
H. Díaz, R. Sepúlveda, M. Rodríguez, Y. Nuñez La seguridad de la información
[7] Bart Preneel. «The State of Cryptographic Hash Functions». En: Lectures on Data Security, Mo-
dern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998. London,
UK, UK: Springer-Verlag, 1999, págs. 158-182. isbn: 3-540-65757-6.
[8] D. R. Stinson. «Some Observations on the Theory of Cryptographic Hash Functions». En: Des.
Codes Cryptography 38.2 (feb. de 2006), págs. 259-277. issn: 0925-1022.
[9] Paul B. Thompson. «Privacy, Secrecy and Security». En: Ethics and Inf. Technol. 3.1 (mayo de
2001), págs. 13-19. issn: 1388-1957.
[10] Huaiqing Wang y Shuozhong Wang. «Cyber Warfare: Steganography vs. Steganalysis». En: Com-
mun. ACM 47.10 (oct. de 2004), págs. 76-82. issn: 0001-0782.
[11] A. K. Dalai, S. S. Das y S. K. Jena. «A code obfuscation technique to prevent reverse engineering».
En: Proc. Signal Processing and Networking (WiSPNET) 2017 Int. Conf. Wireless Communica-
tions. Mar. de 2017, págs. 828-832.
[12] Ji Ma y Mehmet A. Orgun. «Formalising Theories of Trust for Authentication Protocols». En:
Information Systems Frontiers 10.1 (mar. de 2008), págs. 19-32. issn: 1387-3326.
[13] Reto Kohlas, Jacek Jonczy y Rolf Haenni. «A New Model for Public-Key Authentication». En:
Kommunikation in Verteilten Systemen (KiVS). Ed. por Torsten Braun, Georg Carle y Burkhard
Stiller. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, págs. 213-224. isbn: 978-3-540-69962-
0.
[14] Jose A. Onieva, Jianying Zhou y Javier Lopez. «Multiparty Nonrepudiation: A Survey». En: ACM
Comput. Surv. 41.1 (ene. de 2009), 5:1-5:43. issn: 0360-0300.
[15] Shengzhi Zhang y col. «Availability-sensitive Intrusion Recovery». En: Proceedings of the 1st ACM
Workshop on Virtual Machine Security. VMSec ’09. Chicago, Illinois, USA: ACM, 2009, págs. 43-48.
isbn: 978-1-60558-780-6.
[16] P.C. van Oorschot A. Main. «Software Protection and Application Security: Understanding the
Battleground». En: International Course on State of the Art and Evolution of Computer Security
and Industrial Cryptography. Heverlee, Belgium, 2003.
[17] Alex Shaw. «Program Transformations to Fix C Buffer Overflows». En: Companion Proceedings of
the 36th International Conference on Software Engineering. ICSE Companion 2014. Hyderabad,
India: ACM, 2014, págs. 733-735. isbn: 978-1-4503-2768-8.
[18] A. Sadeghian, M. Zamani y S. M. Abdullah. «A Taxonomy of SQL Injection Attacks». En: Proc.
Int. Conf. Informatics and Creative Multimedia. Sep. de 2013, págs. 269-273.
[19] D. Das, U. Sharma y D. K. Bhattacharyya. «Detection of Cross-Site Scripting Attack under Mul-
tiple Scenarios». En: The Computer Journal 58.4 (abr. de 2015), págs. 808-822. issn: 0010-4620.
[20] M. Beunardeau y col. «White-Box Cryptography: Security in an Insecure Environment». En: IEEE
Security Privacy 14.5 (sep. de 2016), págs. 88-92. issn: 1540-7993.
[21] K. Bai, C. Wu y Z. Zhang. «Protect white-box AES to resist table composition attacks». En: IET
Information Security 12.4 (2018), págs. 305-313. issn: 1751-8709.
[22] Stanley Chow y col. «A White-Box DES Implementation for DRM Applications». En: Digital
Rights Management. Springer, 1 de ene. de 2003. isbn: 978-3-540-40410-1.
[23] Stanley Chow y col. «White-Box Cryptography and an AES Implementation». En: Revised Papers
from the 9th Annual International Workshop on Selected Areas in Cryptography. SAC ’02. London,
UK, UK: Springer-Verlag, 2003, págs. 250-270. isbn: 3-540-00622-2.
[24] C. E. Shannon. «Communication theory of secrecy systems». En: The Bell System Technical Jour-
nal 28.4 (oct. de 1949), págs. 656-715. issn: 0005-8580.
[25] M. Xianya y col. «A Survey of Software Protection Methods Based on Self-Modifying Code». En:
Proc. Int. Conf. Computational Intelligence and Communication Networks (CICN). Dic. de 2015,
págs. 589-593.
http://revistas.utm.edu.ec/index.php/Informaticaysistemas 8