<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462008000300003</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[On the Security of Mexican Digital Fiscal Documents]]></article-title>
<article-title xml:lang="es"><![CDATA[De la Seguridad de Documentos Fiscales Mexicanos]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[González García]]></surname>
<given-names><![CDATA[Vladimir]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Rodríguez Henríquez]]></surname>
<given-names><![CDATA[Francisco]]></given-names>
</name>
<xref ref-type="aff" rid="A02"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Cruz Cortés]]></surname>
<given-names><![CDATA[Nareli]]></given-names>
</name>
<xref ref-type="aff" rid="A03"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,National Laboratory on Advanced Informatics  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
</aff>
<aff id="A02">
<institution><![CDATA[,Instituto Politécnico Nacional CINVESTAV Computer Science Department]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
</aff>
<aff id="A03">
<institution><![CDATA[,Instituto Politécnico Nacional Center for Computing Research ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>09</month>
<year>2008</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>09</month>
<year>2008</year>
</pub-date>
<volume>12</volume>
<numero>1</numero>
<fpage>25</fpage>
<lpage>39</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462008000300003&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462008000300003&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462008000300003&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[In January 2005, the Mexican Tributary Administration System (SAT) introduced an official norm that stipulates how to generate electronic invoices that were termed by SAT, Comprobante Fiscal Digital (CFD). Supporting the CFD service implies the exchange of confidential information over Internet and other communication channels that are intrinsically highly vulnerable. Therefore, it becomes indispensable to incorporate to this service reliable and sound information security mechanisms. In the case of SAT's CFD, its security guarantees depend on customary cryptographic mechanisms such as, digital signatures, hash functions, etc. In this paper we point out several security flaws in the procedure specified by SAT for generating such electronic invoices. Furthermore, we provide recommendations for avoiding the security problems detected, which include the usage of more robust cryptographic mechanisms, alternative authentication protocols, time stamps authorities and a safe storage system.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[En enero de 2005, el Gobierno mexicano a través del Servicio de Administración Tributaria (SAT), presentó una norma oficial que estipula cómo generar facturas electrónicas, las cuales recibieron el nombre oficial de Comprobante Fiscal Digital (CFD). El hecho de ofrecer el servicio de CFD implica el intercambio de información confidencial que debe viajar por Internet y otros canales de comunicación que son intrínsecamente altamente vulnerables. Por lo tanto, es indispensable incorporar a dicho servicio, herramientas de seguridad confiables y técnicamente sólidas. En el caso de los comprobantes fiscales digitales del SAT, su seguridad depende de mecanismos criptográficos tradicionales tales como, firmas digitales, funciones picadillo, etc. En este artículo se señalan fallas de seguridad en el procedimiento especificado por el SAT para la generación de sus facturas electrónicas. Aunado a esto, en este trabajo se dan algunas recomendaciones para eliminar los problemas de seguridad detectados, lo cual incluye, el uso de mecanismos criptográficos más robustos, protocolos de autentificación alternativos, autoridades que emitan estampillas de tiempo y un sistema de almacenamiento a largo plazo seguro.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Information Security]]></kwd>
<kwd lng="en"><![CDATA[Digital Certificates]]></kwd>
<kwd lng="en"><![CDATA[Digital Notary]]></kwd>
<kwd lng="en"><![CDATA[Mexican Tributary Administration System]]></kwd>
<kwd lng="es"><![CDATA[Seguridad informática]]></kwd>
<kwd lng="es"><![CDATA[certificados digitales]]></kwd>
<kwd lng="es"><![CDATA[notaría digital]]></kwd>
