1 % This file was created with JabRef 2.7.
4 @INPROCEEDINGS{AdelsbachKS06,
5 author = {Andr{\'e} Adelsbach and Stefan Katzenbeisser and Ahmad-Reza Sadeghi},
6 title = {A Computational Model for Watermark Robustness},
7 booktitle = {Information Hiding},
10 bibsource = {DBLP, http://dblp.uni-trier.de},
11 crossref = {DBLP:conf/ih/2006},
12 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_10},
14 timestamp = {2009.06.29}
17 @inproceedings{bfg12a:ip,
19 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
22 author = {Bahi, Jacques and Fang, Xiaole and Guyeux, Christophe},
23 title = {An optimization technique on pseudorandom generators based on chaotic iterations},
24 booktitle = {INTERNET'2012, 4-th Int. Conf. on Evolving Internet},
26 address = {Venice, Italy},
33 @UNPUBLISHED{ANDREW2008,
34 author = {NIST Special Publication 800-22 rev. 1},
35 title = {A Statistical Test Suite for Random and Pseudorandom Number Generators
36 for Cryptographic Applications},
39 timestamp = {2009.01.22}
42 @Article{combined_lcg,
43 title = "Efficient and portable combined random number generators",
45 journal = "Communications of the ACM",
53 @INPROCEEDINGS{Fischlin,
54 author = {Fischlin, R. and Schnorr, C. P.},
55 title = {Stronger security proofs for RSA and rabin bits},
56 booktitle = {Proceedings of the 16th annual international conference on Theory
57 and application of cryptographic techniques},
59 series = {EUROCRYPT'97},
61 address = {Berlin, Heidelberg},
62 publisher = {Springer-Verlag},
64 isbn = {3-540-62975-0},
65 location = {Konstanz, Germany},
67 url = {http://dl.acm.org/citation.cfm?id=1754542.1754569}
70 @INPROCEEDINGS{BattiatoCGG99,
71 author = {Sebastiano Battiato and Dario Catalano and Giovanni Gallo and Rosario
73 title = {Robust Watermarking for Images Based on Color Manipulation},
74 booktitle = {Information Hiding},
77 bibsource = {DBLP, http://dblp.uni-trier.de},
78 crossref = {DBLP:conf/ih/1999},
80 timestamp = {2009.06.29}
83 @INPROCEEDINGS{ComesanaPP05,
84 author = {Pedro Comesa{\~n}a and Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez},
85 title = {The Return of the Sensitivity Attack},
89 bibsource = {DBLP, http://dblp.uni-trier.de},
90 crossref = {DBLP:conf/iwdw/2005},
91 ee = {http://dx.doi.org/10.1007/11551492_20},
93 timestamp = {2009.06.29}
96 @INPROCEEDINGS{ComesanaPP05bis,
97 author = {Pedro Comesa{\~n}a and Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez},
98 title = {Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum
100 booktitle = {IH'05: Information Hiding Workshop},
103 publisher = {Lectures Notes in Computer Science, Springer-Verlag},
104 bibsource = {DBLP, http://dblp.uni-trier.de},
105 crossref = {DBLP:conf/ih/2005},
106 ee = {http://dx.doi.org/10.1007/11558859_12},
108 timestamp = {2009.06.30}
111 @INPROCEEDINGS{CongJQZ06,
112 author = {Jin Cong and Yan Jiang and Zhiguo Qu and Zhongmei Zhang},
113 title = {A Wavelet Packets Watermarking Algorithm Based on Chaos Encryption},
114 booktitle = {ICCSA (1)},
117 bibsource = {DBLP, http://dblp.uni-trier.de},
118 crossref = {DBLP:conf/iccsa/2006-1},
119 ee = {http://dx.doi.org/10.1007/11751540_100}
122 @INPROCEEDINGS{DBLP:conf/focs/DziembowskiP08,
123 author = {Stefan Dziembowski and Krzysztof Pietrzak},
124 title = {Leakage-Resilient Cryptography},
128 bibsource = {DBLP, http://dblp.uni-trier.de},
129 crossref = {DBLP:conf/focs/2008},
130 ee = {http://dx.doi.org/10.1109/FOCS.2008.56}
133 @INCOLLECTION{Filiol10,
134 author = {Eric Filiol},
135 title = {Viruses and Malware},
136 booktitle = {Handbook of Information and Communication Security},
139 bibsource = {DBLP, http://dblp.uni-trier.de},
140 crossref = {DBLP:reference/icsec/2010},
141 ee = {http://dx.doi.org/10.1007/978-3-642-04117-4_34}
144 @INPROCEEDINGS{Filiol00,
145 author = {Eric Filiol},
146 title = {Decimation Attack of Stream Ciphers},
147 booktitle = {INDOCRYPT},
150 bibsource = {DBLP, http://dblp.uni-trier.de},
151 crossref = {DBLP:conf/indocrypt/2000},
152 ee = {http://link.springer.de/link/service/series/0558/bibs/1977/19770031.htm}
155 @INPROCEEDINGS{Furon05,
156 author = {Teddy Furon},
157 title = {A Survey of Watermarking Security},
161 bibsource = {DBLP, http://dblp.uni-trier.de},
162 crossref = {DBLP:conf/iwdw/2005},
163 ee = {http://dx.doi.org/10.1007/11551492_16},
165 timestamp = {2009.06.29}
169 @INPROCEEDINGS{DBLP:conf/cec/HiggsSHS10,
170 author = {Trent Higgs and Bela Stantic and Tamjidul Hoque and Abdul Sattar},
171 title = {Genetic algorithm feature-based resampling for protein structure
173 booktitle = {IEEE Congress on Evolutionary Computation},
176 bibsource = {DBLP, http://dblp.uni-trier.de},
177 crossref = {DBLP:conf/cec/2010},
178 ee = {http://dx.doi.org/10.1109/CEC.2010.5586149}
181 @INPROCEEDINGS{Higgs2010,
182 author = {Trent Higgs and Bela Stantic and Tamjidul Hoque and Abdul Sattar},
183 title = {Genetic algorithm feature-based resampling for protein structure
185 booktitle = {IEEE Congress on Evolutionary Computation},
188 bibsource = {DBLP, http://dblp.uni-trier.de},
189 crossref = {DBLP:conf/cec/2010},
190 ee = {http://dx.doi.org/10.1109/CEC.2010.5586149}
193 @INPROCEEDINGS{DBLP:conf/cec/HorvathC10,
194 author = {Dragos Horvath and Camelia Chira},
195 title = {Simplified chain folding models as metaheuristic benchmark for tuning
196 real protein folding algorithms?},
197 booktitle = {IEEE Congress on Evolutionary Computation},
200 bibsource = {DBLP, http://dblp.uni-trier.de},
201 crossref = {DBLP:conf/cec/2010},
202 ee = {http://dx.doi.org/10.1109/CEC.2010.5585932}
205 @INPROCEEDINGS{DBLP:conf/cec/IslamC10,
206 author = {Md. Kamrul Islam and Madhu Chetty},
207 title = {Clustered memetic algorithm for protein structure prediction},
208 booktitle = {IEEE Congress on Evolutionary Computation},
211 bibsource = {DBLP, http://dblp.uni-trier.de},
212 crossref = {DBLP:conf/cec/2010},
213 ee = {http://dx.doi.org/10.1109/CEC.2010.5586187}
216 @INPROCEEDINGS{Ker06,
217 author = {Andrew D. Ker},
218 title = {Batch Steganography and Pooled Steganalysis},
219 booktitle = {Information Hiding},
222 bibsource = {DBLP, http://dblp.uni-trier.de},
