1 % This file was created with JabRef 2.7.
4 @INPROCEEDINGS{AdelsbachKS06,
5 author = {Andr{\'e} Adelsbach and Stefan Katzenbeisser and Ahmad-Reza Sadeghi},
6 title = {A Computational Model for Watermark Robustness},
7 booktitle = {Information Hiding},
10 bibsource = {DBLP, http://dblp.uni-trier.de},
11 crossref = {DBLP:conf/ih/2006},
12 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_10},
14 timestamp = {2009.06.29}
17 @inproceedings{bfg12a:ip,
19 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
22 author = {Bahi, Jacques and Fang, Xiaole and Guyeux, Christophe},
23 title = {An optimization technique on pseudorandom generators based on chaotic iterations},
24 booktitle = {INTERNET'2012, 4-th Int. Conf. on Evolving Internet},
26 address = {Venice, Italy},
33 @UNPUBLISHED{ANDREW2008,
34 author = {NIST Special Publication 800-22 rev. 1},
35 title = {A Statistical Test Suite for Random and Pseudorandom Number Generators
36 for Cryptographic Applications},
39 timestamp = {2009.01.22}
42 @Article{combined_lcg,
43 title = "Efficient and portable combined random number generators",
44 journal = "Communications of the ACM",
52 @INPROCEEDINGS{Fischlin,
53 author = {Fischlin, R. and Schnorr, C. P.},
54 title = {Stronger security proofs for RSA and rabin bits},
55 booktitle = {Proceedings of the 16th annual international conference on Theory
56 and application of cryptographic techniques},
58 series = {EUROCRYPT'97},
60 address = {Berlin, Heidelberg},
61 publisher = {Springer-Verlag},
63 isbn = {3-540-62975-0},
64 location = {Konstanz, Germany},
66 url = {http://dl.acm.org/citation.cfm?id=1754542.1754569}
69 @INPROCEEDINGS{BattiatoCGG99,
70 author = {Sebastiano Battiato and Dario Catalano and Giovanni Gallo and Rosario
72 title = {Robust Watermarking for Images Based on Color Manipulation},
73 booktitle = {Information Hiding},
76 bibsource = {DBLP, http://dblp.uni-trier.de},
77 crossref = {DBLP:conf/ih/1999},
79 timestamp = {2009.06.29}
82 @INPROCEEDINGS{ComesanaPP05,
83 author = {Pedro Comesa{\~n}a and Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez},
84 title = {The Return of the Sensitivity Attack},
88 bibsource = {DBLP, http://dblp.uni-trier.de},
89 crossref = {DBLP:conf/iwdw/2005},
90 ee = {http://dx.doi.org/10.1007/11551492_20},
92 timestamp = {2009.06.29}
95 @INPROCEEDINGS{ComesanaPP05bis,
96 author = {Pedro Comesa{\~n}a and Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez},
97 title = {Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum
99 booktitle = {IH'05: Information Hiding Workshop},
102 publisher = {Lectures Notes in Computer Science, Springer-Verlag},
103 bibsource = {DBLP, http://dblp.uni-trier.de},
104 crossref = {DBLP:conf/ih/2005},
105 ee = {http://dx.doi.org/10.1007/11558859_12},
107 timestamp = {2009.06.30}
110 @INPROCEEDINGS{CongJQZ06,
111 author = {Jin Cong and Yan Jiang and Zhiguo Qu and Zhongmei Zhang},
112 title = {A Wavelet Packets Watermarking Algorithm Based on Chaos Encryption},
113 booktitle = {ICCSA (1)},
116 bibsource = {DBLP, http://dblp.uni-trier.de},
117 crossref = {DBLP:conf/iccsa/2006-1},
118 ee = {http://dx.doi.org/10.1007/11751540_100}
121 @INPROCEEDINGS{DBLP:conf/focs/DziembowskiP08,
122 author = {Stefan Dziembowski and Krzysztof Pietrzak},
123 title = {Leakage-Resilient Cryptography},
127 bibsource = {DBLP, http://dblp.uni-trier.de},
128 crossref = {DBLP:conf/focs/2008},
129 ee = {http://dx.doi.org/10.1109/FOCS.2008.56}
132 @INCOLLECTION{Filiol10,
133 author = {Eric Filiol},
134 title = {Viruses and Malware},
135 booktitle = {Handbook of Information and Communication Security},
138 bibsource = {DBLP, http://dblp.uni-trier.de},
139 crossref = {DBLP:reference/icsec/2010},
140 ee = {http://dx.doi.org/10.1007/978-3-642-04117-4_34}
143 @INPROCEEDINGS{Filiol00,
144 author = {Eric Filiol},
145 title = {Decimation Attack of Stream Ciphers},
146 booktitle = {INDOCRYPT},
149 bibsource = {DBLP, http://dblp.uni-trier.de},
150 crossref = {DBLP:conf/indocrypt/2000},
151 ee = {http://link.springer.de/link/service/series/0558/bibs/1977/19770031.htm}
154 @INPROCEEDINGS{Furon05,
155 author = {Teddy Furon},
156 title = {A Survey of Watermarking Security},
160 bibsource = {DBLP, http://dblp.uni-trier.de},
161 crossref = {DBLP:conf/iwdw/2005},
162 ee = {http://dx.doi.org/10.1007/11551492_16},
164 timestamp = {2009.06.29}
168 author = {Oded Goldreich},
170 title = {Foundations of Cryptography: Basic Tools},
171 publisher = {Cambridge University Press},
175 @INPROCEEDINGS{DBLP:conf/cec/HiggsSHS10,
176 author = {Trent Higgs and Bela Stantic and Tamjidul Hoque and Abdul Sattar},
177 title = {Genetic algorithm feature-based resampling for protein structure
179 booktitle = {IEEE Congress on Evolutionary Computation},
182 bibsource = {DBLP, http://dblp.uni-trier.de},
183 crossref = {DBLP:conf/cec/2010},
184 ee = {http://dx.doi.org/10.1109/CEC.2010.5586149}
187 @INPROCEEDINGS{Higgs2010,
188 author = {Trent Higgs and Bela Stantic and Tamjidul Hoque and Abdul Sattar},
189 title = {Genetic algorithm feature-based resampling for protein structure
191 booktitle = {IEEE Congress on Evolutionary Computation},
194 bibsource = {DBLP, http://dblp.uni-trier.de},
195 crossref = {DBLP:conf/cec/2010},
196 ee = {http://dx.doi.org/10.1109/CEC.2010.5586149}
199 @INPROCEEDINGS{DBLP:conf/cec/HorvathC10,
200 author = {Dragos Horvath and Camelia Chira},
201 title = {Simplified chain folding models as metaheuristic benchmark for tuning
202 real protein folding algorithms?},
203 booktitle = {IEEE Congress on Evolutionary Computation},
206 bibsource = {DBLP, http://dblp.uni-trier.de},
207 crossref = {DBLP:conf/cec/2010},
208 ee = {http://dx.doi.org/10.1109/CEC.2010.5585932}
211 @INPROCEEDINGS{DBLP:conf/cec/IslamC10,
212 author = {Md. Kamrul Islam and Madhu Chetty},
213 title = {Clustered memetic algorithm for protein structure prediction},
214 booktitle = {IEEE Congress on Evolutionary Computation},
217 bibsource = {DBLP, http://dblp.uni-trier.de},
218 crossref = {DBLP:conf/cec/2010},
219 ee = {http://dx.doi.org/10.1109/CEC.2010.5586187}
222 @INPROCEEDINGS{Ker06,
223 author = {Andrew D. Ker},
224 title = {Batch Steganography and Pooled Steganalysis},
225 booktitle = {Information Hiding},
228 bibsource = {DBLP, http://dblp.uni-trier.de},
229 crossref = {DBLP:conf/ih/2006},
230 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_18},
232 timestamp = {2009.06.29}
235 @INPROCEEDINGS{Lin2009,
236 author = {H.-Y. Lin and T.-C. Chiang},
237 title = {Cooperative Secure Data Aggregation in Sensor Networks Using Elliptic
238 Curve Based Cryptosystems},
242 bibsource = {DBLP, http://dblp.uni-trier.de},
243 crossref = {DBLP:conf/cdve/2009},
244 ee = {http://dx.doi.org/10.1007/978-3-642-04265-2_58}
247 @INPROCEEDINGS{DBLP:conf/cse/MaimourPH09,
248 author = {Moufida Maimour and CongDuc Pham and Doan B. Hoang},
249 title = {A Congestion Control Framework for Handling Video Surveillance Traffics
251 booktitle = {CSE (2)},
254 bibsource = {DBLP, http://dblp.uni-trier.de},
255 crossref = {DBLP:conf/cse/2009},
256 ee = {http://dx.doi.org/10.1109/CSE.2009.200}
259 @INPROCEEDINGS{DBLP:conf/icumt/MakhoulSP09,
260 author = {Abdallah Makhoul and Rachid Saadi and CongDuc Pham},
261 title = {Coverage and adaptive scheduling algorithms for criticality management
262 on video wireless sensor networks},
266 bibsource = {DBLP, http://dblp.uni-trier.de},
267 crossref = {DBLP:conf/icumt/2009},
268 ee = {http://dx.doi.org/10.1109/ICUMT.2009.5345630}
271 @INPROCEEDINGS{Mittelholzer99,
272 author = {Thomas Mittelholzer},
273 title = {An Information-Theoretic Approach to Steganography and Watermarking},
274 booktitle = {Information Hiding},
277 bibsource = {DBLP, http://dblp.uni-trier.de},
278 crossref = {DBLP:conf/ih/1999},
280 timestamp = {2009.06.29}
283 @INPROCEEDINGS{PellegriniBA10,
284 author = {Andrea Pellegrini and Valeria Bertacco and Todd M. Austin},
285 title = {Fault-based attack of RSA authentication},
289 bibsource = {DBLP, http://dblp.uni-trier.de},
290 crossref = {DBLP:conf/date/2010},
291 ee = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5456933}
294 @INPROCEEDINGS{DBLP:conf/cec/Perez-HernandezRG10,
295 author = {Luis Germ{\'a}n P{\'e}rez-Hern{\'a}ndez and Katya Rodr\'{\i}guez-V{\'a}zquez
296 and Ram{\'o}n Gardu{\~n}o-Ju{\'a}rez},
297 title = {Estimation of 3D Protein Structure by means of parallel Particle
299 booktitle = {IEEE Congress on Evolutionary Computation},
302 bibsource = {DBLP, http://dblp.uni-trier.de},
303 crossref = {DBLP:conf/cec/2010},
304 ee = {http://dx.doi.org/10.1109/CEC.2010.5586549}
307 @INPROCEEDINGS{WangNHZH07,
308 author = {Chuntao Wang and Jiangqun Ni and Jiwu Huang and Rongyue Zhang and
310 title = {Robust and High Capacity Image Watermarking Based on Jointly Coding
311 and Embedding Optimization},
312 booktitle = {Information Hiding},
315 bibsource = {DBLP, http://dblp.uni-trier.de},
316 crossref = {DBLP:conf/ih/2007},
317 ee = {http://dx.doi.org/10.1007/978-3-540-77370-2_5},
319 timestamp = {2009.06.29}
322 @INPROCEEDINGS{Zhao04,
323 author = {Jian Zhao and Mingquan Zhou and Hongmei Xie and Jinye Peng and Xin
325 title = {A Novel Wavelet Image Watermarking Scheme Combined with Chaos Sequence
327 booktitle = {ISNN (2)},
330 bibsource = {DBLP, http://dblp.uni-trier.de},
331 crossref = {DBLP:conf/isnn/2004-2},
332 ee = {http://springerlink.metapress.com/openurl.asp?genre=article{\&}issn=0302-9743{\&}volume=3174{\&}spage=663}
335 @INPROCEEDINGS{Acharya05securecomparison,
336 author = {Acharya, Mithun and Girao, Joao and Westhoff, Dirk},
337 title = {Secure Comparison of Encrypted Data in Wireless Sensor Networks},
338 booktitle = {WIOPT '05: Proceedings of the Third International Symposium on Modeling
339 and Optimization in Mobile, Ad Hoc, and Wireless Networks},
342 address = {Washington, DC, USA},
343 publisher = {IEEE Computer Society},
344 doi = {http://dx.doi.org/10.1109/WIOPT.2005.44},
345 isbn = {0-7695-2267-X}
348 @INPROCEEDINGS{Acimez07onthe,
349 author = {Onur Acıi\c{c}mez and \c{C}etin Kaya Ko\c{c} and Jean-Pierre Seifert},
350 title = {On the power of simple branch prediction analysis },
351 booktitle = {2007 ACM Symposium on Information, Computer and Communications Security
355 publisher = {ACM Press}
359 author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},
360 title = {Topological entropy},
361 journal = {Trans. Amer. Math. Soc.},
366 timestamp = {2008.05.29}
369 @INPROCEEDINGS{Agrawal04,
370 author = {Agrawal, Rakesh and Kiernan, Jerry and Srikant, Ramakrishnan and
372 title = {Order preserving encryption for numeric data},
373 booktitle = {SIGMOD '04: Proceedings of the 2004 ACM SIGMOD international conference
374 on Management of data},
377 address = {New York, NY, USA},
379 doi = {http://doi.acm.org/10.1145/1007568.1007632},
380 isbn = {1-58113-859-8},
381 location = {Paris, France}
384 @ARTICLE{Anfinsen20071973,
385 author = {Anfinsen, Christian B.},
386 title = {Principles that Govern the Folding of Protein Chains},
392 doi = {10.1126/science.181.4096.223},
393 eprint = {http://www.sciencemag.org/content/181/4096/223.full.pdf},
394 url = {http://www.sciencemag.org/content/181/4096/223.short}
398 author = {D. G. Arques and C. J. Michel},
399 title = {Analytical expression of the purine/pyrimidine autocorrelation function
400 after and before random mutations.},
401 journal = {Math Biosci},
407 abstract = {The mutation process is a classical evolutionary genetic process.
408 The type of mutations studied here is the random substitutions of
409 a purine base R (adenine or guanine) by a pyrimidine base Y (cytosine
410 or thymine) and reciprocally (transversions). The analytical expressions
411 derived allow us to analyze in genes the occurrence probabilities
412 of motifs and d-motifs (two motifs separated by any d bases) on the
413 R/Y alphabet under transversions. These motif probabilities can be
414 obtained after transversions (in the evolutionary sense; from the
415 past to the present) and, unexpectedly, also before transversions
416 (after back transversions, in the inverse evolutionary sense, from
417 the present to the past). This theoretical part in Section 2 is a
418 first generalization of a particular formula recently derived. The
419 application in Section 3 is based on the analytical expression giving
420 the autocorrelation function (the d-motif probabilities) before transversions.
421 It allows us to study primitive genes from actual genes. This approach
422 solves a biological problem. The protein coding genes of chloroplasts
423 and mitochondria have a preferential occurrence of the 6-motif YRY(N)6YRY
424 (maximum of the autocorrelation function for d = 6, N = R or Y) with
425 a periodicity modulo 3. The YRY(N)6YRY preferential occurrence without
426 the periodicity modulo 3 is also observed in the RNA coding genes
427 (ribosomal, transfer, and small nuclear RNA genes) and in the noncoding
428 genes (introns and 5' regions of eukaryotic nuclei). However, there
429 are two exceptions to this YRY(N)6YRY rule: the protein coding genes
430 of eukaryotic nuclei, and prokaryotes, where YRY(N)6YRY has the second
431 highest value after YRY(N)0YRY (YRYYRY) with a periodicity modulo
432 3. When we go backward in time with the analytical expression, the
433 protein coding genes of both eukaryotic nuclei and prokaryotes retrieve
434 the YRY(N)6YRY preferential occurrence with a periodicity modulo
435 3 after 0.2 back transversions per base. In other words, the actual
436 protein coding genes of chloroplasts and mitochondria are similar
437 to the primitive protein coding genes of eukaryotic nuclei and prokaryotes.
438 On the other hand, this application represents the first result concerning
439 the mutation process in the model of DNA sequence evolution we recently
440 proposed. According to this model, the actual genes on the R/Y alphabet
441 derive from two successive evolutionary genetic processes: an independent
442 mixing of a few nonrandom types of oligonucleotides leading to genes
443 called primitive followed by a mutation process in these primitive
444 genes.(ABSTRACT TRUNCATED AT 400 WORDS)},
445 institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon,
447 keywords = {Base Sequence; Biological Evolution; DNA, genetics; Mathematics; Models,
448 Genetic; Mutation; Probability; Proteins, genetics; Purines; Pyrimidines},
450 medline-pst = {ppublish},
452 pii = {0025-5564(94)90020-5},
454 timestamp = {2011.05.05}
458 author = {D. G. Arquès and J. P. Fallot and C. J. Michel},
459 title = {An evolutionary analytical model of a complementary circular code
460 simulating the protein coding genes, the 5' and 3' regions.},
461 journal = {Bull Math Biol},
467 abstract = {The self-complementary subset T0 = X0 [symbol: see text] ¿AAA, TTT¿
468 with X0 = ¿AAC, AAT, ACC, ATC, ATT, CAG, CTC, CTG, GAA, GAC, GAG,
469 GAT, GCC, GGC, GGT, GTA, GTC, GTT, TAC, TTC¿ of 22 trinucleotides
470 has a preferential occurrence in the frame 0 (reading frame established
471 by the ATG start trinucleotide) of protein (coding) genes of both
472 prokaryotes and eukaryotes. The subsets T1 = X1 [symbol: see text]
473 ¿CCC¿ and T2 = X2 [symbol: see text] ¿GGG¿ of 21 trinucleotides have
474 a preferential occurrence in the shifted frames 1 and 2 respectively
475 (frame 0 shifted by one and two nucleotides respectively in the 5'-3'
476 direction). T1 and T2 are complementary to each other. The subset
477 T0 contains the subset X0 which has the rarity property (6 x 10(-8)
478 to be a complementary maximal circular code with two permutated maximal
479 circular codes X1 and X2 in the frames 1 and 2 respectively. X0 is
480 called a C3 code. A quantitative study of these three subsets T0,
481 T1, T2 in the three frames 0, 1, 2 of protein genes, and the 5' and
482 3' regions of eukaryotes, shows that their occurrence frequencies
483 are constant functions of the trinucleotide positions in the sequences.
484 The frequencies of T0, T1, T2 in the frame 0 of protein genes are
485 49, 28.5 and 22.5\% respectively. In contrast, the frequencies of
486 T0, T1, T2 in the 5' and 3' regions of eukaryotes, are independent
487 of the frame. Indeed, the frequency of T0 in the three frames of
488 5' (respectively 3') regions is equal to 35.5\% (respectively 38\%)
489 and is greater than the frequencies T1 and T2, both equal to 32.25\%
490 (respectively 31\%) in the three frames. Several frequency asymmetries
491 unexpectedly observed (e.g. the frequency difference between T1 and
492 T2 in the frame 0), are related to a new property of the subset T0
493 involving substitutions. An evolutionary analytical model at three
494 parameters (p, q, t) based on an independent mixing of the 22 codons
495 (trinucleotides in frame 0) of T0 with equiprobability (1/22) followed
496 by t approximately 4 substitutions per codon according to the proportions
497 p approximately 0.1, q approximately 0.1 and r = 1 - p - q approximately
498 0.8 in the three codon sites respectively, retrieves the frequencies
499 of T0, T1, T2 observed in the three frames of protein genes and explains
500 these asymmetries. Furthermore, the same model (0.1, 0.1, t) after
501 t approximately 22 substitutions per codon, retrieves the statistical
502 properties observed in the three frames of the 5' and 3' regions.