<kwd lng="es"><![CDATA[servicio de administración tributaria]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[ <p align="center"><font face="verdana" size="4"><b>On the Security of Mexican Digital Fiscal Documents</b></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="3"><i><b>De la Seguridad de Documentos Fiscales Mexicanos</b></i></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="2"><b>Vladimir Gonz&aacute;lez Garc&iacute;a<sup>1</sup>, Francisco Rodr&iacute;guez Henr&iacute;quez<sup>2</sup> and Nareli Cruz Cort&eacute;s<sup>3</sup></b></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><sup>1</sup> <i>National Laboratory on Advanced Informatics, LANIA A.C. </i><i>e&#150;mail: <a href="mailto:vlasland2@hotmail.com">vlasland2@hotmail.com</a></i></font></p>     <p align="justify"><font face="verdana" size="2"><sup>2</sup> <i>Computer Science Department, CINVESTAV&#150;IPN </i><i>e&#150;mail: <a href="mailto:francisco@cs.cinvestav.mx">francisco@cs.cinvestav.mx</a></i></font></p>     <p align="justify"><font face="verdana" size="2"><sup>3</sup> <i>Center for Computing Research (CIC) National Polytechnic Institute (IPN), M&eacute;xico </i><i>e&#150;mail: <a href="mailto:nareli@cic.ipn.mx">nareli@cic.ipn.mx</a></i></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">Article received on March 31, 2008    <br> Accepted on June 20, 2008</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Abstract</b></font></p>     <p align="justify"><font face="verdana" size="2">In January 2005, the Mexican Tributary Administration System (SAT) introduced an official norm that stipulates how to generate electronic invoices that were termed by SAT, Comprobante Fiscal Digital (CFD). Supporting the CFD service implies the exchange of confidential information over Internet and other communication channels that are intrinsically highly vulnerable. Therefore, it becomes indispensable to incorporate to this service reliable and sound information security mechanisms. In the case of SAT's CFD, its security guarantees depend on customary cryptographic mechanisms such as, digital signatures, hash functions, etc. In this paper we point out several security flaws in the procedure specified by SAT for generating such electronic invoices. Furthermore, we provide recommendations for avoiding the security problems detected, which include the usage of more robust cryptographic mechanisms, alternative authentication protocols, time stamps authorities and a safe storage system. </font></p>     <p align="justify"><font face="verdana" size="2"><b>Keywords: </b>Information Security, Digital Certificates, Digital Notary, Mexican Tributary Administration System.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Resumen</b></font></p>     <p align="justify"><font face="verdana" size="2">En enero de 2005, el Gobierno mexicano a trav&eacute;s del Servicio de Administraci&oacute;n Tributaria (SAT), present&oacute; una norma oficial que estipula c&oacute;mo generar facturas electr&oacute;nicas, las cuales recibieron el nombre oficial de Comprobante Fiscal Digital (CFD). El hecho de ofrecer el servicio de CFD implica el intercambio de informaci&oacute;n confidencial que debe viajar por Internet y otros canales de comunicaci&oacute;n que son intr&iacute;nsecamente altamente vulnerables. Por lo tanto, es indispensable incorporar a dicho servicio, herramientas de seguridad confiables y t&eacute;cnicamente s&oacute;lidas. En el caso de los comprobantes fiscales digitales del SAT, su seguridad depende de mecanismos criptogr&aacute;ficos tradicionales tales como, firmas digitales, funciones picadillo, etc. En este art&iacute;culo se se&ntilde;alan fallas de seguridad en el procedimiento especificado por el SAT para la generaci&oacute;n de sus facturas electr&oacute;nicas. Aunado a esto, en este trabajo se dan algunas recomendaciones para eliminar los problemas de seguridad detectados, lo cual incluye, el uso de mecanismos criptogr&aacute;ficos m&aacute;s robustos, protocolos de autentificaci&oacute;n alternativos, autoridades que emitan estampillas de tiempo y un sistema de almacenamiento a largo plazo seguro. </font></p>     <p align="justify"><font face="verdana" size="2"><b>Palabras clave: </b>Seguridad inform&aacute;tica, certificados digitales, notar&iacute;a digital, servicio de administraci&oacute;n tributaria.</font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><a href="/pdf/cys/v12n1/v12n1a3.pdf" target="_blank">DESCARGAR ART&Iacute;CULO EN FORMATO PDF</a></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Acknowledgments</b></font></p>     <p align="justify"><font face="verdana" size="2">The second author acknowledges support from CONACYT under grant 45306. The third author acknowledges support from CIC&#150;IPN.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>References</b></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">1.<b> Acuerdo Gobierno Mexicano, </b>"Acuerdo que tiene por objeto crear en forma permanente la comisi&oacute;n intersecretarial para el desarrollo del gobierno electr&oacute;nico" (in Spanish). In Diario Oficial de la Federaci&oacute;n, December, 9 2005.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045241&pid=S1405-5546200800030000300001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">2.<b> Adams C., Cain P., Pinkas D., and Zuccherato R., </b>"Internet X.509 Public Key Infrastructure Time&#150;Stamp Protocol (TSP)". RFC 3161, IETF, August 2001. Available at: <a href="http://www.ietf.org/rfc/rfc3161.txt" target="_blank">http://www.ietf.org/rfc/rfc3161.txt</a>.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045242&pid=S1405-5546200800030000300002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">3.