Array Array

Array

Authors

  • Humberto Días Pando
  • Miguel Rodriguez Veliz
  • Yulier Nuñez Musa
  • Roberto Sepúlveda Lima

DOI:

https://doi.org/10.33936/isrtic.v2i2.1427

Keywords:

Array

Abstract

Array

Downloads

Download data is not yet available.

References

[1] Alfred J. Menezes, Scott A. Vanstone y Paul C. Van Oorschot. Handbook of Applied Cryptography. Boca Raton, FL, USA: CRC Press, Inc, 1996.

[2] Bruce Schneier. Applied Cryptography (2Nd Ed.): Protocols, Algorithms, and Source Code in C. New York, NY, USA: John Wiley & Sons, Inc., 1995. isbn: 0-471-11709-9.

[3] Adrian Baldwin y Simon Shiu. «Enabling Shared Audit Data». En: Information Security. Ed. por Colin Boyd y Wenbo Mao. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003, págs. 14-28. isbn: 978-3-540-39981-0.

[4] Gustavus J. Simmons. Contemporary Cryptology: The Science of Information Integrity. Piscataway, NJ, USA: IEEE Press, 1994. isbn: 0879422777.

[5] Roberto Sepúlveda Lima, Frank D. Abá Medina y Léster Crespo Sierra. «Escenarios típicos de fallas de seguridad relacionadas con la integridad de datos.» En: Ingeniería Industrial 24.3 (2003), págs. 87-90.

[6] Tsonka Baicheva, Stefan Dodunekov y Peter Kazakov. «On the cyclic redundancy-check codes with 8-bit redundancy». En: Computer Communications 21.11 (1998), págs. 1030-1033. issn: 0140-3664.

[7] Bart Preneel. «The State of Cryptographic Hash Functions». En: Lectures on Data Security, Mo- dern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998. London, UK, UK: Springer-Verlag, 1999, págs. 158-182. isbn: 3-540-65757-6.

[8] D. R. Stinson. «Some Observations on the Theory of Cryptographic Hash Functions». En: Des. Codes Cryptography 38.2 (feb. de 2006), págs. 259-277. issn: 0925-1022.

[9] Paul B. Thompson. «Privacy, Secrecy and Security». En: Ethics and Inf. Technol. 3.1 (mayo de 2001), págs. 13-19. issn: 1388-1957.

[10] Huaiqing Wang y Shuozhong Wang. «Cyber Warfare: Steganography vs. Steganalysis». En: Com- mun. ACM 47.10 (oct. de 2004), págs. 76-82. issn: 0001-0782.

[11] A. K. Dalai, S. S. Das y S. K. Jena. «A code obfuscation technique to prevent reverse engineering». En: Proc. Signal Processing and Networking (WiSPNET) 2017 Int. Conf. Wireless Communica-tions. Mar. de 2017, págs. 828-832.

[12] Ji Ma y Mehmet A. Orgun. «Formalising Theories of Trust for Authentication Protocols». En: Information Systems Frontiers 10.1 (mar. de 2008), págs. 19-32. issn: 1387-3326.

[13] Reto Kohlas, Jacek Jonczy y Rolf Haenni. «A New Model for Public-Key Authentication». En: Kommunikation in Verteilten Systemen (KiVS). Ed. por Torsten Braun, Georg Carle y Burkhard Stiller. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, págs. 213-224. isbn: 978-3-540-69962-0.

[14] Jose A. Onieva, Jianying Zhou y Javier Lopez. «Multiparty Nonrepudiation: A Survey». En: ACM Comput. Surv. 41.1 (ene. de 2009), 5:1-5:43. issn: 0360-0300.

[15] Shengzhi Zhang y col. «Availability-sensitive Intrusion Recovery». En: Proceedings of the 1st ACM Workshop on Virtual Machine Security. VMSec ’09. Chicago, Illinois, USA: ACM, 2009, págs. 43-48. isbn: 978-1-60558-780-6.

