Array Array
Array
DOI:
https://doi.org/10.33936/isrtic.v2i2.1427Keywords:
ArrayAbstract
ArrayDownloads
References
[1] Alfred J. Menezes, Scott A. Vanstone y Paul C. Van Oorschot. Handbook of Applied Cryptography. Boca Raton, FL, USA: CRC Press, Inc, 1996.
[2] Bruce Schneier. Applied Cryptography (2Nd Ed.): Protocols, Algorithms, and Source Code in C. New York, NY, USA: John Wiley & Sons, Inc., 1995. isbn: 0-471-11709-9.
[3] Adrian Baldwin y Simon Shiu. «Enabling Shared Audit Data». En: Information Security. Ed. por Colin Boyd y Wenbo Mao. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003, págs. 14-28. isbn: 978-3-540-39981-0.
[4] Gustavus J. Simmons. Contemporary Cryptology: The Science of Information Integrity. Piscataway, NJ, USA: IEEE Press, 1994. isbn: 0879422777.
[5] Roberto Sepúlveda Lima, Frank D. Abá Medina y Léster Crespo Sierra. «Escenarios típicos de fallas de seguridad relacionadas con la integridad de datos.» En: Ingeniería Industrial 24.3 (2003), págs. 87-90.
[6] Tsonka Baicheva, Stefan Dodunekov y Peter Kazakov. «On the cyclic redundancy-check codes with 8-bit redundancy». En: Computer Communications 21.11 (1998), págs. 1030-1033. issn: 0140-3664.
[7] Bart Preneel. «The State of Cryptographic Hash Functions». En: Lectures on Data Security, Mo- dern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998. London, UK, UK: Springer-Verlag, 1999, págs. 158-182. isbn: 3-540-65757-6.
[8] D. R. Stinson. «Some Observations on the Theory of Cryptographic Hash Functions». En: Des. Codes Cryptography 38.2 (feb. de 2006), págs. 259-277. issn: 0925-1022.
[9] Paul B. Thompson. «Privacy, Secrecy and Security». En: Ethics and Inf. Technol. 3.1 (mayo de 2001), págs. 13-19. issn: 1388-1957.
[10] Huaiqing Wang y Shuozhong Wang. «Cyber Warfare: Steganography vs. Steganalysis». En: Com- mun. ACM 47.10 (oct. de 2004), págs. 76-82. issn: 0001-0782.
[11] A. K. Dalai, S. S. Das y S. K. Jena. «A code obfuscation technique to prevent reverse engineering». En: Proc. Signal Processing and Networking (WiSPNET) 2017 Int. Conf. Wireless Communica-tions. Mar. de 2017, págs. 828-832.
[12] Ji Ma y Mehmet A. Orgun. «Formalising Theories of Trust for Authentication Protocols». En: Information Systems Frontiers 10.1 (mar. de 2008), págs. 19-32. issn: 1387-3326.
[13] Reto Kohlas, Jacek Jonczy y Rolf Haenni. «A New Model for Public-Key Authentication». En: Kommunikation in Verteilten Systemen (KiVS). Ed. por Torsten Braun, Georg Carle y Burkhard Stiller. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, págs. 213-224. isbn: 978-3-540-69962-0.
[14] Jose A. Onieva, Jianying Zhou y Javier Lopez. «Multiparty Nonrepudiation: A Survey». En: ACM Comput. Surv. 41.1 (ene. de 2009), 5:1-5:43. issn: 0360-0300.
[15] Shengzhi Zhang y col. «Availability-sensitive Intrusion Recovery». En: Proceedings of the 1st ACM Workshop on Virtual Machine Security. VMSec ’09. Chicago, Illinois, USA: ACM, 2009, págs. 43-48. isbn: 978-1-60558-780-6.
[16] P.C. van Oorschot A. Main. «Software Protection and Application Security: Understanding the Battleground». En: International Course on State of the Art and Evolution of Computer Security and Industrial Cryptography. Heverlee, Belgium, 2003.