223 crossref = {DBLP:conf/ih/2006},
224 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_18},
226 timestamp = {2009.06.29}
229 @INPROCEEDINGS{Lin2009,
230 author = {H.-Y. Lin and T.-C. Chiang},
231 title = {Cooperative Secure Data Aggregation in Sensor Networks Using Elliptic
232 Curve Based Cryptosystems},
236 bibsource = {DBLP, http://dblp.uni-trier.de},
237 crossref = {DBLP:conf/cdve/2009},
238 ee = {http://dx.doi.org/10.1007/978-3-642-04265-2_58}
241 @INPROCEEDINGS{DBLP:conf/cse/MaimourPH09,
242 author = {Moufida Maimour and CongDuc Pham and Doan B. Hoang},
243 title = {A Congestion Control Framework for Handling Video Surveillance Traffics
245 booktitle = {CSE (2)},
248 bibsource = {DBLP, http://dblp.uni-trier.de},
249 crossref = {DBLP:conf/cse/2009},
250 ee = {http://dx.doi.org/10.1109/CSE.2009.200}
253 @INPROCEEDINGS{DBLP:conf/icumt/MakhoulSP09,
254 author = {Abdallah Makhoul and Rachid Saadi and CongDuc Pham},
255 title = {Coverage and adaptive scheduling algorithms for criticality management
256 on video wireless sensor networks},
260 bibsource = {DBLP, http://dblp.uni-trier.de},
261 crossref = {DBLP:conf/icumt/2009},
262 ee = {http://dx.doi.org/10.1109/ICUMT.2009.5345630}
265 @INPROCEEDINGS{Mittelholzer99,
266 author = {Thomas Mittelholzer},
267 title = {An Information-Theoretic Approach to Steganography and Watermarking},
268 booktitle = {Information Hiding},
271 bibsource = {DBLP, http://dblp.uni-trier.de},
272 crossref = {DBLP:conf/ih/1999},
274 timestamp = {2009.06.29}
277 @INPROCEEDINGS{PellegriniBA10,
278 author = {Andrea Pellegrini and Valeria Bertacco and Todd M. Austin},
279 title = {Fault-based attack of RSA authentication},
283 bibsource = {DBLP, http://dblp.uni-trier.de},
284 crossref = {DBLP:conf/date/2010},
285 ee = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5456933}
288 @INPROCEEDINGS{DBLP:conf/cec/Perez-HernandezRG10,
289 author = {Luis Germ{\'a}n P{\'e}rez-Hern{\'a}ndez and Katya Rodr\'{\i}guez-V{\'a}zquez
290 and Ram{\'o}n Gardu{\~n}o-Ju{\'a}rez},
291 title = {Estimation of 3D Protein Structure by means of parallel Particle
293 booktitle = {IEEE Congress on Evolutionary Computation},
296 bibsource = {DBLP, http://dblp.uni-trier.de},
297 crossref = {DBLP:conf/cec/2010},
298 ee = {http://dx.doi.org/10.1109/CEC.2010.5586549}
301 @INPROCEEDINGS{WangNHZH07,
302 author = {Chuntao Wang and Jiangqun Ni and Jiwu Huang and Rongyue Zhang and
304 title = {Robust and High Capacity Image Watermarking Based on Jointly Coding
305 and Embedding Optimization},
306 booktitle = {Information Hiding},
309 bibsource = {DBLP, http://dblp.uni-trier.de},
310 crossref = {DBLP:conf/ih/2007},
311 ee = {http://dx.doi.org/10.1007/978-3-540-77370-2_5},
313 timestamp = {2009.06.29}
316 @INPROCEEDINGS{Zhao04,
317 author = {Jian Zhao and Mingquan Zhou and Hongmei Xie and Jinye Peng and Xin
319 title = {A Novel Wavelet Image Watermarking Scheme Combined with Chaos Sequence
321 booktitle = {ISNN (2)},
324 bibsource = {DBLP, http://dblp.uni-trier.de},
325 crossref = {DBLP:conf/isnn/2004-2},
326 ee = {http://springerlink.metapress.com/openurl.asp?genre=article{\&}issn=0302-9743{\&}volume=3174{\&}spage=663}
329 @INPROCEEDINGS{Acharya05securecomparison,
330 author = {Acharya, Mithun and Girao, Joao and Westhoff, Dirk},
331 title = {Secure Comparison of Encrypted Data in Wireless Sensor Networks},
332 booktitle = {WIOPT '05: Proceedings of the Third International Symposium on Modeling
333 and Optimization in Mobile, Ad Hoc, and Wireless Networks},
336 address = {Washington, DC, USA},
337 publisher = {IEEE Computer Society},
338 doi = {http://dx.doi.org/10.1109/WIOPT.2005.44},
339 isbn = {0-7695-2267-X}
342 @INPROCEEDINGS{Acimez07onthe,
343 author = {Onur Acıi\c{c}mez and \c{C}etin Kaya Ko\c{c} and Jean-Pierre Seifert},
344 title = {On the power of simple branch prediction analysis },
345 booktitle = {2007 ACM Symposium on Information, Computer and Communications Security
349 publisher = {ACM Press}
353 author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},
354 title = {Topological entropy},
355 journal = {Trans. Amer. Math. Soc.},
360 timestamp = {2008.05.29}
363 @INPROCEEDINGS{Agrawal04,
364 author = {Agrawal, Rakesh and Kiernan, Jerry and Srikant, Ramakrishnan and
366 title = {Order preserving encryption for numeric data},
367 booktitle = {SIGMOD '04: Proceedings of the 2004 ACM SIGMOD international conference
368 on Management of data},
371 address = {New York, NY, USA},
373 doi = {http://doi.acm.org/10.1145/1007568.1007632},
374 isbn = {1-58113-859-8},
375 location = {Paris, France}
378 @ARTICLE{Anfinsen20071973,
379 author = {Anfinsen, Christian B.},
380 title = {Principles that Govern the Folding of Protein Chains},
386 doi = {10.1126/science.181.4096.223},
387 eprint = {http://www.sciencemag.org/content/181/4096/223.full.pdf},
388 url = {http://www.sciencemag.org/content/181/4096/223.short}
392 author = {D. G. Arques and C. J. Michel},
393 title = {Analytical expression of the purine/pyrimidine autocorrelation function
394 after and before random mutations.},
395 journal = {Math Biosci},
401 abstract = {The mutation process is a classical evolutionary genetic process.
402 The type of mutations studied here is the random substitutions of
403 a purine base R (adenine or guanine) by a pyrimidine base Y (cytosine
404 or thymine) and reciprocally (transversions). The analytical expressions
405 derived allow us to analyze in genes the occurrence probabilities
406 of motifs and d-motifs (two motifs separated by any d bases) on the
407 R/Y alphabet under transversions. These motif probabilities can be
408 obtained after transversions (in the evolutionary sense; from the
409 past to the present) and, unexpectedly, also before transversions
410 (after back transversions, in the inverse evolutionary sense, from
411 the present to the past). This theoretical part in Section 2 is a
412 first generalization of a particular formula recently derived. The
413 application in Section 3 is based on the analytical expression giving
414 the autocorrelation function (the d-motif probabilities) before transversions.
