1 % This file was created with JabRef 2.7.
4 @INPROCEEDINGS{AdelsbachKS06,
5 author = {Andr{\'e} Adelsbach and Stefan Katzenbeisser and Ahmad-Reza Sadeghi},
6 title = {A Computational Model for Watermark Robustness},
7 booktitle = {Information Hiding},
10 bibsource = {DBLP, http://dblp.uni-trier.de},
11 crossref = {DBLP:conf/ih/2006},
12 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_10},
14 timestamp = {2009.06.29}
17 @inproceedings{bfg12a:ip,
19 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
22 author = {Bahi, Jacques and Fang, Xiaole and Guyeux, Christophe},
23 title = {An optimization technique on pseudorandom generators based on chaotic iterations},
24 booktitle = {INTERNET'2012, 4-th Int. Conf. on Evolving Internet},
26 address = {Venice, Italy},
33 @Article{combined_lcg,
34 title = "Efficient and portable combined random number generators",
35 journal = "Communications of the ACM",
43 @INPROCEEDINGS{Fischlin,
44 author = {Fischlin, R. and Schnorr, C. P.},
45 title = {Stronger security proofs for RSA and rabin bits},
46 booktitle = {Proceedings of the 16th annual international conference on Theory
47 and application of cryptographic techniques},
49 series = {EUROCRYPT'97},
51 address = {Berlin, Heidelberg},
52 publisher = {Springer-Verlag},
54 isbn = {3-540-62975-0},
55 location = {Konstanz, Germany},
57 url = {http://dl.acm.org/citation.cfm?id=1754542.1754569}
60 @INPROCEEDINGS{BattiatoCGG99,
61 author = {Sebastiano Battiato and Dario Catalano and Giovanni Gallo and Rosario
63 title = {Robust Watermarking for Images Based on Color Manipulation},
64 booktitle = {Information Hiding},
67 bibsource = {DBLP, http://dblp.uni-trier.de},
68 crossref = {DBLP:conf/ih/1999},
70 timestamp = {2009.06.29}
73 @INPROCEEDINGS{ComesanaPP05,
74 author = {Pedro Comesa{\~n}a and Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez},
75 title = {The Return of the Sensitivity Attack},
79 bibsource = {DBLP, http://dblp.uni-trier.de},
80 crossref = {DBLP:conf/iwdw/2005},
81 ee = {http://dx.doi.org/10.1007/11551492_20},
83 timestamp = {2009.06.29}
86 @INPROCEEDINGS{ComesanaPP05bis,
87 author = {Pedro Comesa{\~n}a and Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez},
88 title = {Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum
90 booktitle = {IH'05: Information Hiding Workshop},
93 publisher = {Lectures Notes in Computer Science, Springer-Verlag},
94 bibsource = {DBLP, http://dblp.uni-trier.de},
95 crossref = {DBLP:conf/ih/2005},
96 ee = {http://dx.doi.org/10.1007/11558859_12},
98 timestamp = {2009.06.30}
101 @INPROCEEDINGS{CongJQZ06,
102 author = {Jin Cong and Yan Jiang and Zhiguo Qu and Zhongmei Zhang},
103 title = {A Wavelet Packets Watermarking Algorithm Based on Chaos Encryption},
104 booktitle = {ICCSA (1)},
107 bibsource = {DBLP, http://dblp.uni-trier.de},
108 crossref = {DBLP:conf/iccsa/2006-1},
109 ee = {http://dx.doi.org/10.1007/11751540_100}
112 @INPROCEEDINGS{DBLP:conf/focs/DziembowskiP08,
113 author = {Stefan Dziembowski and Krzysztof Pietrzak},
114 title = {Leakage-Resilient Cryptography},
118 bibsource = {DBLP, http://dblp.uni-trier.de},
119 crossref = {DBLP:conf/focs/2008},
120 ee = {http://dx.doi.org/10.1109/FOCS.2008.56}
123 @INCOLLECTION{Filiol10,
124 author = {Eric Filiol},
125 title = {Viruses and Malware},
126 booktitle = {Handbook of Information and Communication Security},
129 bibsource = {DBLP, http://dblp.uni-trier.de},
130 crossref = {DBLP:reference/icsec/2010},
131 ee = {http://dx.doi.org/10.1007/978-3-642-04117-4_34}
134 @INPROCEEDINGS{Filiol00,
135 author = {Eric Filiol},
136 title = {Decimation Attack of Stream Ciphers},
137 booktitle = {INDOCRYPT},
140 bibsource = {DBLP, http://dblp.uni-trier.de},
141 crossref = {DBLP:conf/indocrypt/2000},
142 ee = {http://link.springer.de/link/service/series/0558/bibs/1977/19770031.htm}
145 @INPROCEEDINGS{Furon05,
146 author = {Teddy Furon},
147 title = {A Survey of Watermarking Security},
151 bibsource = {DBLP, http://dblp.uni-trier.de},
152 crossref = {DBLP:conf/iwdw/2005},
153 ee = {http://dx.doi.org/10.1007/11551492_16},
155 timestamp = {2009.06.29}
159 author = {Oded Goldreich},
161 title = {Foundations of Cryptography: Basic Tools},
162 publisher = {Cambridge University Press},
166 @INPROCEEDINGS{DBLP:conf/cec/HiggsSHS10,
167 author = {Trent Higgs and Bela Stantic and Tamjidul Hoque and Abdul Sattar},
168 title = {Genetic algorithm feature-based resampling for protein structure
170 booktitle = {IEEE Congress on Evolutionary Computation},
173 bibsource = {DBLP, http://dblp.uni-trier.de},
174 crossref = {DBLP:conf/cec/2010},
175 ee = {http://dx.doi.org/10.1109/CEC.2010.5586149}
178 @INPROCEEDINGS{Higgs2010,
179 author = {Trent Higgs and Bela Stantic and Tamjidul Hoque and Abdul Sattar},
180 title = {Genetic algorithm feature-based resampling for protein structure
182 booktitle = {IEEE Congress on Evolutionary Computation},
185 bibsource = {DBLP, http://dblp.uni-trier.de},
186 crossref = {DBLP:conf/cec/2010},
187 ee = {http://dx.doi.org/10.1109/CEC.2010.5586149}
190 @INPROCEEDINGS{DBLP:conf/cec/HorvathC10,
191 author = {Dragos Horvath and Camelia Chira},
192 title = {Simplified chain folding models as metaheuristic benchmark for tuning
193 real protein folding algorithms?},
194 booktitle = {IEEE Congress on Evolutionary Computation},
197 bibsource = {DBLP, http://dblp.uni-trier.de},
198 crossref = {DBLP:conf/cec/2010},
199 ee = {http://dx.doi.org/10.1109/CEC.2010.5585932}
202 @INPROCEEDINGS{DBLP:conf/cec/IslamC10,
203 author = {Md. Kamrul Islam and Madhu Chetty},
204 title = {Clustered memetic algorithm for protein structure prediction},
205 booktitle = {IEEE Congress on Evolutionary Computation},
208 bibsource = {DBLP, http://dblp.uni-trier.de},
209 crossref = {DBLP:conf/cec/2010},
210 ee = {http://dx.doi.org/10.1109/CEC.2010.5586187}
213 @INPROCEEDINGS{Ker06,
214 author = {Andrew D. Ker},
215 title = {Batch Steganography and Pooled Steganalysis},
216 booktitle = {Information Hiding},
219 bibsource = {DBLP, http://dblp.uni-trier.de},
220 crossref = {DBLP:conf/ih/2006},
221 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_18},
223 timestamp = {2009.06.29}
226 @INPROCEEDINGS{Lin2009,
227 author = {H.-Y. Lin and T.-C. Chiang},
228 title = {Cooperative Secure Data Aggregation in Sensor Networks Using Elliptic
229 Curve Based Cryptosystems},
233 bibsource = {DBLP, http://dblp.uni-trier.de},
234 crossref = {DBLP:conf/cdve/2009},
235 ee = {http://dx.doi.org/10.1007/978-3-642-04265-2_58}
238 @INPROCEEDINGS{DBLP:conf/cse/MaimourPH09,
239 author = {Moufida Maimour and CongDuc Pham and Doan B. Hoang},
240 title = {A Congestion Control Framework for Handling Video Surveillance Traffics
242 booktitle = {CSE (2)},
245 bibsource = {DBLP, http://dblp.uni-trier.de},
246 crossref = {DBLP:conf/cse/2009},
247 ee = {http://dx.doi.org/10.1109/CSE.2009.200}
250 @INPROCEEDINGS{DBLP:conf/icumt/MakhoulSP09,
251 author = {Abdallah Makhoul and Rachid Saadi and CongDuc Pham},
252 title = {Coverage and adaptive scheduling algorithms for criticality management
253 on video wireless sensor networks},
257 bibsource = {DBLP, http://dblp.uni-trier.de},
258 crossref = {DBLP:conf/icumt/2009},
259 ee = {http://dx.doi.org/10.1109/ICUMT.2009.5345630}
262 @INPROCEEDINGS{Mittelholzer99,
263 author = {Thomas Mittelholzer},
264 title = {An Information-Theoretic Approach to Steganography and Watermarking},
265 booktitle = {Information Hiding},
268 bibsource = {DBLP, http://dblp.uni-trier.de},
269 crossref = {DBLP:conf/ih/1999},
271 timestamp = {2009.06.29}
274 @INPROCEEDINGS{PellegriniBA10,
275 author = {Andrea Pellegrini and Valeria Bertacco and Todd M. Austin},
276 title = {Fault-based attack of RSA authentication},
280 bibsource = {DBLP, http://dblp.uni-trier.de},
281 crossref = {DBLP:conf/date/2010},
282 ee = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5456933}
285 @INPROCEEDINGS{DBLP:conf/cec/Perez-HernandezRG10,
286 author = {Luis Germ{\'a}n P{\'e}rez-Hern{\'a}ndez and Katya Rodr\'{\i}guez-V{\'a}zquez
287 and Ram{\'o}n Gardu{\~n}o-Ju{\'a}rez},
288 title = {Estimation of 3D Protein Structure by means of parallel Particle
290 booktitle = {IEEE Congress on Evolutionary Computation},
293 bibsource = {DBLP, http://dblp.uni-trier.de},
294 crossref = {DBLP:conf/cec/2010},
295 ee = {http://dx.doi.org/10.1109/CEC.2010.5586549}
298 @INPROCEEDINGS{WangNHZH07,
299 author = {Chuntao Wang and Jiangqun Ni and Jiwu Huang and Rongyue Zhang and
301 title = {Robust and High Capacity Image Watermarking Based on Jointly Coding
302 and Embedding Optimization},
303 booktitle = {Information Hiding},
306 bibsource = {DBLP, http://dblp.uni-trier.de},
307 crossref = {DBLP:conf/ih/2007},
308 ee = {http://dx.doi.org/10.1007/978-3-540-77370-2_5},
310 timestamp = {2009.06.29}
313 @INPROCEEDINGS{Zhao04,
314 author = {Jian Zhao and Mingquan Zhou and Hongmei Xie and Jinye Peng and Xin
316 title = {A Novel Wavelet Image Watermarking Scheme Combined with Chaos Sequence
318 booktitle = {ISNN (2)},
321 bibsource = {DBLP, http://dblp.uni-trier.de},
322 crossref = {DBLP:conf/isnn/2004-2},
323 ee = {http://springerlink.metapress.com/openurl.asp?genre=article{\&}issn=0302-9743{\&}volume=3174{\&}spage=663}
326 @INPROCEEDINGS{Acharya05securecomparison,
327 author = {Acharya, Mithun and Girao, Joao and Westhoff, Dirk},
328 title = {Secure Comparison of Encrypted Data in Wireless Sensor Networks},
329 booktitle = {WIOPT '05: Proceedings of the Third International Symposium on Modeling
330 and Optimization in Mobile, Ad Hoc, and Wireless Networks},
333 address = {Washington, DC, USA},
334 publisher = {IEEE Computer Society},
335 doi = {http://dx.doi.org/10.1109/WIOPT.2005.44},
336 isbn = {0-7695-2267-X}
339 @INPROCEEDINGS{Acimez07onthe,
340 author = {Onur Acıi\c{c}mez and \c{C}etin Kaya Ko\c{c} and Jean-Pierre Seifert},
341 title = {On the power of simple branch prediction analysis },
342 booktitle = {2007 ACM Symposium on Information, Computer and Communications Security
346 publisher = {ACM Press}
350 author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},
351 title = {Topological entropy},
352 journal = {Trans. Amer. Math. Soc.},
357 timestamp = {2008.05.29}
360 @INPROCEEDINGS{Agrawal04,
361 author = {Agrawal, Rakesh and Kiernan, Jerry and Srikant, Ramakrishnan and
363 title = {Order preserving encryption for numeric data},
364 booktitle = {SIGMOD '04: Proceedings of the 2004 ACM SIGMOD international conference
365 on Management of data},
368 address = {New York, NY, USA},
370 doi = {http://doi.acm.org/10.1145/1007568.1007632},
371 isbn = {1-58113-859-8},
372 location = {Paris, France}
375 @ARTICLE{Anfinsen20071973,
376 author = {Anfinsen, Christian B.},
377 title = {Principles that Govern the Folding of Protein Chains},
383 doi = {10.1126/science.181.4096.223},
384 eprint = {http://www.sciencemag.org/content/181/4096/223.full.pdf},
385 url = {http://www.sciencemag.org/content/181/4096/223.short}
389 author = {D. G. Arques and C. J. Michel},
390 title = {Analytical expression of the purine/pyrimidine autocorrelation function
391 after and before random mutations.},
392 journal = {Math Biosci},
398 abstract = {The mutation process is a classical evolutionary genetic process.
399 The type of mutations studied here is the random substitutions of
400 a purine base R (adenine or guanine) by a pyrimidine base Y (cytosine
401 or thymine) and reciprocally (transversions). The analytical expressions
402 derived allow us to analyze in genes the occurrence probabilities
403 of motifs and d-motifs (two motifs separated by any d bases) on the
404 R/Y alphabet under transversions. These motif probabilities can be
405 obtained after transversions (in the evolutionary sense; from the
406 past to the present) and, unexpectedly, also before transversions
407 (after back transversions, in the inverse evolutionary sense, from
408 the present to the past). This theoretical part in Section 2 is a
409 first generalization of a particular formula recently derived. The
410 application in Section 3 is based on the analytical expression giving
411 the autocorrelation function (the d-motif probabilities) before transversions.
412 It allows us to study primitive genes from actual genes. This approach
413 solves a biological problem. The protein coding genes of chloroplasts
414 and mitochondria have a preferential occurrence of the 6-motif YRY(N)6YRY
415 (maximum of the autocorrelation function for d = 6, N = R or Y) with
416 a periodicity modulo 3. The YRY(N)6YRY preferential occurrence without
417 the periodicity modulo 3 is also observed in the RNA coding genes
418 (ribosomal, transfer, and small nuclear RNA genes) and in the noncoding
419 genes (introns and 5' regions of eukaryotic nuclei). However, there
420 are two exceptions to this YRY(N)6YRY rule: the protein coding genes
421 of eukaryotic nuclei, and prokaryotes, where YRY(N)6YRY has the second
422 highest value after YRY(N)0YRY (YRYYRY) with a periodicity modulo
423 3. When we go backward in time with the analytical expression, the
424 protein coding genes of both eukaryotic nuclei and prokaryotes retrieve
425 the YRY(N)6YRY preferential occurrence with a periodicity modulo
426 3 after 0.2 back transversions per base. In other words, the actual
427 protein coding genes of chloroplasts and mitochondria are similar
428 to the primitive protein coding genes of eukaryotic nuclei and prokaryotes.
429 On the other hand, this application represents the first result concerning
430 the mutation process in the model of DNA sequence evolution we recently
431 proposed. According to this model, the actual genes on the R/Y alphabet
432 derive from two successive evolutionary genetic processes: an independent
433 mixing of a few nonrandom types of oligonucleotides leading to genes
434 called primitive followed by a mutation process in these primitive
435 genes.(ABSTRACT TRUNCATED AT 400 WORDS)},
436 institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon,
438 keywords = {Base Sequence; Biological Evolution; DNA, genetics; Mathematics; Models,
439 Genetic; Mutation; Probability; Proteins, genetics; Purines; Pyrimidines},
441 medline-pst = {ppublish},
443 pii = {0025-5564(94)90020-5},
445 timestamp = {2011.05.05}
449 author = {D. G. Arquès and J. P. Fallot and C. J. Michel},
450 title = {An evolutionary analytical model of a complementary circular code
451 simulating the protein coding genes, the 5' and 3' regions.},
452 journal = {Bull Math Biol},
458 abstract = {The self-complementary subset T0 = X0 [symbol: see text] ¿AAA, TTT¿
459 with X0 = ¿AAC, AAT, ACC, ATC, ATT, CAG, CTC, CTG, GAA, GAC, GAG,
460 GAT, GCC, GGC, GGT, GTA, GTC, GTT, TAC, TTC¿ of 22 trinucleotides
461 has a preferential occurrence in the frame 0 (reading frame established
462 by the ATG start trinucleotide) of protein (coding) genes of both
463 prokaryotes and eukaryotes. The subsets T1 = X1 [symbol: see text]
464 ¿CCC¿ and T2 = X2 [symbol: see text] ¿GGG¿ of 21 trinucleotides have
465 a preferential occurrence in the shifted frames 1 and 2 respectively
466 (frame 0 shifted by one and two nucleotides respectively in the 5'-3'
467 direction). T1 and T2 are complementary to each other. The subset
468 T0 contains the subset X0 which has the rarity property (6 x 10(-8)
469 to be a complementary maximal circular code with two permutated maximal
470 circular codes X1 and X2 in the frames 1 and 2 respectively. X0 is
471 called a C3 code. A quantitative study of these three subsets T0,
472 T1, T2 in the three frames 0, 1, 2 of protein genes, and the 5' and
473 3' regions of eukaryotes, shows that their occurrence frequencies
474 are constant functions of the trinucleotide positions in the sequences.
475 The frequencies of T0, T1, T2 in the frame 0 of protein genes are
476 49, 28.5 and 22.5\% respectively. In contrast, the frequencies of
477 T0, T1, T2 in the 5' and 3' regions of eukaryotes, are independent
478 of the frame. Indeed, the frequency of T0 in the three frames of
479 5' (respectively 3') regions is equal to 35.5\% (respectively 38\%)
480 and is greater than the frequencies T1 and T2, both equal to 32.25\%
481 (respectively 31\%) in the three frames. Several frequency asymmetries
482 unexpectedly observed (e.g. the frequency difference between T1 and
483 T2 in the frame 0), are related to a new property of the subset T0
484 involving substitutions. An evolutionary analytical model at three
485 parameters (p, q, t) based on an independent mixing of the 22 codons
486 (trinucleotides in frame 0) of T0 with equiprobability (1/22) followed
487 by t approximately 4 substitutions per codon according to the proportions
488 p approximately 0.1, q approximately 0.1 and r = 1 - p - q approximately
489 0.8 in the three codon sites respectively, retrieves the frequencies
490 of T0, T1, T2 observed in the three frames of protein genes and explains
491 these asymmetries. Furthermore, the same model (0.1, 0.1, t) after
492 t approximately 22 substitutions per codon, retrieves the statistical
493 properties observed in the three frames of the 5' and 3' regions.