<b> Anexo 20 SHCP Secretar&iacute;a de Hacienda y Cr&eacute;dito P&uacute;blico, </b>"Anexo 20 de la resoluci&oacute;n miscel&aacute;nea fiscal para 2006" (in Spanish). Diario Oficial de la Federaci&oacute;n de M&eacute;xico, September 1st 2006. Available at: <a href="http://www.sat.gob.mx/" target="_blank">http://www.sat.gob.mx/nuevo.html</a>.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045243&pid=S1405-5546200800030000300003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">4.<b> Art&iacute;culo 29 C&aacute;mara de Diputados del H. Congreso de la Uni&oacute;n, </b>"Art&iacute;culo 29 del C&oacute;digo Fiscal de la Federaci&oacute;n". In El Diario Oficial de la Federaci&oacute;n, Gobierno de M&eacute;xico. (in Spanish), December 2006.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045244&pid=S1405-5546200800030000300004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">5.<b> Art&iacute;culo 30 C&aacute;mara de Diputados del H. Congreso de la Uni&oacute;n, </b>"Art&iacute;culo 30 del C&oacute;digo Fiscal de la Federaci&oacute;n". In El Diario Oficial de la Federaci&oacute;n, Gobierno de M&eacute;xico. (in Spanish), December 2006.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045245&pid=S1405-5546200800030000300005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">6.<b> Dubuisson O., </b>"ASN.1 Communication Between Heterogeneous Systems". Morgan Kaufmann Publishers, 2000. <a href="http://asn1.elibel.tm.fr/" target="_blank">http://asn1.elibel.tm.fr/en/book/</A></a>.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045246&pid=S1405-5546200800030000300006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">7.<b> Gabillon A.  and Byun J., </b>"A two&#150;level time&#150;stamping system". In Sec  '01: Proceedings of the  16th international conference on Information security: Trusted information, pages 139&#150;149, 2001.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045247&pid=S1405-5546200800030000300007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">8.<b> Gonz&aacute;lez&#150;Garc&iacute;a V., </b>"Dise&ntilde;o y desarrollo de un prototipo de notar&iacute;a digital" (in Spanish). Master's thesis, Laboratorio Nacional de Inform&aacute;tica Avanzada LANIA, August 2007.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045248&pid=S1405-5546200800030000300008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">9.<b> Haber S. and Stornetta W. </b><b>S.</b>, "How to time&#150;stamp a digital document". In A. Menezes and S. A. Vanstone, editors, CRYPTO, volume 537 of Lecture Notes in Computer Science, pages 437&#150;455. Springer, 1990.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045249&pid=S1405-5546200800030000300009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">10.<b> Haber S. and Stornetta W. </b><b>S.</b>, "How to time&#150;stamp a digital document". J. Cryptology, 3(2):99&#150;111, 1991.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045250&pid=S1405-5546200800030000300010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">11.<b> Haber S. and Stornetta W. S., </b>"Secure names for bit&#150;strings". In ACM Conference on Computer and Communications Security, pages 28&#150;35, 1997.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045251&pid=S1405-5546200800030000300011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">12.<b> Hankerson D., Menezes A., and Vanstone </b><b>S.</b>, "Guide to Elliptic Curve Cryptography". Springer, 2003.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045252&pid=S1405-5546200800030000300012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">13.<b> Hern&aacute;ndez&#150;Luna F. A., </b>"An&aacute;lisis e implementaci&oacute;n de la norma oficial mexicana NOM&#150;151&#150;SCFI&#150;2002". Propuesta de Tesis de Maestr&iacute;a, Programa de Graduados en Ciencias Computacionales. Instituto tecnol&oacute;gico y de estudios superiores de Monterrey, Zona metropolitana de la Ciudad de M&eacute;xico, December 2007.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045253&pid=S1405-5546200800030000300013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">14.<b> Housley R., Ford W., Polk T., and Solo D., </b>"Internet X.509 Public Key Infrastructure Certificate and Certificate    Revocation    List    (CRL)    Profile".     RFC    3280,     IETF,    Apr.     2002.     Available    at: <a href="http://www.ietf.org/rfc/rfc3280.txt" target="_blank">http://www.ietf.org/rfc/rfc3280.txt</a>.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045254&pid=S1405-5546200800030000300014&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">15.<b> Jerman&#150;Blazic A., Klobucar T., and Donova&#150;Jerman B, </b>"Long&#150;term trusted preservation service using service interaction protocol and evidence records". Comput. Stand. Interfaces, 29(3):398&#150;412, 2007.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045255&pid=S1405-5546200800030000300015&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">16.