+@article{DBLP:journals/sigpro/LeeT10,
+ author = {I{-}Shi Lee and
+ Wen{-}Hsiang Tsai},
+ title = {A new approach to covert communication via {PDF} files},
+ journal = {Signal Processing},
+ volume = {90},
+ number = {2},
+ pages = {557--565},
+ year = {2010},
+ url = {http://dx.doi.org/10.1016/j.sigpro.2009.07.022},
+ doi = {10.1016/j.sigpro.2009.07.022},
+ timestamp = {Wed, 13 Jan 2010 11:24:36 +0100},
+ biburl = {http://dblp.uni-trier.de/rec/bib/journals/sigpro/LeeT10},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+}
+
+
+@Article{LLGC13,
+ author = {Lin, H. F. and Lu, L. W. and Gun, C. Y. and Chen, C. Y.},
+ title = {A Copyright Protection Scheme Based on PDF},
+ journal = {International Journal of Innovative Computing, Information and Control},
+ year = {2013},
+ OPTkey = {},
+ volume = {9},
+ number = {1},
+ pages = {1--6},
+ OPTmonth = {},
+ note = {ISSN 1349-4198},
+ OPTannote = {}
+}
+
+@Misc{ACDV12,
+ author = { Alizadeh, F. and Canceill, N. and Dabkiewicz, S. and Vandevenne, D.},
+ title = {Using Steganography to hide messages inside PDF files},
+ howpublished = {SSN Project Report},
+ month = dec,
+ year = {2012},
+ OPTnote = {34p,}
+}
+
+@InProceedings{PD2008,
+ author = {POR, L. Y. and Delina, B.},
+ title = {Information Hiding: A New Approach in Text Steganography},
+ booktitle = {7th WSEAS Int. Conf. on APPLIED COMPUTER $\&$ APPLIED COMPUTATIONAL SCIENCE},
+ year = {2008},
+ OPTeditor = {},
+ OPTvolume = {},
+ OPTnumber = {},
+ OPTseries = {},
+ OPTpages = {},
+ month = apr,
+ OPTaddress = {},
+ OPTorganization = {},
+ OPTpublisher = {},
+ OPTnote = {},
+ OPTannote = {}
+}
+
+@article{DBLP:journals/tifs/PevnyBF10,
+ author = {Tom{\'{a}}s Pevn{\'{y}} and
+ Patrick Bas and
+ Jessica J. Fridrich},
+ title = {Steganalysis by subtractive pixel adjacency matrix},
+ journal = {{IEEE} Transactions on Information Forensics and Security},
+ volume = {5},
+ number = {2},
+ pages = {215--224},
+ year = {2010},
+ url = {http://dx.doi.org/10.1109/TIFS.2010.2045842},
+ doi = {10.1109/TIFS.2010.2045842},
+ timestamp = {Sat, 25 Sep 2010 12:20:13 +0200},
+ biburl = {http://dblp.uni-trier.de/rec/bib/journals/tifs/PevnyBF10},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+}
+
+
+@INPROCEEDINGS{rifq/others03,
+ author = {Rifqi, Maria and Detyniecki, Marcin and Bouchon-Meunier, Bernadette},
+ x-lip6teams = {APA},
+ x-lip6id = {4425},
+ x-international-audience = {yes},
+ title = {{D}iscrimination power of measures of resemblance},
+ booktitle = {{IFSA}'03},
+ year = {2003},
+ location = {Istanbul, Turkey}
+}
+
+
+@ARTICLE{Rifqi:2000:DPM:342947.342970,
+ author = {Rifqi, Maria and Berger, Vincent and Bouchon-Meunier, Bernadette},
+ x-lip6teams = {APA},
+ x-lip6id = {4417},
+ x-international-audience = {yes},
+ title = {{D}iscrimination power of measures of comparison},
+ journal = {{F}uzzy {S}ets and {S}ystems},
+ volume = {110},
+ year = {2000},
+ pages = {189-196}
+}
+
+
+
+@book{Anderberg-Cluster-1973,
+ added-at = {2008-10-29T00:31:48.000+0100},
+ author = {Anderberg, M. R.},
+ biburl = {http://www.bibsonomy.org/bibtex/2f586cc49441c591f06539d11d3e06006/kirylenka},
+ interhash = {a94e1d2f9a5f6cf6c2e7822f789040b0},
+ intrahash = {f586cc49441c591f06539d11d3e06006},
+ keywords = {cluster_analysis wismasys0809},
+ publisher = {Academic Press},
+ timestamp = {2008-10-29T00:31:48.000+0100},
+ title = {Cluster Analysis for Applications},
+ year = 1973
+}
+
+
+
+@article{yule1950introduction,
+ Author = {Yule, G.U. and Kendall, MG},
+ Date-Added = {2009-08-14 22:16:50 -0500},
+ Date-Modified = {2009-08-14 22:16:50 -0500},
+ Journal = {Statistics},
+ Title = {An Introduction to the Theory of},
+ Year = {1950}}
+
+
