<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462022000100441</article-id>
<article-id pub-id-type="doi">10.13053/cys-26-1-3898</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Propuesta de una guía de actuación forense para entornos de internet de las cosas (IoT)]]></article-title>
<article-title xml:lang="en"><![CDATA[Proposal for a Forensic Action Guide for Internet of Things (IoT) Environments]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Parra de Gallo]]></surname>
<given-names><![CDATA[H. Beatriz]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Católica de Salta Facultad de Ingeniería ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Argentina</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>03</month>
<year>2022</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>03</month>
<year>2022</year>
</pub-date>
<volume>26</volume>
<numero>1</numero>
<fpage>441</fpage>
<lpage>460</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462022000100441&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462022000100441&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462022000100441&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen: Internet de las Cosas (IoT) se considera el entorno de comunicación del futuro, en el que se conectan componentes tecnológicos de cualquier tipo para compartir datos, haciendo posible el procesamiento y control de funcionalidades mediante un marco de trabajo integrado puesto a disposición del usuario. Este contexto, de muchísimas ventajas para la mejora de la calidad de vida de las personas, con amplio impacto en la economía, la salud y la industria, también se encuentra a disposición de quienes buscan en internet nuevos modos de delinquir. Y es desde esta óptica que se aborda el Entorno IoT, para estudiar y proponer una guía de acción que permitan realizar un análisis forense adecuado y suficiente cuando se deba buscar evidencia digital en estos contextos. El trabajo incluye la revisión de un conjunto de metodologías para el análisis forense en general &#8212;y de IoT en particular&#8212; de la cual se deriva luego una Guía de Actuación Forense para Entornos IoT (GAFIoT).]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: Internet of Things (IoT) is considered the communication environment of the future, in which technological components of any kind are connected to share data, making possible the process and control of functionalities through an integrated framework available for the user. This context, with many advantages for improving the quality of life of people, with a wide impact on the economy, health and industry, is also available to those who search new ways of chime using the Internet. And it is from this perspective that the IoT environment is approached, to study and propose an action guide that allows an adequate and sufficient forensic analysis when it must search digital evidence in this context. The work includes the review of a set of methodologies for forensic analysis in general, and IoT in particular, from which a Forensic Action Guide for IoT Environments (GAFIoT) derives.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Forensia digital]]></kwd>
<kwd lng="es"><![CDATA[Internet de las Cosas]]></kwd>
<kwd lng="es"><![CDATA[IoT]]></kwd>
<kwd lng="en"><![CDATA[Digital forensic]]></kwd>
<kwd lng="en"><![CDATA[internet of things]]></kwd>
<kwd lng="en"><![CDATA[IoT]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="">
<collab>Unión Internacional de Telecomunicaciones</collab>
<source><![CDATA[Descripción General de Internet de los Objetos]]></source>
<year>2012</year>
<page-range>20</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Palmer]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[A road map for digital forensic research]]></source>
<year>2001</year>
<conf-name><![CDATA[ First Digital Forensic Research Workshop]]></conf-name>
<conf-loc>Utica, New York </conf-loc>
<page-range>27-30</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Patel]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Malek]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Brief overview of existing challenges in IoT]]></article-title>
<source><![CDATA[International Journal of Emerging Trends &amp; Technology in Computer Science]]></source>
<year>2020</year>
<volume>9</volume>
<numero>3</numero>
<issue>3</issue>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stoyanova]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Nikoloudakis]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Panagiotakis]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Pallis]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Markakis]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A survey on the internet of things (IoT) forensics: Challenges, approaches, and open issues]]></article-title>
<source><![CDATA[IEEE Communications Surveys &amp; Tutorials]]></source>
<year>2020</year>
<volume>22</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>1191-221</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rashid]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Chivers]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Danezis]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Lupu]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Martin]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[The cyber security body of knowledge (CyBoK)]]></source>
<year>2019</year>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vallejo]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Muñoz]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Rosales]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Kids and parents privacy exposure in the internet of things: How to protect personal information?]]></article-title>
<source><![CDATA[Computación y Sistemas]]></source>
<year>2018</year>
<volume>22</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1191-205</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Escamilla-Ambrosio]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Robles-Ramírez]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Alsalamah]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Securing mHealth applications using IoTsecM security modelling: Dentify]]></article-title>
<source><![CDATA[Computación y Sistemas]]></source>
<year>2019</year>
<volume>23</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1139-58</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Atlam]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Wills]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[IoT security, privacy, safety and ethics]]></article-title>
<source><![CDATA[Digital Twin Technologies and Smart Cities]]></source>
<year>2020</year>
<page-range>123-49</page-range><publisher-loc><![CDATA[Cham ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pirolli]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Card]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[The sensemaking process and leverage points for analyst technology as identified through cognitive task analysis]]></source>
<year>2005</year>
<volume>5</volume>
<conf-name><![CDATA[ international conference on intelligence analysis]]></conf-name>
<conf-loc> </conf-loc>
<page-range>2-4</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Di-Iorio]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Castellote]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Constanzo]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Curti]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[El rastro digital del delito: Aspectos técnicos, legales y estratégicos de la informática forense]]></source>
<year>2017</year>