503 The complex behaviour of these analytical curves is totally unexpected
504 and a priori difficult to imagine.},
505 doi = {10.1006/bulm.1997.0033},
506 institution = {Equipe de Biologie Théorique, Université de Marne la Vallée, Institut
507 Gaspard Monge, Noisy Le Grand, France. arques@univ-mlv.fr},
508 keywords = {Animals; Biological Evolution; Codon, genetics; Genetic Code; Humans;
509 Mammals; Models, Genetic; Probability; Proteins, genetics; Rodentia;
512 medline-pst = {ppublish},
514 pii = {S0092-8240(97)90033-1},
516 timestamp = {2011.05.05},
517 url = {http://dx.doi.org/10.1006/bulm.1997.0033}
521 author = {D. G. Arquès and C. J. Michel},
522 title = {Analytical expression of the purine/pyrimidine codon probability
523 after and before random mutations.},
524 journal = {Bull Math Biol},
527 pages = {1025--1038},
530 abstract = {Recently, we proposed a new model of DNA sequence evolution (Arquès
531 and Michel. 1990b. Bull. math. Biol. 52, 741-772) according to which
532 actual genes on the purine/pyrimidine (R/Y) alphabet (R = purine
533 = adenine or guanine, Y = pyrimidine = cytosine or thymine) are the
534 result of two successive evolutionary genetic processes: (i) a mixing
535 (independent) process of non-random oligonucleotides (words of base
536 length less than 10: YRY(N)6, YRYRYR and YRYYRY are so far identified;
537 N = R or Y) leading to primitive genes (words of several hundreds
538 of base length) and followed by (ii) a random mutation process, i.e.,
539 transformations of a base R (respectively Y) into the base Y (respectively
540 R) at random sites in these primitive genes. Following this model
541 the problem investigated here is the study of the variation of the
542 8 R/Y codon probabilities RRR, ..., YYY under random mutations. Two
543 analytical expressions solved here allow analysis of this variation
544 in the classical evolutionary sense (from the past to the present,
545 i.e., after random mutations), but also in the inverted evolutionary
546 sense (from the present to the past, i.e., before random mutations).
547 Different properties are also derived from these formulae. Finally,
548 a few applications of these formulae are presented. They prove the
549 proposition in Arquès and Michel (1990b. Bull. math. Biol. 52, 741-772),
550 Section 3.3.2, with the existence of a maximal mean number of random
551 mutations per base of the order 0.3 in the protein coding genes.
552 They also confirm the mixing process of oligonucleotides by excluding
553 the purine/pyrimidine contiguous and alternating tracts from the
554 formation process of primitive genes.},
555 institution = {Université de Franche-Comté, Besançon, France.},
556 keywords = {Base Sequence; Codon; DNA, chemistry/genetics; Mathematics; Models,
557 Genetic; Mutation; Probability; Purines; Pyrimidines},
559 medline-pst = {ppublish},
562 timestamp = {2011.05.05}
565 @ARTICLE{Arques1993b,
566 author = {D. G. Arquès and C. J. Michel},
567 title = {Identification and simulation of new non-random statistical properties
568 common to different eukaryotic gene subpopulations.},
569 journal = {Biochimie},
574 abstract = {The nucleotide distribution in protein coding genes, introns and transfer
575 RNA genes of eukaryotic subpopulations (primates, rodent and mammals)
576 is studied by autocorrelation functions. The autocorrelation function
577 analysing the occurrence probability of the i-motif YRY(N)iYRY (YRY-function)
578 in protein coding genes and transfer RNA genes of these three eukaryotic
579 subpopulations retrieves the preferential occurrence of YRY(N)6YRY
580 (R = purine = adenine or guanine, Y = pyrimidine = cytosine or thymine,
581 N = R or Y). The autocorrelation functions analysing the occurrence
582 probability of the i-motifs RRR(N)iRRR (RRR-function) and YYY(N)iYYY
583 (YYY-function) identify new non-random genetic statistical properties
584 in these three eukaryotic subpopulations, mainly: i) in their protein
585 coding genes: local maxima for i identical to 6 [12] (peaks for i
586 = 6, 18, 30, 42) with the RRR-function and local maxima for i identical
587 to 8 [10] (peaks for i = 8, 18, 28) with the YYY-function; and ii)
588 in their introns: local maxima for i identical to 3 [6] (peaks for
589 i = 3, 9, 15) and a short linear decrease followed by a large exponential
590 decrease both with the RRR- and YYY-functions. The non-random properties
591 identified in eukaryotic intron subpopulations are modelised with
592 a process of random insertions and deletions of nucleotides simulating
594 institution = {Equipe de Biologie Théorique, Université de Franche-Comté, Laboratoire
595 d'Informatique de Besançon, France.},
596 keywords = {Animals; Base Sequence; Data Interpretation, Statistical; Genes; Introns;
597 Mammals; Models, Genetic; Primates; Probability; Proteins, genetics;
598 RNA Editing; RNA, Transfer, genetics; Rodentia; Sequence Analysis,
601 medline-pst = {ppublish},
603 pii = {0300-9084(93)90173-P},
605 timestamp = {2011.05.05}
609 author = {D. G. Arquès and C. J. Michel},
610 title = {A simulation of the genetic periodicities modulo 2 and 3 with processes
611 of nucleotide insertions and deletions.},
612 journal = {J Theor Biol},
618 abstract = {Recently, a new genetic process termed RNA editing has been identified
619 showing insertions and deletions of nucleotides in particular RNA
620 molecules. On the other hand, there are a few non-random statistical
621 properties in genes: in particular, the periodicity modulo 3 (P3)
622 associated with an open reading frame, the periodicity modulo 2 (P2)
623 associated with alternating purine/pyrimidine stretches, the YRY(N)6YRY
624 preferential occurrence (R = purine = adenine or guanine, Y = pyrimidine
625 = cytosine or thymine, N = R or Y) representing a "code" of the DNA
626 helix pitch, etc. The problem investigated here is whether a process
627 of the type RNA editing can lead to the non-random statistical properties
628 commonly observed in genes. This paper will show in particular that:
629 The process of insertions and deletions of mononucleotides in the
630 initial sequence [YRY(N)3]* [series of YRY(N)3] can lead to the periodicity
631 modulo 2 (P2). The process of insertions and deletions of trinucleotides
632 in the initial sequence [YRY(N)6]* [series of YRY(N)6] can lead to
633 the periodicity modulo 3 (P3) and the YRY(N)6YRY preferential occurrence.
634 Furthermore, these two processes lead to a strong correlation with
635 the reality, namely the mononucleotide insertion/deletion process,
636 with the 5' eukaryotic regions and the trinucleotide insertion/deletion
637 process, with the eukaryotic protein coding genes.},
638 institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon,
639 Unité Associée CNRS No 822, France.},
640 keywords = {Chromosome Deletion; Computer Simulation; Humans; Models, Genetic;
641 Mutagenesis, genetics; RNA, genetics},
643 medline-pst = {ppublish},
646 timestamp = {2011.05.05}
650 author = {D. G. Arquès and C. J. Michel},
651 title = {Periodicities in coding and noncoding regions of the genes.},
652 journal = {J Theor Biol},
658 abstract = {Gene population statistical studies of protein coding genes and introns
659 have identified two types of periodicities on the purine/pyrimidine
660 alphabet: (i) the modulo 3 periodicity or coding periodicity (periodicity
661 P3) in protein coding genes of eukaryotes, prokaryotes, viruses,
662 chloroplasts, mitochondria, plasmids and in introns of viruses and
663 mitochondria, and (ii) the modulo 2 periodicity (periodicity P2)
664 in the eukaryotic introns. The periodicity study is herein extended
665 to the 5' and 3' regions of eukaryotes, prokaryotes and viruses and
666 shows: (i) the periodicity P3 in the 5' and 3' regions of eukaryotes.
667 Therefore, these observations suggest a unitary and dynamic concept
668 for the genes as for a given genome, the 5' and 3' regions have the
669 genetic information for protein coding genes and for introns: (1)
670 In the eukaryotic genome, the 5' (P2 and P3) and 3' (P2 and P3) regions
671 have the information for protein coding genes (P3) and for introns
672 (P2). The intensity of P3 is high in 5' regions and weak in 3' regions,
673 while the intensity of P2 is weak in 5' regions and high in 3' regions.
674 (2) In the prokaryotic genome, the 5' (P3) and 3' (P3) regions have
675 the information for protein coding genes (P3). (3) In the viral genome,
676 the 5' (P3) and 3' (P3) regions have the information for protein
677 coding genes (P3) and for introns (P3). The absence of P2 in viral
678 introns (in opposition to eukaryotic introns) may be related to the
679 absence of P2 in 5' and 3' regions of viruses.},
680 institution = {Université de Franche-Comté, Unité Associée CNRS No. 822, Besançon,
682 keywords = {Animals; Base Sequence; Eukaryotic Cells; Genes; Introns; Prokaryotic
683 Cells; Purine Nucleotides; Pyrimidine Nucleotides; Repetitive Sequences,
684 Nucleic Acid; Viruses, genetics},
686 medline-pst = {ppublish},
689 timestamp = {2011.05.05}
692 @ARTICLE{Arques1990a,
693 author = {D. G. Arquès and C. J. Michel},
694 title = {A model of DNA sequence evolution.},
695 journal = {Bull Math Biol},
700 abstract = {Statistical studies of gene populations on the purine/pyrimidine alphabet
701 have shown that the mean occurrence probability of the i-motif YRY(N)iYRY
702 (R = purine, Y = pyrimidine, N = R or Y) is not uniform by varying
703 i in the range, but presents a maximum at i = 6 in the following
704 populations: protein coding genes of eukaryotes, prokaryotes, chloroplasts
705 and mitochondria, and also viral introns, ribosomal RNA genes and
706 transfer RNA genes (Arquès and Michel, 1987b, J. theor. Biol. 128,
707 457-461). From the "universality" of this observation, we suggested
708 that the oligonucleotide YRY(N)6 is a primitive one and that it has
709 a central function in DNA sequence evolution (Arquès and Michel,
710 1987b, J. theor. Biol. 128, 457-461). Following this idea, we introduce
711 a concept of a model of DNA sequence evolution which will be validated
712 according to a schema presented in three parts. In the first part,
713 using the last version of the gene database, the YRY(N)6YRY preferential
714 occurrence (maximum at i = 6) is confirmed for the populations mentioned
715 above and is extended to some newly analysed populations: chloroplast
716 introns, chloroplast 5' regions, mitochondrial 5' regions and small
717 nuclear RNA genes. On the other hand, the YRY(N)6YRY preferential
718 occurrence and periodicities are used in order to classify 18 gene
719 populations. In the second part, we will demonstrate that several
720 statistical features characterizing different gene populations (in
721 particular the YRY(N)6YRY preferential occurrence and the periodicities)
722 can be retrieved from a simple Markov model based on the mixing of
723 the two oligonucleotides YRY(N)6 and YRY(N)3 and based on the percentages
724 of RYR and YRY in the unspecified trinucleotides (N)3 of YRY(N)6
725 and YRY(N)3. Several properties are identified and prove in particular
726 that the oligonucleotide mixing is an independent process and that
727 several different features are functions of a unique parameter. In
728 the third part, the return of the model to the reality shows a strong
729 correlation between reality and simulation concerning the presence
730 of a large alternating purine/pyrimidine stretches and of periodicities.
731 It also contributes to a greater understanding of biological reality,
732 e.g. the presence or the absence of large alternating purine/pyrimidine
733 stretches can be explained as being a simple consequence of the mixing
734 of two particular oligonucleotides. Finally, we believe that such
735 an approach is the first step toward a unified model of DNA sequence
736 evolution allowing the molecular understanding of both the origin
737 of life and the actual biological reality.},
738 institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon,
739 Unité Associée CNRS No 822, France.},
740 keywords = {Base Sequence; Biological Evolution; DNA, genetics; Genetics, Population;
743 medline-pst = {ppublish},
746 timestamp = {2011.05.05}
749 @ARTICLE{Arques1993a,
750 author = {D. G. Arquès and C. J. Michel and K. Orieux},
751 title = {Identification and simulation of new non-random statistical properties
752 common to different populations of eukaryotic non-coding genes.},
753 journal = {J Theor Biol},
759 abstract = {The autocorrelation function analysing the occurrence probability
760 of the i-motif YRY(N)iYRY in genes allows the identification of mainly
761 two periodicities modulo 2, 3 and the preferential occurrence of
762 the motif YRY(N)6YRY (R = purine = adenine or guanine, Y = pyrimidine
763 = cytosine or thymine, N = R or Y). These non-random genetic statistical
764 properties can be simulated by an independent mixing of the three
765 oligonucleotides YRYRYR, YRYYRY and YRY(N)6 (Arquès & Michel, 1990b).
766 The problem investigated in this study is whether new properties
767 can be identified in genes with other autocorrelation functions and
768 also simulated with an oligonucleotide mixing model. The two autocorrelation
769 functions analysing the occurrence probability of the i-motifs RRR(N)iRRR
770 and YYY(N)iYYY simultaneously identify three new non-random genetic
771 statistical properties: a short linear decrease, local maxima for
772 i identical to 3[6] (i = 3, 9, etc) and a large exponential decrease.
773 Furthermore, these properties are common to three different populations
774 of eukaryotic non-coding genes: 5' regions, introns and 3' regions
775 (see section 2). These three non-random properties can also be simulated
776 by an independent mixing of the four oligonucleotides R8, Y8, RRRYRYRRR,
777 YYYRYRYYY and large alternating R/Y series. The short linear decrease
778 is a result of R8 and Y8, the local maxima for i identical to 3[6],
779 of RRRYRYRRR and YYYRYRYYY, and the large exponential decrease, of
780 large alternating R/Y series (section 3). The biological meaning
781 of these results and their relation to the previous oligonucleotide
782 mixing model are presented in the Discussion.},
783 doi = {10.1006/jtbi.1993.1059},
784 institution = {Equipe de Biologie Théorique, Université de Franche-Comté, Laboratoire
785 d'Informatique de Besançon, France.},
786 keywords = {Animals; Biological Evolution; Genes, genetics; Models, Genetic; Models,
787 Statistical; Mutation, genetics; Oligonucleotides, genetics; Probability},
789 medline-pst = {ppublish},
791 pii = {S0022-5193(83)71059-3},
793 timestamp = {2011.05.05},
794 url = {http://dx.doi.org/10.1006/jtbi.1993.1059}
798 author = {David Arroyo and Gonzalo Alvarez and Veronica Fernandez},
799 title = {On the inadequacy of the logistic map for cryptographic applications},
800 journal = {X Reunión Española sobre Criptología y Seguridad de la Información
805 owner = {christophe},
806 timestamp = {2010.03.01}
809 @MISC{Backofen99algorithmicapproach,
810 author = {R. Backofen and S. Will and P. Clote},
811 title = {Algorithmic Approach To Quantifying The Hydrophobic Force Contribution
817 @inproceedings{Blum:1985:EPP:19478.19501,
818 author = {Blum, Manuel and Goldwasser, Shafi},
819 title = {An efficient probabilistic public key encryption scheme which hides all partial information},
820 booktitle = {Proceedings of CRYPTO 84 on Advances in cryptology},
822 isbn = {0-387-15658-5},
823 location = {Santa Barbara, California, United States},
826 url = {http://dl.acm.org/citation.cfm?id=19478.19501},
828 publisher = {Springer-Verlag New York, Inc.},
829 address = {New York, NY, USA},
830 keywords = {chosen cyphertext attack, integer factorization, partial information, passive adversaries, probabilistic encryption},
834 @INPROCEEDINGS{bcgr11:ip,
835 author = {Bahi, Jacques M. and Couchot, Jean-fran\c{c}ois and Guyeux, Christophe
836 and Richard, Adrien},
837 title = {On the Link Between Strongly Connected Iteration Graphs and Chaotic
838 Boolean Discrete-Time Dynamical Systems},
839 booktitle = {FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory},
844 address = {Oslo, Norway},
848 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
854 author = {Bahi, Jacques M. and Guyeux, Christophe},
855 title = {Hash Functions Using Chaotic Iterations},
856 journal = {Journal of Algorithms \& Computational Technology},
862 doi = {10.1260/1748-3018.4.2.167},
863 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
868 url = {http://dx.doi.org/10.1260/1748-3018.4.2.167}
871 @INPROCEEDINGS{guyeux10ter,
872 author = {Bahi, Jacques M. and Guyeux, Christophe},
873 title = {A new chaos-based watermarking algorithm},
874 booktitle = {SECRYPT'10, Int. conf. on security and cryptography},
877 address = {Athens, Greece},
879 publisher = {SciTePress},
881 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
886 @INPROCEEDINGS{bgc11:ip,
887 author = {Bahi, Jacques M. and Guyeux, Christophe and Cote, Nathalie},
888 title = {Chaos of Protein Folding},
889 booktitle = {IJCNN 2011, Int. Joint Conf. on Neural Networks},
892 address = {San Jose, California, United States},
896 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
901 @INPROCEEDINGS{guyeux10bis,
902 author = {Bahi, Jacques M. and Guyeux, Christophe and Makhoul, Abdallah},
903 title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor
905 booktitle = {SENSORCOMM'10, 4-th Int. Conf. on Sensor Technologies and Applications},
908 address = {Venice-Mestre, Italy},
911 doi = {10.1109/SENSORCOMM.2010.76},
912 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
915 url = {http://dx.doi.org/10.1109/SENSORCOMM.2010.76}
918 @INPROCEEDINGS{guyeuxVictoria,
919 author = {Bahi, Jacques M. and Guyeux, Christophe and Makhoul, Abdallah},
920 title = {Secure Data Aggregation in Wireless Sensor Networks. Homomorphism
921 versus Watermarking Approach},
922 booktitle = {ADHOCNETS 2010, 2nd Int. Conf. on Ad Hoc Networks},
925 series = {Lecture Notes in ICST},
927 address = {Victoria, Canada},
930 doi = {10.1007/978-3-642-17994-5_23},
931 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
934 url = {http://dx.doi.org/10.1007/978-3-642-17994-5_23}
937 @INPROCEEDINGS{bgs11:ip,
938 author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel},
939 title = {Building a Chaotic Proven Neural Network},
940 booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network
944 address = {Maldives, Maldives},
947 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
952 @INPROCEEDINGS{bgw10:ip,
953 author = {Bahi, Jacques M. and Guyeux, Christophe and Wang, Qianxue},
954 title = {A Pseudo Random Numbers Generator Based on Chaotic Iterations. Application
956 booktitle = {WISM 2010, Int. Conf. on Web Information Systems and Mining},
961 address = {Sanya, China},
964 doi = {10.1007/978-3-642-16515-3_26},
965 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
968 url = {http://dx.doi.org/10.1007/978-3-642-16515-3_26}
971 @INPROCEEDINGS{bgw09:ip,
972 author = {Bahi, Jacques M. and Guyeux, Christophe and Wang, Qianxue},
973 title = {A novel pseudo-random generator based on discrete chaotic iterations},
974 booktitle = {INTERNET'09, 1-st Int. Conf. on Evolving Internet},
977 address = {Cannes, France},
980 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
985 @INPROCEEDINGS{bmg10:onp,
986 author = {Bahi, Jacques M. and Makhoul, Abdallah and Guyeux, Christophe},
987 title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor
988 Networks for critical applications},
989 booktitle = {RESSACS, Journ\'ee th\'ematique PHC/ResCom sur RESeaux de capteurS
990 et Applications Critiques de Surveillance},
992 address = {Bayonne, France},
994 note = {Communication orale},
996 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1001 @INPROCEEDINGS{guyeuxBayonne,
1002 author = {Bahi, Jacques M. and Makhoul, Abdallah and Guyeux, Christophe},
1003 title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor
1004 Networks for critical applications},
1005 booktitle = {RESSACS, Journ\'ee th\'ematique PHC/ResCom sur RESeaux de capteurS
1006 et Applications Critiques de Surveillance},
1008 address = {Bayonne, France},
1010 note = {Communication orale},
1017 author = {Bahi, Jacques M. and Salomon, Michel},
1018 title = {A Decentralized Energy-based Diffusion Algorithm to Increase the
1019 Lifetime of {MANETs}},
1020 journal = {Computer Networks Journal},
1023 note = {Accepted manuscript. To appear},
1024 classement = {ACLI},
1026 impact-factor = {1.201},
1029 publisher = {Elsevier}
1033 author = {J. M. Bahi},
1034 title = {Boolean totally asynchronous iterations},
1035 journal = {Int. Journal of Mathematical Algorithms},
1040 timestamp = {17/02/2008}
1043 @ARTICLE{Bahi2000bis,
1044 author = {Jacques M. Bahi},
1045 title = {Asynchronous iterative algorithms for nonexpansive linear systems},
1046 journal = {Journal of Parallel and Distributed Computing},
1051 timestamp = {2009.01.10}
1055 author = {J. M. Bahi},
1056 title = {Parallel synchronous chaotic iterations for singular linear systems},
1057 journal = {Parallel Algorithms and Applications},
1062 timestamp = {17/02/2008}
1066 author = {Jacques M. Bahi},
1067 title = {Algorithmes paralleles asynchrones pour les systemes singuliers},
1068 journal = {Comptes Rendus de l'Academie des Sciences},
1070 volume = {t. 326, serie 1},
1071 pages = {1421--1425},
1073 timestamp = {2009.01.18}
1077 author = {Jacques M. Bahi},
1078 title = {Méthodes itératives dans des espaces produits. Application au calcul
1080 school = {Université de Franche-Comté},
1082 type = {Habilitation à diriger des recherches},
1083 owner = {christophe},
1084 timestamp = {2010.08.24}
1088 author = {Jacques M. Bahi},
1089 title = {Algorithmes asynchrones pour des systèmes différentiels-algébriques.