415 It allows us to study primitive genes from actual genes. This approach
416 solves a biological problem. The protein coding genes of chloroplasts
417 and mitochondria have a preferential occurrence of the 6-motif YRY(N)6YRY
418 (maximum of the autocorrelation function for d = 6, N = R or Y) with
419 a periodicity modulo 3. The YRY(N)6YRY preferential occurrence without
420 the periodicity modulo 3 is also observed in the RNA coding genes
421 (ribosomal, transfer, and small nuclear RNA genes) and in the noncoding
422 genes (introns and 5' regions of eukaryotic nuclei). However, there
423 are two exceptions to this YRY(N)6YRY rule: the protein coding genes
424 of eukaryotic nuclei, and prokaryotes, where YRY(N)6YRY has the second
425 highest value after YRY(N)0YRY (YRYYRY) with a periodicity modulo
426 3. When we go backward in time with the analytical expression, the
427 protein coding genes of both eukaryotic nuclei and prokaryotes retrieve
428 the YRY(N)6YRY preferential occurrence with a periodicity modulo
429 3 after 0.2 back transversions per base. In other words, the actual
430 protein coding genes of chloroplasts and mitochondria are similar
431 to the primitive protein coding genes of eukaryotic nuclei and prokaryotes.
432 On the other hand, this application represents the first result concerning
433 the mutation process in the model of DNA sequence evolution we recently
434 proposed. According to this model, the actual genes on the R/Y alphabet
435 derive from two successive evolutionary genetic processes: an independent
436 mixing of a few nonrandom types of oligonucleotides leading to genes
437 called primitive followed by a mutation process in these primitive
438 genes.(ABSTRACT TRUNCATED AT 400 WORDS)},
439 institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon,
441 keywords = {Base Sequence; Biological Evolution; DNA, genetics; Mathematics; Models,
442 Genetic; Mutation; Probability; Proteins, genetics; Purines; Pyrimidines},
444 medline-pst = {ppublish},
446 pii = {0025-5564(94)90020-5},
448 timestamp = {2011.05.05}
452 author = {D. G. Arquès and J. P. Fallot and C. J. Michel},
453 title = {An evolutionary analytical model of a complementary circular code
454 simulating the protein coding genes, the 5' and 3' regions.},
455 journal = {Bull Math Biol},
461 abstract = {The self-complementary subset T0 = X0 [symbol: see text] ¿AAA, TTT¿
462 with X0 = ¿AAC, AAT, ACC, ATC, ATT, CAG, CTC, CTG, GAA, GAC, GAG,
463 GAT, GCC, GGC, GGT, GTA, GTC, GTT, TAC, TTC¿ of 22 trinucleotides
464 has a preferential occurrence in the frame 0 (reading frame established
465 by the ATG start trinucleotide) of protein (coding) genes of both
466 prokaryotes and eukaryotes. The subsets T1 = X1 [symbol: see text]
467 ¿CCC¿ and T2 = X2 [symbol: see text] ¿GGG¿ of 21 trinucleotides have
468 a preferential occurrence in the shifted frames 1 and 2 respectively
469 (frame 0 shifted by one and two nucleotides respectively in the 5'-3'
470 direction). T1 and T2 are complementary to each other. The subset
471 T0 contains the subset X0 which has the rarity property (6 x 10(-8)
472 to be a complementary maximal circular code with two permutated maximal
473 circular codes X1 and X2 in the frames 1 and 2 respectively. X0 is
474 called a C3 code. A quantitative study of these three subsets T0,
475 T1, T2 in the three frames 0, 1, 2 of protein genes, and the 5' and
476 3' regions of eukaryotes, shows that their occurrence frequencies
477 are constant functions of the trinucleotide positions in the sequences.
478 The frequencies of T0, T1, T2 in the frame 0 of protein genes are
479 49, 28.5 and 22.5\% respectively. In contrast, the frequencies of
480 T0, T1, T2 in the 5' and 3' regions of eukaryotes, are independent
481 of the frame. Indeed, the frequency of T0 in the three frames of
482 5' (respectively 3') regions is equal to 35.5\% (respectively 38\%)
483 and is greater than the frequencies T1 and T2, both equal to 32.25\%
484 (respectively 31\%) in the three frames. Several frequency asymmetries
485 unexpectedly observed (e.g. the frequency difference between T1 and
486 T2 in the frame 0), are related to a new property of the subset T0
487 involving substitutions. An evolutionary analytical model at three
488 parameters (p, q, t) based on an independent mixing of the 22 codons
489 (trinucleotides in frame 0) of T0 with equiprobability (1/22) followed
490 by t approximately 4 substitutions per codon according to the proportions
491 p approximately 0.1, q approximately 0.1 and r = 1 - p - q approximately
492 0.8 in the three codon sites respectively, retrieves the frequencies
493 of T0, T1, T2 observed in the three frames of protein genes and explains
494 these asymmetries. Furthermore, the same model (0.1, 0.1, t) after
495 t approximately 22 substitutions per codon, retrieves the statistical
496 properties observed in the three frames of the 5' and 3' regions.
497 The complex behaviour of these analytical curves is totally unexpected
498 and a priori difficult to imagine.},
499 doi = {10.1006/bulm.1997.0033},
500 institution = {Equipe de Biologie Théorique, Université de Marne la Vallée, Institut
501 Gaspard Monge, Noisy Le Grand, France. arques@univ-mlv.fr},
502 keywords = {Animals; Biological Evolution; Codon, genetics; Genetic Code; Humans;
503 Mammals; Models, Genetic; Probability; Proteins, genetics; Rodentia;
506 medline-pst = {ppublish},
508 pii = {S0092-8240(97)90033-1},
510 timestamp = {2011.05.05},
511 url = {http://dx.doi.org/10.1006/bulm.1997.0033}
515 author = {D. G. Arquès and C. J. Michel},
516 title = {Analytical expression of the purine/pyrimidine codon probability
517 after and before random mutations.},
518 journal = {Bull Math Biol},
521 pages = {1025--1038},
524 abstract = {Recently, we proposed a new model of DNA sequence evolution (Arquès
525 and Michel. 1990b. Bull. math. Biol. 52, 741-772) according to which
526 actual genes on the purine/pyrimidine (R/Y) alphabet (R = purine
527 = adenine or guanine, Y = pyrimidine = cytosine or thymine) are the
528 result of two successive evolutionary genetic processes: (i) a mixing
529 (independent) process of non-random oligonucleotides (words of base
530 length less than 10: YRY(N)6, YRYRYR and YRYYRY are so far identified;
531 N = R or Y) leading to primitive genes (words of several hundreds
532 of base length) and followed by (ii) a random mutation process, i.e.,
533 transformations of a base R (respectively Y) into the base Y (respectively
534 R) at random sites in these primitive genes. Following this model
535 the problem investigated here is the study of the variation of the
536 8 R/Y codon probabilities RRR, ..., YYY under random mutations. Two
537 analytical expressions solved here allow analysis of this variation
538 in the classical evolutionary sense (from the past to the present,
539 i.e., after random mutations), but also in the inverted evolutionary
540 sense (from the present to the past, i.e., before random mutations).
541 Different properties are also derived from these formulae. Finally,
542 a few applications of these formulae are presented. They prove the
543 proposition in Arquès and Michel (1990b. Bull. math. Biol. 52, 741-772),
544 Section 3.3.2, with the existence of a maximal mean number of random
545 mutations per base of the order 0.3 in the protein coding genes.