494 The complex behaviour of these analytical curves is totally unexpected
495 and a priori difficult to imagine.},
496 doi = {10.1006/bulm.1997.0033},
497 institution = {Equipe de Biologie Théorique, Université de Marne la Vallée, Institut
498 Gaspard Monge, Noisy Le Grand, France. arques@univ-mlv.fr},
499 keywords = {Animals; Biological Evolution; Codon, genetics; Genetic Code; Humans;
500 Mammals; Models, Genetic; Probability; Proteins, genetics; Rodentia;
503 medline-pst = {ppublish},
505 pii = {S0092-8240(97)90033-1},
507 timestamp = {2011.05.05},
508 url = {http://dx.doi.org/10.1006/bulm.1997.0033}
512 author = {D. G. Arquès and C. J. Michel},
513 title = {Analytical expression of the purine/pyrimidine codon probability
514 after and before random mutations.},
515 journal = {Bull Math Biol},
518 pages = {1025--1038},
521 abstract = {Recently, we proposed a new model of DNA sequence evolution (Arquès
522 and Michel. 1990b. Bull. math. Biol. 52, 741-772) according to which
523 actual genes on the purine/pyrimidine (R/Y) alphabet (R = purine
524 = adenine or guanine, Y = pyrimidine = cytosine or thymine) are the
525 result of two successive evolutionary genetic processes: (i) a mixing
526 (independent) process of non-random oligonucleotides (words of base
527 length less than 10: YRY(N)6, YRYRYR and YRYYRY are so far identified;
528 N = R or Y) leading to primitive genes (words of several hundreds
529 of base length) and followed by (ii) a random mutation process, i.e.,
530 transformations of a base R (respectively Y) into the base Y (respectively
531 R) at random sites in these primitive genes. Following this model
532 the problem investigated here is the study of the variation of the
533 8 R/Y codon probabilities RRR, ..., YYY under random mutations. Two
534 analytical expressions solved here allow analysis of this variation
535 in the classical evolutionary sense (from the past to the present,
536 i.e., after random mutations), but also in the inverted evolutionary
537 sense (from the present to the past, i.e., before random mutations).
538 Different properties are also derived from these formulae. Finally,
539 a few applications of these formulae are presented. They prove the
540 proposition in Arquès and Michel (1990b. Bull. math. Biol. 52, 741-772),
541 Section 3.3.2, with the existence of a maximal mean number of random
542 mutations per base of the order 0.3 in the protein coding genes.
543 They also confirm the mixing process of oligonucleotides by excluding
544 the purine/pyrimidine contiguous and alternating tracts from the
545 formation process of primitive genes.},
546 institution = {Université de Franche-Comté, Besançon, France.},
547 keywords = {Base Sequence; Codon; DNA, chemistry/genetics; Mathematics; Models,
548 Genetic; Mutation; Probability; Purines; Pyrimidines},
550 medline-pst = {ppublish},
553 timestamp = {2011.05.05}
556 @ARTICLE{Arques1993b,
557 author = {D. G. Arquès and C. J. Michel},
558 title = {Identification and simulation of new non-random statistical properties
559 common to different eukaryotic gene subpopulations.},
560 journal = {Biochimie},
565 abstract = {The nucleotide distribution in protein coding genes, introns and transfer
566 RNA genes of eukaryotic subpopulations (primates, rodent and mammals)
567 is studied by autocorrelation functions. The autocorrelation function
568 analysing the occurrence probability of the i-motif YRY(N)iYRY (YRY-function)
569 in protein coding genes and transfer RNA genes of these three eukaryotic
570 subpopulations retrieves the preferential occurrence of YRY(N)6YRY
571 (R = purine = adenine or guanine, Y = pyrimidine = cytosine or thymine,
572 N = R or Y). The autocorrelation functions analysing the occurrence
573 probability of the i-motifs RRR(N)iRRR (RRR-function) and YYY(N)iYYY
574 (YYY-function) identify new non-random genetic statistical properties
575 in these three eukaryotic subpopulations, mainly: i) in their protein
576 coding genes: local maxima for i identical to 6 [12] (peaks for i
577 = 6, 18, 30, 42) with the RRR-function and local maxima for i identical
578 to 8 [10] (peaks for i = 8, 18, 28) with the YYY-function; and ii)
579 in their introns: local maxima for i identical to 3 [6] (peaks for
580 i = 3, 9, 15) and a short linear decrease followed by a large exponential
581 decrease both with the RRR- and YYY-functions. The non-random properties
582 identified in eukaryotic intron subpopulations are modelised with
583 a process of random insertions and deletions of nucleotides simulating
585 institution = {Equipe de Biologie Théorique, Université de Franche-Comté, Laboratoire
586 d'Informatique de Besançon, France.},
587 keywords = {Animals; Base Sequence; Data Interpretation, Statistical; Genes; Introns;
588 Mammals; Models, Genetic; Primates; Probability; Proteins, genetics;
589 RNA Editing; RNA, Transfer, genetics; Rodentia; Sequence Analysis,
592 medline-pst = {ppublish},
594 pii = {0300-9084(93)90173-P},
596 timestamp = {2011.05.05}
600 author = {D. G. Arquès and C. J. Michel},
601 title = {A simulation of the genetic periodicities modulo 2 and 3 with processes
602 of nucleotide insertions and deletions.},
603 journal = {J Theor Biol},
609 abstract = {Recently, a new genetic process termed RNA editing has been identified
610 showing insertions and deletions of nucleotides in particular RNA
611 molecules. On the other hand, there are a few non-random statistical
612 properties in genes: in particular, the periodicity modulo 3 (P3)
613 associated with an open reading frame, the periodicity modulo 2 (P2)
614 associated with alternating purine/pyrimidine stretches, the YRY(N)6YRY
615 preferential occurrence (R = purine = adenine or guanine, Y = pyrimidine
616 = cytosine or thymine, N = R or Y) representing a "code" of the DNA
617 helix pitch, etc. The problem investigated here is whether a process
618 of the type RNA editing can lead to the non-random statistical properties
619 commonly observed in genes. This paper will show in particular that:
620 The process of insertions and deletions of mononucleotides in the
621 initial sequence [YRY(N)3]* [series of YRY(N)3] can lead to the periodicity
622 modulo 2 (P2). The process of insertions and deletions of trinucleotides
623 in the initial sequence [YRY(N)6]* [series of YRY(N)6] can lead to
624 the periodicity modulo 3 (P3) and the YRY(N)6YRY preferential occurrence.
625 Furthermore, these two processes lead to a strong correlation with
626 the reality, namely the mononucleotide insertion/deletion process,
627 with the 5' eukaryotic regions and the trinucleotide insertion/deletion
628 process, with the eukaryotic protein coding genes.},
629 institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon,
630 Unité Associée CNRS No 822, France.},
631 keywords = {Chromosome Deletion; Computer Simulation; Humans; Models, Genetic;
632 Mutagenesis, genetics; RNA, genetics},
634 medline-pst = {ppublish},
637 timestamp = {2011.05.05}
641 author = {D. G. Arquès and C. J. Michel},
642 title = {Periodicities in coding and noncoding regions of the genes.},
643 journal = {J Theor Biol},
649 abstract = {Gene population statistical studies of protein coding genes and introns
650 have identified two types of periodicities on the purine/pyrimidine
651 alphabet: (i) the modulo 3 periodicity or coding periodicity (periodicity
652 P3) in protein coding genes of eukaryotes, prokaryotes, viruses,
653 chloroplasts, mitochondria, plasmids and in introns of viruses and
654 mitochondria, and (ii) the modulo 2 periodicity (periodicity P2)
655 in the eukaryotic introns. The periodicity study is herein extended
656 to the 5' and 3' regions of eukaryotes, prokaryotes and viruses and
657 shows: (i) the periodicity P3 in the 5' and 3' regions of eukaryotes.
658 Therefore, these observations suggest a unitary and dynamic concept
659 for the genes as for a given genome, the 5' and 3' regions have the
660 genetic information for protein coding genes and for introns: (1)
661 In the eukaryotic genome, the 5' (P2 and P3) and 3' (P2 and P3) regions
662 have the information for protein coding genes (P3) and for introns
663 (P2). The intensity of P3 is high in 5' regions and weak in 3' regions,
664 while the intensity of P2 is weak in 5' regions and high in 3' regions.
665 (2) In the prokaryotic genome, the 5' (P3) and 3' (P3) regions have
666 the information for protein coding genes (P3). (3) In the viral genome,
667 the 5' (P3) and 3' (P3) regions have the information for protein
668 coding genes (P3) and for introns (P3). The absence of P2 in viral
669 introns (in opposition to eukaryotic introns) may be related to the
670 absence of P2 in 5' and 3' regions of viruses.},
671 institution = {Université de Franche-Comté, Unité Associée CNRS No. 822, Besançon,
673 keywords = {Animals; Base Sequence; Eukaryotic Cells; Genes; Introns; Prokaryotic
674 Cells; Purine Nucleotides; Pyrimidine Nucleotides; Repetitive Sequences,
675 Nucleic Acid; Viruses, genetics},
677 medline-pst = {ppublish},
680 timestamp = {2011.05.05}
683 @ARTICLE{Arques1990a,
684 author = {D. G. Arquès and C. J. Michel},
685 title = {A model of DNA sequence evolution.},
686 journal = {Bull Math Biol},
691 abstract = {Statistical studies of gene populations on the purine/pyrimidine alphabet
692 have shown that the mean occurrence probability of the i-motif YRY(N)iYRY
693 (R = purine, Y = pyrimidine, N = R or Y) is not uniform by varying
694 i in the range, but presents a maximum at i = 6 in the following
695 populations: protein coding genes of eukaryotes, prokaryotes, chloroplasts
696 and mitochondria, and also viral introns, ribosomal RNA genes and
697 transfer RNA genes (Arquès and Michel, 1987b, J. theor. Biol. 128,
698 457-461). From the "universality" of this observation, we suggested
699 that the oligonucleotide YRY(N)6 is a primitive one and that it has
700 a central function in DNA sequence evolution (Arquès and Michel,
701 1987b, J. theor. Biol. 128, 457-461). Following this idea, we introduce
702 a concept of a model of DNA sequence evolution which will be validated
703 according to a schema presented in three parts. In the first part,
704 using the last version of the gene database, the YRY(N)6YRY preferential
705 occurrence (maximum at i = 6) is confirmed for the populations mentioned
706 above and is extended to some newly analysed populations: chloroplast
707 introns, chloroplast 5' regions, mitochondrial 5' regions and small
708 nuclear RNA genes. On the other hand, the YRY(N)6YRY preferential
709 occurrence and periodicities are used in order to classify 18 gene
710 populations. In the second part, we will demonstrate that several
711 statistical features characterizing different gene populations (in
712 particular the YRY(N)6YRY preferential occurrence and the periodicities)
713 can be retrieved from a simple Markov model based on the mixing of
714 the two oligonucleotides YRY(N)6 and YRY(N)3 and based on the percentages
715 of RYR and YRY in the unspecified trinucleotides (N)3 of YRY(N)6
716 and YRY(N)3. Several properties are identified and prove in particular
717 that the oligonucleotide mixing is an independent process and that
718 several different features are functions of a unique parameter. In
719 the third part, the return of the model to the reality shows a strong
720 correlation between reality and simulation concerning the presence
721 of a large alternating purine/pyrimidine stretches and of periodicities.
722 It also contributes to a greater understanding of biological reality,
723 e.g. the presence or the absence of large alternating purine/pyrimidine
724 stretches can be explained as being a simple consequence of the mixing
725 of two particular oligonucleotides. Finally, we believe that such
726 an approach is the first step toward a unified model of DNA sequence
727 evolution allowing the molecular understanding of both the origin
728 of life and the actual biological reality.},
729 institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon,
730 Unité Associée CNRS No 822, France.},
731 keywords = {Base Sequence; Biological Evolution; DNA, genetics; Genetics, Population;
734 medline-pst = {ppublish},
737 timestamp = {2011.05.05}
740 @ARTICLE{Arques1993a,
741 author = {D. G. Arquès and C. J. Michel and K. Orieux},
742 title = {Identification and simulation of new non-random statistical properties
743 common to different populations of eukaryotic non-coding genes.},
744 journal = {J Theor Biol},
750 abstract = {The autocorrelation function analysing the occurrence probability
751 of the i-motif YRY(N)iYRY in genes allows the identification of mainly
752 two periodicities modulo 2, 3 and the preferential occurrence of
753 the motif YRY(N)6YRY (R = purine = adenine or guanine, Y = pyrimidine
754 = cytosine or thymine, N = R or Y). These non-random genetic statistical
755 properties can be simulated by an independent mixing of the three
756 oligonucleotides YRYRYR, YRYYRY and YRY(N)6 (Arquès & Michel, 1990b).
757 The problem investigated in this study is whether new properties
758 can be identified in genes with other autocorrelation functions and
759 also simulated with an oligonucleotide mixing model. The two autocorrelation
760 functions analysing the occurrence probability of the i-motifs RRR(N)iRRR
761 and YYY(N)iYYY simultaneously identify three new non-random genetic
762 statistical properties: a short linear decrease, local maxima for
763 i identical to 3[6] (i = 3, 9, etc) and a large exponential decrease.
764 Furthermore, these properties are common to three different populations
765 of eukaryotic non-coding genes: 5' regions, introns and 3' regions
766 (see section 2). These three non-random properties can also be simulated
767 by an independent mixing of the four oligonucleotides R8, Y8, RRRYRYRRR,
768 YYYRYRYYY and large alternating R/Y series. The short linear decrease
769 is a result of R8 and Y8, the local maxima for i identical to 3[6],
770 of RRRYRYRRR and YYYRYRYYY, and the large exponential decrease, of
771 large alternating R/Y series (section 3). The biological meaning
772 of these results and their relation to the previous oligonucleotide
773 mixing model are presented in the Discussion.},
774 doi = {10.1006/jtbi.1993.1059},
775 institution = {Equipe de Biologie Théorique, Université de Franche-Comté, Laboratoire
776 d'Informatique de Besançon, France.},
777 keywords = {Animals; Biological Evolution; Genes, genetics; Models, Genetic; Models,
778 Statistical; Mutation, genetics; Oligonucleotides, genetics; Probability},
780 medline-pst = {ppublish},
782 pii = {S0022-5193(83)71059-3},
784 timestamp = {2011.05.05},
785 url = {http://dx.doi.org/10.1006/jtbi.1993.1059}
789 author = {David Arroyo and Gonzalo Alvarez and Veronica Fernandez},
790 title = {On the inadequacy of the logistic map for cryptographic applications},
791 journal = {X Reunión Española sobre Criptología y Seguridad de la Información
796 owner = {christophe},
797 timestamp = {2010.03.01}
800 @MISC{Backofen99algorithmicapproach,
801 author = {R. Backofen and S. Will and P. Clote},
802 title = {Algorithmic Approach To Quantifying The Hydrophobic Force Contribution
808 @inproceedings{Blum:1985:EPP:19478.19501,
809 author = {Blum, Manuel and Goldwasser, Shafi},
810 title = {An efficient probabilistic public key encryption scheme which hides all partial information},
811 booktitle = {Proceedings of CRYPTO 84 on Advances in cryptology},
813 isbn = {0-387-15658-5},
814 location = {Santa Barbara, California, United States},
817 url = {http://dl.acm.org/citation.cfm?id=19478.19501},
819 publisher = {Springer-Verlag New York, Inc.},
820 address = {New York, NY, USA},
821 keywords = {chosen cyphertext attack, integer factorization, partial information, passive adversaries, probabilistic encryption},
825 @INPROCEEDINGS{bcgr11:ip,
826 author = {Bahi, Jacques M. and Couchot, Jean-fran\c{c}ois and Guyeux, Christophe
827 and Richard, Adrien},
828 title = {On the Link Between Strongly Connected Iteration Graphs and Chaotic
829 Boolean Discrete-Time Dynamical Systems},
830 booktitle = {FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory},
835 address = {Oslo, Norway},
839 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
845 author = {Bahi, Jacques M. and Guyeux, Christophe},
846 title = {Hash Functions Using Chaotic Iterations},
847 journal = {Journal of Algorithms \& Computational Technology},
853 doi = {10.1260/1748-3018.4.2.167},
854 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
859 url = {http://dx.doi.org/10.1260/1748-3018.4.2.167}
862 @INPROCEEDINGS{guyeux10ter,
863 author = {Bahi, Jacques M. and Guyeux, Christophe},
864 title = {A new chaos-based watermarking algorithm},
865 booktitle = {SECRYPT'10, Int. conf. on security and cryptography},
868 address = {Athens, Greece},
870 publisher = {SciTePress},
872 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
877 @INPROCEEDINGS{bgc11:ip,
878 author = {Bahi, Jacques M. and Guyeux, Christophe and Cote, Nathalie},
879 title = {Chaos of Protein Folding},
880 booktitle = {IJCNN 2011, Int. Joint Conf. on Neural Networks},
883 address = {San Jose, California, United States},
887 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
892 @INPROCEEDINGS{guyeux10bis,
893 author = {Bahi, Jacques M. and Guyeux, Christophe and Makhoul, Abdallah},
894 title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor
896 booktitle = {SENSORCOMM'10, 4-th Int. Conf. on Sensor Technologies and Applications},
899 address = {Venice-Mestre, Italy},
902 doi = {10.1109/SENSORCOMM.2010.76},
903 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
906 url = {http://dx.doi.org/10.1109/SENSORCOMM.2010.76}
909 @INPROCEEDINGS{guyeuxVictoria,
910 author = {Bahi, Jacques M. and Guyeux, Christophe and Makhoul, Abdallah},
911 title = {Secure Data Aggregation in Wireless Sensor Networks. Homomorphism
912 versus Watermarking Approach},
913 booktitle = {ADHOCNETS 2010, 2nd Int. Conf. on Ad Hoc Networks},
916 series = {Lecture Notes in ICST},
918 address = {Victoria, Canada},
921 doi = {10.1007/978-3-642-17994-5_23},
922 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
925 url = {http://dx.doi.org/10.1007/978-3-642-17994-5_23}
928 @INPROCEEDINGS{bgs11:ip,
929 author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel},
930 title = {Building a Chaotic Proven Neural Network},
931 booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network
935 address = {Maldives, Maldives},
938 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
943 @INPROCEEDINGS{bgw10:ip,
944 author = {Bahi, Jacques M. and Guyeux, Christophe and Wang, Qianxue},
945 title = {A Pseudo Random Numbers Generator Based on Chaotic Iterations. Application
947 booktitle = {WISM 2010, Int. Conf. on Web Information Systems and Mining},
952 address = {Sanya, China},
955 doi = {10.1007/978-3-642-16515-3_26},
956 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
959 url = {http://dx.doi.org/10.1007/978-3-642-16515-3_26}
962 @INPROCEEDINGS{bgw09:ip,
963 author = {Bahi, Jacques M. and Guyeux, Christophe and Wang, Qianxue},
964 title = {A novel pseudo-random generator based on discrete chaotic iterations},
965 booktitle = {INTERNET'09, 1-st Int. Conf. on Evolving Internet},
968 address = {Cannes, France},
971 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
976 @INPROCEEDINGS{bmg10:onp,
977 author = {Bahi, Jacques M. and Makhoul, Abdallah and Guyeux, Christophe},
978 title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor
979 Networks for critical applications},
980 booktitle = {RESSACS, Journ\'ee th\'ematique PHC/ResCom sur RESeaux de capteurS
981 et Applications Critiques de Surveillance},
983 address = {Bayonne, France},
985 note = {Communication orale},
987 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
992 @INPROCEEDINGS{guyeuxBayonne,
993 author = {Bahi, Jacques M. and Makhoul, Abdallah and Guyeux, Christophe},
994 title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor
995 Networks for critical applications},
996 booktitle = {RESSACS, Journ\'ee th\'ematique PHC/ResCom sur RESeaux de capteurS
997 et Applications Critiques de Surveillance},
999 address = {Bayonne, France},
1001 note = {Communication orale},
1008 author = {Bahi, Jacques M. and Salomon, Michel},
1009 title = {A Decentralized Energy-based Diffusion Algorithm to Increase the
1010 Lifetime of {MANETs}},
1011 journal = {Computer Networks Journal},
1014 note = {Accepted manuscript. To appear},
1015 classement = {ACLI},
1017 impact-factor = {1.201},
1020 publisher = {Elsevier}
1024 author = {J. M. Bahi},
1025 title = {Boolean totally asynchronous iterations},
1026 journal = {Int. Journal of Mathematical Algorithms},
1031 timestamp = {17/02/2008}
1034 @ARTICLE{Bahi2000bis,
1035 author = {Jacques M. Bahi},
1036 title = {Asynchronous iterative algorithms for nonexpansive linear systems},
1037 journal = {Journal of Parallel and Distributed Computing},
1042 timestamp = {2009.01.10}
1046 author = {J. M. Bahi},
1047 title = {Parallel synchronous chaotic iterations for singular linear systems},
1048 journal = {Parallel Algorithms and Applications},
1053 timestamp = {17/02/2008}
1057 author = {Jacques M. Bahi},
1058 title = {Algorithmes paralleles asynchrones pour les systemes singuliers},
1059 journal = {Comptes Rendus de l'Academie des Sciences},
1061 volume = {t. 326, serie 1},
1062 pages = {1421--1425},
1064 timestamp = {2009.01.18}
1068 author = {Jacques M. Bahi},
1069 title = {Méthodes itératives dans des espaces produits. Application au calcul
1071 school = {Université de Franche-Comté},
1073 type = {Habilitation à diriger des recherches},
1074 owner = {christophe},
1075 timestamp = {2010.08.24}
1079 author = {Jacques M. Bahi},
1080 title = {Algorithmes asynchrones pour des systèmes différentiels-algébriques.