1090 Simulation numérique sur des exemples de circuits électriques},
1091 school = {Université de Franche-Comté},
1093 owner = {christophe},
1094 timestamp = {2010.08.24}
1098 author = {Jacques M. Bahi and Sylvain Contassot-Vivier},
1099 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
1101 journal = {IEEE Transactions on Neural Networks},
1108 timestamp = {2009.12.04}
1112 author = {J.~M. Bahi and S. Contassot-Vivier},
1113 title = {Stability of fully asynchronous discrete-time discrete state dynamic
1115 journal = {IEEE Transactions on Neural Networks},
1118 pages = {1353-1363},
1120 timestamp = {2009.02.14}
1123 @TECHREPORT{bcgg10:ir,
1124 author = {Bahi, J. M. and Couchot, J.-F. and Grasset, O. and Guyeux, C.},
1125 title = {{D}iscrete {D}ynamical {S}ystems: {N}ecessary {D}ivergence {C}onditions
1126 for {S}ynchronous {I}terations},
1127 institution = {LIFC - Laboratoire d'{I}nformatique de l'{U}niversit\'{e} de {F}ranche
1130 type = {Research Report},
1131 number = {RR2010-04},
1133 pdf = {/~publis/papers/pub/2010/RR2010-04.pdf}
1137 author = {Bahi, Jacques M. and Guyeux, Christophe},
1138 title = {Hash Functions Using Chaotic Iterations},
1139 journal = {Journal of Algorithms \& Computational Technology},
1144 classement = {ACLNI},
1145 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1147 impact-factor = {#},
1152 @INPROCEEDINGS{guyeux10,
1153 author = {Bahi, Jacques M. and Guyeux, Christophe},
1154 title = {Topological chaos and chaotic iterations, application to Hash functions},
1155 booktitle = {WCCI'10, IEEE World Congress on Computational Intelligence},
1158 address = {Barcelona, Spain},
1160 note = {Best paper award},
1161 classement = {ACTI},
1162 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1168 author = {Jacques M. Bahi and Christophe Guyeux},
1169 title = {A chaos-based approach for information hiding security.},
1170 howpublished = {arXiv},
1173 institution = {Computer Science Laboratory LIFC, University of Franche-Comte, France}
1177 author = {Jacques M. Bahi and Christophe Guyeux},
1178 title = {A watermarking algorithm satisfying topological chaos properties},
1181 volume = {abs/0810.4713},
1182 bibsource = {DBLP, http://dblp.uni-trier.de},
1183 ee = {http://arxiv.org/abs/0810.4713}
1187 author = {Jacques M. Bahi and Christophe Guyeux},
1188 title = {Chaotic iterations and topological chaos},
1190 abstract = {Chaotic iterations have been introduced on the one hand by Chazan,
1191 Miranker [5] and Miellou [9] in a numerical analysis context, and
1192 on the other hand by Robert [11] and Pellegrin [10] in the discrete
1193 dynamical systems framework. In both cases, the objective was to
1194 derive conditions of convergence of such iterations to a fixed state.
1195 In this paper, a new point of view is presented, the goal here is
1196 to derive conditions under which chaotic iterations admit a chaotic
1197 behaviour in a rigorous mathematical sense. Contrary to what has
1198 been studied in the literature, convergence is not desired. More
1199 precisely, we establish in this paper a link between the concept
1200 of chaotic iterations on a finite set and the notion of topological
1201 chaos [8], [6], [7]. We are motivated by concrete applications of
1202 our approach, such as the use of chaotic boolean iterations in the
1203 computer security field. Indeed, the concept of chaos is used in
1204 many areas of data security without real rigorous theoretical foundations,
1205 and without using the fundamental properties that allow chaos. The
1206 wish of this paper is to bring a bit more mathematical rigour in
1208 citeseerurl = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}},
1210 comments = {6 pages},
1211 eprint = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}},
1212 oai2identifier = {0810.3154},
1214 timestamp = {2008.10.23},
1215 url = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}}
1218 @ARTICLE{arxivRNNchaos,
1219 author = {Jacques M. Bahi and Christophe Guyeux and Michel Salomon},
1220 title = {Building a Chaotic Proved Neural Network},
1223 volume = {abs/1101.4351},
1224 ee = {http://arxiv.org/abs/1101.4351}
1227 @INPROCEEDINGS{guyeuxTaiwan10,
1228 author = {Bahi, Jacques M. and Guyeux, Christophe and Wang, Qianxue},
1229 title = {Improving random number generators by chaotic iterations. Application
1231 booktitle = {ICCASM 2010, Int. Conf. on Computer Application and System Modeling},
1233 pages = {V13-643--V13-647},
1234 address = {Taiyuan, China},
1236 classement = {ACTI},
1237 doi = {10.1109/ICCASM.2010.5622199},
1238 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1241 url = {http://dx.doi.org/10.1109/ICCASM.2010.5622199}
1245 author = {Jacques M Bahi and Christian J Michel},
1246 title = {A stochastic model of gene evolution with time dependent pseudochaotic
1248 journal = {Bull Math Biol},
1254 abstract = {We develop here a new class of stochastic models of gene evolution
1255 in which a random subset of the 64 possible trinucleotides mutates
1256 at each evolutionary time t according to some time dependent substitution
1257 probabilities. Therefore, at each time t, the numbers and the types
1258 of mutable trinucleotides are unknown. Thus, the mutation matrix
1259 changes at each time t. This pseudochaotic model developed generalizes
1260 the standard model in which all the trinucleotides mutate at each
1261 time t. It determines the occurrence probabilities at time t of trinucleotides
1262 which pseudochaotically mutate according to 3 time dependent substitution
1263 parameters associated with the 3 trinucleotide sites. The main result
1264 proves that under suitable assumptions, this pseudochaotic model
1265 converges to a uniform probability vector identical to that of the
1266 standard model. Furthermore, an application of this pseudochaotic
1267 model allows an evolutionary study of the 3 circular codes identified
1268 in both eukaryotic and prokaryotic genes. A circular code is a particular
1269 set of trinucleotides whose main property is the retrieval of the
1270 frames in genes locally, i.e., anywhere in genes and particularly
1271 without start codons, and automatically with a window of a few nucleotides.
1272 After a certain evolutionary time and with particular time dependent
1273 functions for the 3 substitution parameters, precisely an exponential
1274 decrease in the 1st and 2nd trinucleotide sites and an exponential
1275 increase in the 3rd one, this pseudochaotic model retrieves the main
1276 statistical properties of the 3 circular codes observed in genes.
1277 Furthermore, it leads to a circular code asymmetry stronger than
1278 the standard model (nonpseudochaotic) and, therefore, to a better
1279 correlation with the genes.},
1280 doi = {10.1007/s11538-008-9376-4},
1281 institution = {LIFC-EA 4157, Université de Franche-Comté, IUT de Belfort, BP 527,
1282 90016, Belfort Cedex, France. jacques.bahi@univ-fcomte.fr},
1283 keywords = {Evolution, Molecular; Genes; Models, Genetic; Mutation; Stochastic
1286 medline-pst = {ppublish},
1289 timestamp = {2011.05.05},
1290 url = {http://dx.doi.org/10.1007/s11538-008-9376-4}
1294 author = {Jacques M Bahi and Christian J Michel},
1295 title = {A stochastic model of gene evolution with chaotic mutations.},
1296 journal = {J Theor Biol},
1302 abstract = {We develop here a new class of stochastic models of gene evolution
1303 in which the mutations are chaotic, i.e. a random subset of the 64
1304 possible trinucleotides mutates at each evolutionary time t according
1305 to some substitution probabilities. Therefore, at each time t, the
1306 numbers and the types of mutable trinucleotides are unknown. Thus,
1307 the mutation matrix changes at each time t. The chaotic model developed
1308 generalizes the standard model in which all the trinucleotides mutate
1309 at each time t. It determines the occurrence probabilities at time
1310 t of trinucleotides which chaotically mutate according to three substitution
1311 parameters associated with the three trinucleotide sites. Two theorems
1312 prove that this chaotic model has a probability vector at each time
1313 t and that it converges to a uniform probability vector identical
1314 to that of the standard model. Furthermore, four applications of
1315 this chaotic model (with a uniform random strategy for the 64 trinucleotides
1316 and with a particular strategy for the three stop codons) allow an
1317 evolutionary study of the three circular codes identified in both
1318 eukaryotic and prokaryotic genes. A circular code is a particular
1319 set of trinucleotides whose main property is the retrieval of the
1320 frames in genes locally, i.e. anywhere in genes and particularly
1321 without start codons, and automatically with a window of a few nucleotides.
1322 After a certain evolutionary time and with particular values for
1323 the three substitution parameters, the chaotic models retrieve the
1324 main statistical properties of the three circular codes observed
1325 in genes. These applications also allow an evolutionary comparison
1326 between the standard and chaotic models.},
1327 doi = {10.1016/j.jtbi.2008.07.028},
1328 institution = {LIFC-EA 4157, Université de Franche-Comté, IUT de Belfort, BP 527,
1329 90016 Belfort Cedex, France. jacques.bahi@univ-fcomte.fr},
1330 keywords = {Animals; Computer Simulation; DNA, Circular, genetics; Evolution,
1331 Molecular; Genetic Code; Models, Genetic; Mutation; Nonlinear Dynamics;
1332 Stochastic Processes; Time},
1334 medline-pst = {ppublish},
1336 pii = {S0022-5193(08)00395-0},
1338 timestamp = {2011.05.05},
1339 url = {http://dx.doi.org/10.1016/j.jtbi.2008.07.028}
1342 @ARTICLE{Bahi2008bis,
1343 author = {Bahi, J. M. and Michel, C. J.},
1344 title = {A stochastic model of gene evolution with chaotic mutations},
1345 journal = {Journal of Theoretical Biology},
1350 timestamp = {2009.01.10}
1354 author = {Jacques M Bahi and Christian J Michel},
1355 title = {A stochastic gene evolution model with time dependent mutations.},
1356 journal = {Bull Math Biol},
1362 abstract = {We develop here a new class of gene evolution models in which the
1363 nucleotide mutations are time dependent. These models allow to study
1364 nonlinear gene evolution by accelerating or decelerating the mutation
1365 rates at different evolutionary times. They generalize the previous
1366 ones which are based on constant mutation rates. The stochastic model
1367 developed in this class determines at some time t the occurrence
1368 probabilities of trinucleotides mutating according to 3 time dependent
1369 substitution parameters associated with the 3 trinucleotide sites.
1370 Therefore, it allows to simulate the evolution of the circular code
1371 recently observed in genes. By varying the class of function for
1372 the substitution parameters, 1 among 12 models retrieves after mutation
1373 the statistical properties of the observed circular code in the 3
1374 frames of actual genes. In this model, the mutation rate in the 3rd
1375 trinucleotide site increases during gene evolution while the mutation
1376 rates in the 1st and 2nd sites decrease. This property agrees with
1377 the actual degeneracy of the genetic code. This approach can easily
1378 be generalized to study evolution of motifs of various lengths, e.g.,
1379 dicodons, etc., with time dependent mutations.},
1380 doi = {10.1016/j.bulm.2003.10.004},
1381 institution = {LIFC - FRE CNRS 2661, IUT de Belfort, Université de Franche-Comté,
1382 BP 527, 90016 Belfort Cédex, France. bahi@iut-bm.univ-fcomte.fr},
1383 keywords = {Codon, genetics; Evolution, Molecular; Genes, genetics; Genetic Code,
1384 genetics; Models, Genetic; Mutation; Stochastic Processes},
1386 medline-pst = {ppublish},
1388 pii = {S0092824003001174},
1390 timestamp = {2011.05.05},
1391 url = {http://dx.doi.org/10.1016/j.bulm.2003.10.004}
1395 author = {J. Banks and J. Brooks and G. Cairns and P. Stacey},
1396 title = {On Devaney's Definition of Chaos},
1397 journal = {Amer. Math. Monthly},
1403 timestamp = {27/01/2008}
1407 author = {E. Barker and A. Roginsky},
1408 title = {DRAFT NIST Special Publication 800-131 Recommendation for the Transitioning
1409 of Cryptographic Algorithms and Key Sizes},
1411 owner = {christophe},
1412 timestamp = {2010.08.18}
1416 author = {Mauro Barni and Franco Bartolini and Teddy Furon},
1417 title = {A general framework for robust watermarking security},
1418 journal = {Signal Processing},
1421 pages = {2069-2084},
1423 note = {Special issue on Security of Data Hiding Technologies, invited paper},
1424 bibsource = {DBLP, http://dblp.uni-trier.de},
1425 ee = {http://dx.doi.org/10.1016/S0165-1684(03)00168-3},
1427 timestamp = {2009.06.30}
1431 author = {Baudet, G\'{e}rard M.},
1432 title = {Asynchronous Iterative Methods for Multiprocessors},
1438 address = {New York, NY, USA},
1439 doi = {http://doi.acm.org/10.1145/322063.322067},
1445 author = {Didier El Baz},
1446 title = {Contribution à l'algorithmique parallèle. Le concept d'asynchronisme
1447 : étude théorique, mise en œuvre, et application},
1448 school = {Institut national polytechnique de Toulouse},
1450 type = {Habilitation à diriger des recherches},
1451 owner = {christophe},
1452 timestamp = {2010.08.24}
1456 author = {Benoit, Anne and Hakem, Mourad and Robert, Yves},
1457 title = {Contention awareness and fault-tolerant scheduling for precedence
1458 constrained tasks in heterogeneous systems},
1459 journal = {Parallel Computing},
1465 doi = {10.1016/j.parco.2008.11.001},
1468 url = {http://dx.doi.org/10.1016/j.parco.2008.11.001}
1471 @INPROCEEDINGS{bhr08b:bl,
1472 author = {Benoit, Anne and Hakem, Mourad and Robert, Yves},
1473 title = {Fault tolerant scheduling of precedence task graphs on heterogeneous
1475 booktitle = {IPDPS'08},
1478 publisher = {IEEE Computer Society Press},
1484 @INPROCEEDINGS{Berger98,
1485 author = {Berger, Bonnie and Leighton, Tom},
1486 title = {Protein folding in the hydrophobic-hydrophilic (HP) is NP-complete},
1487 booktitle = {Proceedings of the second annual international conference on Computational
1490 series = {RECOMB '98},
1492 address = {New York, NY, USA},
1495 isbn = {0-89791-976-9},
1496 location = {New York, New York, United States},
1501 title = {Parallel and distributed computation: numerical methods},
1502 publisher = {Prentice-Hall, Inc.},
1504 author = {Bertsekas, Dimitri P. and Tsitsiklis, John N.},
1505 address = {Upper Saddle River, NJ, USA},
1506 isbn = {0-13-648700-9}
1509 @MISC{Bertsekas88paralleland,
1510 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
1511 title = {Parallel and distributed iterative algorithms: a selective survey},
1516 author = {F. Blanchard and E. Glasner and S. Kolyada and A.Maass},
1517 title = {On Li-Yorke pairs},
1521 timestamp = {2008.01.02}
1525 author = {F. Blanchard and B. Host and S. Ruette},
1526 title = {Asymptotic pairs in positive-entropy systems},
1528 optannote = {to appear in Ergod. Th. Dynam. Sys.},
1531 timestamp = {2008.01.02}
1535 author = {Dan Boneh and Matt Franklin},
1536 title = {Identity-Based Encryption from the {Weil} Pairing},
1537 journal = {SIAM J. of Computing},
1542 note = {Extended abstract in Crypto'01}
1545 @INCOLLECTION{boneh,
1546 author = {Boneh, Dan and Goh, Eu-Jin and Nissim, Kobbi},
1547 title = {Evaluating 2-DNF Formulas on Ciphertexts},
1550 abstract = {Let ψ be a 2-DNF formula on boolean variables x 1,..., x n ∈ {0,1}.