+@inproceedings{fgb11:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {Friot, Nicolas and Guyeux, Christophe and Bahi, Jacques},
+title = {Chaotic Iterations for Steganography - Stego-security and chaos-security},
+booktitle = {SECRYPT'2011, Int. Conf. on Security and Cryptography. SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications},
+pages = {218--227},
+address = {Sevilla, Spain},
+editor = {Javier Lopez and Pierangela Samarati},
+publisher = {SciTePress},
+month = jul,
+year = 2011,
+
+}
+
+
+@ARTICLE{Cayre2008,
+ author = {Cayre, F. and Bas, P.},
+ title = {Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding},
+ journal = {IEEE Transactions on Information Forensics and Security},
+ year = {2008},
+ volume = {3},
+ pages = {1--15},
+ number = {1},
+ doi = {10.1109/TIFS.2007.916006},
+ issn = {1556-6013},
+ keywords = {cryptography, random sequences, spread spectrum communication, telecommunication
+ security, watermarking, Kerckhoffs-based embedding security classes,
+ WOA Data Hiding, pseudorandom sequences, spread-spectrum techniques,
+ steganography security, watermark-only-attack, watermarking, Security,
+ spread-spectrum (SS) watermarking},
+ owner = {guyeux},
+ timestamp = {2009.06.29}
+}
+@INPROCEEDINGS{Perez06,
+ author = {Perez-Freire, Luis and Pérez-Gonzalez, F. and Comesaña, Pedro },
+ title = {Secret Dither Estimation in Lattice-Quantization Data Hiding: A Set-Membership
+ Approach},
+ booktitle = {Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California},
+ year = {2006},
+ volume =6072,
+ pages={1--12},
+ month = jan,
+ publisher = spie,
+ address = spie_loc
+}
+
+
+
+@ARTICLE{Cayre2005,
+ author = {Cayre, F. and Fontaine, C. and Furon, T.},
+ title = {Watermarking security: theory and practice},
+ journal = {IEEE Transactions on Signal Processing},
+ year = {2005},
+ volume = {53},
+ pages = {3976--3987},
+ number = {10},
+ keywords = {blind source separation, cryptography, watermarking, Fisher information
+ matrix, blind source separation, cryptanalysis, information theory,
+ spread spectrum techniques, substitutive scheme, watermarking security,
+ Blind source separation, Fisher information matrix, equivocation,
+ security, watermarking}
+}
+
+
+
+@inproceedings{Shujun1,
+ author = {Li Shujun and Li Qi and Li Wenmin and Mou Xuanqin and Cai Yuanlong},
+ title = {Statistical Properties of Digital Piecewise Linear Chaotic Maps and
+ Their Roles in Cryptography and Pseudo-Random Coding},
+ booktitle = {Cryptography and Coding, 8th IMA International Conference,
+ Cirencester, UK},
+ month=dec,
+ year = 2001,
+ publisher = springer,
+ address = springer_loc,
+ series = lncs,
+ volume = {2260},
+ pages = {205--221}}
+
+
+@misc{cgh16:onp,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {COM},
+author = {Couchot, Jean-François and Guyeux, Christophe and H\'eam, Pierre-Cyrille},
+title = {Random Walk in a N-cube Without Hamiltonian Cycle
+ to Chaotic Pseudorandom Number Generation: Theoretical and Practical
+ Considerations},
+howpublished = {in submission to the RAIRO - Theoretical Informatics and Applications special issue to the 15-th Mons Theoretical Computer Science Days},
+month = mar,
+year = 2015,
+}
+
+
+@misc{bgco16:onp,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {COM},
+author = {Bakiri, Mohammed and Guyeux, Christophe and Couchot, Jean-Fran{\c}cois and Oudjida, Abdelkrim Kamel},
+title = {Survey on Hardware Implementation of Random Number Generators on FPGA: Theory and Experimental Analyses},
+howpublished = {in submission to the ACM Computing Surveys journal},
+month = aug,
+year = 2015,
+}
+
+
+
+
+
+
+@inproceedings{couchot04:onp,
+inhal = {no},
