Changeset 342b9da in libros for maquetacion/bibliografia.bib


Ignore:
Timestamp:
May 12, 2014, 4:49:12 PM (10 years ago)
Author:
cualquiera <cualquiera@…>
Branches:
master, revisionfinal
Children:
ed97591, a8f4684
Parents:
12c2106
Message:

Cambios en la bibliografía del capítulo 3.

File:
1 edited

Legend:

Unmodified
Added
Removed
  • maquetacion/bibliografia.bib

    r12c2106 r342b9da  
    441441}
    442442
    443 @Article{ rlsm:tor-design,
     443@Article{rlsm:tor-design,
    444444        title = "Tor: The Second-Generation Onion Router",
    445445        author = "Dingledine, R., Mathewson, N., Syverson, P.",
     
    451451
    452452
    453 @Article{ rlsm:antnet,
     453@Article{rlsm:antnet,
    454454        title = "AntNet: Distributed Stigmergetic Control for Communications Networks",
    455455        author = "Caro, G.D., Dorigo, M.",
     
    557557}
    558558
    559 
    560 
    561 
     559% Referencias adicionales del capítulo 3.
     560
     561@TechReport{ico2006,
     562author = {Information Commissioner Office},
     563title = {Data protection technical guidance note: Privacy enhancing technologies (pets)},
     564institution = {Information Commissioner Office},
     565year = {2006},
     566month = {April},
     567}
     568
     569@TechReport{ONU1948,
     570author = {Organización de las Naciones Unidas},
     571title = {Derechos humanos para todos. Declaración Universal de los Derechos humanos},
     572institution = {Organización de las Naciones Unidas},
     573year = {1948}
     574}
     575
     576@phdthesis{george-thesis,
     577  title = {Better Anonymous Communications},
     578  author = {George Danezis},
     579  school = {University of Cambridge},
     580  year = {2004},
     581  month = {July},
     582  www_tags = {selected},
     583  www_section = {Anonymous communication},
     584  www_pdf_url = {http://www.cl.cam.ac.uk/~gd216/thesis.pdf},
     585}
     586
     587@inproceedings{ISDN-mixes,
     588  title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},
     589  author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},
     590  booktitle = {Proceedings of the GI/ITG Conference on Communication in Distributed
     591        Systems},
     592  year = {1991},
     593  month = {February},
     594  pages = {451--463},
     595  www_tags = {selected},
     596  www_section = {Anonymous communication},
     597  www_ps_gz_url = {http://www.semper.org/sirene/publ/PfPW_91TelMixeGI_NTG.ps.gz},
     598}
     599
     600@inproceedings{esorics04-mauw,
     601  title = {A formalization of anonymity and onion routing},
     602  author = {S. Mauw and J. Verschuren and E.P. de Vink},
     603  booktitle = {Proceedings of ESORICS 2004},
     604  year = {2004},
     605  location = {Sophia Antipolis},
     606  pages = {109--124},
     607  editor = {P. Samarati and P. Ryan and D. Gollmann and R. Molva},
     608  publisher = {LNCS 3193},
     609  www_tags = {selected},
     610  www_section = {Formal methods},
     611  www_pdf_url = {http://www.win.tue.nl/~ecss/downloads/esorics04.pdf},
     612}
     613
     614@inproceedings{onion-discex00,
     615  title = {{O}nion {R}outing Access Configurations},
     616  author = {Paul Syverson and Michael Reed and David Goldschlag},
     617  booktitle = {Proceedings of the DARPA Information Survivability Conference and Exposition
     618        (DISCEX 2000)},
     619  volume = {1},
     620  year = {2000},
     621  pages = {34--40},
     622  publisher = {IEEE CS Press},
     623  www_ps_gz_url = {http://www.onion-router.net/Publications/DISCEX-2000.ps.gz},
     624  www_tags = {selected},
     625  www_abstract_url = {http://www.onion-router.net/Publications.html},
     626  www_section = {Anonymous communication},
     627  www_pdf_url = {http://www.onion-router.net/Publications/DISCEX-2000.pdf},
     628  www_ps_url = {http://www.onion-router.net/Publications/DISCEX-2000.ps},
     629}
     630
     631@inproceedings{onion-routing:pet2000,
     632  title = {{Towards an Analysis of Onion Routing Security}},
     633  author = {Paul Syverson and Gene Tsudik and Michael Reed and Carl Landwehr},
     634  booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design
     635        Issues in Anonymity and Unobservability},
     636  year = {2000},
     637  month = {July},
     638  pages = {96--114},
     639  editor = {H. Federrath},
     640  publisher = {Springer-Verlag, LNCS 2009},
     641  www_important = {1},
     642  www_tags = {selected},
     643  www_section = {Anonymous communication},
     644  www_ps_gz_url = {http://www.onion-router.net/Publications/WDIAU-2000.ps.gz},
     645}
     646
     647@inproceedings{danezis:pet2004,