1551 We present a homomorphic public key encryption scheme that allows
1552 the public evaluation of ψ given an encryption of the variables x
1553 1,..., x n. In other words, given the encryption of the bits x 1,...,
1554 x n, anyone can create the encryption of ψ( x 1,..., x n). More generally,
1555 we can evaluate quadratic multi-variate polynomials on ciphertexts
1556 provided the resulting value falls within a small set. We present
1557 a number of applications of the system: 1 In a database of size n,
1558 the total communication in the basic step of the Kushilevitz-Ostrovsky
1559 PIR protocol is reduced from to . 2 An efficient election system
1560 based on homomorphic encryption where voters do not need to include
1561 non-interactive zero knowledge proofs that their ballots are valid.
1562 The election system is proved secure without random oracles but still
1563 efficient. 3 A protocol for universally verifiable computation.},
1564 citeulike-article-id = {2719460},
1565 citeulike-linkout-0 = {http://www.springerlink.com/content/wtt5caxkr94laxkg},
1566 journal = {Theory of Cryptography},
1567 keywords = {homomorphic, pairings},
1568 posted-at = {2008-04-25 21:53:15},
1570 url = {http://www.springerlink.com/content/wtt5caxkr94laxkg}
1574 author = {Bonneau, Richard and Baker, David},
1575 title = {AB INITIO PROTEIN STRUCTURE PREDICTION: Progress and Prospects},
1576 journal = {Annual Review of Biophysics and Biomolecular Structure},
1581 doi = {10.1146/annurev.biophys.30.1.173}
1585 author = {R. Bowen},
1586 title = {Entropy for group endomorphisms and homogeneous spaces},
1587 journal = {Trans. Amer. Math. Soc.},
1592 timestamp = {15/02/2008}
1596 author = {R. Bowen},
1597 title = {Periodic points and measures for Axiom A diffeomorphisms},
1598 journal = {Trans. Amer. Math. Soc.},
1603 timestamp = {15/02/2008}
1606 @ARTICLE{Braxenthaler97,
1607 author = {Michael Braxenthaler and R. Ron Unger and Ditza Auerbach and John
1609 title = {Chaos in protein dynamics},
1610 journal = {Proteins-structure Function and Bioinformatics},
1614 doi = {10.1002/(SICI)1097-0134(199712)29:4<417::AID-PROT2>3.3.CO;2-O},
1618 @INPROCEEDINGS{Brumley03remotetiming,
1619 author = {David Brumley and Dan Boneh},
1620 title = {Remote Timing Attacks are Practical},
1621 booktitle = {Proceedings of the 12th USENIX Security Symposium},
1626 @ARTICLE{Bohm1991375,
1627 author = {Gerald Böhm},
1628 title = {Protein folding and deterministic chaos: Limits of protein folding
1629 simulations and calculations},
1630 journal = {Chaos, Solitons \& Fractals},
1633 pages = {375 - 382},
1635 doi = {DOI: 10.1016/0960-0779(91)90028-8},
1637 url = {http://www.sciencedirect.com/science/article/B6TJ4-46CBXVT-1X/2/370489c218e4c2732cd9b620ef50c696}
1640 @INCOLLECTION{Cachin2004,
1641 author = {Cachin, Christian},
1642 title = {An Information-Theoretic Model for Steganography},
1643 booktitle = {Information Hiding},
1644 publisher = {Springer Berlin / Heidelberg},
1647 series = {Lecture Notes in Computer Science},
1649 affiliation = {MIT Laboratory for Computer Science 545 Technology Square Cambridge
1654 author = {H. Cam and S. Ozdemir and P. Nair and D. Muthuavinashinappan and
1656 title = {ESPDA: Energy-efficient secure pattern based data aggregation for
1657 wireless sensor networks.},
1658 journal = {Computer Communication journal (29)},
1663 @ARTICLE{CarletCZ98,
1664 author = {Claude Carlet and Pascale Charpin and Victor Zinoviev},
1665 title = {Codes, Bent Functions and Permutations Suitable For DES-like Cryptosystems},
1666 journal = {Des. Codes Cryptography},
1671 bibsource = {DBLP, http://dblp.uni-trier.de}
1674 @INPROCEEDINGS{Castelluccia05efficientaggregation,
1675 author = {Claude Castelluccia},
1676 title = {Efficient aggregation of encrypted data in wireless sensor networks},
1677 booktitle = {MobiQuitous},
1680 publisher = {IEEE Computer Society}
1684 author = {Cayre, F. and Bas, P.},
1685 title = {Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding},
1686 journal = {IEEE Transactions on Information Forensics and Security},
1691 doi = {10.1109/TIFS.2007.916006},
1693 keywords = {cryptography, random sequences, spread spectrum communication, telecommunication
1694 security, watermarking, Kerckhoffs-based embedding security classes,
1695 WOA Data Hiding, pseudorandom sequences, spread-spectrum techniques,
1696 steganography security, watermark-only-attack, watermarking, Security,
1697 spread-spectrum (SS) watermarking},
1699 timestamp = {2009.06.29}
1703 author = {Cayre, F. and Fontaine, C. and Furon, T.},
1704 title = {Watermarking security: theory and practice},
1705 journal = {IEEE Transactions on Signal Processing},
1708 pages = {3976--3987},
1710 doi = {10.1109/TSP.2005.855418},
1712 keywords = {blind source separation, cryptography, watermarking, Fisher information
1713 matrix, blind source separation, cryptanalysis, information theory,
1714 spread spectrum techniques, substitutive scheme, watermarking security,
1715 Blind source separation, Fisher information matrix, equivocation,
1716 security, watermarking},
1718 timestamp = {2009.06.29}
1721 @ARTICLE{Chajakis91,
1722 author = {Chajakis, Emmanuel D. and Zenios, Stavros A.},
1723 title = {Synchronous and asynchronous implementations of relaxation algorithms
1724 for nonlinear network optimization},
1725 journal = {Parallel Comput.},
1730 address = {Amsterdam, The Netherlands, The Netherlands},
1731 doi = {http://dx.doi.org/10.1016/S0167-8191(05)80072-9},
1733 publisher = {Elsevier Science Publishers B. V.}
1737 author = {Chan, Haowen and Perrig, Adrian and Przydatek, Bartosz and Song,
1739 title = {SIA: Secure information aggregation in sensor networks},
1740 journal = {J. Comput. Secur.},
1745 address = {Amsterdam, The Netherlands, The Netherlands},
1747 publisher = {IOS Press}
1750 @ARTICLE{Chandramouli06,
1751 author = {R. Chandramouli and S. Bapatla and K.P. Subbalakshmi},
1752 title = {Battery power-aware encryption},
1753 journal = {ACM transactions on information and system security},
1756 owner = {christophe},
1757 timestamp = {2010.07.31}
1761 author = {Pascale Charpin},
1762 title = {A description of some extended cyclic codes with application to Reed-Solomon
1764 journal = {Discrete Mathematics},
1769 bibsource = {DBLP, http://dblp.uni-trier.de},
1770 ee = {http://dx.doi.org/10.1016/0012-365X(85)90019-6}
1774 author = {D. Chazan and W. Miranker},
1775 title = {Chaotic relaxation},
1776 journal = {Linear algebra and its applications},
1780 timestamp = {2008.05.22}
1784 author = {Cheon, Jung Hee and Kim, Woo-Hwan and Nam, Hyun Soo},
1785 title = {Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy
1786 homomorphism scheme},
1787 journal = {Inf. Process. Lett.},
1792 address = {Amsterdam, The Netherlands, The Netherlands},
1793 doi = {http://dx.doi.org/10.1016/j.ipl.2005.09.016},
1795 publisher = {Elsevier North-Holland, Inc.}
1798 @MISC{Cheon03acryptanalysis,
1799 author = {Jung Hee Cheon and Hyun Soo Nam},
1800 title = {A Cryptanalysis of the Original Domingo-Ferrer's Algebraic Privacy
1806 author = {R.C.C. Cheung and N.J. Telle and W. Luk and P.Y.K. Cheung},
1807 title = {Secure encrypted-data aggregation for wireless sensor networks},
1808 journal = {IEEE Trans. on Very Large Scale Integration Systems},
1811 pages = {1048-1059},
1815 @ARTICLE{Chivian2005,
1816 author = {Chivian, Dylan and Kim, David E. and Malmström, Lars and Schonbrun,
1817 Jack and Rohl, Carol A. and Baker, David},
1818 title = {Prediction of CASP6 structures using automated robetta protocols},
1819 journal = {Proteins},
1825 keywords = {Rosetta, fragment assembly, de novo modeling, homology modeling, parametric
1826 alignment ensemble},
1827 owner = {christophe},
1828 publisher = {Wiley Subscription Services, Inc., A Wiley Company},
1829 timestamp = {2011.01.22},
1830 url = {http://dx.doi.org/10.1002/prot.20733}
1834 author = {Congxu, Zhu and Xuefeng, Liao and Zhihua, Li},
1835 title = {Chaos-based multipurpose image watermarking algorithm},
1836 journal = {Wuhan University Journal of Natural Sciences},
1839 pages = {1675-1678},
1840 note = {10.1007/BF02831848},
1841 abstract = {To achieve the goal of image content authentication and copyright
1842 protection simultaneously, this paper presents a novel image dual
1843 watermarking method based on chaotic map. Firstly, the host image
1844 was split into many nonoverlapping small blocks, and the block-wise
1845 discrete cosine transform (DCT) is computed. Secondly, the robust
1846 watermarks, shuffled by the chaotic sequences, are embedded in the
1847 DC coefficients of blocks to achieve the goal of copyright protection.
1848 The semi-fragile watermarks, generated by chaotic map, are embedded
1849 in the AC coefficients of blocks to obtain the aim of image authentication.
1850 Both of them can be extracted without the original image. Simulation
1851 results demonstrate the effectiveness of our algorithm in terms of
1852 robustness and fragility.},
1853 affiliation = {Central South University School of Information Science and Engineering
1854 410083 Changsha, Hunan China},
1857 keyword = {Mathematics, general},
1858 publisher = {Wuhan University, co-published with Springer},
1859 url = {http://dx.doi.org/10.1007/BF02831848}
1862 @ARTICLE{Conley1978,
1863 author = {C. Conley},
1864 title = {Isolated invariant sets and the Morse index},
1865 journal = {CBMS Regional Conference. AMS.},
1869 timestamp = {2008.01.02}
1873 author = {Philippe Cornu and André Smolarz},
1874 title = {Image characterization by texture},
1875 journal = {Traitement du signal},
1879 file = {:/home/guyeux/Documents/Bibliotheque/These/Watermarking/Caractérisation d'images par textures associées.pdf:PDF},
1881 timestamp = {2008.05.12}
1884 @INPROCEEDINGS{Cox99,
1885 author = {Ingemar Cox and Matt L. Miller and Andrew L. Mckellips},
1886 title = {Watermarking as Communications With Side Information},
1887 booktitle = {Proceedings of the IEEE},
1889 pages = {1127--1141},
1890 owner = {christophe},
1891 timestamp = {2010.03.06}
1894 @ARTICLE{Cox97securespread,
1895 author = {Ingemar J. Cox and Senior Member and Joe Kilian and F. Thomson Leighton
1897 title = {Secure spread spectrum watermarking for multimedia},
1898 journal = {IEEE Transactions on Image Processing},
1901 pages = {1673--1687}
1905 author = {Christopher Cramer and Erol Gelenbe and Hakan Bakircioglu},
1906 title = {Video Compression with Random Neural Networks},
1907 journal = {Neural Networks for Identification, Control, and Robotics, International
1912 address = {Los Alamitos, CA, USA},
1913 isbn = {0-8186-7456-3},
1914 publisher = {IEEE Computer Society}
1917 @INPROCEEDINGS{Crescenzi98,
1918 author = {Crescenzi, Pierluigi and Goldman, Deborah and Papadimitriou, Christos
1919 and Piccolboni, Antonio and Yannakakis, Mihalis},
1920 title = {On the complexity of protein folding (extended abstract)},
1921 booktitle = {Proceedings of the thirtieth annual ACM symposium on Theory of computing},
1923 series = {STOC '98},
1925 address = {New York, NY, USA},
1928 isbn = {0-89791-962-9},
1929 location = {Dallas, Texas, United States},
1934 author = {Zhao Dawei and Chen Guanrong and Liu Wenbo},
1935 title = {A chaos-based robust wavelet-domain watermarking algorithm},
1936 journal = {Chaos, Solitons and Fractals},
1941 timestamp = {2008.10.07}
1945 author = {Anthony Desnos and Robert Erra and Eric Filiol},
1946 title = {Processor-Dependent Malware... and codes},
1948 comment = {arXiv:1011.1638},
1949 eprint = {arXiv:1011.1638}
1953 title = {An Introduction to Chaotic Dynamical Systems},
1954 publisher = {Addison-Wesley},
1956 author = {Devaney, Robert L.},
1957 address = {Redwood City, CA},
1962 author = {Whitfield Diffie and Martin E. Hellman},
1963 title = {New Directions in Cryptography},
1964 journal = {IEEE Transactions on Information Theory},
1969 date = {November 1976},
1971 timestamp = {2009.06.30},
1972 url = {citeseer.ist.psu.edu/diffie76new.html}
1975 @INCOLLECTION{Dijk10,
1976 author = {van Dijk, Marten and Gentry, Craig and Halevi, Shai and Vaikuntanathan,
1978 title = {Fully Homomorphic Encryption over the Integers},
1979 booktitle = {Advances in Cryptology – EUROCRYPT 2010},
1980 publisher = {Springer Berlin / Heidelberg},
1982 editor = {Gilbert, Henri},
1984 series = {Lecture Notes in Computer Science},
1986 abstract = {We construct a simple fully homomorphic encryption scheme, using only
1987 elementary modular arithmetic. We use Gentry’s technique to construct
1988 a fully homomorphic scheme from a bootstrappable somewhat homomorphic
1989 scheme. However, instead of using ideal lattices over a polynomial
1990 ring, our bootstrappable encryption scheme merely uses addition and
1991 multiplication over the integers. The main appeal of our scheme is
1992 the conceptual simplicity. We reduce the security of our scheme to
1993 finding an approximate integer gcd – i.e., given a list of integers
1994 that are near-multiples of a hidden integer, output that hidden integer.
1995 We investigate the hardness of this task, building on earlier work
1996 of Howgrave-Graham.},
1997 affiliation = {MIT CSAIL}
2001 author = {Dill, KA},
2002 title = {Theory for the folding and stability of globular proteins.},
2003 journal = {Biochemistry},
2009 abstract = {Using lattice statistical mechanics, we develop theory to account
2010 for the folding of a heteropolymer molecule such as a protein to
2011 the globular and soluble state. Folding is assumed to be driven by
2012 the association of solvophobic monomers to avoid solvent and opposed
2013 by the chain configurational entropy. Theory predicts a phase transition
2014 as a function of temperature or solvent character. Molecules that
2015 are too short or too long or that have too few solvophobic residues
2016 are predicted not to fold. Globular molecules should have a largely
2017 solvophobic core, but there is an entropic tendency for some residues
2018 to be "out of place", particularly in small molecules. For long chains,
2019 molecules comprised of globular domains are predicted to be thermodynamically
2020 more stable than spherical molecules. The number of accessible conformations
2021 in the globular state is calculated to be an exceedingly small fraction
2022 of the number available to the random coil. Previous estimates of
2023 this number, which have motivated kinetic theories of folding, err
2024 by many tens of orders of magnitude.},
2025 comment = {Research Support, Non-U.S. Gov't,Research Support, U.S. Gov't, P.H.S.,},
2026 keywords = {Mathematics, Models, Chemical, Polymers, Protein Conformation},
2027 owner = {christophe},
2028 timestamp = {2011.01.22},
2029 url = {http://ukpmc.ac.uk/abstract/MED/3986190}
2033 author = {Dill, KA and Bromberg, S and Yue, K and Fiebig, KM and Yee, DP and
2034 Thomas, PD and Chan, HS},
2035 title = {Principles of protein folding--a perspective from simple exact models.},
2036 journal = {Protein Sci},
2039 pages = {561-602--},
2042 abstract = {General principles of protein structure, stability, and folding kinetics
2043 have recently been explored in computer simulations of simple exact
2044 lattice models. These models represent protein chains at a rudimentary
2045 level, but they involve few parameters, approximations, or implicit
2046 biases, and they allow complete explorations of conformational and
2047 sequence spaces. Such simulations have resulted in testable predictions
2048 that are sometimes unanticipated: The folding code is mainly binary
2049 and delocalized throughout the amino acid sequence. The secondary
2050 and tertiary structures of a protein are specified mainly by the
2051 sequence of polar and nonpolar monomers. More specific interactions
2052 may refine the structure, rather than dominate the folding code.
2053 Simple exact models can account for the properties that characterize
2054 protein folding: two-state cooperativity, secondary and tertiary
2055 structures, and multistage folding kinetics--fast hydrophobic collapse
2056 followed by slower annealing. These studies suggest the possibility
2057 of creating "foldable" chain molecules other than proteins. The encoding
2058 of a unique compact chain conformation may not require amino acids;
2059 it may require only the ability to synthesize specific monomer sequences
2060 in which at least one monomer type is solvent-averse.},
2061 address = {Department of Pharmaceutical Chemistry, University of California,
2062 San Francisco 94143-1204, USA.},
2063 comment = {Review,Research Support, Non-U.S. Gov't,Research Support, U.S. Gov't,
2064 Non-P.H.S.,Research Support, U.S. Gov't, P.H.S.,},
2065 keywords = {Amino Acid Sequence, Biological Evolution, Hydrogen Bonding, Models,
2066 Molecular, Molecular Sequence Data, Mutation, Protein Conformation,
2067 Protein Denaturation, Protein Folding, Temperature, Thermodynamics},
2068 owner = {christophe},
2069 timestamp = {2011.01.22},
2070 url = {http://ukpmc.ac.uk/abstract/MED/7613459}
2073 @INPROCEEDINGS{Dobbertin96,
2074 author = {Dobbertin, Hans},
2075 title = {Cryptanalysis of MD4},
2076 booktitle = {Proceedings of the Third International Workshop on Fast Software
2080 address = {London, UK},
2081 publisher = {Springer-Verlag},
2082 isbn = {3-540-60865-6}
2085 @INPROCEEDINGS{DomingoFerrer2002,
2086 author = {Domingo-Ferrer, Josep},
2087 title = {A Provably Secure Additive and Multiplicative Privacy Homomorphism},
2088 booktitle = {ISC '02: Proceedings of the 5th International Conference on Information
2092 address = {London, UK},
2093 publisher = {Springer-Verlag},
2094 isbn = {3-540-44270-7}
2097 @ARTICLE{Dubchak1995,
2098 author = {I. Dubchak and I. Muchnik and S. R. Holbrook and S. H. Kim},
2099 title = {Prediction of protein folding class using global description of amino
2101 journal = {Proc Natl Acad Sci U S A},
2104 pages = {8700--8704},
2107 __markedentry = {[guyeux]},
2108 abstract = {We present a method for predicting protein folding class based on
2109 global protein chain description and a voting process. Selection
2110 of the best descriptors was achieved by a computer-simulated neural
2111 network trained on a data base consisting of 83 folding classes.