1081 Simulation numérique sur des exemples de circuits électriques},
1082 school = {Université de Franche-Comté},
1084 owner = {christophe},
1085 timestamp = {2010.08.24}
1089 author = {Jacques M. Bahi and Sylvain Contassot-Vivier},
1090 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
1092 journal = {IEEE Transactions on Neural Networks},
1099 timestamp = {2009.12.04}
1103 author = {J.~M. Bahi and S. Contassot-Vivier},
1104 title = {Stability of fully asynchronous discrete-time discrete state dynamic
1106 journal = {IEEE Transactions on Neural Networks},
1109 pages = {1353-1363},
1111 timestamp = {2009.02.14}
1114 @TECHREPORT{bcgg10:ir,
1115 author = {Bahi, J. M. and Couchot, J.-F. and Grasset, O. and Guyeux, C.},
1116 title = {{D}iscrete {D}ynamical {S}ystems: {N}ecessary {D}ivergence {C}onditions
1117 for {S}ynchronous {I}terations},
1118 institution = {LIFC - Laboratoire d'{I}nformatique de l'{U}niversit\'{e} de {F}ranche
1121 type = {Research Report},
1122 number = {RR2010-04},
1124 pdf = {/~publis/papers/pub/2010/RR2010-04.pdf}
1128 author = {Bahi, Jacques M. and Guyeux, Christophe},
1129 title = {Hash Functions Using Chaotic Iterations},
1130 journal = {Journal of Algorithms \& Computational Technology},
1135 classement = {ACLNI},
1136 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1138 impact-factor = {#},
1143 @INPROCEEDINGS{guyeux10,
1144 author = {Bahi, Jacques M. and Guyeux, Christophe},
1145 title = {Topological chaos and chaotic iterations, application to Hash functions},
1146 booktitle = {WCCI'10, IEEE World Congress on Computational Intelligence},
1149 address = {Barcelona, Spain},
1151 note = {Best paper award},
1152 classement = {ACTI},
1153 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1159 author = {Jacques M. Bahi and Christophe Guyeux},
1160 title = {A chaos-based approach for information hiding security.},
1161 howpublished = {arXiv},
1164 institution = {Computer Science Laboratory LIFC, University of Franche-Comte, France}
1168 author = {Jacques M. Bahi and Christophe Guyeux},
1169 title = {A watermarking algorithm satisfying topological chaos properties},
1172 volume = {abs/0810.4713},
1173 bibsource = {DBLP, http://dblp.uni-trier.de},
1174 ee = {http://arxiv.org/abs/0810.4713}
1178 author = {Jacques M. Bahi and Christophe Guyeux},
1179 title = {Chaotic iterations and topological chaos},
1181 abstract = {Chaotic iterations have been introduced on the one hand by Chazan,
1182 Miranker [5] and Miellou [9] in a numerical analysis context, and
1183 on the other hand by Robert [11] and Pellegrin [10] in the discrete
1184 dynamical systems framework. In both cases, the objective was to
1185 derive conditions of convergence of such iterations to a fixed state.
1186 In this paper, a new point of view is presented, the goal here is
1187 to derive conditions under which chaotic iterations admit a chaotic
1188 behaviour in a rigorous mathematical sense. Contrary to what has
1189 been studied in the literature, convergence is not desired. More
1190 precisely, we establish in this paper a link between the concept
1191 of chaotic iterations on a finite set and the notion of topological
1192 chaos [8], [6], [7]. We are motivated by concrete applications of
1193 our approach, such as the use of chaotic boolean iterations in the
1194 computer security field. Indeed, the concept of chaos is used in
1195 many areas of data security without real rigorous theoretical foundations,
1196 and without using the fundamental properties that allow chaos. The
1197 wish of this paper is to bring a bit more mathematical rigour in
1199 citeseerurl = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}},
1201 comments = {6 pages},
1202 eprint = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}},
1203 oai2identifier = {0810.3154},
1205 timestamp = {2008.10.23},
1206 url = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}}
1209 @ARTICLE{arxivRNNchaos,
1210 author = {Jacques M. Bahi and Christophe Guyeux and Michel Salomon},
1211 title = {Building a Chaotic Proved Neural Network},
1214 volume = {abs/1101.4351},
1215 ee = {http://arxiv.org/abs/1101.4351}
1218 @INPROCEEDINGS{guyeuxTaiwan10,
1219 author = {Bahi, Jacques M. and Guyeux, Christophe and Wang, Qianxue},
1220 title = {Improving random number generators by chaotic iterations. Application
1222 booktitle = {ICCASM 2010, Int. Conf. on Computer Application and System Modeling},
1224 pages = {V13-643--V13-647},
1225 address = {Taiyuan, China},
1227 classement = {ACTI},
1228 doi = {10.1109/ICCASM.2010.5622199},
1229 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1232 url = {http://dx.doi.org/10.1109/ICCASM.2010.5622199}
1236 author = {Jacques M Bahi and Christian J Michel},
1237 title = {A stochastic model of gene evolution with time dependent pseudochaotic
1239 journal = {Bull Math Biol},
1245 abstract = {We develop here a new class of stochastic models of gene evolution
1246 in which a random subset of the 64 possible trinucleotides mutates
1247 at each evolutionary time t according to some time dependent substitution
1248 probabilities. Therefore, at each time t, the numbers and the types
1249 of mutable trinucleotides are unknown. Thus, the mutation matrix
1250 changes at each time t. This pseudochaotic model developed generalizes
1251 the standard model in which all the trinucleotides mutate at each
1252 time t. It determines the occurrence probabilities at time t of trinucleotides
1253 which pseudochaotically mutate according to 3 time dependent substitution
1254 parameters associated with the 3 trinucleotide sites. The main result
1255 proves that under suitable assumptions, this pseudochaotic model
1256 converges to a uniform probability vector identical to that of the
1257 standard model. Furthermore, an application of this pseudochaotic
1258 model allows an evolutionary study of the 3 circular codes identified
1259 in both eukaryotic and prokaryotic genes. A circular code is a particular
1260 set of trinucleotides whose main property is the retrieval of the
1261 frames in genes locally, i.e., anywhere in genes and particularly
1262 without start codons, and automatically with a window of a few nucleotides.
1263 After a certain evolutionary time and with particular time dependent
1264 functions for the 3 substitution parameters, precisely an exponential
1265 decrease in the 1st and 2nd trinucleotide sites and an exponential
1266 increase in the 3rd one, this pseudochaotic model retrieves the main
1267 statistical properties of the 3 circular codes observed in genes.
1268 Furthermore, it leads to a circular code asymmetry stronger than
1269 the standard model (nonpseudochaotic) and, therefore, to a better
1270 correlation with the genes.},
1271 doi = {10.1007/s11538-008-9376-4},
1272 institution = {LIFC-EA 4157, Université de Franche-Comté, IUT de Belfort, BP 527,
1273 90016, Belfort Cedex, France. jacques.bahi@univ-fcomte.fr},
1274 keywords = {Evolution, Molecular; Genes; Models, Genetic; Mutation; Stochastic
1277 medline-pst = {ppublish},
1280 timestamp = {2011.05.05},
1281 url = {http://dx.doi.org/10.1007/s11538-008-9376-4}
1285 author = {Jacques M Bahi and Christian J Michel},
1286 title = {A stochastic model of gene evolution with chaotic mutations.},
1287 journal = {J Theor Biol},
1293 abstract = {We develop here a new class of stochastic models of gene evolution
1294 in which the mutations are chaotic, i.e. a random subset of the 64
1295 possible trinucleotides mutates at each evolutionary time t according
1296 to some substitution probabilities. Therefore, at each time t, the
1297 numbers and the types of mutable trinucleotides are unknown. Thus,
1298 the mutation matrix changes at each time t. The chaotic model developed
1299 generalizes the standard model in which all the trinucleotides mutate
1300 at each time t. It determines the occurrence probabilities at time
1301 t of trinucleotides which chaotically mutate according to three substitution
1302 parameters associated with the three trinucleotide sites. Two theorems
1303 prove that this chaotic model has a probability vector at each time
1304 t and that it converges to a uniform probability vector identical
1305 to that of the standard model. Furthermore, four applications of
1306 this chaotic model (with a uniform random strategy for the 64 trinucleotides
1307 and with a particular strategy for the three stop codons) allow an
1308 evolutionary study of the three circular codes identified in both
1309 eukaryotic and prokaryotic genes. A circular code is a particular
1310 set of trinucleotides whose main property is the retrieval of the
1311 frames in genes locally, i.e. anywhere in genes and particularly
1312 without start codons, and automatically with a window of a few nucleotides.
1313 After a certain evolutionary time and with particular values for
1314 the three substitution parameters, the chaotic models retrieve the
1315 main statistical properties of the three circular codes observed
1316 in genes. These applications also allow an evolutionary comparison
1317 between the standard and chaotic models.},
1318 doi = {10.1016/j.jtbi.2008.07.028},
1319 institution = {LIFC-EA 4157, Université de Franche-Comté, IUT de Belfort, BP 527,
1320 90016 Belfort Cedex, France. jacques.bahi@univ-fcomte.fr},
1321 keywords = {Animals; Computer Simulation; DNA, Circular, genetics; Evolution,
1322 Molecular; Genetic Code; Models, Genetic; Mutation; Nonlinear Dynamics;
1323 Stochastic Processes; Time},
1325 medline-pst = {ppublish},
1327 pii = {S0022-5193(08)00395-0},
1329 timestamp = {2011.05.05},
1330 url = {http://dx.doi.org/10.1016/j.jtbi.2008.07.028}
1333 @ARTICLE{Bahi2008bis,
1334 author = {Bahi, J. M. and Michel, C. J.},
1335 title = {A stochastic model of gene evolution with chaotic mutations},
1336 journal = {Journal of Theoretical Biology},
1341 timestamp = {2009.01.10}
1345 author = {Jacques M Bahi and Christian J Michel},
1346 title = {A stochastic gene evolution model with time dependent mutations.},
1347 journal = {Bull Math Biol},
1353 abstract = {We develop here a new class of gene evolution models in which the
1354 nucleotide mutations are time dependent. These models allow to study
1355 nonlinear gene evolution by accelerating or decelerating the mutation
1356 rates at different evolutionary times. They generalize the previous
1357 ones which are based on constant mutation rates. The stochastic model
1358 developed in this class determines at some time t the occurrence
1359 probabilities of trinucleotides mutating according to 3 time dependent
1360 substitution parameters associated with the 3 trinucleotide sites.
1361 Therefore, it allows to simulate the evolution of the circular code
1362 recently observed in genes. By varying the class of function for
1363 the substitution parameters, 1 among 12 models retrieves after mutation
1364 the statistical properties of the observed circular code in the 3
1365 frames of actual genes. In this model, the mutation rate in the 3rd
1366 trinucleotide site increases during gene evolution while the mutation
1367 rates in the 1st and 2nd sites decrease. This property agrees with
1368 the actual degeneracy of the genetic code. This approach can easily
1369 be generalized to study evolution of motifs of various lengths, e.g.,
1370 dicodons, etc., with time dependent mutations.},
1371 doi = {10.1016/j.bulm.2003.10.004},
1372 institution = {LIFC - FRE CNRS 2661, IUT de Belfort, Université de Franche-Comté,
1373 BP 527, 90016 Belfort Cédex, France. bahi@iut-bm.univ-fcomte.fr},
1374 keywords = {Codon, genetics; Evolution, Molecular; Genes, genetics; Genetic Code,
1375 genetics; Models, Genetic; Mutation; Stochastic Processes},
1377 medline-pst = {ppublish},
1379 pii = {S0092824003001174},
1381 timestamp = {2011.05.05},
1382 url = {http://dx.doi.org/10.1016/j.bulm.2003.10.004}
1386 author = {J. Banks and J. Brooks and G. Cairns and P. Stacey},
1387 title = {On Devaney's Definition of Chaos},
1388 journal = {Amer. Math. Monthly},
1394 timestamp = {27/01/2008}
1398 author = {E. Barker and A. Roginsky},
1399 title = {DRAFT NIST Special Publication 800-131 Recommendation for the Transitioning
1400 of Cryptographic Algorithms and Key Sizes},
1402 owner = {christophe},
1403 timestamp = {2010.08.18}
1407 author = {Mauro Barni and Franco Bartolini and Teddy Furon},
1408 title = {A general framework for robust watermarking security},
1409 journal = {Signal Processing},
1412 pages = {2069-2084},
1414 note = {Special issue on Security of Data Hiding Technologies, invited paper},
1415 bibsource = {DBLP, http://dblp.uni-trier.de},
1416 ee = {http://dx.doi.org/10.1016/S0165-1684(03)00168-3},
1418 timestamp = {2009.06.30}
1422 author = {Baudet, G\'{e}rard M.},
1423 title = {Asynchronous Iterative Methods for Multiprocessors},
1429 address = {New York, NY, USA},
1430 doi = {http://doi.acm.org/10.1145/322063.322067},
1436 author = {Didier El Baz},
1437 title = {Contribution à l'algorithmique parallèle. Le concept d'asynchronisme
1438 : étude théorique, mise en œuvre, et application},
1439 school = {Institut national polytechnique de Toulouse},
1441 type = {Habilitation à diriger des recherches},
1442 owner = {christophe},
1443 timestamp = {2010.08.24}
1447 author = {Benoit, Anne and Hakem, Mourad and Robert, Yves},
1448 title = {Contention awareness and fault-tolerant scheduling for precedence
1449 constrained tasks in heterogeneous systems},
1450 journal = {Parallel Computing},
1456 doi = {10.1016/j.parco.2008.11.001},
1459 url = {http://dx.doi.org/10.1016/j.parco.2008.11.001}
1462 @INPROCEEDINGS{bhr08b:bl,
1463 author = {Benoit, Anne and Hakem, Mourad and Robert, Yves},
1464 title = {Fault tolerant scheduling of precedence task graphs on heterogeneous
1466 booktitle = {IPDPS'08},
1469 publisher = {IEEE Computer Society Press},
1475 @INPROCEEDINGS{Berger98,
1476 author = {Berger, Bonnie and Leighton, Tom},
1477 title = {Protein folding in the hydrophobic-hydrophilic (HP) is NP-complete},
1478 booktitle = {Proceedings of the second annual international conference on Computational
1481 series = {RECOMB '98},
1483 address = {New York, NY, USA},
1486 isbn = {0-89791-976-9},
1487 location = {New York, New York, United States},
1492 title = {Parallel and distributed computation: numerical methods},
1493 publisher = {Prentice-Hall, Inc.},
1495 author = {Bertsekas, Dimitri P. and Tsitsiklis, John N.},
1496 address = {Upper Saddle River, NJ, USA},
1497 isbn = {0-13-648700-9}
1500 @MISC{Bertsekas88paralleland,
1501 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
1502 title = {Parallel and distributed iterative algorithms: a selective survey},
1507 author = {F. Blanchard and E. Glasner and S. Kolyada and A.Maass},
1508 title = {On Li-Yorke pairs},
1512 timestamp = {2008.01.02}
1516 author = {F. Blanchard and B. Host and S. Ruette},
1517 title = {Asymptotic pairs in positive-entropy systems},
1519 optannote = {to appear in Ergod. Th. Dynam. Sys.},
1522 timestamp = {2008.01.02}
1526 author = {Dan Boneh and Matt Franklin},
1527 title = {Identity-Based Encryption from the {Weil} Pairing},
1528 journal = {SIAM J. of Computing},
1533 note = {Extended abstract in Crypto'01}
1536 @INCOLLECTION{boneh,
1537 author = {Boneh, Dan and Goh, Eu-Jin and Nissim, Kobbi},
1538 title = {Evaluating 2-DNF Formulas on Ciphertexts},
1541 abstract = {Let ψ be a 2-DNF formula on boolean variables x 1,..., x n ∈ {0,1}.