     648  title = {The Traffic Analysis of Continuous-Time Mixes},
     649  author = {George Danezis},
     650  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
     651  volume = {3424},
     652  year = {2004},
     653  month = {May},
     654  pages = {35--50},
     655  series = {LNCS},
     656  www_important = {1},
     657  www_tags = {selected},
     658  www_section = {Traffic analysis},
     659  www_pdf_url = {http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf},
     660}
     661
     662@inproceedings{timing-fc2004,
     663  title = {Timing Attacks in Low-Latency Mix-Based Systems},
     664  author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew K. Wright},
     665  booktitle = {Proceedings of Financial Cryptography (FC '04)},
     666  year = {2004},
     667  month = {February},
     668  pages = {251--265},
     669  editor = {Ari Juels},
     670  publisher = {Springer-Verlag, LNCS 3110},
     671  www_tags = {selected},
     672  www_section = {Traffic analysis},
     673  www_pdf_url = {http://www.cs.umass.edu/~mwright/papers/levine-timing.pdf},
     674}
     675
     676@inproceedings{SS03,
     677  title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
     678  author = {Andrei Serjantov and Peter Sewell},
     679  booktitle = {Proceedings of ESORICS 2003},
     680  year = {2003},
     681  month = {October},
     682  www_tags = {selected},
     683  www_remarks = {An investigation of packet counting attacks (which work best on lightly loaded networks) and connection-start timing attacks.},
     684  www_ps_url = {http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps},
     685  www_section = {Traffic analysis},
     686}
     687
     688@inproceedings{flow-correlation04,
     689  title = {On Flow Correlation Attacks and Countermeasures in Mix Networks},
     690  author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao},
     691  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
     692  volume = {3424},
     693  year = {2004},
     694  month = {May},
     695  pages = {207--225},
     696  series = {LNCS},
     697  www_tags = {selected},
     698  www_section = {Traffic analysis},
     699  www_pdf_url = {http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf},
     700}
     701
     702@inproceedings{WangCJ05,
     703  title = {Tracking anonymous peer-to-peer VoIP calls on the internet},
     704  author = {Xinyuan Wang and Shiping Chen and Sushil Jajodia},
     705  booktitle = {Proceedings of the ACM Conference on Computer and Communications Security},
     706  year = {2005},
     707  month = {November},
     708  pages = {81--91},
     709  www_tags = {selected},
     710  www_section = {Anonymous communication},
     711  www_pdf_url = {http://ise.gmu.edu/~xwangc/Publications/CCS05-VoIPTracking.pdf},
     712}
     713
     714@inproceedings{e2e-traffic,
     715  title = {Practical Traffic Analysis: Extending and Resisting Statistical Disclosure},
     716  author = {Nick Mathewson and Roger Dingledine},
     717  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
     718  volume = {3424},
     719  year = {2004},
     720  month = {May},
     721  pages = {17--34},
     722  series = {LNCS},
     723  www_important = {1},
     724  www_tags = {selected},
     725  www_section = {Traffic analysis},
     726  www_pdf_url = {http://freehaven.net/doc/e2e-traffic/e2e-traffic.pdf},
     727}
     728
     729@inproceedings{back01,
     730  title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
     731  author = {Adam Back and Ulf M\"oller and Anton Stiglic},
     732  booktitle = {Proceedings of Information Hiding Workshop (IH 2001)},
     733  year = {2001},
     734  month = {April},
     735  pages = {245--257},
     736  editor = {Ira S. Moskowitz},
     737  publisher = {Springer-Verlag, LNCS 2137},
     738  www_important = {1},
     739  www_tags = {selected},
     740  www_section = {Traffic analysis},
     741  www_pdf_url = {http://www.cypherspace.org/adam/pubs/traffic.pdf},
     742}
     743
     744@inproceedings{hs-attack06,
     745  title = {Locating Hidden Servers},
     746  author = {Lasse {\O}verlier and Paul Syverson},
     747  booktitle = {Proceedings of the 2006 IEEE Symposium on Security and Privacy},
     748  year = {2006},
     749  month = {May},
     750  publisher = {IEEE CS},
     751  www_important = {1},
     752  www_tags = {selected},
     753  www_pdf_url = {http://www.onion-router.net/Publications/locating-hidden-servers.pdf},
     754  www_remarks = {Motivates and describes Tor's entry guard design.},
     755  www_section = {Traffic analysis},
     756}
Note: See TracChangeset for help on using the changeset viewer.