546 They also confirm the mixing process of oligonucleotides by excluding
547 the purine/pyrimidine contiguous and alternating tracts from the
548 formation process of primitive genes.},
549 institution = {Université de Franche-Comté, Besançon, France.},
550 keywords = {Base Sequence; Codon; DNA, chemistry/genetics; Mathematics; Models,
551 Genetic; Mutation; Probability; Purines; Pyrimidines},
553 medline-pst = {ppublish},
556 timestamp = {2011.05.05}
559 @ARTICLE{Arques1993b,
560 author = {D. G. Arquès and C. J. Michel},
561 title = {Identification and simulation of new non-random statistical properties
562 common to different eukaryotic gene subpopulations.},
563 journal = {Biochimie},
568 abstract = {The nucleotide distribution in protein coding genes, introns and transfer
569 RNA genes of eukaryotic subpopulations (primates, rodent and mammals)
570 is studied by autocorrelation functions. The autocorrelation function
571 analysing the occurrence probability of the i-motif YRY(N)iYRY (YRY-function)
572 in protein coding genes and transfer RNA genes of these three eukaryotic
573 subpopulations retrieves the preferential occurrence of YRY(N)6YRY
574 (R = purine = adenine or guanine, Y = pyrimidine = cytosine or thymine,
575 N = R or Y). The autocorrelation functions analysing the occurrence
576 probability of the i-motifs RRR(N)iRRR (RRR-function) and YYY(N)iYYY
577 (YYY-function) identify new non-random genetic statistical properties
578 in these three eukaryotic subpopulations, mainly: i) in their protein
579 coding genes: local maxima for i identical to 6 [12] (peaks for i
580 = 6, 18, 30, 42) with the RRR-function and local maxima for i identical
581 to 8 [10] (peaks for i = 8, 18, 28) with the YYY-function; and ii)
582 in their introns: local maxima for i identical to 3 [6] (peaks for
583 i = 3, 9, 15) and a short linear decrease followed by a large exponential
584 decrease both with the RRR- and YYY-functions. The non-random properties
585 identified in eukaryotic intron subpopulations are modelised with
586 a process of random insertions and deletions of nucleotides simulating
588 institution = {Equipe de Biologie Théorique, Université de Franche-Comté, Laboratoire
589 d'Informatique de Besançon, France.},
590 keywords = {Animals; Base Sequence; Data Interpretation, Statistical; Genes; Introns;
591 Mammals; Models, Genetic; Primates; Probability; Proteins, genetics;
592 RNA Editing; RNA, Transfer, genetics; Rodentia; Sequence Analysis,
595 medline-pst = {ppublish},
597 pii = {0300-9084(93)90173-P},
599 timestamp = {2011.05.05}
603 author = {D. G. Arquès and C. J. Michel},
604 title = {A simulation of the genetic periodicities modulo 2 and 3 with processes
605 of nucleotide insertions and deletions.},
606 journal = {J Theor Biol},
612 abstract = {Recently, a new genetic process termed RNA editing has been identified
613 showing insertions and deletions of nucleotides in particular RNA
614 molecules. On the other hand, there are a few non-random statistical
615 properties in genes: in particular, the periodicity modulo 3 (P3)
616 associated with an open reading frame, the periodicity modulo 2 (P2)
617 associated with alternating purine/pyrimidine stretches, the YRY(N)6YRY
618 preferential occurrence (R = purine = adenine or guanine, Y = pyrimidine
619 = cytosine or thymine, N = R or Y) representing a "code" of the DNA
620 helix pitch, etc. The problem investigated here is whether a process
621 of the type RNA editing can lead to the non-random statistical properties
622 commonly observed in genes. This paper will show in particular that:
623 The process of insertions and deletions of mononucleotides in the
624 initial sequence [YRY(N)3]* [series of YRY(N)3] can lead to the periodicity
625 modulo 2 (P2). The process of insertions and deletions of trinucleotides
626 in the initial sequence [YRY(N)6]* [series of YRY(N)6] can lead to
627 the periodicity modulo 3 (P3) and the YRY(N)6YRY preferential occurrence.
628 Furthermore, these two processes lead to a strong correlation with
629 the reality, namely the mononucleotide insertion/deletion process,
630 with the 5' eukaryotic regions and the trinucleotide insertion/deletion
631 process, with the eukaryotic protein coding genes.},
632 institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon,
633 Unité Associée CNRS No 822, France.},
634 keywords = {Chromosome Deletion; Computer Simulation; Humans; Models, Genetic;
635 Mutagenesis, genetics; RNA, genetics},
637 medline-pst = {ppublish},
640 timestamp = {2011.05.05}
644 author = {D. G. Arquès and C. J. Michel},
645 title = {Periodicities in coding and noncoding regions of the genes.},
646 journal = {J Theor Biol},
652 abstract = {Gene population statistical studies of protein coding genes and introns
653 have identified two types of periodicities on the purine/pyrimidine
654 alphabet: (i) the modulo 3 periodicity or coding periodicity (periodicity
655 P3) in protein coding genes of eukaryotes, prokaryotes, viruses,
656 chloroplasts, mitochondria, plasmids and in introns of viruses and
657 mitochondria, and (ii) the modulo 2 periodicity (periodicity P2)
658 in the eukaryotic introns. The periodicity study is herein extended
659 to the 5' and 3' regions of eukaryotes, prokaryotes and viruses and
660 shows: (i) the periodicity P3 in the 5' and 3' regions of eukaryotes.
661 Therefore, these observations suggest a unitary and dynamic concept
662 for the genes as for a given genome, the 5' and 3' regions have the
663 genetic information for protein coding genes and for introns: (1)
664 In the eukaryotic genome, the 5' (P2 and P3) and 3' (P2 and P3) regions
665 have the information for protein coding genes (P3) and for introns
666 (P2). The intensity of P3 is high in 5' regions and weak in 3' regions,
667 while the intensity of P2 is weak in 5' regions and high in 3' regions.
668 (2) In the prokaryotic genome, the 5' (P3) and 3' (P3) regions have
669 the information for protein coding genes (P3). (3) In the viral genome,
670 the 5' (P3) and 3' (P3) regions have the information for protein
671 coding genes (P3) and for introns (P3). The absence of P2 in viral
672 introns (in opposition to eukaryotic introns) may be related to the
673 absence of P2 in 5' and 3' regions of viruses.},
674 institution = {Université de Franche-Comté, Unité Associée CNRS No. 822, Besançon,
676 keywords = {Animals; Base Sequence; Eukaryotic Cells; Genes; Introns; Prokaryotic
677 Cells; Purine Nucleotides; Pyrimidine Nucleotides; Repetitive Sequences,
678 Nucleic Acid; Viruses, genetics},
680 medline-pst = {ppublish},
683 timestamp = {2011.05.05}
686 @ARTICLE{Arques1990a,
687 author = {D. G. Arquès and C. J. Michel},
688 title = {A model of DNA sequence evolution.},
689 journal = {Bull Math Biol},
694 abstract = {Statistical studies of gene populations on the purine/pyrimidine alphabet
695 have shown that the mean occurrence probability of the i-motif YRY(N)iYRY
696 (R = purine, Y = pyrimidine, N = R or Y) is not uniform by varying
697 i in the range, but presents a maximum at i = 6 in the following
698 populations: protein coding genes of eukaryotes, prokaryotes, chloroplasts
699 and mitochondria, and also viral introns, ribosomal RNA genes and
700 transfer RNA genes (Arquès and Michel, 1987b, J. theor. Biol. 128,
701 457-461). From the "universality" of this observation, we suggested
702 that the oligonucleotide YRY(N)6 is a primitive one and that it has
703 a central function in DNA sequence evolution (Arquès and Michel,
704 1987b, J. theor. Biol. 128, 457-461). Following this idea, we introduce
705 a concept of a model of DNA sequence evolution which will be validated
706 according to a schema presented in three parts. In the first part,
707 using the last version of the gene database, the YRY(N)6YRY preferential
708 occurrence (maximum at i = 6) is confirmed for the populations mentioned
709 above and is extended to some newly analysed populations: chloroplast
710 introns, chloroplast 5' regions, mitochondrial 5' regions and small
711 nuclear RNA genes. On the other hand, the YRY(N)6YRY preferential
712 occurrence and periodicities are used in order to classify 18 gene
713 populations. In the second part, we will demonstrate that several
714 statistical features characterizing different gene populations (in
715 particular the YRY(N)6YRY preferential occurrence and the periodicities)
716 can be retrieved from a simple Markov model based on the mixing of
717 the two oligonucleotides YRY(N)6 and YRY(N)3 and based on the percentages
718 of RYR and YRY in the unspecified trinucleotides (N)3 of YRY(N)6
719 and YRY(N)3. Several properties are identified and prove in particular
720 that the oligonucleotide mixing is an independent process and that
721 several different features are functions of a unique parameter. In
722 the third part, the return of the model to the reality shows a strong
723 correlation between reality and simulation concerning the presence
724 of a large alternating purine/pyrimidine stretches and of periodicities.