[16] P.C. van Oorschot A. Main. «Software Protection and Application Security: Understanding the Battleground». En: International Course on State of the Art and Evolution of Computer Security and Industrial Cryptography. Heverlee, Belgium, 2003.

[17] Alex Shaw. «Program Transformations to Fix C Buffer Overflows». En: Companion Proceedings of the 36th International Conference on Software Engineering. ICSE Companion 2014. Hyderabad, India: ACM, 2014, págs. 733-735. isbn: 978-1-4503-2768-8.

[18] A. Sadeghian, M. Zamani y S. M. Abdullah. «A Taxonomy of SQL Injection Attacks». En: Proc. Int. Conf. Informatics and Creative Multimedia. Sep. de 2013, págs. 269-273.

[19] D. Das, U. Sharma y D. K. Bhattacharyya. «Detection of Cross-Site Scripting Attack under Mul-tiple Scenarios». En: The Computer Journal 58.4 (abr. de 2015), págs. 808-822. issn: 0010-4620.

[20] M. Beunardeau y col. «White-Box Cryptography: Security in an Insecure Environment». En: IEEE Security Privacy 14.5 (sep. de 2016), págs. 88-92. issn: 1540-7993.

[21] K. Bai, C. Wu y Z. Zhang. «Protect white-box AES to resist table composition attacks». En: IET Information Security 12.4 (2018), págs. 305-313. issn: 1751-8709.

[22] Stanley Chow y col. «A White-Box DES Implementation for DRM Applications». En: Digital Rights Management. Springer, 1 de ene. de 2003. isbn: 978-3-540-40410-1.

[23] Stanley Chow y col. «White-Box Cryptography and an AES Implementation». En: Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography. SAC ’02. London, UK, UK: Springer-Verlag, 2003, págs. 250-270. isbn: 3-540-00622-2.

[24] C. E. Shannon. «Communication theory of secrecy systems». En: The Bell System Technical Jour-nal 28.4 (oct. de 1949), págs. 656-715. issn: 0005-8580.

[25] M. Xianya y col. «A Survey of Software Protection Methods Based on Self-Modifying Code». En: Proc. Int. Conf. Computational Intelligence and Communication Networks (CICN). Dic. de 2015, págs. 589-593.

[26] N. Zong y C. Jia. «Software Watermarking Using Support Vector Machines». En: Proc. IEEE 39th Annual Computer Software and Applications Conf. Vol. 2. Jul. de 2015, págs. 533-542.

[27] C. S. Collberg y C. Thomborson. «Watermarking, tamper-proofing, and obfuscation - tools for soft-ware protection». En: IEEE Transactions on Software Engineering 28.8 (ago. de 2002), págs. 735-746. issn: 0098-5589.

[28] Mariusz H. Jakubowski, Chit Wei (Nick) Saw y Ramarathnam Venkatesan. «Tamper-Tolerant Software: Modeling and Implementation». En: Advances in Information and Computer Security. Springer, 1 de ene. de 2009. isbn: 978-3-642-04845-6.

[29] Yulier Nuñez Musa y col. «A Non-Deterministic Self-Checking Mechanism to Enhance Tamper-Resistance in Engineering Education Software». En: International Journal of Engineering Educa-tion 28 (ene. de 2012), págs. 1393-1398.

[30] David Aucsmith. «Tamper resistant software: an implementation». En: Information Hiding. Ed. por Ross Anderson. Berlin, Heidelberg: Springer Berlin Heidelberg, 1996, págs. 317-333. isbn: 978-3-540-49589-5.

[31] A. Avizienis y col. «Basic concepts and taxonomy of dependable and secure computing». En: IEEE Transactions on Dependable and Secure Computing 1.1 (ene. de 2004), págs. 11-33. issn: 1545-5971.

Published

2018-07-31

Issue

Section

Regular Papers