1542 We present a homomorphic public key encryption scheme that allows
1543 the public evaluation of ψ given an encryption of the variables x
1544 1,..., x n. In other words, given the encryption of the bits x 1,...,
1545 x n, anyone can create the encryption of ψ( x 1,..., x n). More generally,
1546 we can evaluate quadratic multi-variate polynomials on ciphertexts
1547 provided the resulting value falls within a small set. We present
1548 a number of applications of the system: 1 In a database of size n,
1549 the total communication in the basic step of the Kushilevitz-Ostrovsky
1550 PIR protocol is reduced from to . 2 An efficient election system
1551 based on homomorphic encryption where voters do not need to include
1552 non-interactive zero knowledge proofs that their ballots are valid.
1553 The election system is proved secure without random oracles but still
1554 efficient. 3 A protocol for universally verifiable computation.},
1555 citeulike-article-id = {2719460},
1556 citeulike-linkout-0 = {http://www.springerlink.com/content/wtt5caxkr94laxkg},
1557 journal = {Theory of Cryptography},
1558 keywords = {homomorphic, pairings},
1559 posted-at = {2008-04-25 21:53:15},
1561 url = {http://www.springerlink.com/content/wtt5caxkr94laxkg}
1565 author = {Bonneau, Richard and Baker, David},
1566 title = {AB INITIO PROTEIN STRUCTURE PREDICTION: Progress and Prospects},
1567 journal = {Annual Review of Biophysics and Biomolecular Structure},
1572 doi = {10.1146/annurev.biophys.30.1.173}
1576 author = {R. Bowen},
1577 title = {Entropy for group endomorphisms and homogeneous spaces},
1578 journal = {Trans. Amer. Math. Soc.},
1583 timestamp = {15/02/2008}
1587 author = {R. Bowen},
1588 title = {Periodic points and measures for Axiom A diffeomorphisms},
1589 journal = {Trans. Amer. Math. Soc.},
1594 timestamp = {15/02/2008}
1597 @ARTICLE{Braxenthaler97,
1598 author = {Michael Braxenthaler and R. Ron Unger and Ditza Auerbach and John
1600 title = {Chaos in protein dynamics},
1601 journal = {Proteins-structure Function and Bioinformatics},
1605 doi = {10.1002/(SICI)1097-0134(199712)29:4<417::AID-PROT2>3.3.CO;2-O},
1609 @INPROCEEDINGS{Brumley03remotetiming,
1610 author = {David Brumley and Dan Boneh},
1611 title = {Remote Timing Attacks are Practical},
1612 booktitle = {Proceedings of the 12th USENIX Security Symposium},
1617 @ARTICLE{Bohm1991375,
1618 author = {Gerald Böhm},
1619 title = {Protein folding and deterministic chaos: Limits of protein folding
1620 simulations and calculations},
1621 journal = {Chaos, Solitons \& Fractals},
1624 pages = {375 - 382},
1626 doi = {DOI: 10.1016/0960-0779(91)90028-8},
1628 url = {http://www.sciencedirect.com/science/article/B6TJ4-46CBXVT-1X/2/370489c218e4c2732cd9b620ef50c696}
1631 @INCOLLECTION{Cachin2004,
1632 author = {Cachin, Christian},
1633 title = {An Information-Theoretic Model for Steganography},
1634 booktitle = {Information Hiding},
1635 publisher = {Springer Berlin / Heidelberg},
1638 series = {Lecture Notes in Computer Science},
1640 affiliation = {MIT Laboratory for Computer Science 545 Technology Square Cambridge
1645 author = {H. Cam and S. Ozdemir and P. Nair and D. Muthuavinashinappan and
1647 title = {ESPDA: Energy-efficient secure pattern based data aggregation for
1648 wireless sensor networks.},
1649 journal = {Computer Communication journal (29)},
1654 @ARTICLE{CarletCZ98,
1655 author = {Claude Carlet and Pascale Charpin and Victor Zinoviev},
1656 title = {Codes, Bent Functions and Permutations Suitable For DES-like Cryptosystems},
1657 journal = {Des. Codes Cryptography},
1662 bibsource = {DBLP, http://dblp.uni-trier.de}
1665 @INPROCEEDINGS{Castelluccia05efficientaggregation,
1666 author = {Claude Castelluccia},
1667 title = {Efficient aggregation of encrypted data in wireless sensor networks},
1668 booktitle = {MobiQuitous},
1671 publisher = {IEEE Computer Society}
1675 author = {Cayre, F. and Bas, P.},
1676 title = {Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding},
1677 journal = {IEEE Transactions on Information Forensics and Security},
1682 doi = {10.1109/TIFS.2007.916006},
1684 keywords = {cryptography, random sequences, spread spectrum communication, telecommunication
1685 security, watermarking, Kerckhoffs-based embedding security classes,
1686 WOA Data Hiding, pseudorandom sequences, spread-spectrum techniques,
1687 steganography security, watermark-only-attack, watermarking, Security,
1688 spread-spectrum (SS) watermarking},
1690 timestamp = {2009.06.29}
1694 author = {Cayre, F. and Fontaine, C. and Furon, T.},
1695 title = {Watermarking security: theory and practice},
1696 journal = {IEEE Transactions on Signal Processing},
1699 pages = {3976--3987},
1701 doi = {10.1109/TSP.2005.855418},
1703 keywords = {blind source separation, cryptography, watermarking, Fisher information
1704 matrix, blind source separation, cryptanalysis, information theory,
1705 spread spectrum techniques, substitutive scheme, watermarking security,
1706 Blind source separation, Fisher information matrix, equivocation,
1707 security, watermarking},
1709 timestamp = {2009.06.29}
1712 @ARTICLE{Chajakis91,
1713 author = {Chajakis, Emmanuel D. and Zenios, Stavros A.},
1714 title = {Synchronous and asynchronous implementations of relaxation algorithms
1715 for nonlinear network optimization},
1716 journal = {Parallel Comput.},
1721 address = {Amsterdam, The Netherlands, The Netherlands},
1722 doi = {http://dx.doi.org/10.1016/S0167-8191(05)80072-9},
1724 publisher = {Elsevier Science Publishers B. V.}
1728 author = {Chan, Haowen and Perrig, Adrian and Przydatek, Bartosz and Song,
1730 title = {SIA: Secure information aggregation in sensor networks},
1731 journal = {J. Comput. Secur.},
1736 address = {Amsterdam, The Netherlands, The Netherlands},
1738 publisher = {IOS Press}
1741 @ARTICLE{Chandramouli06,
1742 author = {R. Chandramouli and S. Bapatla and K.P. Subbalakshmi},
1743 title = {Battery power-aware encryption},
1744 journal = {ACM transactions on information and system security},
1747 owner = {christophe},
1748 timestamp = {2010.07.31}
1752 author = {Pascale Charpin},
1753 title = {A description of some extended cyclic codes with application to Reed-Solomon
1755 journal = {Discrete Mathematics},
1760 bibsource = {DBLP, http://dblp.uni-trier.de},
1761 ee = {http://dx.doi.org/10.1016/0012-365X(85)90019-6}
1765 author = {D. Chazan and W. Miranker},
1766 title = {Chaotic relaxation},
1767 journal = {Linear algebra and its applications},
1771 timestamp = {2008.05.22}
1775 author = {Cheon, Jung Hee and Kim, Woo-Hwan and Nam, Hyun Soo},
1776 title = {Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy
1777 homomorphism scheme},
1778 journal = {Inf. Process. Lett.},
1783 address = {Amsterdam, The Netherlands, The Netherlands},
1784 doi = {http://dx.doi.org/10.1016/j.ipl.2005.09.016},
1786 publisher = {Elsevier North-Holland, Inc.}
1789 @MISC{Cheon03acryptanalysis,
1790 author = {Jung Hee Cheon and Hyun Soo Nam},
1791 title = {A Cryptanalysis of the Original Domingo-Ferrer's Algebraic Privacy
1797 author = {R.C.C. Cheung and N.J. Telle and W. Luk and P.Y.K. Cheung},
1798 title = {Secure encrypted-data aggregation for wireless sensor networks},
1799 journal = {IEEE Trans. on Very Large Scale Integration Systems},
1802 pages = {1048-1059},
1806 @ARTICLE{Chivian2005,
1807 author = {Chivian, Dylan and Kim, David E. and Malmström, Lars and Schonbrun,
1808 Jack and Rohl, Carol A. and Baker, David},
1809 title = {Prediction of CASP6 structures using automated robetta protocols},
1810 journal = {Proteins},
1816 keywords = {Rosetta, fragment assembly, de novo modeling, homology modeling, parametric
1817 alignment ensemble},
1818 owner = {christophe},
1819 publisher = {Wiley Subscription Services, Inc., A Wiley Company},
1820 timestamp = {2011.01.22},
1821 url = {http://dx.doi.org/10.1002/prot.20733}
1825 author = {Congxu, Zhu and Xuefeng, Liao and Zhihua, Li},
1826 title = {Chaos-based multipurpose image watermarking algorithm},
1827 journal = {Wuhan University Journal of Natural Sciences},
1830 pages = {1675-1678},
1831 note = {10.1007/BF02831848},
1832 abstract = {To achieve the goal of image content authentication and copyright
1833 protection simultaneously, this paper presents a novel image dual
1834 watermarking method based on chaotic map. Firstly, the host image
1835 was split into many nonoverlapping small blocks, and the block-wise
1836 discrete cosine transform (DCT) is computed. Secondly, the robust
1837 watermarks, shuffled by the chaotic sequences, are embedded in the
1838 DC coefficients of blocks to achieve the goal of copyright protection.
1839 The semi-fragile watermarks, generated by chaotic map, are embedded
1840 in the AC coefficients of blocks to obtain the aim of image authentication.
1841 Both of them can be extracted without the original image. Simulation
1842 results demonstrate the effectiveness of our algorithm in terms of
1843 robustness and fragility.},
1844 affiliation = {Central South University School of Information Science and Engineering
1845 410083 Changsha, Hunan China},
1848 keyword = {Mathematics, general},
1849 publisher = {Wuhan University, co-published with Springer},
1850 url = {http://dx.doi.org/10.1007/BF02831848}
1853 @ARTICLE{Conley1978,
1854 author = {C. Conley},
1855 title = {Isolated invariant sets and the Morse index},
1856 journal = {CBMS Regional Conference. AMS.},
1860 timestamp = {2008.01.02}
1864 author = {Philippe Cornu and André Smolarz},
1865 title = {Image characterization by texture},
1866 journal = {Traitement du signal},
1870 file = {:/home/guyeux/Documents/Bibliotheque/These/Watermarking/Caractérisation d'images par textures associées.pdf:PDF},
1872 timestamp = {2008.05.12}
1875 @INPROCEEDINGS{Cox99,
1876 author = {Ingemar Cox and Matt L. Miller and Andrew L. Mckellips},
1877 title = {Watermarking as Communications With Side Information},
1878 booktitle = {Proceedings of the IEEE},
1880 pages = {1127--1141},
1881 owner = {christophe},
1882 timestamp = {2010.03.06}
1885 @ARTICLE{Cox97securespread,
1886 author = {Ingemar J. Cox and Senior Member and Joe Kilian and F. Thomson Leighton
1888 title = {Secure spread spectrum watermarking for multimedia},
1889 journal = {IEEE Transactions on Image Processing},
1892 pages = {1673--1687}
1896 author = {Christopher Cramer and Erol Gelenbe and Hakan Bakircioglu},
1897 title = {Video Compression with Random Neural Networks},
1898 journal = {Neural Networks for Identification, Control, and Robotics, International
1903 address = {Los Alamitos, CA, USA},
1904 isbn = {0-8186-7456-3},
1905 publisher = {IEEE Computer Society}
1908 @INPROCEEDINGS{Crescenzi98,
1909 author = {Crescenzi, Pierluigi and Goldman, Deborah and Papadimitriou, Christos
1910 and Piccolboni, Antonio and Yannakakis, Mihalis},
1911 title = {On the complexity of protein folding (extended abstract)},
1912 booktitle = {Proceedings of the thirtieth annual ACM symposium on Theory of computing},
1914 series = {STOC '98},
1916 address = {New York, NY, USA},
1919 isbn = {0-89791-962-9},
1920 location = {Dallas, Texas, United States},
1925 author = {Zhao Dawei and Chen Guanrong and Liu Wenbo},
1926 title = {A chaos-based robust wavelet-domain watermarking algorithm},
1927 journal = {Chaos, Solitons and Fractals},
1932 timestamp = {2008.10.07}
1936 author = {Anthony Desnos and Robert Erra and Eric Filiol},
1937 title = {Processor-Dependent Malware... and codes},
1939 comment = {arXiv:1011.1638},
1940 eprint = {arXiv:1011.1638}
1944 title = {An Introduction to Chaotic Dynamical Systems},
1945 publisher = {Addison-Wesley},
1947 author = {Devaney, Robert L.},
1948 address = {Redwood City, CA},
1953 author = {Whitfield Diffie and Martin E. Hellman},
1954 title = {New Directions in Cryptography},
1955 journal = {IEEE Transactions on Information Theory},
1960 date = {November 1976},
1962 timestamp = {2009.06.30},
1963 url = {citeseer.ist.psu.edu/diffie76new.html}
1966 @INCOLLECTION{Dijk10,
1967 author = {van Dijk, Marten and Gentry, Craig and Halevi, Shai and Vaikuntanathan,
1969 title = {Fully Homomorphic Encryption over the Integers},
1970 booktitle = {Advances in Cryptology – EUROCRYPT 2010},
1971 publisher = {Springer Berlin / Heidelberg},
1973 editor = {Gilbert, Henri},
1975 series = {Lecture Notes in Computer Science},
1977 abstract = {We construct a simple fully homomorphic encryption scheme, using only
1978 elementary modular arithmetic. We use Gentry’s technique to construct
1979 a fully homomorphic scheme from a bootstrappable somewhat homomorphic
1980 scheme. However, instead of using ideal lattices over a polynomial
1981 ring, our bootstrappable encryption scheme merely uses addition and
1982 multiplication over the integers. The main appeal of our scheme is
1983 the conceptual simplicity. We reduce the security of our scheme to
1984 finding an approximate integer gcd – i.e., given a list of integers
1985 that are near-multiples of a hidden integer, output that hidden integer.
1986 We investigate the hardness of this task, building on earlier work
1987 of Howgrave-Graham.},
1988 affiliation = {MIT CSAIL}
1992 author = {Dill, KA},
1993 title = {Theory for the folding and stability of globular proteins.},
1994 journal = {Biochemistry},
2000 abstract = {Using lattice statistical mechanics, we develop theory to account
2001 for the folding of a heteropolymer molecule such as a protein to
2002 the globular and soluble state. Folding is assumed to be driven by
2003 the association of solvophobic monomers to avoid solvent and opposed
2004 by the chain configurational entropy. Theory predicts a phase transition
2005 as a function of temperature or solvent character. Molecules that
2006 are too short or too long or that have too few solvophobic residues
2007 are predicted not to fold. Globular molecules should have a largely
2008 solvophobic core, but there is an entropic tendency for some residues
2009 to be "out of place", particularly in small molecules. For long chains,
2010 molecules comprised of globular domains are predicted to be thermodynamically
2011 more stable than spherical molecules. The number of accessible conformations
2012 in the globular state is calculated to be an exceedingly small fraction
2013 of the number available to the random coil. Previous estimates of
2014 this number, which have motivated kinetic theories of folding, err
2015 by many tens of orders of magnitude.},
2016 comment = {Research Support, Non-U.S. Gov't,Research Support, U.S. Gov't, P.H.S.,},
2017 keywords = {Mathematics, Models, Chemical, Polymers, Protein Conformation},
2018 owner = {christophe},
2019 timestamp = {2011.01.22},
2020 url = {http://ukpmc.ac.uk/abstract/MED/3986190}
2024 author = {Dill, KA and Bromberg, S and Yue, K and Fiebig, KM and Yee, DP and
2025 Thomas, PD and Chan, HS},
2026 title = {Principles of protein folding--a perspective from simple exact models.},
2027 journal = {Protein Sci},
2030 pages = {561-602--},
2033 abstract = {General principles of protein structure, stability, and folding kinetics
2034 have recently been explored in computer simulations of simple exact
2035 lattice models. These models represent protein chains at a rudimentary
2036 level, but they involve few parameters, approximations, or implicit
2037 biases, and they allow complete explorations of conformational and
2038 sequence spaces. Such simulations have resulted in testable predictions
2039 that are sometimes unanticipated: The folding code is mainly binary
2040 and delocalized throughout the amino acid sequence. The secondary
2041 and tertiary structures of a protein are specified mainly by the
2042 sequence of polar and nonpolar monomers. More specific interactions
2043 may refine the structure, rather than dominate the folding code.
2044 Simple exact models can account for the properties that characterize
2045 protein folding: two-state cooperativity, secondary and tertiary
2046 structures, and multistage folding kinetics--fast hydrophobic collapse
2047 followed by slower annealing. These studies suggest the possibility
2048 of creating "foldable" chain molecules other than proteins. The encoding
2049 of a unique compact chain conformation may not require amino acids;
2050 it may require only the ability to synthesize specific monomer sequences
2051 in which at least one monomer type is solvent-averse.},
2052 address = {Department of Pharmaceutical Chemistry, University of California,
2053 San Francisco 94143-1204, USA.},
2054 comment = {Review,Research Support, Non-U.S. Gov't,Research Support, U.S. Gov't,
2055 Non-P.H.S.,Research Support, U.S. Gov't, P.H.S.,},
2056 keywords = {Amino Acid Sequence, Biological Evolution, Hydrogen Bonding, Models,
2057 Molecular, Molecular Sequence Data, Mutation, Protein Conformation,
2058 Protein Denaturation, Protein Folding, Temperature, Thermodynamics},
2059 owner = {christophe},
2060 timestamp = {2011.01.22},
2061 url = {http://ukpmc.ac.uk/abstract/MED/7613459}
2064 @INPROCEEDINGS{Dobbertin96,
2065 author = {Dobbertin, Hans},
2066 title = {Cryptanalysis of MD4},
2067 booktitle = {Proceedings of the Third International Workshop on Fast Software
2071 address = {London, UK},
2072 publisher = {Springer-Verlag},
2073 isbn = {3-540-60865-6}
2076 @INPROCEEDINGS{DomingoFerrer2002,
2077 author = {Domingo-Ferrer, Josep},
2078 title = {A Provably Secure Additive and Multiplicative Privacy Homomorphism},
2079 booktitle = {ISC '02: Proceedings of the 5th International Conference on Information
2083 address = {London, UK},
2084 publisher = {Springer-Verlag},
2085 isbn = {3-540-44270-7}
2088 @ARTICLE{Dubchak1995,
2089 author = {I. Dubchak and I. Muchnik and S. R. Holbrook and S. H. Kim},
2090 title = {Prediction of protein folding class using global description of amino
2092 journal = {Proc Natl Acad Sci U S A},
2095 pages = {8700--8704},
2098 __markedentry = {[guyeux]},
2099 abstract = {We present a method for predicting protein folding class based on
2100 global protein chain description and a voting process. Selection
2101 of the best descriptors was achieved by a computer-simulated neural
2102 network trained on a data base consisting of 83 folding classes.