<b> Jerman&#150;Blazic A. and Sylvester P. </b>"Long&#150;Term Archive Protocol (LTAP)", draft&#150;ietf&#150;ltans&#150;ltap&#150;06. Internet Draft, August 2005. Available at: <a href="http://tools.ietf.org/html/draft&#150;ietf&#150;ltans&#150;ltap&#150;06" target="_blank">http://tools.ietf.org/html/draft&#150;ietf&#150;ltans&#150;ltap&#150;06</a>.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045256&pid=S1405-5546200800030000300016&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">17.<b> Kaliski   B.   and   Staddon  J.,   </b>"RFC2437:   PKCS   #1:   RSA  Encryption",   October   1998.   Available   at: <a href="http://www.ietf.org/rfc/rfc2437.txt" target="_blank">http://www.ietf.org/rfc/rfc2437.txt</a>.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045257&pid=S1405-5546200800030000300017&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">18.<b> Kuhn R., Hu V., Polk T., and Chang S.&#150;J., </b>"Introduction to public key technology and the federal PKI infrastructure". NIST, February 2001. Available at: <a href="http://csrc.nist.gov/publications/nistpubs/800-32/sp800-32.pdf" target="_blank">http://csrc.nist.gov/publications/nistpubs/800&#150;32/sp800&#150;32.pdf</a>.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045258&pid=S1405-5546200800030000300018&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">19.<b> LTANS   IETF   Secretariat,    </b>"Long&#150;Term   Archive   and   Notary    Services   (LTANS)".    Available   at: <a href="http://www.ietf.org/html.charters/ltans-charter.html" target="_blank">http://www.ietf.org/html.charters/ltans&#150;charter.html</a>. abril, 2008.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045259&pid=S1405-5546200800030000300019&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">20.<b> Mart&iacute;nez&#150;Silva G., Rodr&iacute;guez&#150;Henr&iacute;quez F., Cruz&#150;Cort&eacute;s N., and Ertaul L, </b>"On the generation of x.509v3 certificates with biometric information". In S. Aissi and H. R. Arabnia, editors, Security and Management, pages 52&#150;57. CSREA Press, 2007.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045260&pid=S1405-5546200800030000300020&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">21.<b> Massias H., Avila X. S., and Quisquater J.&#150;J., </b>"Timestamps: Main issues on their use and implementation". In WETICE, pages 178&#150;183. IEEE Computer Society, 1999.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045261&pid=S1405-5546200800030000300021&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">22.<b> Myers M., Ankney R., Malpani A., Galperin S., and Adams C. </b>"X.509 Internet Public Key Infrastructure Online Certificate Status Protocol&#150;OCSP". RFC 2560, IETF, June 1999.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045262&pid=S1405-5546200800030000300022&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">23.<b> NOM&#150;151   Gobierno  Mexicano,  </b>"Norma oficial mexicana NOM&#150;151&#150;SCFI&#150;2002, pr&aacute;cticas comerciales, requisitos que deben observarse para la conservaci&oacute;n de mensajes de datos" (in Spanish). In Diario Oficial de la Federaci&oacute;n, June, 4 2002.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045263&pid=S1405-5546200800030000300023&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">24.<b> PKCS 1 RSA Laboratories, </b>"PKCS #1 v2.1: RSA Cryptography Standard. Technical Note PKCS1", RSA Laboratories, June 2002. Available at: <a href="http://www.ietf.org/rfc/rfc3447.txt" target="_blank">http://www.ietf.org/rfc/rfc3447.txt</a>.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045264&pid=S1405-5546200800030000300024&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">25.<b> PKCS 7 RSA Laboratories, </b>"PKCS #7: Cryptographic Message Syntax Standard. Technical Note PKCS7", RSA Laboratories, Nov. 1993. Available at: <a href="http://www.ietf.org/rfc/rfc2315.txt" target="_blank">http://www.ietf.org/rfc/rfc2315.txt</a>.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045265&pid=S1405-5546200800030000300025&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">26.<b> PKCS 8 RSA Laboratories, </b>"PKCS #8: Private&#150;Key Information Syntax Standard". Technical Note PKCS8, RSA Laboratories, 1993.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045266&pid=S1405-5546200800030000300026&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">27.<b> Regla 2.22.8 SHCP Secretar&iacute;a de Hacienda y Cr&eacute;dito P&uacute;blico, </b>"Regla 2.22.8" (in Spanish). Diario Oficial de la Federaci&oacute;n de M&eacute;xico, May 31th 2004.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045267&pid=S1405-5546200800030000300027&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">28.<b> Rodr&iacute;guez&#150;Henr&iacute;quez F., Saqib N. A., D&iacute;az&#150;P&eacute;rez A., and Ko&ccedil; </b><b>C.</b> <b>K., </b>"Cryptographic Algorithms on Reconfigurable Hardware". Springer, First Edition, November 2006.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045268&pid=S1405-5546200800030000300028&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">29.