725 It also contributes to a greater understanding of biological reality,
726 e.g. the presence or the absence of large alternating purine/pyrimidine
727 stretches can be explained as being a simple consequence of the mixing
728 of two particular oligonucleotides. Finally, we believe that such
729 an approach is the first step toward a unified model of DNA sequence
730 evolution allowing the molecular understanding of both the origin
731 of life and the actual biological reality.},
732 institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon,
733 Unité Associée CNRS No 822, France.},
734 keywords = {Base Sequence; Biological Evolution; DNA, genetics; Genetics, Population;
737 medline-pst = {ppublish},
740 timestamp = {2011.05.05}
743 @ARTICLE{Arques1993a,
744 author = {D. G. Arquès and C. J. Michel and K. Orieux},
745 title = {Identification and simulation of new non-random statistical properties
746 common to different populations of eukaryotic non-coding genes.},
747 journal = {J Theor Biol},
753 abstract = {The autocorrelation function analysing the occurrence probability
754 of the i-motif YRY(N)iYRY in genes allows the identification of mainly
755 two periodicities modulo 2, 3 and the preferential occurrence of
756 the motif YRY(N)6YRY (R = purine = adenine or guanine, Y = pyrimidine
757 = cytosine or thymine, N = R or Y). These non-random genetic statistical
758 properties can be simulated by an independent mixing of the three
759 oligonucleotides YRYRYR, YRYYRY and YRY(N)6 (Arquès & Michel, 1990b).
760 The problem investigated in this study is whether new properties
761 can be identified in genes with other autocorrelation functions and
762 also simulated with an oligonucleotide mixing model. The two autocorrelation
763 functions analysing the occurrence probability of the i-motifs RRR(N)iRRR
764 and YYY(N)iYYY simultaneously identify three new non-random genetic
765 statistical properties: a short linear decrease, local maxima for
766 i identical to 3[6] (i = 3, 9, etc) and a large exponential decrease.
767 Furthermore, these properties are common to three different populations
768 of eukaryotic non-coding genes: 5' regions, introns and 3' regions
769 (see section 2). These three non-random properties can also be simulated
770 by an independent mixing of the four oligonucleotides R8, Y8, RRRYRYRRR,
771 YYYRYRYYY and large alternating R/Y series. The short linear decrease
772 is a result of R8 and Y8, the local maxima for i identical to 3[6],
773 of RRRYRYRRR and YYYRYRYYY, and the large exponential decrease, of
774 large alternating R/Y series (section 3). The biological meaning
775 of these results and their relation to the previous oligonucleotide
776 mixing model are presented in the Discussion.},
777 doi = {10.1006/jtbi.1993.1059},
778 institution = {Equipe de Biologie Théorique, Université de Franche-Comté, Laboratoire
779 d'Informatique de Besançon, France.},
780 keywords = {Animals; Biological Evolution; Genes, genetics; Models, Genetic; Models,
781 Statistical; Mutation, genetics; Oligonucleotides, genetics; Probability},
783 medline-pst = {ppublish},
785 pii = {S0022-5193(83)71059-3},
787 timestamp = {2011.05.05},
788 url = {http://dx.doi.org/10.1006/jtbi.1993.1059}
792 author = {David Arroyo and Gonzalo Alvarez and Veronica Fernandez},
793 title = {On the inadequacy of the logistic map for cryptographic applications},
794 journal = {X Reunión Española sobre Criptología y Seguridad de la Información
799 owner = {christophe},
800 timestamp = {2010.03.01}
803 @MISC{Backofen99algorithmicapproach,
804 author = {R. Backofen and S. Will and P. Clote},
805 title = {Algorithmic Approach To Quantifying The Hydrophobic Force Contribution
811 @inproceedings{Blum:1985:EPP:19478.19501,
812 author = {Blum, Manuel and Goldwasser, Shafi},
813 title = {An efficient probabilistic public key encryption scheme which hides all partial information},
814 booktitle = {Proceedings of CRYPTO 84 on Advances in cryptology},
816 isbn = {0-387-15658-5},
817 location = {Santa Barbara, California, United States},
820 url = {http://dl.acm.org/citation.cfm?id=19478.19501},
822 publisher = {Springer-Verlag New York, Inc.},
823 address = {New York, NY, USA},
824 keywords = {chosen cyphertext attack, integer factorization, partial information, passive adversaries, probabilistic encryption},
828 @INPROCEEDINGS{bcgr11:ip,
829 author = {Bahi, Jacques M. and Couchot, Jean-fran\c{c}ois and Guyeux, Christophe
830 and Richard, Adrien},
831 title = {On the Link Between Strongly Connected Iteration Graphs and Chaotic
832 Boolean Discrete-Time Dynamical Systems},
833 booktitle = {FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory},
838 address = {Oslo, Norway},
842 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
848 author = {Bahi, Jacques M. and Guyeux, Christophe},
849 title = {Hash Functions Using Chaotic Iterations},
850 journal = {Journal of Algorithms \& Computational Technology},
856 doi = {10.1260/1748-3018.4.2.167},
857 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
862 url = {http://dx.doi.org/10.1260/1748-3018.4.2.167}
865 @INPROCEEDINGS{guyeux10ter,
866 author = {Bahi, Jacques M. and Guyeux, Christophe},
867 title = {A new chaos-based watermarking algorithm},
868 booktitle = {SECRYPT'10, Int. conf. on security and cryptography},
871 address = {Athens, Greece},
873 publisher = {SciTePress},
875 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
880 @INPROCEEDINGS{bgc11:ip,
881 author = {Bahi, Jacques M. and Guyeux, Christophe and Cote, Nathalie},
882 title = {Chaos of Protein Folding},
883 booktitle = {IJCNN 2011, Int. Joint Conf. on Neural Networks},
886 address = {San Jose, California, United States},
890 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
895 @INPROCEEDINGS{guyeux10bis,
896 author = {Bahi, Jacques M. and Guyeux, Christophe and Makhoul, Abdallah},
897 title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor
899 booktitle = {SENSORCOMM'10, 4-th Int. Conf. on Sensor Technologies and Applications},
902 address = {Venice-Mestre, Italy},
905 doi = {10.1109/SENSORCOMM.2010.76},
906 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
909 url = {http://dx.doi.org/10.1109/SENSORCOMM.2010.76}
912 @INPROCEEDINGS{guyeuxVictoria,
913 author = {Bahi, Jacques M. and Guyeux, Christophe and Makhoul, Abdallah},
914 title = {Secure Data Aggregation in Wireless Sensor Networks. Homomorphism
915 versus Watermarking Approach},
916 booktitle = {ADHOCNETS 2010, 2nd Int. Conf. on Ad Hoc Networks},
919 series = {Lecture Notes in ICST},