2103 Protein-chain descriptors include overall composition, transition,
2104 and distribution of amino acid attributes, such as relative hydrophobicity,
2105 predicted secondary structure, and predicted solvent exposure. Cross-validation
2106 testing was performed on 15 of the largest classes. The test shows
2107 that proteins were assigned to the correct class (correct positive
2108 prediction) with an average accuracy of 71.7\%, whereas the inverse
2109 prediction of proteins as not belonging to a particular class (correct
2110 negative prediction) was 90-95\% accurate. When tested on 254 structures
2111 used in this study, the top two predictions contained the correct
2112 class in 91\% of the cases.},
2113 institution = {Department of Chemistry, University of California, Berkeley 94720,
2115 keywords = {Amino Acid Sequence; Amino Acids, chemistry; Computer Simulation;
2116 Databases, Factual; Models, Chemical; Neural Networks (Computer);
2117 Protein Folding; Protein Structure, Secondary; Proteins, chemistry/classification;
2118 Reproducibility of Results; Solvents},
2120 medline-pst = {ppublish},
2123 timestamp = {2011.07.18}
2127 title = {Real analysis and probability},
2128 publisher = {Cambridge University Press},
2129 author = {Richard M. Dudley},
2132 timestamp = {2008.01.02}
2136 author = {El Tarazi, Mouhamed Nabih},
2137 title = {Algorithmes mixtes asynchrones. Etude de convergence monotone},
2138 journal = {Numerische Mathematik},
2142 note = {10.1007/BF01405568},
2143 affiliation = {Department of Mathematics, Faculty of Science Kuwait University P.O.
2147 keyword = {Mathematics and Statistics},
2148 publisher = {Springer Berlin / Heidelberg},
2149 url = {http://dx.doi.org/10.1007/BF01405568}
2153 author = {El Tarazi, Mouhamed Nabih},
2154 title = {Some convergence results for asynchronous algorithms},
2155 journal = {Numerische Mathematik},
2159 note = {10.1007/BF01407866},
2160 affiliation = {Department of Mathematics, Faculty of Science Kuwait University P.O.
2161 Box 5969 Kuwait Kuwait},
2164 keyword = {Mathematics and Statistics},
2165 publisher = {Springer Berlin / Heidelberg},
2166 url = {http://dx.doi.org/10.1007/BF01407866}
2170 author = {Peng Fei and Qiu Shui-Sheng and Long Min},
2171 title = {A secure digital signature algorithm based on elliptic curve and
2173 journal = {Circuits Systems Signal Processing},
2175 volume = {24, No. 5},
2178 timestamp = {2009.01.16}
2181 @BOOK{Feigenbaum1908,
2182 title = {Universal behavior in nonlinear systems},
2183 publisher = {Los Alamos Science},
2185 author = {Feigenbaum},
2187 timestamp = {2008.01.02}
2190 @ARTICLE{Felsenstein1980,
2191 author = {J. Felsenstein},
2192 title = {A view of population genetics.},
2193 journal = {Science},
2199 doi = {10.1126/science.208.4449.1253},
2201 medline-pst = {ppublish},
2203 pii = {208/4449/1253},
2205 timestamp = {2011.05.05},
2206 url = {http://dx.doi.org/10.1126/science.208.4449.1253}
2210 title = {Les virus informatiques : techniques virales et antivirales avancées},
2212 editor = {Springer},
2213 author = {Eric Filiol},
2214 owner = {christophe},
2215 timestamp = {2010.10.13}
2218 @INPROCEEDINGS{FiliolBlackHat,
2219 author = {Eric Filiol},
2220 title = {Passive and Active Leakage of Secret Data from Non Networked Computer},
2221 booktitle = {Black Hat},
2223 owner = {christophe},
2224 timestamp = {2010.11.28}
2227 @PHDTHESIS{Formenti2003,
2228 author = {Enrico Formenti},
2229 title = {De l'algorithmique du chaos dans les systèmes dynamiques discrets},
2230 school = {Université de Provence},
2233 timestamp = {2008.01.02}
2236 @PHDTHESIS{Formenti1998,
2237 author = {Enrico Formenti},
2238 title = {Automates cellulaires et chaos : de la vision topologique à la vision
2240 school = {\'Ecole Normale Supérieure de Lyon},
2242 optmonth = {Octobre},
2244 timestamp = {2008.01.02}
2248 author = {Gabriel Frey and Christian J Michel},
2249 title = {Identification of circular codes in bacterial genomes and their use
2250 in a factorization method for retrieving the reading frames of genes.},
2251 journal = {Comput Biol Chem},
2257 abstract = {We developed a statistical method that allows each trinucleotide to
2258 be associated with a unique frame among the three possible ones in
2259 a (protein coding) gene. An extensive gene study in 175 complete
2260 bacterial genomes based on this statistical approach resulted in
2261 identification of 72 new circular codes. Finding a circular code
2262 enables an immediate retrieval of the reading frame locally anywhere
2263 in a gene. No knowledge of location of the start codon is required
2264 and a short window of only a few nucleotides is sufficient for automatic
2265 retrieval. We have therefore developed a factorization method (that
2266 explores previously found circular codes) for retrieving the reading
2267 frames of bacterial genes. Its principle is new and easy to understand.
2268 Neither complex treatment nor specific information on the nucleotide
2269 sequences is necessary. Moreover, the method can be used for short
2270 regions in nucleotide sequences (less than 25 nucleotides in protein
2271 coding genes). Selected additional properties of circular codes and
2272 their possible biological consequences are also discussed.},
2273 doi = {10.1016/j.compbiolchem.2005.11.001},
2274 institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université
2275 Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant,
2276 67400 Illkirch, France. frey@dpt-info.u-strasbg.fr},
2277 keywords = {Base Sequence; Computational Biology; Genes, Bacterial; Genome, Bacterial;
2278 Genomics, statistics /&/ numerical data; Models, Genetic; Models,
2279 Statistical; Reading Frames},
2281 medline-pst = {ppublish},
2283 pii = {S1476-9271(05)00111-8},
2285 timestamp = {2011.05.05},
2286 url = {http://dx.doi.org/10.1016/j.compbiolchem.2005.11.001}
2290 author = {Gabriel Frey and Christian J Michel},
2291 title = {An analytical model of gene evolution with six mutation parameters:
2292 an application to archaeal circular codes.},
2293 journal = {Comput Biol Chem},
2299 abstract = {We develop here an analytical evolutionary model based on a trinucleotide
2300 mutation matrix 64 x 64 with six substitution parameters associated
2301 with the transitions and transversions in the three trinucleotide
2302 sites. It generalizes the previous models based on the nucleotide
2303 mutation matrices 4 x 4 and the trinucleotide mutation matrix 64
2304 x 64 with three parameters. It determines at some time t the exact
2305 occurrence probabilities of trinucleotides mutating randomly according
2306 to six substitution parameters. An application of this model allows
2307 an evolutionary study of the common circular code COM and the 15
2308 archaeal circular codes X which have been recently identified in
2309 several archaeal genomes. The main property of a circular code is
2310 the retrieval of the reading frames in genes, both locally, i.e.
2311 anywhere in genes and in particular without a start codon, and automatically
2312 with a window of a few nucleotides. In genes, the circular code is
2313 superimposed on the traditional genetic one. Very unexpectedly, the
2314 evolutionary model demonstrates that the archaeal circular codes
2315 can derive from the common circular code subjected to random substitutions
2316 with particular values for six substitutions parameters. It has a
2317 strong correlation with the statistical observations of three archaeal
2318 codes in actual genes. Furthermore, the properties of these substitution
2319 rates allow proposal of an evolutionary classification of the 15
2320 archaeal codes into three main classes according to this model. In
2321 almost all the cases, they agree with the actual degeneracy of the
2322 genetic code with substitutions more frequent in the third trinucleotide
2323 site and with transitions more frequent that transversions in any
2324 trinucleotide site.},
2325 doi = {10.1016/j.compbiolchem.2005.09.001},
2326 institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université
2327 Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant,
2328 67400 Illkirch, France. frey@dpt-info.u-strasbg.fr},
2329 keywords = {Archaea, genetics; DNA, Circular; Evolution, Molecular; Genetic Code;
2330 Genome, Archaeal; Models, Genetic; Mutation; Trinucleotide Repeats},
2332 medline-pst = {ppublish},
2334 pii = {S1476-9271(05)00083-6},
2336 timestamp = {2011.05.05},
2337 url = {http://dx.doi.org/10.1016/j.compbiolchem.2005.09.001}
2340 @INPROCEEDINGS{fgb11:ip,
2341 author = {Friot, Nicolas and Guyeux, Christophe and Bahi, Jacques},
2342 title = {Chaotic Iterations for Steganography - Stego-security and chaos-security},
2343 booktitle = {SECRYPT'2011, Int. Conf. on Security and Cryptography},
2346 address = {Sevilla, Spain},
2349 classement = {ACTI},
2350 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2356 author = {Alain Frisch},
2357 title = {Entropie topologique et définition du chaos},
2359 note = {Rapport de tipe},
2360 file = {Tipe_Entropie Topologique et Definition du Chaos (Alain Frisch).ps:Chaos/Tipe_Entropie Topologique et Definition du Chaos (Alain Frisch).ps:PDF},
2361 keywords = {Chaos, Entropie Topologique, Tipe},
2363 timestamp = {2008.01.02},
2364 url = {http://alain.frisch.fr/math.html}
2368 author = {Alain Frisch},
2369 title = {Entropie topologique et définition du chaos},
2371 note = {[En ligne; Page disponible le 12-août-2010]},
2372 url = {\url{http://alain.frisch.fr/math.html}}
2375 @ARTICLE{Frommer97asynchronousweighted,
2376 author = {Andreas Frommer and Hartmut Schwandt and Daniel and Daniel B. Szyld},
2377 title = {Asynchronous Weighted Additive Schwarz Methods},
2378 journal = {Electronic Transactions on Numerical Analysis},
2384 @MISC{Frommer94asynchronoustwo-stage,
2385 author = {Andreas Frommer and Daniel B. Szyld},
2386 title = {Asynchronous Two-Stage Iterative Methods},
2391 title = {Introduction to Chaos and Coherence},
2392 publisher = {IOP Publishing},
2394 author = {J. Frøyland},
2396 timestamp = {2008.01.02}
2400 author = {T. Furon},
2401 title = {Security analysis},
2403 note = {European Project IST-1999-10987 CERTIMARK, Deliverable D.5.5},
2405 timestamp = {2009.06.30}
2409 author = {Furon, Teddy and Bas, Patrick},
2410 title = {Broken arrows},
2411 journal = {EURASIP J. Inf. Secur.},
2415 address = {New York, NY, United States},
2416 doi = {http://dx.doi.org/10.1155/2008/597040},
2418 owner = {christophe},
2419 publisher = {Hindawi Publishing Corp.},
2420 timestamp = {2010.03.06}
2423 @ARTICLE{P1150442004,
2424 author = {G.S.El-Taweel and H.M. Onsi and M.Samy and M.G. Darwish},
2425 title = {Secure and Non-Blind Watermarking Scheme for Color Images Based on
2427 journal = {ICGST International Journal on Graphics, Vision and Image Processing},
2433 owner = {christophe},
2434 timestamp = {2010.03.07}
2437 @INPROCEEDINGS{Gentry09,
2438 author = {Gentry, Craig},
2439 title = {Fully homomorphic encryption using ideal lattices},
2440 booktitle = {STOC '09: Proceedings of the 41st annual ACM symposium on Theory
2444 address = {New York, NY, USA},
2446 doi = {http://doi.acm.org/10.1145/1536414.1536440},
2447 isbn = {978-1-60558-506-2},
2448 location = {Bethesda, MD, USA}
2451 @INPROCEEDINGS{Girao04,
2452 author = {J. Girao and M. Schneider and D. Westhoff},
2453 title = {CDA: Concealed data aggregation in wireless sensor networks},
2454 booktitle = {Proceedings of the ACM Workshop on Wireless Security},
2456 owner = {christophe},
2457 timestamp = {2010.07.31}
2460 @CONFERENCE{Gotsman88,
2461 author = {C. Gotsman and D. Lehmann and E. Shamir},
2462 title = {Asynchronous Dynamics of Random Boolean Networks},
2463 booktitle = {San Diego '88 Neural Networks Conference},
2466 timestamp = {30/03/2008}
2469 @ARTICLE{Guckenheimer1979,
2470 author = {J. Guckenheimer},
2471 title = {Sensitive dependence to initial conditions for one-dimensional maps},
2472 journal = {Comm. Math. Phys.},
2474 optpages = {133-160},
2476 timestamp = {2008.01.02}
2480 title = {Nonlinear oscillations, dynamical systems, and bifurcations of vector
2482 publisher = {Springer Verlag},
2484 author = {J. Guckenheimer and P. Holmes},
2486 timestamp = {2008.01.02}
2489 @ARTICLE{Guo20093201,
2490 author = {Wei Guo and Xiaoming Wang and Dake He and Yang Cao},
2491 title = {Cryptanalysis on a parallel keyed hash function based on chaotic
2493 journal = {Physics Letters A},
2496 pages = {3201 - 3206},
2498 abstract = {This Letter analyzes the security of a novel parallel keyed hash function
2499 based on chaotic maps, proposed by Xiao et al. to improve the efficiency
2500 in parallel computing environment. We show how to devise forgery
2501 attacks on Xiao's scheme with differential cryptanalysis and give
2502 the experiment results of two kinds of forgery attacks firstly. Furthermore,
2503 we discuss the problem of weak keys in the scheme and demonstrate
2504 how to utilize weak keys to construct collision.},
2506 keywords = {Cryptanalysis}
2509 @PHDTHESIS{GuyeuxThese10,
2510 author = {Christophe Guyeux},
2511 title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}
2512 en s\'{e}curit\'{e} informatique},
2513 school = {Universit\'{e} de Franche-Comt\'{e}},
2515 owner = {christophe},
2516 timestamp = {2010.12.21}
2520 author = {Guyeux, Christophe and Bahi, Jacques},
2521 title = {\'Etude topologique de l'\'etalement de spectre},
2522 howpublished = {Journ\'ees Codes et St\'eganographie, \'Ecoles Militaires de Saint-Cyr,
2527 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2532 @INPROCEEDINGS{bg10:ip,
2533 author = {Guyeux, Christophe and Bahi, Jacques},
2534 title = {An improved watermarking algorithm for Internet applications},
2535 booktitle = {INTERNET'2010. The 2nd Int. Conf. on Evolving Internet},
2538 address = {Valencia, Spain},
2540 classement = {ACTI},
2541 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2546 @INPROCEEDINGS{gfb10:ip,
2547 author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques},
2548 title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},
2549 booktitle = {IIH-MSP'10, 6-th Int. Conf. on Intelligent Information Hiding and
2550 Multimedia Signal Processing},
2553 address = {Darmstadt, Germany},
2555 classement = {ACTI},
2556 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2562 author = {Christophe Guyeux and Nicolas Friot and Jacques M. Bahi},
2563 title = {A more secure information hiding scheme than spread-spectrum obtained
2565 journal = {arXiv 0032565},
2568 timestamp = {2010.04.30}
2572 title = {Guide to Elliptic Curve Cryptography},
2573 publisher = {Springer Professional Computing},
2575 editor = {Springer},
2576 author = {D. Hankerson and A. Menezes and S. Vanstone},
2577 owner = {christophe},
2578 timestamp = {2010.07.31}
2581 @ARTICLE{Hasegawa1985,
2582 author = {M. Hasegawa and H. Kishino and T. Yano},
2583 title = {Dating of the human-ape splitting by a molecular clock of mitochondrial
2585 journal = {J Mol Evol},
2590 abstract = {A new statistical method for estimating divergence dates of species
2591 from DNA sequence data by a molecular clock approach is developed.
2592 This method takes into account effectively the information contained
2593 in a set of DNA sequence data. The molecular clock of mitochondrial
2594 DNA (mtDNA) was calibrated by setting the date of divergence between
2595 primates and ungulates at the Cretaceous-Tertiary boundary (65 million
2596 years ago), when the extinction of dinosaurs occurred. A generalized
2597 least-squares method was applied in fitting a model to mtDNA sequence
2598 data, and the clock gave dates of 92.3 +/- 11.7, 13.3 +/- 1.5, 10.9
2599 +/- 1.2, 3.7 +/- 0.6, and 2.7 +/- 0.6 million years ago (where the
2600 second of each pair of numbers is the standard deviation) for the
2601 separation of mouse, gibbon, orangutan, gorilla, and chimpanzee,
2602 respectively, from the line leading to humans. Although there is
2603 some uncertainty in the clock, this dating may pose a problem for
2604 the widely believed hypothesis that the pipedal creature Australopithecus
2605 afarensis, which lived some 3.7 million years ago at Laetoli in Tanzania
2606 and at Hadar in Ethiopia, was ancestral to man and evolved after
2607 the human-ape splitting. Another likelier possibility is that mtDNA
2608 was transferred through hybridization between a proto-human and a
2609 proto-chimpanzee after the former had developed bipedalism.},
2610 keywords = {Animals; Biological Evolution; DNA, Mitochondrial, genetics; Genes;
2611 Haplorhini, genetics; Humans; Mathematics; Models, Genetic; Nucleic
2612 Acid Hybridization; Primates, genetics; Proteins, genetics; Species
2615 medline-pst = {ppublish},
2618 timestamp = {2011.05.05}
2622 title = {A First Course in Discrete Dynamical Systems},
2623 publisher = {Springer-Verlag},
2625 author = {R. Homlgren},
2628 timestamp = {2008.01.02}
2631 @INCOLLECTION{Hoque09,
2632 author = {Hoque, Md. and Chetty, Madhu and Sattar, Abdul},
2633 title = {Genetic Algorithm in Ab Initio Protein Structure Prediction Using
2634 Low Resolution Model: A Review},
2635 booktitle = {Biomedical Data and Applications},
2636 publisher = {Springer Berlin Heidelberg},
2638 editor = {Sidhu, Amandeep and Dillon, Tharam},
2640 series = {Studies in Computational Intelligence},
2642 affiliation = {IIIS, Griffith University, Nathan, QLD-4111 Australia}
2645 @CONFERENCE{Houmansadr09,
2646 author = {A. Houmansadr and N. Kiyavash and N. Borisov},
2647 title = {Rainbow: A robust and invisible non-blind watermark for network flows},
2648 booktitle = {NDSS’09: 16th Annual Network and Distributed System Security Symposium},
2650 owner = {christophe},
2651 timestamp = {2010.03.07}
2655 author = {Huang, Shih-I and Shieh, Shiuhpyng and Tygar, J.},
2656 title = {Secure encrypted-data aggregation for wireless sensor networks},
2657 journal = {Wireless Networks},
2658 abstract = {Abstract\ \ This paper proposes a secure encrypted-data
2659 aggregation scheme for wireless sensor networks. Our design for data
2660 aggregation eliminates redundant sensor readings without using encryption
2661 and maintains data secrecy and privacy during transmission. Conventional
2662 aggregation functions operate when readings are received in plaintext.