[17] Alex Shaw. «Program Transformations to Fix C Buffer Overflows». En: Companion Proceedings of the 36th International Conference on Software Engineering. ICSE Companion 2014. Hyderabad, India: ACM, 2014, págs. 733-735. isbn: 978-1-4503-2768-8.
[18] A. Sadeghian, M. Zamani y S. M. Abdullah. «A Taxonomy of SQL Injection Attacks». En: Proc. Int. Conf. Informatics and Creative Multimedia. Sep. de 2013, págs. 269-273.
[19] D. Das, U. Sharma y D. K. Bhattacharyya. «Detection of Cross-Site Scripting Attack under Mul-tiple Scenarios». En: The Computer Journal 58.4 (abr. de 2015), págs. 808-822. issn: 0010-4620.
[20] M. Beunardeau y col. «White-Box Cryptography: Security in an Insecure Environment». En: IEEE Security Privacy 14.5 (sep. de 2016), págs. 88-92. issn: 1540-7993.
[21] K. Bai, C. Wu y Z. Zhang. «Protect white-box AES to resist table composition attacks». En: IET Information Security 12.4 (2018), págs. 305-313. issn: 1751-8709.
[22] Stanley Chow y col. «A White-Box DES Implementation for DRM Applications». En: Digital Rights Management. Springer, 1 de ene. de 2003. isbn: 978-3-540-40410-1.
[23] Stanley Chow y col. «White-Box Cryptography and an AES Implementation». En: Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography. SAC ’02. London, UK, UK: Springer-Verlag, 2003, págs. 250-270. isbn: 3-540-00622-2.
[24] C. E. Shannon. «Communication theory of secrecy systems». En: The Bell System Technical Jour-nal 28.4 (oct. de 1949), págs. 656-715. issn: 0005-8580.
[25] M. Xianya y col. «A Survey of Software Protection Methods Based on Self-Modifying Code». En: Proc. Int. Conf. Computational Intelligence and Communication Networks (CICN). Dic. de 2015, págs. 589-593.
[26] N. Zong y C. Jia. «Software Watermarking Using Support Vector Machines». En: Proc. IEEE 39th Annual Computer Software and Applications Conf. Vol. 2. Jul. de 2015, págs. 533-542.
[27] C. S. Collberg y C. Thomborson. «Watermarking, tamper-proofing, and obfuscation - tools for soft-ware protection». En: IEEE Transactions on Software Engineering 28.8 (ago. de 2002), págs. 735-746. issn: 0098-5589.
[28] Mariusz H. Jakubowski, Chit Wei (Nick) Saw y Ramarathnam Venkatesan. «Tamper-Tolerant Software: Modeling and Implementation». En: Advances in Information and Computer Security. Springer, 1 de ene. de 2009. isbn: 978-3-642-04845-6.
[29] Yulier Nuñez Musa y col. «A Non-Deterministic Self-Checking Mechanism to Enhance Tamper-Resistance in Engineering Education Software». En: International Journal of Engineering Educa-tion 28 (ene. de 2012), págs. 1393-1398.
[30] David Aucsmith. «Tamper resistant software: an implementation». En: Information Hiding. Ed. por Ross Anderson. Berlin, Heidelberg: Springer Berlin Heidelberg, 1996, págs. 317-333. isbn: 978-3-540-49589-5.
[31] A. Avizienis y col. «Basic concepts and taxonomy of dependable and secure computing». En: IEEE Transactions on Dependable and Secure Computing 1.1 (ene. de 2004), págs. 11-33. issn: 1545-5971.
Published
Issue
Section
License
Articles submitted to this journal for publication will be released for open access under a Creative Commons Attribution Non-Commercial No Derivative Works licence (http://creativecommons.org/licenses/by-nc-nd/4.0).
The authors retain copyright, and are therefore free to share, copy, distribute, perform and publicly communicate the work under the following conditions: Acknowledge credit for the work specified by the author and indicate if changes were made (you may do so in any reasonable way, but not in a way that suggests that the author endorses your use of his or her work. Do not use the work for commercial purposes. In case of remixing, transformation or development, the modified material may not be distributed.

