierno:2013,
1749author = {Asamblea Nacional},
1750title = {Ley de Infogobierno},
1751howpublished = {Gaceta Oficial de la República Bolivariana de Venezuela Número: 40.274 del 17/10/2013},
1752year = {2013},
1753
1754}
1755
1756@Electronic{NSA:2009,
1757        author = {NSA},
1758        title = {SIGINT Frequently Asked Questions},
1759        year = {2009},
1760        howpublished = {https://www.nsa.gov/sigint/faqs.shtml\#sigint1},
1761}
Note: See TracBrowser for help on using the repository browser.