2663 If readings are encrypted, aggregation requires decryption creating
2664 extra overhead and key management issues. In contrast to conventional
2665 schemes, our proposed scheme provides security and privacy, and duplicate
2666 instances of original readings will be aggregated into a single packet.
2667 Our scheme is resilient to known-plaintext attacks, chosen-plaintext
2668 attacks, ciphertext-only attacks and man-in-the-middle attacks. Our
2669 experiments show that our proposed aggregation method significantly
2670 reduces communication overhead and can be practically implemented
2671 in on-the-shelf sensor platforms.},
2672 citeulike-article-id = {4499496},
2673 citeulike-linkout-0 = {http://dx.doi.org/10.1007/s11276-009-0177-y},
2674 citeulike-linkout-1 = {http://www.springerlink.com/content/g573138072642u63},
2675 doi = {10.1007/s11276-009-0177-y},
2676 posted-at = {2009-05-10 09:55:44},
2677 url = {http://dx.doi.org/10.1007/s11276-009-0177-y}
2681 author = {Huang, Shih-I and Shieh, Shiuhpyng and Tygar, J. D.},
2682 title = {Secure encrypted-data aggregation for wireless sensor networks},
2683 journal = {Wirel. Netw.},
2688 address = {Hingham, MA, USA},
2689 doi = {http://dx.doi.org/10.1007/s11276-009-0177-y},
2691 publisher = {Kluwer Academic Publishers}
2695 author = {W. Huang and X. Ye},
2696 title = {Homeomorphisms with the whole compacta being scrambled sets},
2697 journal = {Ergod. Th. Dynam. Systems},
2703 timestamp = {2008.01.02}
2706 @ARTICLE{Hurley1982,
2707 author = {M. Hurley},
2708 title = {Attractors, persistence and density of their bassin},
2709 journal = {Transactions of AMS},
2711 optpages = {247-271},
2714 timestamp = {2008.01.02}
2717 @INPROCEEDINGS{Islam:2009:NMA:1695134.1695181,
2718 author = {Islam, Md. Kamrul and Chetty, Madhu},
2719 title = {Novel Memetic Algorithm for Protein Structure Prediction},
2720 booktitle = {Proceedings of the 22nd Australasian Joint Conference on Advances
2721 in Artificial Intelligence},
2725 address = {Berlin, Heidelberg},
2726 publisher = {Springer-Verlag},
2728 isbn = {978-3-642-10438-1},
2729 keywords = {Guided search space, Memetic Algorithm, Modified fitness function,
2730 Pair-wise-interchange, Schema preservation, Tabu Search},
2731 location = {Melbourne, Australia},
2735 @PHDTHESIS{Jacquemard77,
2736 author = {C. Jacquemard},
2737 title = {Contribution à l'étude d'algorithmes à convergence monotone},
2738 school = {Université de Franche-Comté},
2740 owner = {christophe},
2741 timestamp = {2010.08.25}
2745 title = {{Evolution of Protein Molecules}},
2746 publisher = {Academy Press},
2748 editor = {Munro, H. N.},
2749 author = {Jukes, T. H. and Cantor, C. R.},
2750 booktitle = {Evolution of Protein Molecules},
2751 citeulike-article-id = {1673661},
2752 keywords = {compbio, fresco},
2753 posted-at = {2007-09-19 06:23:18},
2757 @INPROCEEDINGS{Kalker2001,
2758 author = {Kalker, T.},
2759 title = {Considerations on watermarking security},
2762 abstract = {In this paper we address the usually implicit assumption that digital
2763 watermarking has as its main target copyright and copy protection
2764 applications. From these target applications a great many conclusions
2765 are drawn about the required security of a watermarking system, and
2766 in fact, a considerably percentage of the watermarking literature
2767 has this very topic as its main focus of attention. In this paper
2768 we take a step back, and try to do a more careful analysis of the
2769 'watermarking-is-for-security-applications' paradigm. The intention
2770 of this paper is to discuss the meaning of the concept security in
2771 the context of watermarking, and try to show that one has to be careful
2772 in using analogies from the related field of cryptography},
2773 citeulike-article-id = {1226513},
2774 journal = {2001 IEEE Fourth Workshop on Multimedia Signal Processing},
2775 keywords = {security, wateramarking},
2777 posted-at = {2007-04-14 14:30:06},
2779 timestamp = {2009.06.30}
2782 @ARTICLE{Kerckhoffs83,
2783 author = {Kerckhoffs, Auguste},
2784 title = {La cryptographie militaire},
2785 journal = {Journal des sciences militaires},
2790 abstract = {pp. 161–191, Feb. 1883.},
2791 citeulike-article-id = {505508},
2792 keywords = {cryptography, master},
2794 posted-at = {2006-02-15 04:49:15},
2796 timestamp = {2009.06.30}
2800 author = {Kimura, Motoo},
2801 title = {A simple method for estimating evolutionary rates of base substitutions
2802 through comparative studies of nucleotide sequences},
2803 journal = {Journal of Molecular Evolution},
2807 note = {10.1007/BF01731581},
2808 affiliation = {National Institute of Genetics 411 Mishima Japan},
2811 keyword = {Biomedical and Life Sciences},
2812 publisher = {Springer New York},
2813 url = {http://dx.doi.org/10.1007/BF01731581}
2818 title = {Chaos Without Nonperiodicity},
2819 journal = {Amer. Math. Monthly},
2823 timestamp = {27/01/2008}
2826 @PHDTHESIS{Knudsen1994a,
2827 author = {C. Knudsen},
2828 title = {Aspects of noninvertible dynamics and chaos},
2829 school = {Technical University of Denmark},
2832 timestamp = {2008.01.02}
2836 author = {L. Kocarev and J. Szczepanski and J.M. Amigo and I. Tomovski},
2837 title = {Discrete Chaos - I: Theory},
2838 journal = {IEEE Trans. on Circuits Systems},
2841 pages = {1300-1309},
2842 owner = {christophe},
2843 timestamp = {2010.10.10}
2846 @INPROCEEDINGS{Kocher95cryptanalysisof,
2847 author = {Paul C. Kocher},
2848 title = {Cryptanalysis of Diffie-Hellman, RSA, DSS, and Other Systems Using
2849 Timing Attacks (Extended Abstract)},
2850 booktitle = {Advances in Cryptology, CRYPTO '95: 15th Annual International Cryptology
2854 publisher = {Springer-Verlag}
2857 @ARTICLE{Kullback1951,
2858 author = {Kullback, Solomon and Leibler, Richard A.},
2859 title = {On Information and Sufficiency},
2860 journal = {The Annals of Mathematical Statistics},
2865 citeulike-article-id = {3245942},
2866 keywords = {file-import-08-09-12},
2868 posted-at = {2008-09-12 14:30:37},
2870 timestamp = {2009.06.29}
2874 author = {Eshter Ledoux},
2875 title = {Introduction à la théorie du chaos},
2877 note = {[En ligne; Page disponible le 12-août-2010]},
2878 url = {\url{http://www.nux.be/eledoux/mem/node1.html}}
2882 title = {Analyse en dimension finie},
2883 publisher = {Masson},
2889 timestamp = {2008.01.02}
2893 author = {A.K. Lenstra and E.R. Verheul},
2894 title = {Selecting Cryptographic Key Sizes},
2895 journal = {Jour. of the International Association for Cryptologic Research},
2903 author = {Lettvin, J.Y. and Maturana, H.R. and McCulloch, W.S. and Pitts, W.H.},
2904 title = {What the Frog's Eye Tells the Frog's Brain},
2905 journal = {Proceedings of the IRE},
2910 owner = {christophe},
2911 timestamp = {2010.12.21}
2915 author = {T. Y. Li and J. A. Yorke},
2916 title = {Period three implies chaos},
2917 journal = {Amer. Math. Monthly},
2923 timestamp = {27/01/2008}
2927 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2928 title = {A novel Hash algorithm construction based on chaotic neural network},
2929 journal = {Neural Computing and Applications},
2932 affiliation = {Chongqing University College of Computer Science 400044 Chongqing
2935 keyword = {Computer Science},
2936 publisher = {Springer London}
2939 @INPROCEEDINGS{Lin09,
2940 author = {Lin, Hua-Yi and Chiang, Tzu-Chiang},
2941 title = {Cooperative secure data aggregation in sensor networks using elliptic
2942 curve based cryptosystems},
2943 booktitle = {CDVE'09: Proceedings of the 6th international conference on Cooperative
2944 design, visualization, and engineering},
2947 address = {Berlin, Heidelberg},
2948 publisher = {Springer-Verlag},
2949 isbn = {3-642-04264-3, 978-3-642-04264-5},
2950 location = {Luxembourg, Luxembourg}
2953 @INPROCEEDINGS{Liu2008,
2954 author = {Liu, An and Ning, Peng},
2955 title = {TinyECC: A Configurable Library for Elliptic Curve Cryptography in
2956 Wireless Sensor Networks},
2957 booktitle = {7th International Conference on Information Processing in Sensor
2958 Networks (IPSN 2008)},
2962 citeulike-article-id = {3041699},
2963 howpublished = {SPOTS Track},
2965 posted-at = {2008-07-25 05:25:05},
2969 @ARTICLE{Liu2007bis,
2970 author = {Shao-Hui Liu and Hong-Xun Yao and Wen Gao and Yong-Liang Liu},
2971 title = {An image fragile watermark scheme based on chaotic image pattern
2973 journal = {Applied Mathematics and Computation},
2978 timestamp = {2008.10.07}
2981 @INPROCEEDINGS{Liu07,
2982 author = {Liu, Zhen and Xi, Lifeng},
2983 title = {Image Information Hiding Encryption Using Chaotic Sequence},
2984 booktitle = {KES '07: Knowledge-Based Intelligent Information and Engineering
2985 Systems and the XVII Italian Workshop on Neural Networks on Proceedings
2986 of the 11th International Conference},
2989 address = {Berlin, Heidelberg},
2990 publisher = {Springer-Verlag},
2991 doi = {http://dx.doi.org/10.1007/978-3-540-74827-4_26},
2992 isbn = {978-3-540-74826-7},
2993 location = {Vietri sul Mare, Italy}
2997 author = {Zhen Liu and Lifeng Xi},
2998 title = {Image Information Hiding Encryption Using Chaotic Sequence},
3004 timestamp = {11/04/2008}
3007 @ARTICLE{Lubachevsky86,
3008 author = {Lubachevsky, Boris and Mitra, Debasis},
3009 title = {A chaotic asynchronous algorithm for computing the fixed point of
3010 a nonnegative matrix of unit spectral radius},
3016 address = {New York, NY, USA},
3017 doi = {http://doi.acm.org/10.1145/4904.4801},
3023 author = {{L}arger, {L}. and {D}udley, {J}.{M}.},
3024 title = { {N}onlinear dynamics {O}ptoelectronic chaos},
3025 journal = {{N}ature },
3031 abstract = {{O}ptoelectronic circuits with delayed feedback provide a convenient
3032 bench-top platform to study a wide range of nonlinear dynamic systems,
3033 from ultrastable clocks to complex chaotic devices.},
3034 affiliation = {{F}ranche-{C}omt{\'e} {\'E}lectronique {M}{\'e}canique, {T}hermique
3035 et {O}ptique - {S}ciences et {T}echnologies - {FEMTO}-{ST} - {CNRS}
3036 : {UMR}6174 - {U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {U}niversit{\'e}
3037 de {T}echnologie de {B}elfort-{M}ontbeliard - {E}cole {N}ationale
3038 {S}up{\'e}rieure de {M}{\'e}canique et des {M}icrotechniques },
3039 audience = {internationale },
3041 doi = {10.1038/465041a },
3042 hal_id = {hal-00517696},
3043 language = {{A}nglais},
3044 url = {http://hal.archives-ouvertes.fr/hal-00517696/en/}
3047 @INPROCEEDINGS{Mahoney00,
3048 author = {Mahoney, Matthew V.},
3049 title = {Fast Text Compression with Neural Networks},
3050 booktitle = {Proceedings of the Thirteenth International Florida Artificial Intelligence
3051 Research Society Conference},
3054 publisher = {AAAI Press},
3056 isbn = {1-57735-113-4},
3060 @INPROCEEDINGS{msp10:bl,
3061 author = {Makhoul, Abdallah and Saadi, Rachid and Pham, Congduc},
3062 title = {Risk Management in Intrusion Detection Applications with Wireless
3063 Video Sensor Networks},
3064 booktitle = {WCNC'10 IEEE Int. Conf.},
3067 address = {Sydney, Australia},
3076 author = {H.S. Malvar and D. Florêncio},
3077 title = {Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking},
3078 journal = {IEEE Trans. Signal Proceeding},
3082 owner = {christophe},
3083 timestamp = {2010.03.07}
3086 @ARTICLE{Marsaglia2003,
3087 author = {G. Marsaglia},
3088 title = {Xorshift RNGs},
3089 journal = {Journal of Statistical Software},
3094 timestamp = {2009.10.28}
3097 @ARTICLE{Marsaglia1996,
3098 author = {G. Marsaglia},
3099 title = {DIEHARD: a battery of tests of randomness.},
3100 journal = {http://stat.fsu.edu/~geo/diehard.html},
3103 timestamp = {2009.11.09}
3106 @ARTICLE{Simard07testu01:a,
3107 author = {Richard Simard and Université De Montréal},
3108 title = {TestU01: A C library for empirical testing of random number generators},
3109 journal = {ACM Transactions on Mathematical Software},
3114 @ARTICLE{DefiningChaos,
3115 author = {M. Martelli and M. Dang and T. Seph},
3116 title = {Defining chaos},
3117 journal = {Mathematics Magazine},
3121 owner = {christophe},
3122 timestamp = {2010.08.11}
3125 @ARTICLE{Michel2007c,
3126 author = {Christian J Michel},
3127 title = {An analytical model of gene evolution with 9 mutation parameters:
3128 an application to the amino acids coded by the common circular code.},
3129 journal = {Bull Math Biol},
3135 abstract = {We develop here an analytical evolutionary model based on a trinucleotide
3136 mutation matrix 64 x 64 with nine substitution parameters associated
3137 with the three types of substitutions in the three trinucleotide
3138 sites. It generalizes the previous models based on the nucleotide
3139 mutation matrices 4 x 4 and the trinucleotide mutation matrix 64
3140 x 64 with three and six parameters. It determines at some time t
3141 the exact occurrence probabilities of trinucleotides mutating randomly
3142 according to these nine substitution parameters. An application of
3143 this model allows an evolutionary study of the common circular code
3144 [Formula: see text] of eukaryotes and prokaryotes and its 12 coded
3145 amino acids. The main property of this code [Formula: see text] is
3146 the retrieval of the reading frames in genes, both locally, i.e.
3147 anywhere in genes and in particular without a start codon, and automatically
3148 with a window of a few nucleotides. However, since its identification
3149 in 1996, amino acid information coded by [Formula: see text] has
3150 never been studied. Very unexpectedly, this evolutionary model demonstrates
3151 that random substitutions in this code [Formula: see text] and with
3152 particular values for the nine substitutions parameters retrieve
3153 after a certain time of evolution a frequency distribution of these
3154 12 amino acids very close to the one coded by the actual genes.},
3155 doi = {10.1007/s11538-006-9147-z},
3156 institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université
3157 Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant,
3158 67400 Illkirch, France. michel@dpt-info.u-strasbg.fr},
3159 keywords = {Amino Acids, genetics; Codon, genetics; Eukaryotic Cells; Evolution,
3160 Molecular; Models, Genetic; Prokaryotic Cells},
3162 medline-pst = {ppublish},
3165 timestamp = {2011.05.05},
3166 url = {http://dx.doi.org/10.1007/s11538-006-9147-z}
3170 author = {J.-C. Miellou},
3171 title = {Algorithmes de relaxation chaotique \`{a} retards},
3177 timestamp = {2008.05.22}
3180 @ARTICLE{Miellou75b,
3181 author = {Miellou, J.-C.},
3182 title = {Itérations chaotiques à retards, étude de la convergence dans le
3183 cas d'espaces partiellement ordonnés},
3184 journal = {C.R.A.S. Paris},
3188 owner = {christophe},
3189 timestamp = {2010.08.17}
3193 author = {Jean-Claude Miellou and Pierre Spitéri},
3194 title = {Un critère de convergence pour des méthodes générales de point fixe},
3195 journal = {Rairo -- Modélisation mathématique et analyse numérique},
3200 owner = {christophe},
3201 timestamp = {2010.10.13}
3205 author = {Aidan Mooney and John G. Keating and Ioannis Pitas},
3206 title = {A comparative study of chaotic and white noise signals in digital
3208 journal = {Chaos, Solitons and Fractals},
3212 owner = {christophe},
3213 timestamp = {2010.03.01}
3216 @ARTICLE{Nakashima2003,
3217 author = {Nakashima, Y. and Tachibana, R. and Babaguchi, N.},
3218 title = {Watermarked Movie Soundtrack Finds the Position of the Camcorder
3220 journal = {IEEE Transactions on Multimedia},
3222 note = {Accepted for future publication Multimedia}
3225 @INCOLLECTION{springerlink:10.1007/978-3-642-04431-1_16,
3226 author = {Nelson, Michael and Nahapetian, Ani and Koushanfar, Farinaz and Potkonjak,
3228 title = {SVD-Based Ghost Circuitry Detection},
3229 booktitle = {Information Hiding},
3230 publisher = {Springer Berlin / Heidelberg},
3232 editor = {Katzenbeisser, Stefan and Sadeghi, Ahmad-Reza},
3234 series = {Lecture Notes in Computer Science},
3236 note = {10.1007/978-3-642-04431-1_16},
3237 affiliation = {Computer Science Department, UCLA, Los Angeles, CA 90095, USA},
3238 url = {http://dx.doi.org/10.1007/978-3-642-04431-1_16}
3241 @INPROCEEDINGS{Perez-Hernandez09,
3242 author = {P\'{e}rez-Hern\'{a}ndez, Luis Germ\'{a}n and Rodr\'{\i}guez-V\'{a}zquez,
3243 Katya and Gardu\~{n}o-Ju\'{a}rez, Ram\'{o}n},
3244 title = {Parallel particle swarm optimization applied to the protein folding
3246 booktitle = {Proceedings of the 11th Annual conference on Genetic and evolutionary
3249 series = {GECCO '09},
3250 pages = {1791--1792},
3251 address = {New York, NY, USA},
3254 isbn = {978-1-60558-325-9},
3255 keywords = {bioinformatics, biology and chemistry, combinatorial optimization,
3256 parallelization, swarm intelligence},
3257 location = {Montreal, Qu\&\#233;bec, Canada},
3261 @PHDTHESIS{Pellegrin1986,
3262 author = {D. Pellegrin},
3263 title = {Algorithmique discr\`{e}te et r\'{e}seaux d'automates},
3264 school = {Grenoble},
3267 timestamp = {2008.05.22}
3271 author = {F. Peng and S.-S. Qiu and M. Long},
3272 title = {One way Hash function construction based on two-dimensional hyperchaotic
3274 journal = {Acta Phys. Sinici.},
3279 timestamp = {2009.01.16}
3282 @INPROCEEDINGS{Perez06,
3283 author = {Luis Perez-Freire and F. Pérez-gonzalez and Pedro Comesaña},
3284 title = {Secret Dither Estimation in Lattice-Quantization Data Hiding: A Set-Membership
3286 booktitle = {Security, Steganography, and Watermarking of Multimedia Contents},
3288 editor = {Edward J. Delp and Ping W. Wong},
3289 address = {San Jose, California, USA},
3291 organization = {SPIE},
3293 timestamp = {2009.06.30}
3296 @INPROCEEDINGS{Perez-Freire06,
3297 author = {Luis Perez-Freire and Pedro Comesana and Juan Ramon Troncoso-Pastoriza
3298 and Fernando Perez-Gonzalez},
3299 title = {Watermarking Security: a Survey},
3300 booktitle = {LNCS Transactions on Data Hiding and Multimedia Security},
3303 timestamp = {2009.06.29}
3306 @PROCEEDINGS{Peter07,
3307 title = {On Concealed Data Aggregation for WSNs},
3309 author = {Peter, Steffen and Piotrowski, Krzysztof and Langendoerfer, Peter},
3310 booktitle = {Consumer Communications and Networking Conference, 2007. CCNC 2007.