+author = {Couchot, Jean-Fran\c{c}ois},
+title = {V\'erification d'invariant par superposition},
+booktitle = {{MAJECSTIC}'04, {MA}nifestation de {JE}unes {C}hercheurs {STIC}},
+address = {Calais, France},
+ps = {http://lifc.univ-fcomte.fr/~couchot/pubs/cou04.ps.gz},
+url = {http://lil.univ-littoral.fr/~lewandowski/majecstic/programme.html},
+note = {Actes en ligne sur { t http://lil.univ-littoral.fr/\~{}lewandowski/majecstic/programme.html}},
+abstract = {Un système d'événements B modélise un système d'intérêt et l'environnement avec lequel il réagit. Il permet d'exprimer une spécification abstraite au niveau ensembliste, dont les événements sont parfois indéterministes et dont la propriété de cohérence, appelée invariant, s'exprime à l'aide d'une formule logique du premier ordre. Cette étude s'applique à un langage de spécification équivalent à une classe de systèmes d'événements qui conserve les notions d'ensemble, d'indéterminisme et d'invariant écrit en logique équationnelle du premier ordre. Elle propose une démarche de vérification automatique d'invariant inductif et de construction d'un tel invariant par renforcement. L'apport principal est le caractère automatique de la démarche, fondée sur une procédure de décision par superposition. L'étude est illustrée par deux exemples d'algorithmes d'exclusion mutuelle.},
+month = oct,
+year = 2004,
+
+}
+
+
+
+
+@inproceedings{aangc+15:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {Alkindy, Bassam and Al'Nayyef, Huda and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques},
+title = {Improved Core Genes Prediction for Constructing well-supported Phylogenetic Trees in large sets of Plant Species},
+booktitle = {IWBBIO 2015, 3rd Int. Work-Conf. on Bioinformatics and Biomedical Engineering, Part I},
+pages = {379--390},
+doi = {10.1007/978-3-319-16483-0_38},
+url = {http://dx.doi.org/10.1007/978-3-319-16483-0_38},
+series = {LNCS},
+volume = 9043,
+address = {Granada, Spain},
+month = apr,
+year = 2015,
+}
+
+
+
+
+
+
+
+@inproceedings{agcs+15:ip,
+ author = {Bassam AlKindy and
+ Christophe Guyeux and
+ Jean{-}Fran{\c{c}}ois Couchot and
+ Michel Salomon and
+ Christian Parisod and
+ Jacques M. Bahi},
+ title = {Hybrid Genetic Algorithm and Lasso Test Approach for Inferring Well
+ Supported Phylogenetic Trees Based on Subsets of Chloroplastic Core
+ Genes},
+ booktitle = {Algorithms for Computational Biology - Second International Conference,
+ AlCoB 2015, Mexico City, Mexico, August 4-5, 2015, Proceedings},
+ pages = {83--96},
+ year = {2015},
+ crossref = {DBLP:conf/alcob/2015},
+ url = {http://dx.doi.org/10.1007/978-3-319-21233-3_7},
+ doi = {10.1007/978-3-319-21233-3_7},
+ timestamp = {Tue, 28 Jul 2015 14:46:16 +0200},
+ biburl = {http://dblp.uni-trier.de/rec/bib/conf/alcob/AlKindyGCSPB15},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+}
+
+@proceedings{DBLP:conf/alcob/2015,
+ editor = {Adrian Horia Dediu and
+ Francisco Hern{\'{a}}ndez Quiroz and
+ Carlos Mart{\'{\i}}n{-}Vide and
+ David A. Rosenblueth},
+ title = {Algorithms for Computational Biology - Second International Conference,
+ AlCoB 2015, Mexico City, Mexico, August 4-5, 2015, Proceedings},
+ series = {Lecture Notes in Computer Science},
+ volume = {9199},
+ publisher = {Springer},
+ year = {2015},
+ url = {http://dx.doi.org/10.1007/978-3-319-21233-3},
+ doi = {10.1007/978-3-319-21233-3},
+ isbn = {978-3-319-21232-6},
+ timestamp = {Tue, 28 Jul 2015 14:45:41 +0200},
+ biburl = {http://dblp.uni-trier.de/rec/bib/conf/alcob/2015},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+}
+
+
+
+
+
+@inproceedings{bcg11:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