921 address = {Victoria, Canada},
924 doi = {10.1007/978-3-642-17994-5_23},
925 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
928 url = {http://dx.doi.org/10.1007/978-3-642-17994-5_23}
931 @INPROCEEDINGS{bgs11:ip,
932 author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel},
933 title = {Building a Chaotic Proven Neural Network},
934 booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network
938 address = {Maldives, Maldives},
941 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
946 @INPROCEEDINGS{bgw10:ip,
947 author = {Bahi, Jacques M. and Guyeux, Christophe and Wang, Qianxue},
948 title = {A Pseudo Random Numbers Generator Based on Chaotic Iterations. Application
950 booktitle = {WISM 2010, Int. Conf. on Web Information Systems and Mining},
955 address = {Sanya, China},
958 doi = {10.1007/978-3-642-16515-3_26},
959 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
962 url = {http://dx.doi.org/10.1007/978-3-642-16515-3_26}
965 @INPROCEEDINGS{bgw09:ip,
966 author = {Bahi, Jacques M. and Guyeux, Christophe and Wang, Qianxue},
967 title = {A novel pseudo-random generator based on discrete chaotic iterations},
968 booktitle = {INTERNET'09, 1-st Int. Conf. on Evolving Internet},
971 address = {Cannes, France},
974 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
979 @INPROCEEDINGS{bmg10:onp,
980 author = {Bahi, Jacques M. and Makhoul, Abdallah and Guyeux, Christophe},
981 title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor
982 Networks for critical applications},
983 booktitle = {RESSACS, Journ\'ee th\'ematique PHC/ResCom sur RESeaux de capteurS
984 et Applications Critiques de Surveillance},
986 address = {Bayonne, France},
988 note = {Communication orale},
990 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
995 @INPROCEEDINGS{guyeuxBayonne,
996 author = {Bahi, Jacques M. and Makhoul, Abdallah and Guyeux, Christophe},
997 title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor
998 Networks for critical applications},
999 booktitle = {RESSACS, Journ\'ee th\'ematique PHC/ResCom sur RESeaux de capteurS
1000 et Applications Critiques de Surveillance},
1002 address = {Bayonne, France},
1004 note = {Communication orale},
1011 author = {Bahi, Jacques M. and Salomon, Michel},
1012 title = {A Decentralized Energy-based Diffusion Algorithm to Increase the
1013 Lifetime of {MANETs}},
1014 journal = {Computer Networks Journal},
1017 note = {Accepted manuscript. To appear},
1018 classement = {ACLI},
1020 impact-factor = {1.201},
1023 publisher = {Elsevier}
1027 author = {J. M. Bahi},
1028 title = {Boolean totally asynchronous iterations},
1029 journal = {Int. Journal of Mathematical Algorithms},
1034 timestamp = {17/02/2008}
1037 @ARTICLE{Bahi2000bis,
1038 author = {Jacques M. Bahi},
1039 title = {Asynchronous iterative algorithms for nonexpansive linear systems},
1040 journal = {Journal of Parallel and Distributed Computing},
1045 timestamp = {2009.01.10}
1049 author = {J. M. Bahi},
1050 title = {Parallel synchronous chaotic iterations for singular linear systems},
1051 journal = {Parallel Algorithms and Applications},
1056 timestamp = {17/02/2008}
1060 author = {Jacques M. Bahi},
1061 title = {Algorithmes paralleles asynchrones pour les systemes singuliers},
1062 journal = {Comptes Rendus de l'Academie des Sciences},
1064 volume = {t. 326, serie 1},
1065 pages = {1421--1425},
1067 timestamp = {2009.01.18}
1071 author = {Jacques M. Bahi},
1072 title = {Méthodes itératives dans des espaces produits. Application au calcul
1074 school = {Université de Franche-Comté},
1076 type = {Habilitation à diriger des recherches},
1077 owner = {christophe},
1078 timestamp = {2010.08.24}
1082 author = {Jacques M. Bahi},
1083 title = {Algorithmes asynchrones pour des systèmes différentiels-algébriques.
1084 Simulation numérique sur des exemples de circuits électriques},
1085 school = {Université de Franche-Comté},
1087 owner = {christophe},
1088 timestamp = {2010.08.24}
1092 author = {Jacques M. Bahi and Sylvain Contassot-Vivier},
1093 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
1095 journal = {IEEE Transactions on Neural Networks},
1102 timestamp = {2009.12.04}
1106 author = {J.~M. Bahi and S. Contassot-Vivier},
1107 title = {Stability of fully asynchronous discrete-time discrete state dynamic
1109 journal = {IEEE Transactions on Neural Networks},
1112 pages = {1353-1363},
1114 timestamp = {2009.02.14}
1117 @TECHREPORT{bcgg10:ir,
1118 author = {Bahi, J. M. and Couchot, J.-F. and Grasset, O. and Guyeux, C.},
1119 title = {{D}iscrete {D}ynamical {S}ystems: {N}ecessary {D}ivergence {C}onditions
1120 for {S}ynchronous {I}terations},
1121 institution = {LIFC - Laboratoire d'{I}nformatique de l'{U}niversit\'{e} de {F}ranche
1124 type = {Research Report},
1125 number = {RR2010-04},
1127 pdf = {/~publis/papers/pub/2010/RR2010-04.pdf}
1131 author = {Bahi, Jacques M. and Guyeux, Christophe},
1132 title = {Hash Functions Using Chaotic Iterations},
1133 journal = {Journal of Algorithms \& Computational Technology},
1138 classement = {ACLNI},
1139 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1141 impact-factor = {#},
1146 @INPROCEEDINGS{guyeux10,
1147 author = {Bahi, Jacques M. and Guyeux, Christophe},
1148 title = {Topological chaos and chaotic iterations, application to Hash functions},
1149 booktitle = {WCCI'10, IEEE World Congress on Computational Intelligence},
1152 address = {Barcelona, Spain},
1154 note = {Best paper award},
1155 classement = {ACTI},
1156 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1162 author = {Jacques M. Bahi and Christophe Guyeux},
1163 title = {A chaos-based approach for information hiding security.},
1164 howpublished = {arXiv},
1167 institution = {Computer Science Laboratory LIFC, University of Franche-Comte, France}
1171 author = {Jacques M. Bahi and Christophe Guyeux},
1172 title = {A watermarking algorithm satisfying topological chaos properties},
1175 volume = {abs/0810.4713},
1176 bibsource = {DBLP, http://dblp.uni-trier.de},
1177 ee = {http://arxiv.org/abs/0810.4713}
1181 author = {Jacques M. Bahi and Christophe Guyeux},
1182 title = {Chaotic iterations and topological chaos},
1184 abstract = {Chaotic iterations have been introduced on the one hand by Chazan,
1185 Miranker [5] and Miellou [9] in a numerical analysis context, and
1186 on the other hand by Robert [11] and Pellegrin [10] in the discrete
1187 dynamical systems framework. In both cases, the objective was to
1188 derive conditions of convergence of such iterations to a fixed state.