3312 citeulike-article-id = {2281643},
3313 citeulike-linkout-0 = {http://dx.doi.org/10.1109/CCNC.2007.45},
3314 citeulike-linkout-1 = {http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=4199133},
3315 doi = {10.1109/CCNC.2007.45},
3316 journal = {Consumer Communications and Networking Conference, 2007. CCNC 2007.
3320 posted-at = {2008-01-23 19:36:19},
3322 url = {http://dx.doi.org/10.1109/CCNC.2007.45}
3326 author = {Pham, Congduc and Makhoul, Abdallah and Saadi, Rachid},
3327 title = {Risk-based Adaptive Scheduling in Randomly Deployed Video Sensor
3328 Networks for Critical Surveillance Applications},
3329 journal = {Journal of Network and Computer Applications},
3334 note = {Accepted manuscript. To appear},
3335 classement = {ACLI},
3337 impact-factor = {1.111},
3339 isi-acro = {J NETW COMPU APPL},
3340 publisher = {Springer}
3344 author = {Edgar Alan Poe},
3345 title = {The Raven},
3348 note = {American Museum (Baltimore)},
3349 owner = {christophe},
3350 timestamp = {2010.11.23}
3353 @ARTICLE{Perez-Freire2006:Security,
3354 author = {L. P{\'e}rez-Freire and F. P{\'e}rez-González and T. Furon and P.
3356 title = {Security of lattice-based data hiding against the known message attack},
3357 journal = {IEEE Trans. on Information Forensics and Security},
3364 timestamp = {2009.12.06}
3367 @MISC{Quisquater02sidechannel,
3368 author = {J-J. Quisquater and D. Samyde and Université Catholique De Louvain
3370 title = {Side Channel Cryptanalysis},
3374 @ARTICLE{Raynal2001,
3375 author = {Frédéric Raynal and Fabien A. P. Petitcolas and Caroline Fontaine},
3376 title = {Evaluation automatique des méthodes de tatouage},
3377 journal = {Traitement du signal},
3382 timestamp = {2008.05.21}
3386 author = {Vincent Rijmen and Elisabeth Oswald},
3387 title = {Update on SHA-1},
3388 howpublished = {Cryptology ePrint Archive, Report 2005/010},
3390 note = {\url{http://eprint.iacr.org/}}
3394 title = {Discrete Iterations, a Metric Study},
3395 publisher = {Springer-Verlag},
3397 editor = {Berlin Heidelberg New-York},
3398 author = {François Robert},
3400 series = {Series in Computational Mathematics}
3404 title = {Discrete Iterations: A Metric Study},
3406 editor = {Springer-Verlag},
3407 author = {F. Robert},
3409 series = {Springer Series in Computational Mathematics},
3411 timestamp = {17/02/2008}
3415 author = {Rudenko, O. and Snytkin, M.},
3416 title = {Image compression based on the neural network art},
3417 journal = {Cybernetics and Systems Analysis},
3421 affiliation = {Kharkov National University of Radio Electronics Kharkov Ukraine},
3424 keyword = {Computer Science},
3425 publisher = {Springer New York}
3428 @PHDTHESIS{Ruette2001,
3429 author = {Sylvie Ruette},
3430 title = {Chaos en dynamique topologique, en particulier sur l'intervalle,
3431 mesures d'entropie maximale},
3432 school = {Université d'Aix-Marseille II},
3434 optmonth = {Novembre},
3436 timestamp = {2008.01.02}
3439 @MASTERSTHESIS{Saulnier02,
3440 author = {Boris Saulnier},
3441 title = {Entropie topologique},
3442 school = {DEA Sémantique, Preuves et Langages, Paris 7},
3444 owner = {christophe},
3445 timestamp = {2010.08.12}
3448 @ARTICLE{Schmitz2001,
3449 author = {Roland Schmitz},
3450 title = {Use of chaotic dynamical systems in cryptography},
3451 journal = {Journal of Franklin Institute},
3456 timestamp = {17/02/2008}
3460 title = {Analyse: topologie g\'{e}n\'{e}rale et analyse fonctionnelle},
3461 publisher = {Hermann},
3464 author = {Laurent Schwartz},
3465 owner = {christophe},
3466 timestamp = {2010.09.15}
3470 author = {Shannon, Claude E.},
3471 title = {Communication Theory of Secrecy Systems},
3472 journal = {Bell Systems Technical Journal},
3476 citeulike-article-id = {507362},
3477 keywords = {master, secrecy\_systems, teoria-informacao, theory\_communication,
3478 theory\_cryptography},
3480 posted-at = {2006-02-16 23:24:09},
3482 timestamp = {2009.06.29}
3485 @ARTICLE{Shmygelska05,
3486 author = {Shmygelska, Alena and Hoos, Holger},
3487 title = {An ant colony optimisation algorithm for the 2D and 3D hydrophobic
3488 polar protein folding problem},
3489 journal = {BMC Bioinformatics},
3494 abstract = {BACKGROUND:The protein folding problem is a fundamental problems in
3495 computational molecular biology and biochemical physics. Various
3496 optimisation methods have been applied to formulations of the ab-initio
3497 folding problem that are based on reduced models of protein structure,
3498 including Monte Carlo methods, Evolutionary Algorithms, Tabu Search
3499 and hybrid approaches. In our work, we have introduced an ant colony
3500 optimisation (ACO) algorithm to address the non-deterministic polynomial-time
3501 hard (NP-hard) combinatorial problem of predicting a protein's conformation
3502 from its amino acid sequence under a widely studied, conceptually
3503 simple model - the 2-dimensional (2D) and 3-dimensional (3D) hydrophobic-polar
3504 (HP) model.RESULTS:We present an improvement of our previous ACO
3505 algorithm for the 2D HP model and its extension to the 3D HP model.
3506 We show that this new algorithm, dubbed ACO-HPPFP-3, performs better
3507 than previous state-of-the-art algorithms on sequences whose native
3508 conformations do not contain structural nuclei (parts of the native
3509 fold that predominantly consist of local interactions) at the ends,
3510 but rather in the middle of the sequence, and that it generally finds
3511 a more diverse set of native conformations.CONCLUSIONS:The application
3512 of ACO to this bioinformatics problem compares favourably with specialised,
3513 state-of-the-art methods for the 2D and 3D HP protein folding problem;
3514 our empirical results indicate that our rather simple ACO algorithm
3515 scales worse with sequence length but usually finds a more diverse
3516 ensemble of native states. Therefore the development of ACO algorithms
3517 for more complex and realistic models of protein structure holds
3518 significant promise.},
3519 doi = {10.1186/1471-2105-6-30},
3521 pubmedid = {15710037}
3524 @OTHER{Shmygelska2005Feb,
3525 __markedentry = {[christophe]},
3526 abstract = {Abstract Background The protein folding problem is a fundamental problems
3527 in computational molecular biology and biochemical physics. Various
3528 optimisation methods have been applied to formulations of the ab-initio
3529 folding problem that are based on reduced models of protein structure,
3530 including Monte Carlo methods, Evolutionary Algorithms, Tabu Search
3531 and hybrid approaches. In our work, we have introduced an ant colony
3532 optimisation (ACO) algorithm to address the non-deterministic polynomial-time
3533 hard (NP-hard) combinatorial problem of predicting a protein's conformation
3534 from its amino acid sequence under a widely studied, conceptually
3535 simple model – the 2-dimensional (2D) and 3-dimensional (3D) hydrophobic-polar
3536 (HP) model. Results We present an improvement of our previous ACO
3537 algorithm for the 2D HP model and its extension to the 3D HP model.
3538 We show that this new algorithm, dubbed ACO-HPPFP-3, performs better
3539 than previous state-of-the-art algorithms on sequences whose native
3540 conformations do not contain structural nuclei (parts of the native
3541 fold that predominantly consist of local interactions) at the ends,
3542 but rather in the middle of the sequence, and that it generally finds
3543 a more diverse set of native conformations. Conclusions The application
3544 of ACO to this bioinformatics problem compares favourably with specialised,
3545 state-of-the-art methods for the 2D and 3D HP protein folding problem;
3546 our empirical results indicate that our rather simple ACO algorithm
3547 scales worse with sequence length but usually finds a more diverse
3548 ensemble of native states. Therefore the development of ACO algorithms
3549 for more complex and realistic models of protein structure holds
3550 significant promise.},
3551 author = {Shmygelska, Alena and Hoos, Holger H},
3552 journal = {BMC Bioinformatics. 2005 Feb 14},
3554 owner = {christophe},
3556 timestamp = {2011.01.24},
3557 title = {An ant colony optimisation algorithm for the 2D and 3D hydrophobic
3558 polar protein folding problem},
3564 author = {Li Shujun and Li Qi and Li Wenmin and Mou Xuanqin and Cai Yuanlong},
3565 title = {Statistical Properties of Digital Piecewise Linear Chaotic Maps and
3566 Their Roles in Cryptography and Pseudo-Random Coding},
3567 journal = {Proceedings of the 8th IMA International Conference on Cryptography
3572 owner = {christophe},
3573 timestamp = {2010.03.06}
3576 @INPROCEEDINGS{Simmons83,
3577 author = {Gustavus J. Simmons},
3578 title = {The Prisoners' Problem and the Subliminal Channel},
3579 booktitle = {Advances in Cryptology, Proc. CRYPTO'83},
3582 bibsource = {DBLP, http://dblp.uni-trier.de},
3584 timestamp = {2009.06.29}
3587 @ARTICLE{Solak2004389,
3588 author = {Ercan Solak},
3589 title = {On the security of a class of discrete-time chaotic cryptosystems},
3590 journal = {Physics Letters A},
3593 pages = {389 - 395},
3595 doi = {DOI: 10.1016/j.physleta.2003.11.008},
3597 keywords = {Communication using chaos},
3599 timestamp = {2009.12.12},
3600 url = {http://www.sciencedirect.com/science/article/B6TVM-4B22RC9-2/2/99a0af737c9b6ba8af47ae4d3c7a326d}
3603 @PHDTHESIS{Spiteri74,
3604 author = {Pierre Spitéri},
3605 title = {Contribution à l'étude de la stabilite au sens de liapounov de certains
3606 systemes differentiels non lineaires},
3607 school = {Université de Franche-Comté},
3609 owner = {christophe},
3610 timestamp = {2010.10.13}
3614 title = {Does God Play Dices ?: the mathematics of chaos},
3615 publisher = {Penguin},
3617 author = {Ian Stewart},
3619 timestamp = {2008.01.02}
3623 title = {Cryptography: Theory and Practice, Second Edition},
3624 publisher = {{Chapman \& Hall/CRC}},
3626 author = {Stinson, Douglas R.},
3628 abstract = {{Douglas R. Stinson's <I>Cryptography: Theory and Practice</I> is
3629 a mathematically intensive examination of cryptography, including
3630 ciphers, the Data Encryption Standard (DES), public key cryptography,
3631 one-way hash functions, and digital signatures. Stinson's explication
3632 of "zero-sum proofs"--a process by which one person lets another
3633 person know that he or she has a password without actually revealing
3634 any information--is especially good.<P> If you are new to the math
3635 behind cryptography but want to tackle it, the author covers all
3636 of the required background to understand the real mathematics here.
3637 <I>Cryptography</I> includes extensive exercises with each chapter
3638 and makes an ideal introduction for any math-literate person willing
3639 to get acquainted with this material.} {<P>Major advances over the
3640 last five years precipitated this major revision of the bestselling
3641 Cryptography: Theory and Practice. With more than 40 percent new
3642 or updated material, the second edition now provides an even more
3643 comprehensive treatment of modern cryptography. It focuses on the
3644 new Advanced Encryption Standards and features an entirely new chapter
3645 on that subject. Another new chapter explores the applications of
3646 secret sharing schemes, including ramp schemes, visual cryptography,
3647 threshold cryptography, and broadcast encryption. This is an ideal
3648 introductory text for both computer science and mathematics students
3649 and a valuable reference for professionals.</P>}},
3650 citeulike-article-id = {2401855},
3652 howpublished = {Hardcover},
3653 isbn = {1584882069},
3654 keywords = {security},
3655 posted-at = {2008-02-20 08:28:49},
3657 url = {http://www.amazon.com/exec/obidos/redirect?tag=citeulike07-20\&path=ASIN/1584882069}
3660 @INPROCEEDINGS{Takana90,
3661 author = {K. Tanaka and Y. Nakamura and K. Matsui},
3662 title = {Embedding Secret Information into a Dithered Multi-level Image},
3663 booktitle = {IEEE Military Communications Conference},
3665 owner = {christophe},
3666 timestamp = {2010.08.05}
3669 @PHDTHESIS{ElTarazi81,
3670 author = {M. N. El Tarazi},
3671 title = {Contraction et ordre partiel pour l'étude d'algorithmes synchrones
3672 et asynchrones en analyse numérique},
3673 school = {Faculté des Sciences et Techniques de l'Université de Franche-Comté,
3676 owner = {christophe},
3677 timestamp = {2010.08.17}
3680 @INPROCEEDINGS{Unger93,
3681 author = {Unger, Ron and Moult, John},
3682 title = {Genetic Algorithm for 3D Protein Folding Simulations},
3683 booktitle = {Proceedings of the 5th International Conference on Genetic Algorithms},
3686 address = {San Francisco, CA, USA},
3687 publisher = {Morgan Kaufmann Publishers Inc.},
3689 isbn = {1-55860-299-2},
3693 @MISC{Van93electronicwater,
3694 author = {Tirkel Rankin Van},
3695 title = {Electronic Water Mark},
3699 @ARTICLE{Venkatesan2007397,
3700 author = {R.C. Venkatesan},
3701 title = {Encryption of covert information into multiple statistical distributions},
3702 journal = {Physics Letters A},
3705 pages = {397 - 404},
3707 doi = {DOI: 10.1016/j.physleta.2007.05.117},
3709 keywords = {Statistical encryption/decryption},
3711 timestamp = {2009.12.12},
3712 url = {http://www.sciencedirect.com/science/article/B6TVM-4P4FV2M-1/2/cd11a2ec144526e3c4552d2a7e7906cc}
3716 author = {G. Voyatzis and I. Pitas},
3717 title = {Chaotic watermarks for embedding in the spatial digital image domain},
3718 journal = {Proceedings of IEEE ICIP},
3722 owner = {christophe},
3723 timestamp = {2010.03.06}
3726 @INCOLLECTION{Wagner03,
3727 author = {Wagner, David},
3728 title = {Cryptanalysis of an Algebraic Privacy Homomorphism},
3729 booktitle = {Information Security},
3730 publisher = {Springer Berlin, Heidelberg},
3733 series = {Lecture Notes in Computer Science},
3735 abstract = {We use linear algebra to show that an algebraic privacy homomorphism
3736 proposed by Domingo-Ferrer is insecure for some parameter settings.},
3737 affiliation = {University of California, Berkeley USA}
3740 @INPROCEEDINGS{Wagner03cryptanalysisof,
3741 author = {David Wagner},
3742 title = {Cryptanalysis of an Algebraic Privacy Homomorphism},
3743 booktitle = {Proc. Sixth Information Security Conf. (ISC03},
3748 @ARTICLE{Wang_ellipticcurve,
3749 author = {Haodong Wang and Bo Sheng and Qun Li},
3750 title = {Elliptic curve cryptography-based access control in sensor networks},
3751 journal = {Int. J. Security and Networks}
3754 @INPROCEEDINGS{wbg10:ip,
3755 author = {Wang, Qianxue and Bahi, Jacques M. and Guyeux, Christophe and Fang,
3757 title = {Randomness quality of {CI} chaotic generators. Application to Internet
3759 booktitle = {INTERNET'2010. The 2nd Int. Conf. on Evolving Internet},
3762 address = {Valencia, Spain},
3764 publisher = {IEEE Computer Society Press},
3765 note = {Best Paper award},
3766 classement = {ACTI},
3767 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
3773 author = {X. M. Wang and J. S. Zhang and W. F. Zhang},
3774 title = {One-way hash function construction based on the extended chaotic
3776 journal = {Acta Phys. Sinici.},
3778 volume = {52, No. 11},
3779 pages = {2737--2742},
3781 timestamp = {2009.01.16}
3785 author = {Westhoff, Dirk and Girao, Joao and Acharya, Mithun},
3786 title = {Concealed Data Aggregation for Reverse Multicast Traffic in Sensor
3787 Networks: Encryption, Key Distribution, and Routing Adaptation},
3788 journal = {IEEE Transactions on Mobile Computing},
3791 pages = {1417--1431},
3793 address = {Piscataway, NJ, USA},
3794 doi = {http://dx.doi.org/10.1109/TMC.2006.144},
3796 publisher = {IEEE Educational Activities Department}
3800 author = {Wikipédia},
3801 title = {Exposant de Lyapunov -- Site web d'André Lévesque},
3803 note = {[En ligne; Page disponible le 9-septembre-2010]},
3804 url = {\url{http://math.cmaisonneuve.qc.ca/alevesque/chaos_fract/Lyapunov/Exposant.html}}
3808 author = {Wikipédia},
3809 title = {Espace complet --- Wikipédia{,} l'encyclopédie libre},
3811 note = {[En ligne; Page disponible le 9-août-2010]},
3812 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Espace_complet&oldid=52734266}}
3816 author = {Wikipédia},
3817 title = {Densité (mathématiques) --- Wikipédia{,} l'encyclopédie libre},
3819 note = {[En ligne; Page disponible le 8-août-2010]},
3820 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Densit%C3%A9_(math%C3%A9matiques)&oldid=53938121}}
3824 author = {Wikipédia},
3825 title = {Information de Fisher --- Wikipédia{,} l'encyclopédie libre},
3827 note = {[En ligne; Page disponible le 5-août-2010]},
3828 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Information_de_Fisher&oldid=52877871}}
3831 @MISC{wiki:Kerkhoffs,
3832 author = {Wikipédia},
3833 title = {Principe de Kerckhoffs --- Wikipédia{,} l'encyclopédie libre},
3835 note = {[En ligne; Page disponible le 20-août-2010]},
3836 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Principe_de_Kerckhoffs&oldid=52133114}}
3839 @MISC{wiki:sarkovskii,
3840 author = {Wikipédia},
3841 title = {Théorème de Sarkovskii --- Wikipédia{,} l'encyclopédie libre},
3843 note = {[En ligne; Page disponible le 8-août-2010]},
3844 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Th%C3%A9or%C3%A8me_de_Sarkovskii&oldid=54196167}}
3847 @MISC{wiki:steganographie,
3848 author = {Wikipédia},
3849 title = {Stéganographie --- Wikipédia{,} l'encyclopédie libre},
3851 note = {[En ligne; Page disponible le 5-août-2010]},
3852 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=St%C3%A9ganographie&oldid=54724435}}
3855 @MISC{wiki:tatouage,
3856 author = {Wikipédia},
3857 title = {Tatouage numérique --- Wikipédia{,} l'encyclopédie libre},
3859 note = {[En ligne; Page disponible le 5-août-2010]},
3860 url = {https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Tatouage_num%C3%A9rique&oldid=55484940}
3863 @MISC{wiki:testsHypothese,
3864 author = {Wikipédia},
3865 title = {Test d'hypothèse --- Wikipédia{,} l'encyclopédie libre},
3867 note = {[En ligne; Page disponible le 5-août-2010]},
3868 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Test_d%27hypoth%C3%A8se&oldid=55344108}}
3872 author = {Xianyong Wu and Zhi-Hong Guan},
3873 title = {A novel digital watermark algorithm based on chaotic maps},
3874 journal = {Physics Letters A},
3877 pages = {403 - 406},
3879 doi = {DOI: 10.1016/j.physleta.2007.01.034},
3881 keywords = {Watermarking},
3882 url = {http://www.sciencedirect.com/science/article/B6TVM-4MY0MF3-8/2/0b4d1298fa84337d2e59b3fefe26f583}
3885 @INPROCEEDINGS{Wu2007,
3886 author = {Wu, Xianyong and Guan, Zhi-Hong and Wu, Zhengping},
3887 title = {A Chaos Based Robust Spatial Domain Watermarking Algorithm},
3888 booktitle = {ISNN '07: Proceedings of the 4th international symposium on Neural
3892 address = {Berlin, Heidelberg},
3893 publisher = {Springer-Verlag},
3894 doi = {http://dx.doi.org/10.1007/978-3-540-72393-6_15},
3895 isbn = {978-3-540-72392-9},
3896 location = {Nanjing, China}
3899 @ARTICLE{Xiao20092288,
3900 author = {Di Xiao and Xiaofeng Liao and Yong Wang},
3901 title = {Parallel keyed hash function construction based on chaotic neural
3903 journal = {Neurocomputing},
3906 pages = {2288 - 2296},
3908 note = {Lattice Computing and Natural Computing (JCIS 2007) / Neural Networks
3909 in Intelligent Systems Designn (ISDA 2007)},
3910 abstract = {Recently, various hash functions based on chaos or neural networks
3911 were proposed. Nevertheless, none of them works efficiently in parallel
3912 computing environment. In this paper, an algorithm for parallel keyed
3913 hash function construction based on chaotic neural network is proposed.