<b> SAT Secretar&iacute;a de Hacienda y Cr&eacute;dito P&uacute;blico. </b>Servicio de administraci&oacute;n tributaria. Internet WEB page. Available at: <a href="http://www.sat.gob.mx/" target="_blank">http://www.sat.gob.mx</a>.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045269&pid=S1405-5546200800030000300029&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">30.<b> Schmeh K., </b>"Cryptography and Public Key Infrastructure on the Internet". John Wiley &amp; Sons, 2003.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045270&pid=S1405-5546200800030000300030&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">31.<b> Stallings W., </b>"Cryptography and network security". Prentice Hall, 1998.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045271&pid=S1405-5546200800030000300031&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">32.<b> Takura A., Ono S., and Naito S., </b>"A secure and trusted time stamping authority". In 1999 Internet Workshop, IWS 99, Osaka, Japan, pages 88&#150;93, february 1999.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045272&pid=S1405-5546200800030000300032&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">33.<b> X.509   Internet   Engineer  Task  Force,   </b>"Public&#150;key  infrastructure  X.509  PKIX",   2001.   Available  at: <a href="http://www.ietf.org/html.charters/pkix-charter.html" target="_blank">http://www.ietf.org/html.charters/pkix&#150;charter.html</a>.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045273&pid=S1405-5546200800030000300033&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">34.<b> Young    E.    A.    and    Hudson    T.    J.,    </b>"The    OpenSSL   Project",    December   2007.    Available    at: <a href="http://www.openssl.org/" target="_blank">http://www.openssl.org/</A></a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2045274&pid=S1405-5546200800030000300034&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> ]]></body><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="journal">
<collab>Acuerdo Gobierno Mexicano</collab>
<article-title xml:lang="es"><![CDATA[Acuerdo que tiene por objeto crear en forma permanente la comisión intersecretarial para el desarrollo del gobierno electrónico]]></article-title>
<source><![CDATA[Diario Oficial de la Federación]]></source>
<year>Dece</year>
<month>mb</month>
<day>er</day>
</nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Adams]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Cain]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Pinkas]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Zuccherato]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)]]></article-title>
<source><![CDATA[]]></source>
<year>Augu</year>
<month>st</month>
<day> 2</day>
</nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="journal">
<collab>Secretaría de Hacienda y Crédito Público</collab>
<article-title xml:lang="es"><![CDATA[Anexo 20 de la resolución miscelánea fiscal para 2006]]></article-title>
<source><![CDATA[Diario Oficial de la Federación de México]]></source>
<year>Sept</year>
<month>em</month>
<day>be</day>
</nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="journal">
<collab>Cámara de Diputados del H. Congreso de la Unión</collab>
<article-title xml:lang="es"><![CDATA[Artículo 29 del Código Fiscal de la Federación]]></article-title>
<source><![CDATA[Diario Oficial de la Federación]]></source>
<year>Dece</year>
<month>mb</month>
<day>er</day>
</nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="journal">
<collab>Cámara de Diputados del H. Congreso de la Unión</collab>
<article-title xml:lang="es"><![CDATA[Artículo 30 del Código Fiscal de la Federación]]></article-title>
<source><![CDATA[Diario Oficial de la Federación]]></source>
<year>Dece</year>
<month>mb</month>
<day>er</day>
</nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dubuisson]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
</person-group>
<source><![CDATA[ASN.1 Communication Between Heterogeneous Systems]]></source>
<year>2000</year>
<publisher-name><![CDATA[Morgan Kaufmann Publishers]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gabillon]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Byun]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A two-level time-stamping system]]></article-title>
<source><![CDATA[roceedings of the 16th international conference on Information security: Trusted information]]></source>
<year>2001</year>
<page-range>139-149</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[González-García]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<source><![CDATA[Diseño y desarrollo de un prototipo de notaría digital]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Haber]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Stornetta]]></surname>
<given-names><![CDATA[W. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[How to time-stamp a digital document]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Menezes]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Vanstone]]></surname>