<publisher-name><![CDATA[Editorial UFASTA]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kebande]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Ray]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<source><![CDATA[A generic digital forensic investigation framework for Internet of Things (IoT)]]></source>
<year>2016</year>
<conf-name><![CDATA[ IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>356-62</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kebande]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Karie]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Venter]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cloud-centric framework for isolating big data as forensic evidence from IoT infrastructures]]></source>
<year>2017</year>
<conf-name><![CDATA[ International Conference on Next Generation Computing Applications (NextComp)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>54-60</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kebande]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Karie]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Michael]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Malapane]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kigwana]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Venter]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Wario]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Towards an integrated digital forensic investigation framework for an IoT-based ecosystem]]></source>
<year>2018</year>
<conf-name><![CDATA[ IEEE International Conference on Smart Internet of Things (SmartIoT)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>93-8</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Meffert]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Clark]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Baggili]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Breitinger]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<source><![CDATA[Forensic state acquisition from internet of things (FSAIoT): A general framework and practical approach for IoT forensics through IoT device state acquisition]]></source>
<year>2017</year>
<conf-name><![CDATA[ 12th International Conference on Availability, Reliability and Security]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-11</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hossain]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Karim]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Hasa]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[FIF-IoT: A forensic investigation framework for IoT using a public digital ledger]]></source>
<year>2018</year>
<conf-name><![CDATA[ IEEE International Congress on Internet of Things (ICIOT)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>33-40</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chhabra]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Singh]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Singh]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber forensics framework for big data analytics in IoT environment using machine learning]]></article-title>
<source><![CDATA[Multimedia Tools and Applications]]></source>
<year>2020</year>
<volume>79</volume>
<numero>23</numero>
<issue>23</issue>
<page-range>15881-900</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Al-Masri]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Bai]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[A fog-based digital forensics investigation framework for IoT systems]]></source>
<year>2018</year>
<conf-name><![CDATA[ IEEE International Conference on Smart Cloud (SmartCloud)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>196-201</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Babun]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Sikder]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Acar]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Selcuk-Uluagac]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[IoTDots: A digital forensics framework for smart environments]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Qatawneh]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Almobaideen]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Khanafseh]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Al-Qatawneh]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Al-Ain]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Dfim: A New digital forensics investigation model for internet of things]]></article-title>
<source><![CDATA[Journal of Theoretical and Applied Information Technology]]></source>
<year>2019</year>
<volume>97</volume>
<numero>24</numero>
<issue>24</issue>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Islam]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Khatun]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Roy]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kabir]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Debnath]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A comprehensive data security and forensic investigation framework for cloud-iot ecosystem]]></article-title>
<source><![CDATA[GUB Journal of Science and Engineering]]></source>
<year>2017</year>
<volume>4</volume>
<numero>1</numero>
<issue>1</issue>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Koroniotis]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Moustafa]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Sitnikova]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A new network forensic framework based on deep learning for internet of things networks: A particle deep framework]]></article-title>
<source><![CDATA[Future Generation Computer Systems]]></source>
<year>2020</year>
<volume>110</volume>
<page-range>91-106</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Costantini]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Galvan]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[De-Stefani]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Battiato]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Assessing information quality in IoT forensics: Theoretical Framework and Model Implementation]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Luz-Clara]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Aráoz-Fleming]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Parra de Gallo]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Laboratorio de forensia digital: Propuesta de estructura y funcionamiento]]></source>
<year>2020</year>
<conf-name><![CDATA[ X Congreso Iberoamericano de Investigadores y Docentes de Derecho e Informática]]></conf-name>
<conf-loc>Ecuador </conf-loc>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rivetti]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Gamarra]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Parra de Gallo]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Proyecto de creación de un laboratorio de forensia de IoT]]></article-title>
<source><![CDATA[REDI. Revista Digital del Departamento de Ingeniería e Investigaciones Tecnológicas UNLAM]]></source>
<year>2020</year>
<volume>5</volume>
<numero>1</numero>
<issue>1</issue>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pavón]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Lima]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Dí-Pando]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Evaluation of data quality: A cryptographic approach]]></article-title>
<source><![CDATA[Computación y Sistemas]]></source>
<year>2019</year>
<volume>23</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>557-68</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