3914 The mechanism of changeable-parameter and self-synchronization establishes
3915 a close relation between the hash value bit and message, and the
3916 algorithm structure ensures the uniform sensitivity of the hash value
3917 to the message blocks at different positions. The proposed algorithm
3918 can satisfy the performance requirements of hash function. These
3919 properties make it a promising choice for hashing on parallel computing
3922 keywords = {Chaotic neural network}
3925 @ARTICLE{Xiao20094346,
3926 author = {Di Xiao and Xiaofeng Liao and Yong Wang},
3927 title = {Improving the security of a parallel keyed hash function based on
3929 journal = {Physics Letters A},
3932 pages = {4346 - 4353},
3935 keywords = {Hash function},
3937 timestamp = {2009.12.12}
3940 @ARTICLE{Xiao20102254,
3941 author = {Di Xiao and Frank Y. Shih and Xiaofeng Liao},
3942 title = {A chaos-based hash function with both modification detection and
3943 localization capabilities},
3944 journal = {Communications in Nonlinear Science and Numerical Simulation},
3947 pages = {2254 - 2261},
3949 abstract = {Recently, a variety of chaos-based hash functions have been proposed.
3950 Nevertheless, none of them can realize modification localization.
3951 In this paper, a hash function with both modification detection and
3952 localization capabilities is proposed, which can also support the
3953 parallel processing mode. By using the mechanism of changeable-parameter
3954 and self-synchronization, the keystream can establish a close relation
3955 with the algorithm key, the content, and the order of each message
3956 unit. Theoretical analysis and computer simulation indicate that
3957 the proposed algorithm can satisfy the performance requirements of
3960 keywords = {Hash function}
3963 @INPROCEEDINGS{Yu06,
3964 author = {Yu, Yu and Leiwo, Jussipekka and Premkumar, Benjamin},
3965 title = {A Study on the Security of Privacy Homomorphism},
3966 booktitle = {ITNG '06: Proceedings of the Third International Conference on Information
3967 Technology: New Generations},
3970 address = {Washington, DC, USA},
3971 publisher = {IEEE Computer Society},
3972 doi = {http://dx.doi.org/10.1109/ITNG.2006.19},
3973 isbn = {0-7695-2497-4}
3976 @ARTICLE{Zhang2008658,
3977 author = {Wei Zhang and Yonghe Liu and Sajal K. Das and Pradip De},
3978 title = {Secure data aggregation in wireless sensor networks: A watermark
3979 based authentication supportive approach},
3980 journal = {Pervasive and Mobile Computing},
3983 pages = {658 - 680},
3985 doi = {DOI: 10.1016/j.pmcj.2008.05.005},
3987 keywords = {Wireless sensor networks},
3988 url = {http://www.sciencedirect.com/science/article/B7MF1-4SKB3MD-1/2/b73948dcaa3eb63a2c21d09041882625}
3992 author = {Zhang, Yang and Arakaki, Adrian K. and Skolnick, Jeffrey},
3993 title = {TASSER: An automated method for the prediction of protein tertiary
3994 structures in CASP6},
3995 journal = {Proteins},
4001 keywords = {comparative modeling, threading, ab initio prediction, TASSER, PROSPECTOR_3},
4002 owner = {christophe},
4003 publisher = {Wiley Subscription Services, Inc., A Wiley Company},
4004 timestamp = {2011.01.22},
4005 url = {http://dx.doi.org/10.1002/prot.20724}
4008 @ARTICLE{Zhou1997429,
4009 author = {Chang-song Zhou and Tian-lun Chen},
4010 title = {Extracting information masked by chaos and contaminated with noise:
4011 Some considerations on the security of communication approaches using
4013 journal = {Physics Letters A},
4016 pages = {429 - 435},
4019 keywords = {Communication},
4021 timestamp = {2009.12.12}
4025 author = {Zhou, Huai-bei and Wang, Lu},
4026 title = {Chaos in Biomolecular Dynamics},
4027 journal = {The Journal of Physical Chemistry},
4030 pages = {8101-8105},
4032 doi = {10.1021/jp953409x}
4035 @PROCEEDINGS{DBLP:conf/iwdw/2005,
4036 title = {IWDW'05: 4th International Workshop on Digital Watermarking},
4038 editor = {Mauro Barni and Ingemar J. Cox and Ton Kalker and Hyoung Joong Kim},
4040 series = {Lecture Notes in Computer Science},
4041 address = {Siena, Italy},
4042 publisher = {Springer},
4043 month = {September 15-17},
4044 bibsource = {DBLP, http://dblp.uni-trier.de},
4046 isbn = {3-540-28768-X},
4048 timestamp = {2009.06.29}
4051 @PROCEEDINGS{DBLP:conf/ih/2006,
4052 title = {IH 2006: Information Hiding, 8th International Workshop},
4054 editor = {Jan Camenisch and Christian S. Collberg and Neil F. Johnson and Phil
4057 series = {Lecture Notes in Computer Science},
4058 address = {Alexandria, VA, USA},
4059 publisher = {Springer},
4061 bibsource = {DBLP, http://dblp.uni-trier.de},
4062 booktitle = {Information Hiding},
4063 isbn = {978-3-540-74123-7},
4065 timestamp = {2009.06.29}
4068 @PROCEEDINGS{DBLP:conf/ih/2007,
4069 title = {Information Hiding, 9th International Workshop, IH 2007, Saint Malo,
4070 France, June 11-13, 2007, Revised Selected Papers},
4072 editor = {Teddy Furon and Fran\c{c}ois Cayre and Gwena{\"e}l J. Do{\"e}rr and
4075 series = {Lecture Notes in Computer Science},
4076 publisher = {Springer},
4077 bibsource = {DBLP, http://dblp.uni-trier.de},
4078 booktitle = {Information Hiding},
4079 isbn = {978-3-540-77369-6},
4081 timestamp = {2009.06.29}
4084 @PROCEEDINGS{DBLP:conf/iccsa/2006-1,
4085 title = {Computational Science and Its Applications - ICCSA 2006, International
4086 Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part I},
4088 editor = {Marina L. Gavrilova and Osvaldo Gervasi and Vipin Kumar and Chih
4089 Jeng Kenneth Tan and David Taniar and Antonio Lagan{\`a} and Youngsong
4090 Mun and Hyunseung Choo},
4092 series = {Lecture Notes in Computer Science},
4093 publisher = {Springer},
4094 bibsource = {DBLP, http://dblp.uni-trier.de},
4095 booktitle = {ICCSA (1)},
4096 isbn = {3-540-34070-X}
4099 @PROCEEDINGS{DBLP:conf/secrypt/2010,
4100 title = {SECRYPT 2010 - Proceedings of the International Conference on Security
4101 and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part
4102 of ICETE - The International Joint Conference on e-Business and Telecommunications},
4104 editor = {Sokratis K. Katsikas and Pierangela Samarati},
4105 publisher = {SciTePress},
4106 bibsource = {DBLP, http://dblp.uni-trier.de},
4107 booktitle = {SECRYPT},
4108 isbn = {978-989-8425-18-8}
4111 @BOOK{Katzenbeisser00,
4112 title = {Information Hiding Techniques for Steganography and Digital Watermarking},
4113 publisher = {Artech House, Inc.},
4115 editor = {Katzenbeisser, Stefan and Petitcolas, Fabien A.},
4116 address = {Norwood, MA, USA},
4120 @PROCEEDINGS{DBLP:conf/ih/1999,
4121 title = {IH'99: 3rd International Workshop on Information Hiding},
4123 editor = {Andreas Pfitzmann},
4125 series = {Lecture Notes in Computer Science},
4126 address = {Dresden, Germany},
4127 publisher = {Springer},
4128 month = {September 29 - October 1.},
4129 bibsource = {DBLP, http://dblp.uni-trier.de},
4130 booktitle = {Information Hiding},
4131 isbn = {3-540-67182-X},
4133 timestamp = {2009.06.29}
4136 @PROCEEDINGS{DBLP:conf/indocrypt/2000,
4137 title = {Progress in Cryptology - INDOCRYPT 2000, First International Conference
4138 in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings},
4140 editor = {Bimal K. Roy and Eiji Okamoto},
4142 series = {Lecture Notes in Computer Science},
4143 publisher = {Springer},
4144 bibsource = {DBLP, http://dblp.uni-trier.de},
4145 booktitle = {INDOCRYPT},
4146 isbn = {3-540-41452-5}
4149 @BOOK{DBLP:reference/icsec/2010,
4150 title = {Handbook of Information and Communication Security},
4151 publisher = {Springer},
4153 editor = {Peter P. Stavroulakis and Mark Stamp},
4154 bibsource = {DBLP, http://dblp.uni-trier.de},
4155 booktitle = {Handbook of Information and Communication Security},
4156 ee = {http://dx.doi.org/10.1007/978-3-642-04117-4},
4157 isbn = {978-3-642-04116-7}
4160 @PROCEEDINGS{DBLP:conf/isnn/2004-2,
4161 title = {Advances in Neural Networks - ISNN 2004, International Symposium
4162 on Neural Networks, Dalian, China, August 19-21, 2004, Proceedings,
4165 editor = {Fuliang Yin and Jun Wang and Chengan Guo},
4167 series = {Lecture Notes in Computer Science},
4168 publisher = {Springer},
4169 bibsource = {DBLP, http://dblp.uni-trier.de},
4170 booktitle = {ISNN (2)},
4171 isbn = {3-540-22843-8}
4174 @PROCEEDINGS{DBLP:conf/adhocnets/2010,
4175 title = {Ad Hoc Networks - Second International Conference, ADHOCNETS 2010,
4176 Victoria, BC, Canada, August 18-20, 2010, Revised Selected Papers},
4178 editor = {Jun Zheng and David Simplot-Ryl and Victor C. M. Leung},
4180 series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
4181 and Telecommunications Engineering},
4182 publisher = {Springer},
4183 bibsource = {DBLP, http://dblp.uni-trier.de},
4184 booktitle = {ADHOCNETS},
4185 ee = {http://dx.doi.org/10.1007/978-3-642-17994-5},
4186 isbn = {978-3-642-17993-8}
4191 timestamp = {2011.03.29}
4195 title = {Delicious social bookmarking, http://delicious.com/},
4196 comment = {http://delicious.com/},
4198 url = {http://delicious.com/}
4202 title = {The Frick Collection, http://www.frick.org/},
4203 comment = {http://www.frick.org/},
4205 url = {http://www.frick.org/}
4209 title = {Proceedings of the IEEE Congress on Evolutionary Computation, CEC
4210 2010, Barcelona, Spain, 18-23 July 2010},
4213 bibsource = {DBLP, http://dblp.uni-trier.de},
4214 booktitle = {IEEE Congress on Evolutionary Computation}
4217 @PROCEEDINGS{DBLP:conf/cec/2010,
4218 title = {Proceedings of the IEEE Congress on Evolutionary Computation, CEC
4219 2010, Barcelona, Spain, 18-23 July 2010},
4222 bibsource = {DBLP, http://dblp.uni-trier.de},
4223 booktitle = {IEEE Congress on Evolutionary Computation}
4226 @PROCEEDINGS{DBLP:conf/date/2010,
4227 title = {Design, Automation and Test in Europe, DATE 2010, Dresden, Germany,
4231 bibsource = {DBLP, http://dblp.uni-trier.de},
4235 @PROCEEDINGS{DBLP:conf/cse/2009,
4236 title = {Proceedings IEEE CSE'09, 12th IEEE International Conference on Computational
4237 Science and Engineering, August 29-31, 2009, Vancouver, BC, Canada},
4239 publisher = {IEEE Computer Society},
4240 bibsource = {DBLP, http://dblp.uni-trier.de},
4244 @PROCEEDINGS{DBLP:conf/icumt/2009,
4245 title = {Proceedings of the International Conference on Ultra Modern Telecommunications,
4246 ICUMT 2009, 12-14 October 2009, St. Petersburg, Russia},
4249 bibsource = {DBLP, http://dblp.uni-trier.de},
4253 @PROCEEDINGS{DBLP:conf/focs/2008,
4254 title = {49th Annual IEEE Symposium on Foundations of Computer Science, FOCS
4255 2008, October 25-28, 2008, Philadelphia, PA, USA},
4257 publisher = {IEEE Computer Society},
4258 bibsource = {DBLP, http://dblp.uni-trier.de},
4262 @comment{jabref-meta: selector_publisher:}
4264 @comment{jabref-meta: selector_author:}
4266 @comment{jabref-meta: selector_journal:}
4268 @comment{jabref-meta: selector_keywords:Chaos;Entropie Topologique;Tip
4273 @InProceedings{Pang:2008:cec,
4274 author = "Wai-Man Pang and Tien-Tsin Wong and Pheng-Ann Heng",
4275 title = "Generating Massive High-Quality Random Numbers using
4277 booktitle = "2008 IEEE World Congress on Computational
4280 editor = "Jun Wang",
4281 address = "Hong Kong",
4282 organization = "IEEE Computational Intelligence Society",
4283 publisher = "IEEE Press",
4287 @Article{LEcuyerS07,
4288 title = "Test{U01}: {A} {C} library for empirical testing of
4289 random number generators",
4290 author = "Pierre L'Ecuyer and Richard J. Simard",
4291 journal = "ACM Trans. Math. Softw",
4295 bibdate = "2007-11-06",
4297 http://dblp.uni-trier.de/db/journals/toms/toms33.html#LEcuyerS07",
4298 URL = "http://doi.acm.org/10.1145/1268776.1268777",
4302 author = {A. Zhmurov, K. Rybnikov, Y. Kholodov, and V. Barsegov},
4303 title = {Generation of Random Numbers on Graphics Processors: Forced Indentation In Silico of the Bacteriophage HK97},
4304 journal = {J. Phys. Chem. B},
4308 pages = {5278--5288},
4313 @comment {regarder : Pseudo-Random Number Generation for Brownian Dynamics and Dissipative Particle Dynamics Simulations on GPU Devices}
4314 @comment {CL Phillips, JA Anderson… - Journal of Computational Physics, 2011 - Elsevier}
4316 @InProceedings{conf/fpga/ThomasHL09,
4317 title = "A comparison of {CPU}s, {GPU}s, {FPGA}s, and massively
4318 parallel processor arrays for random number
4320 author = "David B. Thomas and Lee W. Howes and Wayne Luk",
4321 booktitle = "Proceedings of the {ACM}/{SIGDA} 17th International
4322 Symposium on Field Programmable Gate Arrays, {FPGA}
4323 2009, Monterey, California, {USA}, February 22-24,
4325 bibdate = "2010-06-29",
4328 editor = "Paul Chow and Peter Y. K. Cheung",
4329 ISBN = "978-1-60558-410-2",
4331 URL = "http://doi.acm.org/10.1145/1508128.1508139",
4336 @InProceedings{Jenkins96,
4339 booktitle = "IWFSE: International Workshop on Fast Software
4346 title = {Cuda cublas library},
4348 Note = {Version 4.0},
4353 title = {Curand library},
4355 Note = {Version 4.0},
4361 author = {Lenore Blum and Manuel Blum and Michael Shub},
4362 title = {A Simple Unpredictable Pseudo-Random Number Generator},
4363 journal = {SIAM Journal on Computing},
4370 author = {Oded Goldreich},
4372 title = {Foundations of Cryptography: Basic Tools},
4373 publisher = {Cambridge University Press},