1189 In this paper, a new point of view is presented, the goal here is
1190 to derive conditions under which chaotic iterations admit a chaotic
1191 behaviour in a rigorous mathematical sense. Contrary to what has
1192 been studied in the literature, convergence is not desired. More
1193 precisely, we establish in this paper a link between the concept
1194 of chaotic iterations on a finite set and the notion of topological
1195 chaos [8], [6], [7]. We are motivated by concrete applications of
1196 our approach, such as the use of chaotic boolean iterations in the
1197 computer security field. Indeed, the concept of chaos is used in
1198 many areas of data security without real rigorous theoretical foundations,
1199 and without using the fundamental properties that allow chaos. The
1200 wish of this paper is to bring a bit more mathematical rigour in
1202 citeseerurl = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}},
1204 comments = {6 pages},
1205 eprint = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}},
1206 oai2identifier = {0810.3154},
1208 timestamp = {2008.10.23},
1209 url = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}}
1212 @ARTICLE{arxivRNNchaos,
1213 author = {Jacques M. Bahi and Christophe Guyeux and Michel Salomon},
1214 title = {Building a Chaotic Proved Neural Network},
1217 volume = {abs/1101.4351},
1218 ee = {http://arxiv.org/abs/1101.4351}
1221 @INPROCEEDINGS{guyeuxTaiwan10,
1222 author = {Bahi, Jacques M. and Guyeux, Christophe and Wang, Qianxue},
1223 title = {Improving random number generators by chaotic iterations. Application
1225 booktitle = {ICCASM 2010, Int. Conf. on Computer Application and System Modeling},
1227 pages = {V13-643--V13-647},
1228 address = {Taiyuan, China},
1230 classement = {ACTI},
1231 doi = {10.1109/ICCASM.2010.5622199},
1232 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1235 url = {http://dx.doi.org/10.1109/ICCASM.2010.5622199}
1239 author = {Jacques M Bahi and Christian J Michel},
1240 title = {A stochastic model of gene evolution with time dependent pseudochaotic
1242 journal = {Bull Math Biol},
1248 abstract = {We develop here a new class of stochastic models of gene evolution
1249 in which a random subset of the 64 possible trinucleotides mutates
1250 at each evolutionary time t according to some time dependent substitution
1251 probabilities. Therefore, at each time t, the numbers and the types
1252 of mutable trinucleotides are unknown. Thus, the mutation matrix
1253 changes at each time t. This pseudochaotic model developed generalizes
1254 the standard model in which all the trinucleotides mutate at each
1255 time t. It determines the occurrence probabilities at time t of trinucleotides
1256 which pseudochaotically mutate according to 3 time dependent substitution
1257 parameters associated with the 3 trinucleotide sites. The main result
1258 proves that under suitable assumptions, this pseudochaotic model
1259 converges to a uniform probability vector identical to that of the
1260 standard model. Furthermore, an application of this pseudochaotic
1261 model allows an evolutionary study of the 3 circular codes identified
1262 in both eukaryotic and prokaryotic genes. A circular code is a particular
1263 set of trinucleotides whose main property is the retrieval of the
1264 frames in genes locally, i.e., anywhere in genes and particularly
1265 without start codons, and automatically with a window of a few nucleotides.
1266 After a certain evolutionary time and with particular time dependent
1267 functions for the 3 substitution parameters, precisely an exponential
1268 decrease in the 1st and 2nd trinucleotide sites and an exponential
1269 increase in the 3rd one, this pseudochaotic model retrieves the main
1270 statistical properties of the 3 circular codes observed in genes.
1271 Furthermore, it leads to a circular code asymmetry stronger than
1272 the standard model (nonpseudochaotic) and, therefore, to a better
1273 correlation with the genes.},
1274 doi = {10.1007/s11538-008-9376-4},
1275 institution = {LIFC-EA 4157, Université de Franche-Comté, IUT de Belfort, BP 527,
1276 90016, Belfort Cedex, France. jacques.bahi@univ-fcomte.fr},
1277 keywords = {Evolution, Molecular; Genes; Models, Genetic; Mutation; Stochastic
1280 medline-pst = {ppublish},
1283 timestamp = {2011.05.05},
1284 url = {http://dx.doi.org/10.1007/s11538-008-9376-4}
1288 author = {Jacques M Bahi and Christian J Michel},
1289 title = {A stochastic model of gene evolution with chaotic mutations.},
1290 journal = {J Theor Biol},
1296 abstract = {We develop here a new class of stochastic models of gene evolution
1297 in which the mutations are chaotic, i.e. a random subset of the 64
1298 possible trinucleotides mutates at each evolutionary time t according
1299 to some substitution probabilities. Therefore, at each time t, the
1300 numbers and the types of mutable trinucleotides are unknown. Thus,
1301 the mutation matrix changes at each time t. The chaotic model developed
1302 generalizes the standard model in which all the trinucleotides mutate
1303 at each time t. It determines the occurrence probabilities at time
1304 t of trinucleotides which chaotically mutate according to three substitution
1305 parameters associated with the three trinucleotide sites. Two theorems
1306 prove that this chaotic model has a probability vector at each time
1307 t and that it converges to a uniform probability vector identical
1308 to that of the standard model. Furthermore, four applications of
1309 this chaotic model (with a uniform random strategy for the 64 trinucleotides
1310 and with a particular strategy for the three stop codons) allow an
1311 evolutionary study of the three circular codes identified in both
1312 eukaryotic and prokaryotic genes. A circular code is a particular
1313 set of trinucleotides whose main property is the retrieval of the
1314 frames in genes locally, i.e. anywhere in genes and particularly
1315 without start codons, and automatically with a window of a few nucleotides.
1316 After a certain evolutionary time and with particular values for
1317 the three substitution parameters, the chaotic models retrieve the
1318 main statistical properties of the three circular codes observed
1319 in genes. These applications also allow an evolutionary comparison
1320 between the standard and chaotic models.},
1321 doi = {10.1016/j.jtbi.2008.07.028},
1322 institution = {LIFC-EA 4157, Université de Franche-Comté, IUT de Belfort, BP 527,
1323 90016 Belfort Cedex, France. jacques.bahi@univ-fcomte.fr},
1324 keywords = {Animals; Computer Simulation; DNA, Circular, genetics; Evolution,
1325 Molecular; Genetic Code; Models, Genetic; Mutation; Nonlinear Dynamics;
1326 Stochastic Processes; Time},
1328 medline-pst = {ppublish},
1330 pii = {S0022-5193(08)00395-0},
1332 timestamp = {2011.05.05},
1333 url = {http://dx.doi.org/10.1016/j.jtbi.2008.07.028}
1336 @ARTICLE{Bahi2008bis,
1337 author = {Bahi, J. M. and Michel, C. J.},
1338 title = {A stochastic model of gene evolution with chaotic mutations},
1339 journal = {Journal of Theoretical Biology},
1344 timestamp = {2009.01.10}
1348 author = {Jacques M Bahi and Christian J Michel},
1349 title = {A stochastic gene evolution model with time dependent mutations.},
1350 journal = {Bull Math Biol},
1356 abstract = {We develop here a new class of gene evolution models in which the
1357 nucleotide mutations are time dependent. These models allow to study
1358 nonlinear gene evolution by accelerating or decelerating the mutation
1359 rates at different evolutionary times. They generalize the previous
1360 ones which are based on constant mutation rates. The stochastic model
1361 developed in this class determines at some time t the occurrence
1362 probabilities of trinucleotides mutating according to 3 time dependent
1363 substitution parameters associated with the 3 trinucleotide sites.