<given-names><![CDATA[S. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[]]></source>
<year>1990</year>
<volume>537</volume>
<page-range>437-455</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Haber]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Stornetta]]></surname>
<given-names><![CDATA[W. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[How to time-stamp a digital document]]></article-title>
<source><![CDATA[J. Cryptology]]></source>
<year>1991</year>
<volume>3</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>99-111</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Haber]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Stornetta]]></surname>
<given-names><![CDATA[W. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Secure names for bit-strings]]></article-title>
<source><![CDATA[ACM Conference on Computer and Communications Security]]></source>
<year>1997</year>
<page-range>28-35</page-range></nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hankerson]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Menezes]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Vanstone]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Guide to Elliptic Curve Cryptography]]></source>
<year>2003</year>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hernández-Luna]]></surname>
<given-names><![CDATA[F. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Análisis e implementación de la norma oficial mexicana NOM-151-SCFI-2002]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Housley]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Ford]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Polk]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Solo]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile]]></article-title>
<source><![CDATA[]]></source>
<year>Apr.</year>
<month> 2</month>
<day>00</day>
</nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jerman-Blazic]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Klobucar]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Donova-Jerman]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Long-term trusted preservation service using service interaction protocol and evidence records]]></article-title>
<source><![CDATA[Comput. Stand. Interfaces]]></source>
<year>2007</year>
<volume>29</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>398-412</page-range></nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jerman-Blazic]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Sylvester]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Long-Term Archive Protocol (LTAP)]]></article-title>
<source><![CDATA[Internet Draft]]></source>
<year>Augu</year>
<month>st</month>
<day> 2</day>
</nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kaliski]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Staddon]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[RFC2437: PKCS #1: RSA Encryption]]></article-title>
<source><![CDATA[]]></source>
<year>Octo</year>
<month>be</month>
<day>r </day>
</nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kuhn]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Polk]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Chang S.]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Introduction to public key technology and the federal PKI infrastructure]]></source>
<year>Febr</year>
<month>ua</month>
<day>ry</day>
<publisher-name><![CDATA[NIST]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="">
<collab>LTANS IETF Secretariat</collab>
<article-title xml:lang="en"><![CDATA[Long-Term Archive and Notary Services (LTANS)]]></article-title>
<source><![CDATA[]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B20">
<label>20</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Martínez-Silva]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Rodríguez-Henríquez]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Cruz-Cortés]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Ertaul]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[On the generation of x.509v3 certificates with biometric information]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Aissi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Arabnia]]></surname>
<given-names><![CDATA[H. R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Security and Management]]></source>
<year>2007</year>
<page-range>52-57</page-range><publisher-name><![CDATA[CSREA Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<label>21</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Massias]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Avila]]></surname>
<given-names><![CDATA[X. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Quisquater J.]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Timestamps: Main issues on their use and implementation]]></article-title>
<source><![CDATA[WETICE]]></source>
<year>1999</year>