+title = {Performance Analysis of a Keyed Hash Function based on Discrete and Chaotic Proven Iterations},
+booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
+pages = {52--57},
+address = {Luxembourg, Luxembourg},
+month = jun,
+year = 2011,
+note = {Best paper award},
+
+}
+
+@article{bcg12:ij,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACLNI},
+impact-factor ={#},
+isi-acro = {#},
+author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
+title = {Quality analysis of a chaotic proven keyed hash function},
+journal = {International Journal On Advances in Internet Technology},
+pages = {26--33},
+volume = 5,
+number = 1,
+publisher = {IARIA},
+year = 2012,
+
+}
+
+
+@article{ccg15:ij,
+ author = {Jean{-}Fran{\c{c}}ois Couchot and
+ Rapha{\"{e}}l Couturier and
+ Christophe Guyeux},
+ title = {{STABYLO:} steganography with adaptive, Bbs, and binary embedding
+ at low cost},
+ journal = {Annales des T{\'{e}}l{\'{e}}communications},
+ volume = {70},
+ number = {9-10},
+ pages = {441--449},
+ year = {2015},
+ url = {http://dx.doi.org/10.1007/s12243-015-0466-7},
+ doi = {10.1007/s12243-015-0466-7},
+ timestamp = {Mon, 28 Sep 2015 12:42:01 +0200},
+ biburl = {http://dblp.uni-trier.de/rec/bib/journals/adt/CouchotCG15},
+ bibsource = {dblp computer science bibliography, http://dblp.org}
+ }
+
+@inproceedings{fccg15:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {Fadil, Yousra Ahmed and Couchot, Jean-Fran\c{c}ois and Couturier, Rapha\"el and Guyeux, Christophe},
+title = {Steganalyzer performances in operational contexts},
+booktitle = {IIH-MSP 2015, 11th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
+pages = {429-432},
+address = {Adelaide, Australia},
+month = sep,
+year = 2015
+}
+
+
+@inproceedings{accfg15:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {B. Al Bouna and J. F. Couchot and R. Couturier and Y. A. Fadil and C. Guyeux},
+title = {Performance Study of Steganalysis Techniques},
+booktitle = {Applied Research in Computer Science and Engineering (ICAR), 2015 International Conference on},
+pages = {1--7},
+address = {Lebanon},
+month = oct,
+year = 2015
+}
+
+
+
+@inproceedings{bcfg12a:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe},
+title = {Application of Steganography for Anonymity through the Internet},
+booktitle = {IHTIAP'2012, 1-st Workshop on Information Hiding Techniques for Internet Anonymity and Privacy},
+pages = {96--101},
+url = {http://arxiv.org/abs/1202.5302v1},
+address = {Venice, Italy},
+month = jun,
+year = 2012,
+
+}
+
+
+
+
+
+@inproceedings{bcfg+13:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe and Mazouzi, Kamel},
+title = {Quality Studies of an Invisible Chaos-Based Watermarking Scheme with Message Extraction},
+booktitle = {IIHMSP'13, 9th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
+pages = {547--550},
+doi = {10.1109/IIH-MSP.2013.141},
+url = {http://dx.doi.org/10.1109/IIH-MSP.2013.141},
+address = {Beijing, China},
+month = oct,
+year = 2013,
+
+}
+
+@inproceedings{bcfg12b:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe},
+title = {A Robust Data Hiding Process Contributing to the Development of a Semantic Web},
+booktitle = {INTERNET'2012, 4-th Int. Conf. on Evolving Internet},
+pages = {71--76},
+address = {Venice, Italy},
+month = jun,
+year = 2012,
+
+}
+
+
+
+
+
+@inproceedings{bcg11b:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
+title = {Steganography: a Class of Algorithms having Secure Properties},
+booktitle = {IIH-MSP-2011, 7-th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
+pages = {109--112},
+address = {Dalian, China},
+month = oct,
+year = 2011,
+
+}
+
+
+@article{bcg11:ij,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACLI},