2112 Protein-chain descriptors include overall composition, transition,
2113 and distribution of amino acid attributes, such as relative hydrophobicity,
2114 predicted secondary structure, and predicted solvent exposure. Cross-validation
2115 testing was performed on 15 of the largest classes. The test shows
2116 that proteins were assigned to the correct class (correct positive
2117 prediction) with an average accuracy of 71.7\%, whereas the inverse
2118 prediction of proteins as not belonging to a particular class (correct
2119 negative prediction) was 90-95\% accurate. When tested on 254 structures
2120 used in this study, the top two predictions contained the correct
2121 class in 91\% of the cases.},
2122 institution = {Department of Chemistry, University of California, Berkeley 94720,
2124 keywords = {Amino Acid Sequence; Amino Acids, chemistry; Computer Simulation;
2125 Databases, Factual; Models, Chemical; Neural Networks (Computer);
2126 Protein Folding; Protein Structure, Secondary; Proteins, chemistry/classification;
2127 Reproducibility of Results; Solvents},
2129 medline-pst = {ppublish},
2132 timestamp = {2011.07.18}
2136 title = {Real analysis and probability},
2137 publisher = {Cambridge University Press},
2138 author = {Richard M. Dudley},
2141 timestamp = {2008.01.02}
2145 author = {El Tarazi, Mouhamed Nabih},
2146 title = {Algorithmes mixtes asynchrones. Etude de convergence monotone},
2147 journal = {Numerische Mathematik},
2151 note = {10.1007/BF01405568},
2152 affiliation = {Department of Mathematics, Faculty of Science Kuwait University P.O.
2156 keyword = {Mathematics and Statistics},
2157 publisher = {Springer Berlin / Heidelberg},
2158 url = {http://dx.doi.org/10.1007/BF01405568}
2162 author = {El Tarazi, Mouhamed Nabih},
2163 title = {Some convergence results for asynchronous algorithms},
2164 journal = {Numerische Mathematik},
2168 note = {10.1007/BF01407866},
2169 affiliation = {Department of Mathematics, Faculty of Science Kuwait University P.O.
2170 Box 5969 Kuwait Kuwait},
2173 keyword = {Mathematics and Statistics},
2174 publisher = {Springer Berlin / Heidelberg},
2175 url = {http://dx.doi.org/10.1007/BF01407866}
2179 author = {Peng Fei and Qiu Shui-Sheng and Long Min},
2180 title = {A secure digital signature algorithm based on elliptic curve and
2182 journal = {Circuits Systems Signal Processing},
2184 volume = {24, No. 5},
2187 timestamp = {2009.01.16}
2190 @BOOK{Feigenbaum1908,
2191 title = {Universal behavior in nonlinear systems},
2192 publisher = {Los Alamos Science},
2194 author = {Feigenbaum},
2196 timestamp = {2008.01.02}
2199 @ARTICLE{Felsenstein1980,
2200 author = {J. Felsenstein},
2201 title = {A view of population genetics.},
2202 journal = {Science},
2208 doi = {10.1126/science.208.4449.1253},
2210 medline-pst = {ppublish},
2212 pii = {208/4449/1253},
2214 timestamp = {2011.05.05},
2215 url = {http://dx.doi.org/10.1126/science.208.4449.1253}
2219 title = {Les virus informatiques : techniques virales et antivirales avancées},
2221 editor = {Springer},
2222 author = {Eric Filiol},
2223 owner = {christophe},
2224 timestamp = {2010.10.13}
2227 @INPROCEEDINGS{FiliolBlackHat,
2228 author = {Eric Filiol},
2229 title = {Passive and Active Leakage of Secret Data from Non Networked Computer},
2230 booktitle = {Black Hat},
2232 owner = {christophe},
2233 timestamp = {2010.11.28}
2236 @PHDTHESIS{Formenti2003,
2237 author = {Enrico Formenti},
2238 title = {De l'algorithmique du chaos dans les systèmes dynamiques discrets},
2239 school = {Université de Provence},
2242 timestamp = {2008.01.02}
2245 @PHDTHESIS{Formenti1998,
2246 author = {Enrico Formenti},
2247 title = {Automates cellulaires et chaos : de la vision topologique à la vision
2249 school = {\'Ecole Normale Supérieure de Lyon},
2251 optmonth = {Octobre},
2253 timestamp = {2008.01.02}
2257 author = {Gabriel Frey and Christian J Michel},
2258 title = {Identification of circular codes in bacterial genomes and their use
2259 in a factorization method for retrieving the reading frames of genes.},
2260 journal = {Comput Biol Chem},
2266 abstract = {We developed a statistical method that allows each trinucleotide to
2267 be associated with a unique frame among the three possible ones in
2268 a (protein coding) gene. An extensive gene study in 175 complete
2269 bacterial genomes based on this statistical approach resulted in
2270 identification of 72 new circular codes. Finding a circular code
2271 enables an immediate retrieval of the reading frame locally anywhere
2272 in a gene. No knowledge of location of the start codon is required
2273 and a short window of only a few nucleotides is sufficient for automatic
2274 retrieval. We have therefore developed a factorization method (that
2275 explores previously found circular codes) for retrieving the reading
2276 frames of bacterial genes. Its principle is new and easy to understand.
2277 Neither complex treatment nor specific information on the nucleotide
2278 sequences is necessary. Moreover, the method can be used for short
2279 regions in nucleotide sequences (less than 25 nucleotides in protein
2280 coding genes). Selected additional properties of circular codes and
2281 their possible biological consequences are also discussed.},
2282 doi = {10.1016/j.compbiolchem.2005.11.001},
2283 institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université
2284 Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant,
2285 67400 Illkirch, France. frey@dpt-info.u-strasbg.fr},
2286 keywords = {Base Sequence; Computational Biology; Genes, Bacterial; Genome, Bacterial;
2287 Genomics, statistics /&/ numerical data; Models, Genetic; Models,
2288 Statistical; Reading Frames},
2290 medline-pst = {ppublish},
2292 pii = {S1476-9271(05)00111-8},
2294 timestamp = {2011.05.05},
2295 url = {http://dx.doi.org/10.1016/j.compbiolchem.2005.11.001}
2299 author = {Gabriel Frey and Christian J Michel},
2300 title = {An analytical model of gene evolution with six mutation parameters:
2301 an application to archaeal circular codes.},
2302 journal = {Comput Biol Chem},
2308 abstract = {We develop here an analytical evolutionary model based on a trinucleotide
2309 mutation matrix 64 x 64 with six substitution parameters associated
2310 with the transitions and transversions in the three trinucleotide
2311 sites. It generalizes the previous models based on the nucleotide
2312 mutation matrices 4 x 4 and the trinucleotide mutation matrix 64
2313 x 64 with three parameters. It determines at some time t the exact
2314 occurrence probabilities of trinucleotides mutating randomly according
2315 to six substitution parameters. An application of this model allows
2316 an evolutionary study of the common circular code COM and the 15
2317 archaeal circular codes X which have been recently identified in
2318 several archaeal genomes. The main property of a circular code is
2319 the retrieval of the reading frames in genes, both locally, i.e.
2320 anywhere in genes and in particular without a start codon, and automatically
2321 with a window of a few nucleotides. In genes, the circular code is
2322 superimposed on the traditional genetic one. Very unexpectedly, the
2323 evolutionary model demonstrates that the archaeal circular codes
2324 can derive from the common circular code subjected to random substitutions
2325 with particular values for six substitutions parameters. It has a
2326 strong correlation with the statistical observations of three archaeal
2327 codes in actual genes. Furthermore, the properties of these substitution
2328 rates allow proposal of an evolutionary classification of the 15
2329 archaeal codes into three main classes according to this model. In
2330 almost all the cases, they agree with the actual degeneracy of the
2331 genetic code with substitutions more frequent in the third trinucleotide
2332 site and with transitions more frequent that transversions in any
2333 trinucleotide site.},
2334 doi = {10.1016/j.compbiolchem.2005.09.001},
2335 institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université
2336 Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant,
2337 67400 Illkirch, France. frey@dpt-info.u-strasbg.fr},
2338 keywords = {Archaea, genetics; DNA, Circular; Evolution, Molecular; Genetic Code;
2339 Genome, Archaeal; Models, Genetic; Mutation; Trinucleotide Repeats},
2341 medline-pst = {ppublish},
2343 pii = {S1476-9271(05)00083-6},
2345 timestamp = {2011.05.05},
2346 url = {http://dx.doi.org/10.1016/j.compbiolchem.2005.09.001}
2349 @INPROCEEDINGS{fgb11:ip,
2350 author = {Friot, Nicolas and Guyeux, Christophe and Bahi, Jacques},
2351 title = {Chaotic Iterations for Steganography - Stego-security and chaos-security},
2352 booktitle = {SECRYPT'2011, Int. Conf. on Security and Cryptography},
2355 address = {Sevilla, Spain},
2358 classement = {ACTI},
2359 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2365 author = {Alain Frisch},
2366 title = {Entropie topologique et définition du chaos},
2368 note = {Rapport de tipe},
2369 file = {Tipe_Entropie Topologique et Definition du Chaos (Alain Frisch).ps:Chaos/Tipe_Entropie Topologique et Definition du Chaos (Alain Frisch).ps:PDF},
2370 keywords = {Chaos, Entropie Topologique, Tipe},
2372 timestamp = {2008.01.02},
2373 url = {http://alain.frisch.fr/math.html}
2377 author = {Alain Frisch},
2378 title = {Entropie topologique et définition du chaos},
2380 note = {[En ligne; Page disponible le 12-août-2010]},
2381 url = {\url{http://alain.frisch.fr/math.html}}
2384 @ARTICLE{Frommer97asynchronousweighted,
2385 author = {Andreas Frommer and Hartmut Schwandt and Daniel and Daniel B. Szyld},
2386 title = {Asynchronous Weighted Additive Schwarz Methods},
2387 journal = {Electronic Transactions on Numerical Analysis},
2393 @MISC{Frommer94asynchronoustwo-stage,
2394 author = {Andreas Frommer and Daniel B. Szyld},
2395 title = {Asynchronous Two-Stage Iterative Methods},
2400 title = {Introduction to Chaos and Coherence},
2401 publisher = {IOP Publishing},
2403 author = {J. Frøyland},
2405 timestamp = {2008.01.02}
2409 author = {T. Furon},
2410 title = {Security analysis},
2412 note = {European Project IST-1999-10987 CERTIMARK, Deliverable D.5.5},
2414 timestamp = {2009.06.30}
2418 author = {Furon, Teddy and Bas, Patrick},
2419 title = {Broken arrows},
2420 journal = {EURASIP J. Inf. Secur.},
2424 address = {New York, NY, United States},
2425 doi = {http://dx.doi.org/10.1155/2008/597040},
2427 owner = {christophe},
2428 publisher = {Hindawi Publishing Corp.},
2429 timestamp = {2010.03.06}
2432 @ARTICLE{P1150442004,
2433 author = {G.S.El-Taweel and H.M. Onsi and M.Samy and M.G. Darwish},
2434 title = {Secure and Non-Blind Watermarking Scheme for Color Images Based on
2436 journal = {ICGST International Journal on Graphics, Vision and Image Processing},
2442 owner = {christophe},
2443 timestamp = {2010.03.07}
2446 @INPROCEEDINGS{Gentry09,
2447 author = {Gentry, Craig},
2448 title = {Fully homomorphic encryption using ideal lattices},
2449 booktitle = {STOC '09: Proceedings of the 41st annual ACM symposium on Theory
2453 address = {New York, NY, USA},
2455 doi = {http://doi.acm.org/10.1145/1536414.1536440},
2456 isbn = {978-1-60558-506-2},
2457 location = {Bethesda, MD, USA}
2460 @INPROCEEDINGS{Girao04,
2461 author = {J. Girao and M. Schneider and D. Westhoff},
2462 title = {CDA: Concealed data aggregation in wireless sensor networks},
2463 booktitle = {Proceedings of the ACM Workshop on Wireless Security},
2465 owner = {christophe},
2466 timestamp = {2010.07.31}
2469 @CONFERENCE{Gotsman88,
2470 author = {C. Gotsman and D. Lehmann and E. Shamir},
2471 title = {Asynchronous Dynamics of Random Boolean Networks},
2472 booktitle = {San Diego '88 Neural Networks Conference},
2475 timestamp = {30/03/2008}
2478 @ARTICLE{Guckenheimer1979,
2479 author = {J. Guckenheimer},
2480 title = {Sensitive dependence to initial conditions for one-dimensional maps},
2481 journal = {Comm. Math. Phys.},
2483 optpages = {133-160},
2485 timestamp = {2008.01.02}
2489 title = {Nonlinear oscillations, dynamical systems, and bifurcations of vector
2491 publisher = {Springer Verlag},
2493 author = {J. Guckenheimer and P. Holmes},
2495 timestamp = {2008.01.02}
2498 @ARTICLE{Guo20093201,
2499 author = {Wei Guo and Xiaoming Wang and Dake He and Yang Cao},
2500 title = {Cryptanalysis on a parallel keyed hash function based on chaotic
2502 journal = {Physics Letters A},
2505 pages = {3201 - 3206},
2507 abstract = {This Letter analyzes the security of a novel parallel keyed hash function
2508 based on chaotic maps, proposed by Xiao et al. to improve the efficiency
2509 in parallel computing environment. We show how to devise forgery
2510 attacks on Xiao's scheme with differential cryptanalysis and give
2511 the experiment results of two kinds of forgery attacks firstly. Furthermore,
2512 we discuss the problem of weak keys in the scheme and demonstrate
2513 how to utilize weak keys to construct collision.},
2515 keywords = {Cryptanalysis}
2518 @PHDTHESIS{GuyeuxThese10,
2519 author = {Christophe Guyeux},
2520 title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}
2521 en s\'{e}curit\'{e} informatique},
2522 school = {Universit\'{e} de Franche-Comt\'{e}},
2524 owner = {christophe},
2525 timestamp = {2010.12.21}
2529 author = {Guyeux, Christophe and Bahi, Jacques},
2530 title = {\'Etude topologique de l'\'etalement de spectre},
2531 howpublished = {Journ\'ees Codes et St\'eganographie, \'Ecoles Militaires de Saint-Cyr,
2536 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2541 @INPROCEEDINGS{bg10:ip,
2542 author = {Guyeux, Christophe and Bahi, Jacques},
2543 title = {An improved watermarking algorithm for Internet applications},
2544 booktitle = {INTERNET'2010. The 2nd Int. Conf. on Evolving Internet},
2547 address = {Valencia, Spain},
2549 classement = {ACTI},
2550 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2555 @INPROCEEDINGS{gfb10:ip,
2556 author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques},
2557 title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},
2558 booktitle = {IIH-MSP'10, 6-th Int. Conf. on Intelligent Information Hiding and
2559 Multimedia Signal Processing},
2562 address = {Darmstadt, Germany},
2564 classement = {ACTI},
2565 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2571 author = {Christophe Guyeux and Nicolas Friot and Jacques M. Bahi},
2572 title = {A more secure information hiding scheme than spread-spectrum obtained
2574 journal = {arXiv 0032565},
2577 timestamp = {2010.04.30}
2581 title = {Guide to Elliptic Curve Cryptography},
2582 publisher = {Springer Professional Computing},
2584 editor = {Springer},
2585 author = {D. Hankerson and A. Menezes and S. Vanstone},
2586 owner = {christophe},
2587 timestamp = {2010.07.31}
2590 @ARTICLE{Hasegawa1985,
2591 author = {M. Hasegawa and H. Kishino and T. Yano},
2592 title = {Dating of the human-ape splitting by a molecular clock of mitochondrial
2594 journal = {J Mol Evol},
2599 abstract = {A new statistical method for estimating divergence dates of species
2600 from DNA sequence data by a molecular clock approach is developed.
2601 This method takes into account effectively the information contained
2602 in a set of DNA sequence data. The molecular clock of mitochondrial
2603 DNA (mtDNA) was calibrated by setting the date of divergence between
2604 primates and ungulates at the Cretaceous-Tertiary boundary (65 million
2605 years ago), when the extinction of dinosaurs occurred. A generalized
2606 least-squares method was applied in fitting a model to mtDNA sequence
2607 data, and the clock gave dates of 92.3 +/- 11.7, 13.3 +/- 1.5, 10.9
2608 +/- 1.2, 3.7 +/- 0.6, and 2.7 +/- 0.6 million years ago (where the
2609 second of each pair of numbers is the standard deviation) for the
2610 separation of mouse, gibbon, orangutan, gorilla, and chimpanzee,
2611 respectively, from the line leading to humans. Although there is
2612 some uncertainty in the clock, this dating may pose a problem for
2613 the widely believed hypothesis that the pipedal creature Australopithecus
2614 afarensis, which lived some 3.7 million years ago at Laetoli in Tanzania
2615 and at Hadar in Ethiopia, was ancestral to man and evolved after
2616 the human-ape splitting. Another likelier possibility is that mtDNA
2617 was transferred through hybridization between a proto-human and a
2618 proto-chimpanzee after the former had developed bipedalism.},
2619 keywords = {Animals; Biological Evolution; DNA, Mitochondrial, genetics; Genes;
2620 Haplorhini, genetics; Humans; Mathematics; Models, Genetic; Nucleic
2621 Acid Hybridization; Primates, genetics; Proteins, genetics; Species
2624 medline-pst = {ppublish},
2627 timestamp = {2011.05.05}
2631 title = {A First Course in Discrete Dynamical Systems},
2632 publisher = {Springer-Verlag},
2634 author = {R. Homlgren},
2637 timestamp = {2008.01.02}
2640 @INCOLLECTION{Hoque09,
2641 author = {Hoque, Md. and Chetty, Madhu and Sattar, Abdul},
2642 title = {Genetic Algorithm in Ab Initio Protein Structure Prediction Using
2643 Low Resolution Model: A Review},
2644 booktitle = {Biomedical Data and Applications},
2645 publisher = {Springer Berlin Heidelberg},
2647 editor = {Sidhu, Amandeep and Dillon, Tharam},
2649 series = {Studies in Computational Intelligence},
2651 affiliation = {IIIS, Griffith University, Nathan, QLD-4111 Australia}
2654 @CONFERENCE{Houmansadr09,
2655 author = {A. Houmansadr and N. Kiyavash and N. Borisov},
2656 title = {Rainbow: A robust and invisible non-blind watermark for network flows},
2657 booktitle = {NDSS’09: 16th Annual Network and Distributed System Security Symposium},
2659 owner = {christophe},
2660 timestamp = {2010.03.07}
2664 author = {Huang, Shih-I and Shieh, Shiuhpyng and Tygar, J.},
2665 title = {Secure encrypted-data aggregation for wireless sensor networks},
2666 journal = {Wireless Networks},
2667 abstract = {Abstract\ \ This paper proposes a secure encrypted-data
2668 aggregation scheme for wireless sensor networks. Our design for data
2669 aggregation eliminates redundant sensor readings without using encryption
2670 and maintains data secrecy and privacy during transmission. Conventional
2671 aggregation functions operate when readings are received in plaintext.