<page-range>178-183</page-range><publisher-name><![CDATA[IEEE Computer Society]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<label>22</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Myers]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ankney]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Malpani]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Galperin]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Adams]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[X.509 Internet Public Key Infrastructure Online Certificate Status Protocol-OCSP]]></source>
<year>June</year>
<month> 1</month>
<day>99</day>
<publisher-name><![CDATA[IETF]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B23">
<label>23</label><nlm-citation citation-type="journal">
<collab>Gobierno Mexicano</collab>
<article-title xml:lang="es"><![CDATA[Norma oficial mexicana NOM-151-SCFI-2002, prácticas comerciales, requisitos que deben observarse para la conservación de mensajes de datos]]></article-title>
<source><![CDATA[Diario Oficial de la Federación]]></source>
<year>June</year>
<month>, </month>
<day>4 </day>
</nlm-citation>
</ref>
<ref id="B24">
<label>24</label><nlm-citation citation-type="book">
<collab>RSA Laboratories</collab>
<source><![CDATA[PKCS #1 v2.1: RSA Cryptography Standard. Technical Note PKCS1]]></source>
<year>June</year>
<month> 2</month>
<day>00</day>
<publisher-name><![CDATA[RSA Laboratories]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<label>25</label><nlm-citation citation-type="book">
<collab>RSA Laboratories</collab>
<source><![CDATA[PKCS #7: Cryptographic Message Syntax Standard. Technical Note PKCS7]]></source>
<year>Nov.</year>
<month> 1</month>
<day>99</day>
<publisher-name><![CDATA[RSA Laboratories]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B26">
<label>26</label><nlm-citation citation-type="book">
<collab>RSA Laboratories</collab>
<source><![CDATA[PKCS #8: Private-Key Information Syntax Standard". Technical Note PKCS8]]></source>
<year>1993</year>
<publisher-name><![CDATA[RSA Laboratories]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B27">
<label>27</label><nlm-citation citation-type="journal">
<collab>Secretaría de Hacienda y Crédito Público</collab>
<article-title xml:lang="es"><![CDATA[Regla 2.22.8]]></article-title>
<source><![CDATA[Diario Oficial de la Federación de México]]></source>
<year>May </year>
<month>31</month>
<day>th</day>
</nlm-citation>
</ref>
<ref id="B28">
<label>28</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rodríguez-Henríquez]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Saqib]]></surname>
<given-names><![CDATA[N. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Díaz-Pérez]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Koç]]></surname>
<given-names><![CDATA[C. K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cryptographic Algorithms on Reconfigurable Hardware]]></source>
<year>Nove</year>
<month>mb</month>
<day>er</day>
<edition>First</edition>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B29">
<label>29</label><nlm-citation citation-type="">
<collab>Secretaría de Hacienda y Crédito Público^dSAT</collab>
<source><![CDATA[Servicio de administración tributaria]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B30">
<label>30</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schmeh]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cryptography and Public Key Infrastructure on the Internet]]></source>
<year>2003</year>
<publisher-name><![CDATA[John Wiley & Sons]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B31">
<label>31</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stallings]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cryptography and network security]]></source>
<year>1998</year>
<publisher-name><![CDATA[Prentice Hall]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B32">
<label>32</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Takura]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ono]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Naito]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A secure and trusted time stamping authority]]></article-title>
<source><![CDATA[1999 Internet Workshop]]></source>
<year>febr</year>
<month>ua</month>
<day>ry</day>
<page-range>88-93</page-range><publisher-loc><![CDATA[Osaka ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B33">
<label>33</label><nlm-citation citation-type="">
<collab>Internet Engineer Task Force</collab>
<source><![CDATA[Public-key infrastructure X.509 PKIX]]></source>
<year>2001</year>
</nlm-citation>
</ref>
<ref id="B34">
<label>34</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Young]]></surname>
<given-names><![CDATA[E. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Hudson]]></surname>
<given-names><![CDATA[T. J.]]></given-names>
</name>
</person-group>
<source><![CDATA[The OpenSSL Project]]></source>
<year>Dece</year>
<month>mb</month>
<day>er</day>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