+impact-factor ={1.363},
+isi-acro = {COMPUT J},
+author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
+title = {Steganography: a class of secure and robust algorithms},
+journal = {The Computer Journal},
+volume = 55,
+number = 6,
+pages = {653--666},
+doi = {10.1093/comjnl/bxr116},
+url = {http://dx.doi.org/10.1093/comjnl/bxr116},
+publisher = {Oxford University Press},
+year = 2012,
+}
+
+
+
+@inproceedings{bcgw11:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Wang, Qianxue},
+title = {Class of Trustworthy Pseudo Random Number Generators},
+booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
+pages = {72--77},
+address = {Luxembourg, Luxembourg},
+month = jun,
+year = 2011,
+
+}
+
+@misc{chgw+14:onp,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {COM},
+author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
+title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
+howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},
+day = 23,
+month = sep,
+year = 2014,
+}
+
+
+
+
+
+@inproceedings{aagp+15:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTIN},
+author = {Alsrraj, Reem and Alkindy, Bassam and Guyeux, Christophe and Philippe, Laurent and Couchot, Jean-Fran\c{c}ois},
+title = {Well-supported phylogenies using largest subsets of core-genes by discrete particle swarm optimization},
+booktitle = {CIBB 2015, 12th Int. Meeting on Computational Intelligence Methods for Bioinformatics and Biostatistics},
+pages = {***--***},
+address = {Naples, Italy},
+day = 10,
+month = sep,
+year = 2015,
+note = {To appear},
+
+}
+
+@inproceedings{acgm+14:ij,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Mouly, Arnaud and Salomon, Michel and Bahi, Jacques},
+title = {Finding the Core-Genes of Chloroplasts},
+booktitle = {ICBBS 2014, 3rd Int. Conf. on Bioinformatics and Biomedical Science},
+pages = {357--364},
+series = {IJBBB, Journal of Bioscience, Biochemistery, and Bioinformatics},
+number = {4(5)},
+doi = {10.7763/IJBBB.2014.V4.371},
+url = {http://dx.doi.org/10.7763/IJBBB.2014.V4.371},
+address = {Copenhagen, Denmark},
+day = 18,
+month = jun,
+year = 2014,
+
+}
+
+
+
+
+@inproceedings{akgcs+14:oip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {COM},
+author = {Alkindy, Bassam and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques},
+title = {Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts},
+booktitle = {BIBM14, IEEE Int. Conf. on Bioinformatics and Biomedicine},
+address = {Belfast, United Kingdom},
+day = 2,
+month = nov,
+year = 2014,
+note = {Short paper},
+}
+
+@misc{acgs13:onp,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {COM},
+author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
+title = {Finding the core-genes of Chloroplast Species},
+howpublished = {Journ\'ees SeqBio 2013, Montpellier},
+month = nov,
+year = 2013,
+
+}
+
+
+
+
+
+@PhdThesis{guyeuxphd,
+author = {Guyeux, Christophe},
+title = {Le désordre des it\'erations chaotiques et leur utilit\'e en sécurit\'e informatique},
+type = {Th\`ese de {D}octorat},
+school = {LIFC, Universit\'e de Franche-Comt\'e},
+equipe = {AND},
+note = {Rapporteurs~: Pascale Charpin, Directrice de Recherche, INRIA-Rocquencourt ; Eric Filiol, Professeur, ESIEA-Laval ; Pierre Spitéri, Professeur Emérite, IRIT-ENSEEIHT. Examinateurs~: Michel de Labachelerie, Directeur de recherche CNRS, Université de Franche-Comté ; Laurent Larger, Professeur, Université de Franche-Comté ; Jean-Claude Miellou, Professeur, Université de Franche-Comté ; Congduc Pham, Professeur, Université de Pau. Directeur~: Jacques M. Bahi, Professeur, Université de Franche-Comté},
+month = {13 décembre},
+year = 2010,
+
+}
+