2672 If readings are encrypted, aggregation requires decryption creating
2673 extra overhead and key management issues. In contrast to conventional
2674 schemes, our proposed scheme provides security and privacy, and duplicate
2675 instances of original readings will be aggregated into a single packet.
2676 Our scheme is resilient to known-plaintext attacks, chosen-plaintext
2677 attacks, ciphertext-only attacks and man-in-the-middle attacks. Our
2678 experiments show that our proposed aggregation method significantly
2679 reduces communication overhead and can be practically implemented
2680 in on-the-shelf sensor platforms.},
2681 citeulike-article-id = {4499496},
2682 citeulike-linkout-0 = {http://dx.doi.org/10.1007/s11276-009-0177-y},
2683 citeulike-linkout-1 = {http://www.springerlink.com/content/g573138072642u63},
2684 doi = {10.1007/s11276-009-0177-y},
2685 posted-at = {2009-05-10 09:55:44},
2686 url = {http://dx.doi.org/10.1007/s11276-009-0177-y}
2690 author = {Huang, Shih-I and Shieh, Shiuhpyng and Tygar, J. D.},
2691 title = {Secure encrypted-data aggregation for wireless sensor networks},
2692 journal = {Wirel. Netw.},
2697 address = {Hingham, MA, USA},
2698 doi = {http://dx.doi.org/10.1007/s11276-009-0177-y},
2700 publisher = {Kluwer Academic Publishers}
2704 author = {W. Huang and X. Ye},
2705 title = {Homeomorphisms with the whole compacta being scrambled sets},
2706 journal = {Ergod. Th. Dynam. Systems},
2712 timestamp = {2008.01.02}
2715 @ARTICLE{Hurley1982,
2716 author = {M. Hurley},
2717 title = {Attractors, persistence and density of their bassin},
2718 journal = {Transactions of AMS},
2720 optpages = {247-271},
2723 timestamp = {2008.01.02}
2726 @INPROCEEDINGS{Islam:2009:NMA:1695134.1695181,
2727 author = {Islam, Md. Kamrul and Chetty, Madhu},
2728 title = {Novel Memetic Algorithm for Protein Structure Prediction},
2729 booktitle = {Proceedings of the 22nd Australasian Joint Conference on Advances
2730 in Artificial Intelligence},
2734 address = {Berlin, Heidelberg},
2735 publisher = {Springer-Verlag},
2737 isbn = {978-3-642-10438-1},
2738 keywords = {Guided search space, Memetic Algorithm, Modified fitness function,
2739 Pair-wise-interchange, Schema preservation, Tabu Search},
2740 location = {Melbourne, Australia},
2744 @PHDTHESIS{Jacquemard77,
2745 author = {C. Jacquemard},
2746 title = {Contribution à l'étude d'algorithmes à convergence monotone},
2747 school = {Université de Franche-Comté},
2749 owner = {christophe},
2750 timestamp = {2010.08.25}
2754 title = {{Evolution of Protein Molecules}},
2755 publisher = {Academy Press},
2757 editor = {Munro, H. N.},
2758 author = {Jukes, T. H. and Cantor, C. R.},
2759 booktitle = {Evolution of Protein Molecules},
2760 citeulike-article-id = {1673661},
2761 keywords = {compbio, fresco},
2762 posted-at = {2007-09-19 06:23:18},
2766 @INPROCEEDINGS{Kalker2001,
2767 author = {Kalker, T.},
2768 title = {Considerations on watermarking security},
2771 abstract = {In this paper we address the usually implicit assumption that digital
2772 watermarking has as its main target copyright and copy protection
2773 applications. From these target applications a great many conclusions
2774 are drawn about the required security of a watermarking system, and
2775 in fact, a considerably percentage of the watermarking literature
2776 has this very topic as its main focus of attention. In this paper
2777 we take a step back, and try to do a more careful analysis of the
2778 'watermarking-is-for-security-applications' paradigm. The intention
2779 of this paper is to discuss the meaning of the concept security in
2780 the context of watermarking, and try to show that one has to be careful
2781 in using analogies from the related field of cryptography},
2782 citeulike-article-id = {1226513},
2783 journal = {2001 IEEE Fourth Workshop on Multimedia Signal Processing},
2784 keywords = {security, wateramarking},
2786 posted-at = {2007-04-14 14:30:06},
2788 timestamp = {2009.06.30}
2791 @ARTICLE{Kerckhoffs83,
2792 author = {Kerckhoffs, Auguste},
2793 title = {La cryptographie militaire},
2794 journal = {Journal des sciences militaires},
2799 abstract = {pp. 161–191, Feb. 1883.},
2800 citeulike-article-id = {505508},
2801 keywords = {cryptography, master},
2803 posted-at = {2006-02-15 04:49:15},
2805 timestamp = {2009.06.30}
2809 author = {Kimura, Motoo},
2810 title = {A simple method for estimating evolutionary rates of base substitutions
2811 through comparative studies of nucleotide sequences},
2812 journal = {Journal of Molecular Evolution},
2816 note = {10.1007/BF01731581},
2817 affiliation = {National Institute of Genetics 411 Mishima Japan},
2820 keyword = {Biomedical and Life Sciences},
2821 publisher = {Springer New York},
2822 url = {http://dx.doi.org/10.1007/BF01731581}
2827 title = {Chaos Without Nonperiodicity},
2828 journal = {Amer. Math. Monthly},
2832 timestamp = {27/01/2008}
2835 @PHDTHESIS{Knudsen1994a,
2836 author = {C. Knudsen},
2837 title = {Aspects of noninvertible dynamics and chaos},
2838 school = {Technical University of Denmark},
2841 timestamp = {2008.01.02}
2845 author = {L. Kocarev and J. Szczepanski and J.M. Amigo and I. Tomovski},
2846 title = {Discrete Chaos - I: Theory},
2847 journal = {IEEE Trans. on Circuits Systems},
2850 pages = {1300-1309},
2851 owner = {christophe},
2852 timestamp = {2010.10.10}
2855 @INPROCEEDINGS{Kocher95cryptanalysisof,
2856 author = {Paul C. Kocher},
2857 title = {Cryptanalysis of Diffie-Hellman, RSA, DSS, and Other Systems Using
2858 Timing Attacks (Extended Abstract)},
2859 booktitle = {Advances in Cryptology, CRYPTO '95: 15th Annual International Cryptology
2863 publisher = {Springer-Verlag}
2866 @ARTICLE{Kullback1951,
2867 author = {Kullback, Solomon and Leibler, Richard A.},
2868 title = {On Information and Sufficiency},
2869 journal = {The Annals of Mathematical Statistics},
2874 citeulike-article-id = {3245942},
2875 keywords = {file-import-08-09-12},
2877 posted-at = {2008-09-12 14:30:37},
2879 timestamp = {2009.06.29}
2883 author = {Eshter Ledoux},
2884 title = {Introduction à la théorie du chaos},
2886 note = {[En ligne; Page disponible le 12-août-2010]},
2887 url = {\url{http://www.nux.be/eledoux/mem/node1.html}}
2891 title = {Analyse en dimension finie},
2892 publisher = {Masson},
2898 timestamp = {2008.01.02}
2902 author = {A.K. Lenstra and E.R. Verheul},
2903 title = {Selecting Cryptographic Key Sizes},
2904 journal = {Jour. of the International Association for Cryptologic Research},
2912 author = {Lettvin, J.Y. and Maturana, H.R. and McCulloch, W.S. and Pitts, W.H.},
2913 title = {What the Frog's Eye Tells the Frog's Brain},
2914 journal = {Proceedings of the IRE},
2919 owner = {christophe},
2920 timestamp = {2010.12.21}
2924 author = {T. Y. Li and J. A. Yorke},
2925 title = {Period three implies chaos},
2926 journal = {Amer. Math. Monthly},
2932 timestamp = {27/01/2008}
2936 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2937 title = {A novel Hash algorithm construction based on chaotic neural network},
2938 journal = {Neural Computing and Applications},
2941 affiliation = {Chongqing University College of Computer Science 400044 Chongqing
2944 keyword = {Computer Science},
2945 publisher = {Springer London}
2948 @INPROCEEDINGS{Lin09,
2949 author = {Lin, Hua-Yi and Chiang, Tzu-Chiang},
2950 title = {Cooperative secure data aggregation in sensor networks using elliptic
2951 curve based cryptosystems},
2952 booktitle = {CDVE'09: Proceedings of the 6th international conference on Cooperative
2953 design, visualization, and engineering},
2956 address = {Berlin, Heidelberg},
2957 publisher = {Springer-Verlag},
2958 isbn = {3-642-04264-3, 978-3-642-04264-5},
2959 location = {Luxembourg, Luxembourg}
2962 @INPROCEEDINGS{Liu2008,
2963 author = {Liu, An and Ning, Peng},
2964 title = {TinyECC: A Configurable Library for Elliptic Curve Cryptography in
2965 Wireless Sensor Networks},
2966 booktitle = {7th International Conference on Information Processing in Sensor
2967 Networks (IPSN 2008)},
2971 citeulike-article-id = {3041699},
2972 howpublished = {SPOTS Track},
2974 posted-at = {2008-07-25 05:25:05},
2978 @ARTICLE{Liu2007bis,
2979 author = {Shao-Hui Liu and Hong-Xun Yao and Wen Gao and Yong-Liang Liu},
2980 title = {An image fragile watermark scheme based on chaotic image pattern
2982 journal = {Applied Mathematics and Computation},
2987 timestamp = {2008.10.07}
2990 @INPROCEEDINGS{Liu07,
2991 author = {Liu, Zhen and Xi, Lifeng},
2992 title = {Image Information Hiding Encryption Using Chaotic Sequence},
2993 booktitle = {KES '07: Knowledge-Based Intelligent Information and Engineering
2994 Systems and the XVII Italian Workshop on Neural Networks on Proceedings
2995 of the 11th International Conference},
2998 address = {Berlin, Heidelberg},
2999 publisher = {Springer-Verlag},
3000 doi = {http://dx.doi.org/10.1007/978-3-540-74827-4_26},
3001 isbn = {978-3-540-74826-7},
3002 location = {Vietri sul Mare, Italy}
3006 author = {Zhen Liu and Lifeng Xi},
3007 title = {Image Information Hiding Encryption Using Chaotic Sequence},
3013 timestamp = {11/04/2008}
3016 @ARTICLE{Lubachevsky86,
3017 author = {Lubachevsky, Boris and Mitra, Debasis},
3018 title = {A chaotic asynchronous algorithm for computing the fixed point of
3019 a nonnegative matrix of unit spectral radius},
3025 address = {New York, NY, USA},
3026 doi = {http://doi.acm.org/10.1145/4904.4801},
3032 author = {{L}arger, {L}. and {D}udley, {J}.{M}.},
3033 title = { {N}onlinear dynamics {O}ptoelectronic chaos},
3034 journal = {{N}ature },
3040 abstract = {{O}ptoelectronic circuits with delayed feedback provide a convenient
3041 bench-top platform to study a wide range of nonlinear dynamic systems,
3042 from ultrastable clocks to complex chaotic devices.},
3043 affiliation = {{F}ranche-{C}omt{\'e} {\'E}lectronique {M}{\'e}canique, {T}hermique
3044 et {O}ptique - {S}ciences et {T}echnologies - {FEMTO}-{ST} - {CNRS}
3045 : {UMR}6174 - {U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {U}niversit{\'e}
3046 de {T}echnologie de {B}elfort-{M}ontbeliard - {E}cole {N}ationale
3047 {S}up{\'e}rieure de {M}{\'e}canique et des {M}icrotechniques },
3048 audience = {internationale },
3050 doi = {10.1038/465041a },
3051 hal_id = {hal-00517696},
3052 language = {{A}nglais},
3053 url = {http://hal.archives-ouvertes.fr/hal-00517696/en/}
3056 @INPROCEEDINGS{Mahoney00,
3057 author = {Mahoney, Matthew V.},
3058 title = {Fast Text Compression with Neural Networks},
3059 booktitle = {Proceedings of the Thirteenth International Florida Artificial Intelligence
3060 Research Society Conference},
3063 publisher = {AAAI Press},
3065 isbn = {1-57735-113-4},
3069 @INPROCEEDINGS{msp10:bl,
3070 author = {Makhoul, Abdallah and Saadi, Rachid and Pham, Congduc},
3071 title = {Risk Management in Intrusion Detection Applications with Wireless
3072 Video Sensor Networks},
3073 booktitle = {WCNC'10 IEEE Int. Conf.},
3076 address = {Sydney, Australia},
3085 author = {H.S. Malvar and D. Florêncio},
3086 title = {Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking},
3087 journal = {IEEE Trans. Signal Proceeding},
3091 owner = {christophe},
3092 timestamp = {2010.03.07}
3095 @ARTICLE{Marsaglia2003,
3096 author = {G. Marsaglia},
3097 title = {Xorshift RNGs},
3098 journal = {Journal of Statistical Software},
3103 timestamp = {2009.10.28}
3106 @ARTICLE{Marsaglia1996,
3107 author = {G. Marsaglia},
3108 title = {DIEHARD: a battery of tests of randomness.},
3109 journal = {http://stat.fsu.edu/~geo/diehard.html},
3112 timestamp = {2009.11.09}
3115 @ARTICLE{Simard07testu01:a,
3116 author = {Richard Simard and Université De Montréal},
3117 title = {TestU01: A C library for empirical testing of random number generators},
3118 journal = {ACM Transactions on Mathematical Software},
3123 @ARTICLE{DefiningChaos,
3124 author = {M. Martelli and M. Dang and T. Seph},
3125 title = {Defining chaos},
3126 journal = {Mathematics Magazine},
3130 owner = {christophe},
3131 timestamp = {2010.08.11}
3134 @ARTICLE{Michel2007c,
3135 author = {Christian J Michel},
3136 title = {An analytical model of gene evolution with 9 mutation parameters:
3137 an application to the amino acids coded by the common circular code.},
3138 journal = {Bull Math Biol},
3144 abstract = {We develop here an analytical evolutionary model based on a trinucleotide
3145 mutation matrix 64 x 64 with nine substitution parameters associated
3146 with the three types of substitutions in the three trinucleotide
3147 sites. It generalizes the previous models based on the nucleotide
3148 mutation matrices 4 x 4 and the trinucleotide mutation matrix 64
3149 x 64 with three and six parameters. It determines at some time t
3150 the exact occurrence probabilities of trinucleotides mutating randomly
3151 according to these nine substitution parameters. An application of
3152 this model allows an evolutionary study of the common circular code
3153 [Formula: see text] of eukaryotes and prokaryotes and its 12 coded
3154 amino acids. The main property of this code [Formula: see text] is
3155 the retrieval of the reading frames in genes, both locally, i.e.
3156 anywhere in genes and in particular without a start codon, and automatically
3157 with a window of a few nucleotides. However, since its identification
3158 in 1996, amino acid information coded by [Formula: see text] has
3159 never been studied. Very unexpectedly, this evolutionary model demonstrates
3160 that random substitutions in this code [Formula: see text] and with
3161 particular values for the nine substitutions parameters retrieve
3162 after a certain time of evolution a frequency distribution of these
3163 12 amino acids very close to the one coded by the actual genes.},
3164 doi = {10.1007/s11538-006-9147-z},
3165 institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université
3166 Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant,
3167 67400 Illkirch, France. michel@dpt-info.u-strasbg.fr},
3168 keywords = {Amino Acids, genetics; Codon, genetics; Eukaryotic Cells; Evolution,
3169 Molecular; Models, Genetic; Prokaryotic Cells},
3171 medline-pst = {ppublish},
3174 timestamp = {2011.05.05},
3175 url = {http://dx.doi.org/10.1007/s11538-006-9147-z}
3179 author = {J.-C. Miellou},
3180 title = {Algorithmes de relaxation chaotique \`{a} retards},
3186 timestamp = {2008.05.22}
3189 @ARTICLE{Miellou75b,
3190 author = {Miellou, J.-C.},
3191 title = {Itérations chaotiques à retards, étude de la convergence dans le
3192 cas d'espaces partiellement ordonnés},
3193 journal = {C.R.A.S. Paris},
3197 owner = {christophe},
3198 timestamp = {2010.08.17}
3202 author = {Jean-Claude Miellou and Pierre Spitéri},
3203 title = {Un critère de convergence pour des méthodes générales de point fixe},
3204 journal = {Rairo -- Modélisation mathématique et analyse numérique},
3209 owner = {christophe},
3210 timestamp = {2010.10.13}
3214 author = {Aidan Mooney and John G. Keating and Ioannis Pitas},
3215 title = {A comparative study of chaotic and white noise signals in digital
3217 journal = {Chaos, Solitons and Fractals},
3221 owner = {christophe},
3222 timestamp = {2010.03.01}
3225 @ARTICLE{Nakashima2003,
3226 author = {Nakashima, Y. and Tachibana, R. and Babaguchi, N.},
3227 title = {Watermarked Movie Soundtrack Finds the Position of the Camcorder
3229 journal = {IEEE Transactions on Multimedia},
3231 note = {Accepted for future publication Multimedia}
3234 @INCOLLECTION{springerlink:10.1007/978-3-642-04431-1_16,
3235 author = {Nelson, Michael and Nahapetian, Ani and Koushanfar, Farinaz and Potkonjak,
3237 title = {SVD-Based Ghost Circuitry Detection},
3238 booktitle = {Information Hiding},
3239 publisher = {Springer Berlin / Heidelberg},
3241 editor = {Katzenbeisser, Stefan and Sadeghi, Ahmad-Reza},
3243 series = {Lecture Notes in Computer Science},
3245 note = {10.1007/978-3-642-04431-1_16},
3246 affiliation = {Computer Science Department, UCLA, Los Angeles, CA 90095, USA},
3247 url = {http://dx.doi.org/10.1007/978-3-642-04431-1_16}
3250 @INPROCEEDINGS{Perez-Hernandez09,
3251 author = {P\'{e}rez-Hern\'{a}ndez, Luis Germ\'{a}n and Rodr\'{\i}guez-V\'{a}zquez,
3252 Katya and Gardu\~{n}o-Ju\'{a}rez, Ram\'{o}n},
3253 title = {Parallel particle swarm optimization applied to the protein folding
3255 booktitle = {Proceedings of the 11th Annual conference on Genetic and evolutionary
3258 series = {GECCO '09},
3259 pages = {1791--1792},
3260 address = {New York, NY, USA},
3263 isbn = {978-1-60558-325-9},
3264 keywords = {bioinformatics, biology and chemistry, combinatorial optimization,
3265 parallelization, swarm intelligence},
3266 location = {Montreal, Qu\&\#233;bec, Canada},
3270 @PHDTHESIS{Pellegrin1986,
3271 author = {D. Pellegrin},
3272 title = {Algorithmique discr\`{e}te et r\'{e}seaux d'automates},
3273 school = {Grenoble},
3276 timestamp = {2008.05.22}
3280 author = {F. Peng and S.-S. Qiu and M. Long},
3281 title = {One way Hash function construction based on two-dimensional hyperchaotic
3283 journal = {Acta Phys. Sinici.},
3288 timestamp = {2009.01.16}
3291 @INPROCEEDINGS{Perez06,
3292 author = {Luis Perez-Freire and F. Pérez-gonzalez and Pedro Comesaña},
3293 title = {Secret Dither Estimation in Lattice-Quantization Data Hiding: A Set-Membership
3295 booktitle = {Security, Steganography, and Watermarking of Multimedia Contents},
3297 editor = {Edward J. Delp and Ping W. Wong},
3298 address = {San Jose, California, USA},
3300 organization = {SPIE},
3302 timestamp = {2009.06.30}
3305 @INPROCEEDINGS{Perez-Freire06,
3306 author = {Luis Perez-Freire and Pedro Comesana and Juan Ramon Troncoso-Pastoriza
3307 and Fernando Perez-Gonzalez},
3308 title = {Watermarking Security: a Survey},
3309 booktitle = {LNCS Transactions on Data Hiding and Multimedia Security},
3312 timestamp = {2009.06.29}
3315 @PROCEEDINGS{Peter07,
3316 title = {On Concealed Data Aggregation for WSNs},
3318 author = {Peter, Steffen and Piotrowski, Krzysztof and Langendoerfer, Peter},
3319 booktitle = {Consumer Communications and Networking Conference, 2007. CCNC 2007.
3321 citeulike-article-id = {2281643},
3322 citeulike-linkout-0 = {http://dx.doi.org/10.1109/CCNC.2007.45},
3323 citeulike-linkout-1 = {http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=4199133},
3324 doi = {10.1109/CCNC.2007.45},
3325 journal = {Consumer Communications and Networking Conference, 2007. CCNC 2007.
3329 posted-at = {2008-01-23 19:36:19},
3331 url = {http://dx.doi.org/10.1109/CCNC.2007.45}
3335 author = {Pham, Congduc and Makhoul, Abdallah and Saadi, Rachid},
3336 title = {Risk-based Adaptive Scheduling in Randomly Deployed Video Sensor
3337 Networks for Critical Surveillance Applications},
3338 journal = {Journal of Network and Computer Applications},
3343 note = {Accepted manuscript. To appear},
3344 classement = {ACLI},
3346 impact-factor = {1.111},
3348 isi-acro = {J NETW COMPU APPL},
3349 publisher = {Springer}
3353 author = {Edgar Alan Poe},
3354 title = {The Raven},
3357 note = {American Museum (Baltimore)},
3358 owner = {christophe},
3359 timestamp = {2010.11.23}
3362 @ARTICLE{Perez-Freire2006:Security,
3363 author = {L. P{\'e}rez-Freire and F. P{\'e}rez-González and T. Furon and P.
3365 title = {Security of lattice-based data hiding against the known message attack},
3366 journal = {IEEE Trans. on Information Forensics and Security},
3373 timestamp = {2009.12.06}
3376 @MISC{Quisquater02sidechannel,
3377 author = {J-J. Quisquater and D. Samyde and Université Catholique De Louvain
3379 title = {Side Channel Cryptanalysis},
3383 @ARTICLE{Raynal2001,
3384 author = {Frédéric Raynal and Fabien A. P. Petitcolas and Caroline Fontaine},
3385 title = {Evaluation automatique des méthodes de tatouage},
3386 journal = {Traitement du signal},
3391 timestamp = {2008.05.21}
3395 author = {Vincent Rijmen and Elisabeth Oswald},
3396 title = {Update on SHA-1},
3397 howpublished = {Cryptology ePrint Archive, Report 2005/010},
3399 note = {\url{http://eprint.iacr.org/}}
3403 title = {Discrete Iterations, a Metric Study},
3404 publisher = {Springer-Verlag},
3406 editor = {Berlin Heidelberg New-York},
3407 author = {François Robert},
3409 series = {Series in Computational Mathematics}
3413 title = {Discrete Iterations: A Metric Study},
3415 editor = {Springer-Verlag},
3416 author = {F. Robert},
3418 series = {Springer Series in Computational Mathematics},
3420 timestamp = {17/02/2008}
3424 author = {Rudenko, O. and Snytkin, M.},
3425 title = {Image compression based on the neural network art},
3426 journal = {Cybernetics and Systems Analysis},
3430 affiliation = {Kharkov National University of Radio Electronics Kharkov Ukraine},
3433 keyword = {Computer Science},
3434 publisher = {Springer New York}
3437 @PHDTHESIS{Ruette2001,
3438 author = {Sylvie Ruette},
3439 title = {Chaos en dynamique topologique, en particulier sur l'intervalle,
3440 mesures d'entropie maximale},
3441 school = {Université d'Aix-Marseille II},
3443 optmonth = {Novembre},
3445 timestamp = {2008.01.02}
3448 @MASTERSTHESIS{Saulnier02,
3449 author = {Boris Saulnier},
3450 title = {Entropie topologique},
3451 school = {DEA Sémantique, Preuves et Langages, Paris 7},
3453 owner = {christophe},
3454 timestamp = {2010.08.12}
3457 @ARTICLE{Schmitz2001,
3458 author = {Roland Schmitz},
3459 title = {Use of chaotic dynamical systems in cryptography},
3460 journal = {Journal of Franklin Institute},
3465 timestamp = {17/02/2008}
3469 title = {Analyse: topologie g\'{e}n\'{e}rale et analyse fonctionnelle},
3470 publisher = {Hermann},
3473 author = {Laurent Schwartz},
3474 owner = {christophe},
3475 timestamp = {2010.09.15}
3479 author = {Shannon, Claude E.},
3480 title = {Communication Theory of Secrecy Systems},
3481 journal = {Bell Systems Technical Journal},
3485 citeulike-article-id = {507362},
3486 keywords = {master, secrecy\_systems, teoria-informacao, theory\_communication,
3487 theory\_cryptography},
3489 posted-at = {2006-02-16 23:24:09},
3491 timestamp = {2009.06.29}
3494 @ARTICLE{Shmygelska05,
3495 author = {Shmygelska, Alena and Hoos, Holger},
3496 title = {An ant colony optimisation algorithm for the 2D and 3D hydrophobic
3497 polar protein folding problem},
3498 journal = {BMC Bioinformatics},
3503 abstract = {BACKGROUND:The protein folding problem is a fundamental problems in
3504 computational molecular biology and biochemical physics. Various
3505 optimisation methods have been applied to formulations of the ab-initio
3506 folding problem that are based on reduced models of protein structure,
3507 including Monte Carlo methods, Evolutionary Algorithms, Tabu Search
3508 and hybrid approaches. In our work, we have introduced an ant colony
3509 optimisation (ACO) algorithm to address the non-deterministic polynomial-time
3510 hard (NP-hard) combinatorial problem of predicting a protein's conformation
3511 from its amino acid sequence under a widely studied, conceptually
3512 simple model - the 2-dimensional (2D) and 3-dimensional (3D) hydrophobic-polar
3513 (HP) model.RESULTS:We present an improvement of our previous ACO
3514 algorithm for the 2D HP model and its extension to the 3D HP model.
3515 We show that this new algorithm, dubbed ACO-HPPFP-3, performs better
3516 than previous state-of-the-art algorithms on sequences whose native
3517 conformations do not contain structural nuclei (parts of the native
3518 fold that predominantly consist of local interactions) at the ends,
3519 but rather in the middle of the sequence, and that it generally finds
3520 a more diverse set of native conformations.CONCLUSIONS:The application
3521 of ACO to this bioinformatics problem compares favourably with specialised,
3522 state-of-the-art methods for the 2D and 3D HP protein folding problem;
3523 our empirical results indicate that our rather simple ACO algorithm
3524 scales worse with sequence length but usually finds a more diverse
3525 ensemble of native states. Therefore the development of ACO algorithms
3526 for more complex and realistic models of protein structure holds
3527 significant promise.},
3528 doi = {10.1186/1471-2105-6-30},
3530 pubmedid = {15710037}
3533 @OTHER{Shmygelska2005Feb,
3534 __markedentry = {[christophe]},
3535 abstract = {Abstract Background The protein folding problem is a fundamental problems
3536 in computational molecular biology and biochemical physics. Various
3537 optimisation methods have been applied to formulations of the ab-initio
3538 folding problem that are based on reduced models of protein structure,
3539 including Monte Carlo methods, Evolutionary Algorithms, Tabu Search
3540 and hybrid approaches. In our work, we have introduced an ant colony
3541 optimisation (ACO) algorithm to address the non-deterministic polynomial-time
3542 hard (NP-hard) combinatorial problem of predicting a protein's conformation
3543 from its amino acid sequence under a widely studied, conceptually
3544 simple model – the 2-dimensional (2D) and 3-dimensional (3D) hydrophobic-polar
3545 (HP) model. Results We present an improvement of our previous ACO
3546 algorithm for the 2D HP model and its extension to the 3D HP model.
3547 We show that this new algorithm, dubbed ACO-HPPFP-3, performs better
3548 than previous state-of-the-art algorithms on sequences whose native
3549 conformations do not contain structural nuclei (parts of the native
3550 fold that predominantly consist of local interactions) at the ends,
3551 but rather in the middle of the sequence, and that it generally finds
3552 a more diverse set of native conformations. Conclusions The application
3553 of ACO to this bioinformatics problem compares favourably with specialised,
3554 state-of-the-art methods for the 2D and 3D HP protein folding problem;
3555 our empirical results indicate that our rather simple ACO algorithm
3556 scales worse with sequence length but usually finds a more diverse
3557 ensemble of native states. Therefore the development of ACO algorithms
3558 for more complex and realistic models of protein structure holds
3559 significant promise.},
3560 author = {Shmygelska, Alena and Hoos, Holger H},
3561 journal = {BMC Bioinformatics. 2005 Feb 14},
3563 owner = {christophe},
3565 timestamp = {2011.01.24},
3566 title = {An ant colony optimisation algorithm for the 2D and 3D hydrophobic
3567 polar protein folding problem},
3573 author = {Li Shujun and Li Qi and Li Wenmin and Mou Xuanqin and Cai Yuanlong},
3574 title = {Statistical Properties of Digital Piecewise Linear Chaotic Maps and
3575 Their Roles in Cryptography and Pseudo-Random Coding},
3576 journal = {Proceedings of the 8th IMA International Conference on Cryptography
3581 owner = {christophe},
3582 timestamp = {2010.03.06}
3585 @INPROCEEDINGS{Simmons83,
3586 author = {Gustavus J. Simmons},
3587 title = {The Prisoners' Problem and the Subliminal Channel},
3588 booktitle = {Advances in Cryptology, Proc. CRYPTO'83},
3591 bibsource = {DBLP, http://dblp.uni-trier.de},
3593 timestamp = {2009.06.29}
3596 @ARTICLE{Solak2004389,
3597 author = {Ercan Solak},
3598 title = {On the security of a class of discrete-time chaotic cryptosystems},
3599 journal = {Physics Letters A},
3602 pages = {389 - 395},
3604 doi = {DOI: 10.1016/j.physleta.2003.11.008},
3606 keywords = {Communication using chaos},
3608 timestamp = {2009.12.12},
3609 url = {http://www.sciencedirect.com/science/article/B6TVM-4B22RC9-2/2/99a0af737c9b6ba8af47ae4d3c7a326d}
3612 @PHDTHESIS{Spiteri74,
3613 author = {Pierre Spitéri},
3614 title = {Contribution à l'étude de la stabilite au sens de liapounov de certains
3615 systemes differentiels non lineaires},
3616 school = {Université de Franche-Comté},
3618 owner = {christophe},
3619 timestamp = {2010.10.13}
3623 title = {Does God Play Dices ?: the mathematics of chaos},
3624 publisher = {Penguin},
3626 author = {Ian Stewart},
3628 timestamp = {2008.01.02}
3632 title = {Cryptography: Theory and Practice, Second Edition},
3633 publisher = {{Chapman \& Hall/CRC}},
3635 author = {Stinson, Douglas R.},
3637 abstract = {{Douglas R. Stinson's <I>Cryptography: Theory and Practice</I> is
3638 a mathematically intensive examination of cryptography, including
3639 ciphers, the Data Encryption Standard (DES), public key cryptography,
3640 one-way hash functions, and digital signatures. Stinson's explication
3641 of "zero-sum proofs"--a process by which one person lets another
3642 person know that he or she has a password without actually revealing
3643 any information--is especially good.<P> If you are new to the math
3644 behind cryptography but want to tackle it, the author covers all
3645 of the required background to understand the real mathematics here.
3646 <I>Cryptography</I> includes extensive exercises with each chapter
3647 and makes an ideal introduction for any math-literate person willing
3648 to get acquainted with this material.} {<P>Major advances over the
3649 last five years precipitated this major revision of the bestselling
3650 Cryptography: Theory and Practice. With more than 40 percent new
3651 or updated material, the second edition now provides an even more
3652 comprehensive treatment of modern cryptography. It focuses on the
3653 new Advanced Encryption Standards and features an entirely new chapter
3654 on that subject. Another new chapter explores the applications of
3655 secret sharing schemes, including ramp schemes, visual cryptography,
3656 threshold cryptography, and broadcast encryption. This is an ideal
3657 introductory text for both computer science and mathematics students
3658 and a valuable reference for professionals.</P>}},
3659 citeulike-article-id = {2401855},
3661 howpublished = {Hardcover},
3662 isbn = {1584882069},
3663 keywords = {security},
3664 posted-at = {2008-02-20 08:28:49},
3666 url = {http://www.amazon.com/exec/obidos/redirect?tag=citeulike07-20\&path=ASIN/1584882069}
3669 @INPROCEEDINGS{Takana90,
3670 author = {K. Tanaka and Y. Nakamura and K. Matsui},
3671 title = {Embedding Secret Information into a Dithered Multi-level Image},
3672 booktitle = {IEEE Military Communications Conference},
3674 owner = {christophe},
3675 timestamp = {2010.08.05}
3678 @PHDTHESIS{ElTarazi81,
3679 author = {M. N. El Tarazi},
3680 title = {Contraction et ordre partiel pour l'étude d'algorithmes synchrones
3681 et asynchrones en analyse numérique},
3682 school = {Faculté des Sciences et Techniques de l'Université de Franche-Comté,
3685 owner = {christophe},
3686 timestamp = {2010.08.17}
3689 @INPROCEEDINGS{Unger93,
3690 author = {Unger, Ron and Moult, John},
3691 title = {Genetic Algorithm for 3D Protein Folding Simulations},
3692 booktitle = {Proceedings of the 5th International Conference on Genetic Algorithms},
3695 address = {San Francisco, CA, USA},
3696 publisher = {Morgan Kaufmann Publishers Inc.},
3698 isbn = {1-55860-299-2},
3702 @MISC{Van93electronicwater,
3703 author = {Tirkel Rankin Van},
3704 title = {Electronic Water Mark},
3708 @ARTICLE{Venkatesan2007397,
3709 author = {R.C. Venkatesan},
3710 title = {Encryption of covert information into multiple statistical distributions},
3711 journal = {Physics Letters A},
3714 pages = {397 - 404},
3716 doi = {DOI: 10.1016/j.physleta.2007.05.117},
3718 keywords = {Statistical encryption/decryption},
3720 timestamp = {2009.12.12},
3721 url = {http://www.sciencedirect.com/science/article/B6TVM-4P4FV2M-1/2/cd11a2ec144526e3c4552d2a7e7906cc}
3725 author = {G. Voyatzis and I. Pitas},
3726 title = {Chaotic watermarks for embedding in the spatial digital image domain},
3727 journal = {Proceedings of IEEE ICIP},
3731 owner = {christophe},
3732 timestamp = {2010.03.06}
3735 @INCOLLECTION{Wagner03,
3736 author = {Wagner, David},
3737 title = {Cryptanalysis of an Algebraic Privacy Homomorphism},
3738 booktitle = {Information Security},
3739 publisher = {Springer Berlin, Heidelberg},
3742 series = {Lecture Notes in Computer Science},
3744 abstract = {We use linear algebra to show that an algebraic privacy homomorphism
3745 proposed by Domingo-Ferrer is insecure for some parameter settings.},
3746 affiliation = {University of California, Berkeley USA}
3749 @INPROCEEDINGS{Wagner03cryptanalysisof,
3750 author = {David Wagner},
3751 title = {Cryptanalysis of an Algebraic Privacy Homomorphism},
3752 booktitle = {Proc. Sixth Information Security Conf. (ISC03},
3757 @ARTICLE{Wang_ellipticcurve,
3758 author = {Haodong Wang and Bo Sheng and Qun Li},
3759 title = {Elliptic curve cryptography-based access control in sensor networks},
3760 journal = {Int. J. Security and Networks}
3763 @INPROCEEDINGS{wbg10:ip,
3764 author = {Wang, Qianxue and Bahi, Jacques M. and Guyeux, Christophe and Fang,
3766 title = {Randomness quality of {CI} chaotic generators. Application to Internet
3768 booktitle = {INTERNET'2010. The 2nd Int. Conf. on Evolving Internet},
3771 address = {Valencia, Spain},
3773 publisher = {IEEE Computer Society Press},
3774 note = {Best Paper award},
3775 classement = {ACTI},
3776 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
3782 author = {X. M. Wang and J. S. Zhang and W. F. Zhang},
3783 title = {One-way hash function construction based on the extended chaotic
3785 journal = {Acta Phys. Sinici.},
3787 volume = {52, No. 11},
3788 pages = {2737--2742},
3790 timestamp = {2009.01.16}
3794 author = {Westhoff, Dirk and Girao, Joao and Acharya, Mithun},
3795 title = {Concealed Data Aggregation for Reverse Multicast Traffic in Sensor
3796 Networks: Encryption, Key Distribution, and Routing Adaptation},
3797 journal = {IEEE Transactions on Mobile Computing},
3800 pages = {1417--1431},
3802 address = {Piscataway, NJ, USA},
3803 doi = {http://dx.doi.org/10.1109/TMC.2006.144},
3805 publisher = {IEEE Educational Activities Department}
3809 author = {Wikipédia},
3810 title = {Exposant de Lyapunov -- Site web d'André Lévesque},
3812 note = {[En ligne; Page disponible le 9-septembre-2010]},
3813 url = {\url{http://math.cmaisonneuve.qc.ca/alevesque/chaos_fract/Lyapunov/Exposant.html}}
3817 author = {Wikipédia},
3818 title = {Espace complet --- Wikipédia{,} l'encyclopédie libre},
3820 note = {[En ligne; Page disponible le 9-août-2010]},
3821 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Espace_complet&oldid=52734266}}
3825 author = {Wikipédia},
3826 title = {Densité (mathématiques) --- Wikipédia{,} l'encyclopédie libre},
3828 note = {[En ligne; Page disponible le 8-août-2010]},
3829 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Densit%C3%A9_(math%C3%A9matiques)&oldid=53938121}}
3833 author = {Wikipédia},
3834 title = {Information de Fisher --- Wikipédia{,} l'encyclopédie libre},
3836 note = {[En ligne; Page disponible le 5-août-2010]},
3837 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Information_de_Fisher&oldid=52877871}}
3840 @MISC{wiki:Kerkhoffs,
3841 author = {Wikipédia},
3842 title = {Principe de Kerckhoffs --- Wikipédia{,} l'encyclopédie libre},
3844 note = {[En ligne; Page disponible le 20-août-2010]},
3845 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Principe_de_Kerckhoffs&oldid=52133114}}
3848 @MISC{wiki:sarkovskii,
3849 author = {Wikipédia},
3850 title = {Théorème de Sarkovskii --- Wikipédia{,} l'encyclopédie libre},
3852 note = {[En ligne; Page disponible le 8-août-2010]},
3853 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Th%C3%A9or%C3%A8me_de_Sarkovskii&oldid=54196167}}
3856 @MISC{wiki:steganographie,
3857 author = {Wikipédia},
3858 title = {Stéganographie --- Wikipédia{,} l'encyclopédie libre},
3860 note = {[En ligne; Page disponible le 5-août-2010]},
3861 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=St%C3%A9ganographie&oldid=54724435}}
3864 @MISC{wiki:tatouage,
3865 author = {Wikipédia},
3866 title = {Tatouage numérique --- Wikipédia{,} l'encyclopédie libre},
3868 note = {[En ligne; Page disponible le 5-août-2010]},
3869 url = {https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Tatouage_num%C3%A9rique&oldid=55484940}
3872 @MISC{wiki:testsHypothese,
3873 author = {Wikipédia},
3874 title = {Test d'hypothèse --- Wikipédia{,} l'encyclopédie libre},
3876 note = {[En ligne; Page disponible le 5-août-2010]},
3877 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Test_d%27hypoth%C3%A8se&oldid=55344108}}
3881 author = {Xianyong Wu and Zhi-Hong Guan},
3882 title = {A novel digital watermark algorithm based on chaotic maps},
3883 journal = {Physics Letters A},
3886 pages = {403 - 406},
3888 doi = {DOI: 10.1016/j.physleta.2007.01.034},
3890 keywords = {Watermarking},
3891 url = {http://www.sciencedirect.com/science/article/B6TVM-4MY0MF3-8/2/0b4d1298fa84337d2e59b3fefe26f583}
3894 @INPROCEEDINGS{Wu2007,
3895 author = {Wu, Xianyong and Guan, Zhi-Hong and Wu, Zhengping},
3896 title = {A Chaos Based Robust Spatial Domain Watermarking Algorithm},
3897 booktitle = {ISNN '07: Proceedings of the 4th international symposium on Neural
3901 address = {Berlin, Heidelberg},
3902 publisher = {Springer-Verlag},
3903 doi = {http://dx.doi.org/10.1007/978-3-540-72393-6_15},
3904 isbn = {978-3-540-72392-9},
3905 location = {Nanjing, China}
3908 @ARTICLE{Xiao20092288,
3909 author = {Di Xiao and Xiaofeng Liao and Yong Wang},
3910 title = {Parallel keyed hash function construction based on chaotic neural
3912 journal = {Neurocomputing},
3915 pages = {2288 - 2296},
3917 note = {Lattice Computing and Natural Computing (JCIS 2007) / Neural Networks
3918 in Intelligent Systems Designn (ISDA 2007)},
3919 abstract = {Recently, various hash functions based on chaos or neural networks
3920 were proposed. Nevertheless, none of them works efficiently in parallel
3921 computing environment. In this paper, an algorithm for parallel keyed
3922 hash function construction based on chaotic neural network is proposed.
3923 The mechanism of changeable-parameter and self-synchronization establishes
3924 a close relation between the hash value bit and message, and the
3925 algorithm structure ensures the uniform sensitivity of the hash value
3926 to the message blocks at different positions. The proposed algorithm
3927 can satisfy the performance requirements of hash function. These
3928 properties make it a promising choice for hashing on parallel computing
3931 keywords = {Chaotic neural network}
3934 @ARTICLE{Xiao20094346,
3935 author = {Di Xiao and Xiaofeng Liao and Yong Wang},
3936 title = {Improving the security of a parallel keyed hash function based on
3938 journal = {Physics Letters A},
3941 pages = {4346 - 4353},
3944 keywords = {Hash function},
3946 timestamp = {2009.12.12}
3949 @ARTICLE{Xiao20102254,
3950 author = {Di Xiao and Frank Y. Shih and Xiaofeng Liao},
3951 title = {A chaos-based hash function with both modification detection and
3952 localization capabilities},
3953 journal = {Communications in Nonlinear Science and Numerical Simulation},
3956 pages = {2254 - 2261},
3958 abstract = {Recently, a variety of chaos-based hash functions have been proposed.
3959 Nevertheless, none of them can realize modification localization.
3960 In this paper, a hash function with both modification detection and
3961 localization capabilities is proposed, which can also support the
3962 parallel processing mode. By using the mechanism of changeable-parameter
3963 and self-synchronization, the keystream can establish a close relation
3964 with the algorithm key, the content, and the order of each message
3965 unit. Theoretical analysis and computer simulation indicate that
3966 the proposed algorithm can satisfy the performance requirements of
3969 keywords = {Hash function}
3972 @INPROCEEDINGS{Yu06,
3973 author = {Yu, Yu and Leiwo, Jussipekka and Premkumar, Benjamin},
3974 title = {A Study on the Security of Privacy Homomorphism},
3975 booktitle = {ITNG '06: Proceedings of the Third International Conference on Information
3976 Technology: New Generations},
3979 address = {Washington, DC, USA},
3980 publisher = {IEEE Computer Society},
3981 doi = {http://dx.doi.org/10.1109/ITNG.2006.19},
3982 isbn = {0-7695-2497-4}
3985 @ARTICLE{Zhang2008658,
3986 author = {Wei Zhang and Yonghe Liu and Sajal K. Das and Pradip De},
3987 title = {Secure data aggregation in wireless sensor networks: A watermark
3988 based authentication supportive approach},
3989 journal = {Pervasive and Mobile Computing},
3992 pages = {658 - 680},
3994 doi = {DOI: 10.1016/j.pmcj.2008.05.005},
3996 keywords = {Wireless sensor networks},
3997 url = {http://www.sciencedirect.com/science/article/B7MF1-4SKB3MD-1/2/b73948dcaa3eb63a2c21d09041882625}
4001 author = {Zhang, Yang and Arakaki, Adrian K. and Skolnick, Jeffrey},
4002 title = {TASSER: An automated method for the prediction of protein tertiary
4003 structures in CASP6},
4004 journal = {Proteins},
4010 keywords = {comparative modeling, threading, ab initio prediction, TASSER, PROSPECTOR_3},
4011 owner = {christophe},
4012 publisher = {Wiley Subscription Services, Inc., A Wiley Company},
4013 timestamp = {2011.01.22},
4014 url = {http://dx.doi.org/10.1002/prot.20724}
4017 @ARTICLE{Zhou1997429,
4018 author = {Chang-song Zhou and Tian-lun Chen},
4019 title = {Extracting information masked by chaos and contaminated with noise:
4020 Some considerations on the security of communication approaches using
4022 journal = {Physics Letters A},
4025 pages = {429 - 435},
4028 keywords = {Communication},
4030 timestamp = {2009.12.12}
4034 author = {Zhou, Huai-bei and Wang, Lu},
4035 title = {Chaos in Biomolecular Dynamics},
4036 journal = {The Journal of Physical Chemistry},
4039 pages = {8101-8105},
4041 doi = {10.1021/jp953409x}
4044 @PROCEEDINGS{DBLP:conf/iwdw/2005,
4045 title = {IWDW'05: 4th International Workshop on Digital Watermarking},
4047 editor = {Mauro Barni and Ingemar J. Cox and Ton Kalker and Hyoung Joong Kim},
4049 series = {Lecture Notes in Computer Science},
4050 address = {Siena, Italy},
4051 publisher = {Springer},
4052 month = {September 15-17},
4053 bibsource = {DBLP, http://dblp.uni-trier.de},
4055 isbn = {3-540-28768-X},
4057 timestamp = {2009.06.29}
4060 @PROCEEDINGS{DBLP:conf/ih/2006,
4061 title = {IH 2006: Information Hiding, 8th International Workshop},
4063 editor = {Jan Camenisch and Christian S. Collberg and Neil F. Johnson and Phil
4066 series = {Lecture Notes in Computer Science},
4067 address = {Alexandria, VA, USA},
4068 publisher = {Springer},
4070 bibsource = {DBLP, http://dblp.uni-trier.de},
4071 booktitle = {Information Hiding},
4072 isbn = {978-3-540-74123-7},
4074 timestamp = {2009.06.29}
4077 @PROCEEDINGS{DBLP:conf/ih/2007,
4078 title = {Information Hiding, 9th International Workshop, IH 2007, Saint Malo,
4079 France, June 11-13, 2007, Revised Selected Papers},
4081 editor = {Teddy Furon and Fran\c{c}ois Cayre and Gwena{\"e}l J. Do{\"e}rr and
4084 series = {Lecture Notes in Computer Science},
4085 publisher = {Springer},
4086 bibsource = {DBLP, http://dblp.uni-trier.de},
4087 booktitle = {Information Hiding},
4088 isbn = {978-3-540-77369-6},
4090 timestamp = {2009.06.29}
4093 @PROCEEDINGS{DBLP:conf/iccsa/2006-1,
4094 title = {Computational Science and Its Applications - ICCSA 2006, International
4095 Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part I},
4097 editor = {Marina L. Gavrilova and Osvaldo Gervasi and Vipin Kumar and Chih
4098 Jeng Kenneth Tan and David Taniar and Antonio Lagan{\`a} and Youngsong
4099 Mun and Hyunseung Choo},
4101 series = {Lecture Notes in Computer Science},
4102 publisher = {Springer},
4103 bibsource = {DBLP, http://dblp.uni-trier.de},
4104 booktitle = {ICCSA (1)},
4105 isbn = {3-540-34070-X}
4108 @PROCEEDINGS{DBLP:conf/secrypt/2010,
4109 title = {SECRYPT 2010 - Proceedings of the International Conference on Security
4110 and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part
4111 of ICETE - The International Joint Conference on e-Business and Telecommunications},
4113 editor = {Sokratis K. Katsikas and Pierangela Samarati},
4114 publisher = {SciTePress},
4115 bibsource = {DBLP, http://dblp.uni-trier.de},
4116 booktitle = {SECRYPT},
4117 isbn = {978-989-8425-18-8}
4120 @BOOK{Katzenbeisser00,
4121 title = {Information Hiding Techniques for Steganography and Digital Watermarking},
4122 publisher = {Artech House, Inc.},
4124 editor = {Katzenbeisser, Stefan and Petitcolas, Fabien A.},
4125 address = {Norwood, MA, USA},
4129 @PROCEEDINGS{DBLP:conf/ih/1999,
4130 title = {IH'99: 3rd International Workshop on Information Hiding},
4132 editor = {Andreas Pfitzmann},
4134 series = {Lecture Notes in Computer Science},
4135 address = {Dresden, Germany},
4136 publisher = {Springer},
4137 month = {September 29 - October 1.},
4138 bibsource = {DBLP, http://dblp.uni-trier.de},
4139 booktitle = {Information Hiding},
4140 isbn = {3-540-67182-X},
4142 timestamp = {2009.06.29}
4145 @PROCEEDINGS{DBLP:conf/indocrypt/2000,
4146 title = {Progress in Cryptology - INDOCRYPT 2000, First International Conference
4147 in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings},
4149 editor = {Bimal K. Roy and Eiji Okamoto},
4151 series = {Lecture Notes in Computer Science},
4152 publisher = {Springer},
4153 bibsource = {DBLP, http://dblp.uni-trier.de},
4154 booktitle = {INDOCRYPT},
4155 isbn = {3-540-41452-5}
4158 @BOOK{DBLP:reference/icsec/2010,
4159 title = {Handbook of Information and Communication Security},
4160 publisher = {Springer},
4162 editor = {Peter P. Stavroulakis and Mark Stamp},
4163 bibsource = {DBLP, http://dblp.uni-trier.de},
4164 booktitle = {Handbook of Information and Communication Security},
4165 ee = {http://dx.doi.org/10.1007/978-3-642-04117-4},
4166 isbn = {978-3-642-04116-7}
4169 @PROCEEDINGS{DBLP:conf/isnn/2004-2,
4170 title = {Advances in Neural Networks - ISNN 2004, International Symposium
4171 on Neural Networks, Dalian, China, August 19-21, 2004, Proceedings,
4174 editor = {Fuliang Yin and Jun Wang and Chengan Guo},
4176 series = {Lecture Notes in Computer Science},
4177 publisher = {Springer},
4178 bibsource = {DBLP, http://dblp.uni-trier.de},
4179 booktitle = {ISNN (2)},
4180 isbn = {3-540-22843-8}
4183 @PROCEEDINGS{DBLP:conf/adhocnets/2010,
4184 title = {Ad Hoc Networks - Second International Conference, ADHOCNETS 2010,
4185 Victoria, BC, Canada, August 18-20, 2010, Revised Selected Papers},
4187 editor = {Jun Zheng and David Simplot-Ryl and Victor C. M. Leung},
4189 series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
4190 and Telecommunications Engineering},
4191 publisher = {Springer},
4192 bibsource = {DBLP, http://dblp.uni-trier.de},
4193 booktitle = {ADHOCNETS},
4194 ee = {http://dx.doi.org/10.1007/978-3-642-17994-5},
4195 isbn = {978-3-642-17993-8}
4200 timestamp = {2011.03.29}
4204 title = {Delicious social bookmarking, http://delicious.com/},
4205 comment = {http://delicious.com/},
4207 url = {http://delicious.com/}
4211 title = {The Frick Collection, http://www.frick.org/},
4212 comment = {http://www.frick.org/},
4214 url = {http://www.frick.org/}
4218 title = {Proceedings of the IEEE Congress on Evolutionary Computation, CEC
4219 2010, Barcelona, Spain, 18-23 July 2010},
4222 bibsource = {DBLP, http://dblp.uni-trier.de},
4223 booktitle = {IEEE Congress on Evolutionary Computation}
4226 @PROCEEDINGS{DBLP:conf/cec/2010,
4227 title = {Proceedings of the IEEE Congress on Evolutionary Computation, CEC
4228 2010, Barcelona, Spain, 18-23 July 2010},
4231 bibsource = {DBLP, http://dblp.uni-trier.de},
4232 booktitle = {IEEE Congress on Evolutionary Computation}
4235 @PROCEEDINGS{DBLP:conf/date/2010,
4236 title = {Design, Automation and Test in Europe, DATE 2010, Dresden, Germany,
4240 bibsource = {DBLP, http://dblp.uni-trier.de},
4244 @PROCEEDINGS{DBLP:conf/cse/2009,
4245 title = {Proceedings IEEE CSE'09, 12th IEEE International Conference on Computational
4246 Science and Engineering, August 29-31, 2009, Vancouver, BC, Canada},
4248 publisher = {IEEE Computer Society},
4249 bibsource = {DBLP, http://dblp.uni-trier.de},
4253 @PROCEEDINGS{DBLP:conf/icumt/2009,
4254 title = {Proceedings of the International Conference on Ultra Modern Telecommunications,
4255 ICUMT 2009, 12-14 October 2009, St. Petersburg, Russia},
4258 bibsource = {DBLP, http://dblp.uni-trier.de},
4262 @PROCEEDINGS{DBLP:conf/focs/2008,
4263 title = {49th Annual IEEE Symposium on Foundations of Computer Science, FOCS
4264 2008, October 25-28, 2008, Philadelphia, PA, USA},
4266 publisher = {IEEE Computer Society},
4267 bibsource = {DBLP, http://dblp.uni-trier.de},
4271 @comment{jabref-meta: selector_publisher:}
4273 @comment{jabref-meta: selector_author:}
4275 @comment{jabref-meta: selector_journal:}
4277 @comment{jabref-meta: selector_keywords:Chaos;Entropie Topologique;Tip
4282 @InProceedings{Pang:2008:cec,
4283 author = "Wai-Man Pang and Tien-Tsin Wong and Pheng-Ann Heng",
4284 title = "Generating Massive High-Quality Random Numbers using
4286 booktitle = "2008 IEEE World Congress on Computational
4289 editor = "Jun Wang",
4290 address = "Hong Kong",
4291 organization = "IEEE Computational Intelligence Society",
4292 publisher = "IEEE Press",
4296 @Article{LEcuyerS07,
4297 title = "Test{U01}: {A} {C} library for empirical testing of
4298 random number generators",
4299 author = "Pierre L'Ecuyer and Richard J. Simard",
4300 journal = "ACM Trans. Math. Softw",
4304 bibdate = "2007-11-06",
4306 http://dblp.uni-trier.de/db/journals/toms/toms33.html#LEcuyerS07",
4307 URL = "http://doi.acm.org/10.1145/1268776.1268777",
4311 author = {A. Zhmurov, K. Rybnikov, Y. Kholodov, and V. Barsegov},
4312 title = {Generation of Random Numbers on Graphics Processors: Forced Indentation In Silico of the Bacteriophage HK97},
4313 journal = {J. Phys. Chem. B},
4317 pages = {5278--5288},
4322 @comment {regarder : Pseudo-Random Number Generation for Brownian Dynamics and Dissipative Particle Dynamics Simulations on GPU Devices}
4323 @comment {CL Phillips, JA Anderson… - Journal of Computational Physics, 2011 - Elsevier}
4325 @InProceedings{conf/fpga/ThomasHL09,
4326 title = "A comparison of {CPU}s, {GPU}s, {FPGA}s, and massively
4327 parallel processor arrays for random number
4329 author = "David B. Thomas and Lee W. Howes and Wayne Luk",
4330 booktitle = "Proceedings of the {ACM}/{SIGDA} 17th International
4331 Symposium on Field Programmable Gate Arrays, {FPGA}
4332 2009, Monterey, California, {USA}, February 22-24,
4334 bibdate = "2010-06-29",
4337 editor = "Paul Chow and Peter Y. K. Cheung",
4338 ISBN = "978-1-60558-410-2",
4340 URL = "http://doi.acm.org/10.1145/1508128.1508139",
4345 @InProceedings{Jenkins96,
4348 booktitle = "IWFSE: International Workshop on Fast Software
4355 title = {Cuda cublas library},
4357 Note = {Version 4.0},
4362 title = {Curand library},
4364 Note = {Version 4.0},
4370 author = {Lenore Blum and Manuel Blum and Michael Shub},
4371 title = {A Simple Unpredictable Pseudo-Random Number Generator},
4372 journal = {SIAM Journal on Computing},
4379 author = {Oded Goldreich},
4381 title = {Foundations of Cryptography: Basic Tools},
4382 publisher = {Cambridge University Press},