1364 Therefore, it allows to simulate the evolution of the circular code
1365 recently observed in genes. By varying the class of function for
1366 the substitution parameters, 1 among 12 models retrieves after mutation
1367 the statistical properties of the observed circular code in the 3
1368 frames of actual genes. In this model, the mutation rate in the 3rd
1369 trinucleotide site increases during gene evolution while the mutation
1370 rates in the 1st and 2nd sites decrease. This property agrees with
1371 the actual degeneracy of the genetic code. This approach can easily
1372 be generalized to study evolution of motifs of various lengths, e.g.,
1373 dicodons, etc., with time dependent mutations.},
1374 doi = {10.1016/j.bulm.2003.10.004},
1375 institution = {LIFC - FRE CNRS 2661, IUT de Belfort, Université de Franche-Comté,
1376 BP 527, 90016 Belfort Cédex, France. bahi@iut-bm.univ-fcomte.fr},
1377 keywords = {Codon, genetics; Evolution, Molecular; Genes, genetics; Genetic Code,
1378 genetics; Models, Genetic; Mutation; Stochastic Processes},
1380 medline-pst = {ppublish},
1382 pii = {S0092824003001174},
1384 timestamp = {2011.05.05},
1385 url = {http://dx.doi.org/10.1016/j.bulm.2003.10.004}
1389 author = {J. Banks and J. Brooks and G. Cairns and P. Stacey},
1390 title = {On Devaney's Definition of Chaos},
1391 journal = {Amer. Math. Monthly},
1397 timestamp = {27/01/2008}
1401 author = {E. Barker and A. Roginsky},
1402 title = {DRAFT NIST Special Publication 800-131 Recommendation for the Transitioning
1403 of Cryptographic Algorithms and Key Sizes},
1405 owner = {christophe},
1406 timestamp = {2010.08.18}
1410 author = {Mauro Barni and Franco Bartolini and Teddy Furon},
1411 title = {A general framework for robust watermarking security},
1412 journal = {Signal Processing},
1415 pages = {2069-2084},
1417 note = {Special issue on Security of Data Hiding Technologies, invited paper},
1418 bibsource = {DBLP, http://dblp.uni-trier.de},
1419 ee = {http://dx.doi.org/10.1016/S0165-1684(03)00168-3},
1421 timestamp = {2009.06.30}
1425 author = {Baudet, G\'{e}rard M.},
1426 title = {Asynchronous Iterative Methods for Multiprocessors},
1432 address = {New York, NY, USA},
1433 doi = {http://doi.acm.org/10.1145/322063.322067},
1439 author = {Didier El Baz},
1440 title = {Contribution à l'algorithmique parallèle. Le concept d'asynchronisme
1441 : étude théorique, mise en œuvre, et application},
1442 school = {Institut national polytechnique de Toulouse},
1444 type = {Habilitation à diriger des recherches},
1445 owner = {christophe},
1446 timestamp = {2010.08.24}
1450 author = {Benoit, Anne and Hakem, Mourad and Robert, Yves},
1451 title = {Contention awareness and fault-tolerant scheduling for precedence
1452 constrained tasks in heterogeneous systems},
1453 journal = {Parallel Computing},
1459 doi = {10.1016/j.parco.2008.11.001},
1462 url = {http://dx.doi.org/10.1016/j.parco.2008.11.001}
1465 @INPROCEEDINGS{bhr08b:bl,
1466 author = {Benoit, Anne and Hakem, Mourad and Robert, Yves},
1467 title = {Fault tolerant scheduling of precedence task graphs on heterogeneous
1469 booktitle = {IPDPS'08},
1472 publisher = {IEEE Computer Society Press},
1478 @INPROCEEDINGS{Berger98,
1479 author = {Berger, Bonnie and Leighton, Tom},
1480 title = {Protein folding in the hydrophobic-hydrophilic (HP) is NP-complete},
1481 booktitle = {Proceedings of the second annual international conference on Computational
1484 series = {RECOMB '98},
1486 address = {New York, NY, USA},
1489 isbn = {0-89791-976-9},
1490 location = {New York, New York, United States},
1495 title = {Parallel and distributed computation: numerical methods},
1496 publisher = {Prentice-Hall, Inc.},
1498 author = {Bertsekas, Dimitri P. and Tsitsiklis, John N.},
1499 address = {Upper Saddle River, NJ, USA},
1500 isbn = {0-13-648700-9}
1503 @MISC{Bertsekas88paralleland,
1504 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
1505 title = {Parallel and distributed iterative algorithms: a selective survey},
1510 author = {F. Blanchard and E. Glasner and S. Kolyada and A.Maass},
1511 title = {On Li-Yorke pairs},
1515 timestamp = {2008.01.02}
1519 author = {F. Blanchard and B. Host and S. Ruette},
1520 title = {Asymptotic pairs in positive-entropy systems},
1522 optannote = {to appear in Ergod. Th. Dynam. Sys.},
1525 timestamp = {2008.01.02}
1529 author = {Dan Boneh and Matt Franklin},
1530 title = {Identity-Based Encryption from the {Weil} Pairing},
1531 journal = {SIAM J. of Computing},
1536 note = {Extended abstract in Crypto'01}
1539 @INCOLLECTION{boneh,
1540 author = {Boneh, Dan and Goh, Eu-Jin and Nissim, Kobbi},
1541 title = {Evaluating 2-DNF Formulas on Ciphertexts},
1544 abstract = {Let ψ be a 2-DNF formula on boolean variables x 1,..., x n ∈ {0,1}.
1545 We present a homomorphic public key encryption scheme that allows
1546 the public evaluation of ψ given an encryption of the variables x
1547 1,..., x n. In other words, given the encryption of the bits x 1,...,
1548 x n, anyone can create the encryption of ψ( x 1,..., x n). More generally,
1549 we can evaluate quadratic multi-variate polynomials on ciphertexts
1550 provided the resulting value falls within a small set. We present
1551 a number of applications of the system: 1 In a database of size n,
1552 the total communication in the basic step of the Kushilevitz-Ostrovsky
1553 PIR protocol is reduced from to . 2 An efficient election system
1554 based on homomorphic encryption where voters do not need to include
1555 non-interactive zero knowledge proofs that their ballots are valid.
1556 The election system is proved secure without random oracles but still
1557 efficient. 3 A protocol for universally verifiable computation.},
1558 citeulike-article-id = {2719460},
1559 citeulike-linkout-0 = {http://www.springerlink.com/content/wtt5caxkr94laxkg},
1560 journal = {Theory of Cryptography},
1561 keywords = {homomorphic, pairings},
1562 posted-at = {2008-04-25 21:53:15},
1564 url = {http://www.springerlink.com/content/wtt5caxkr94laxkg}
1568 author = {Bonneau, Richard and Baker, David},
1569 title = {AB INITIO PROTEIN STRUCTURE PREDICTION: Progress and Prospects},
1570 journal = {Annual Review of Biophysics and Biomolecular Structure},
1575 doi = {10.1146/annurev.biophys.30.1.173}
1579 author = {R. Bowen},
1580 title = {Entropy for group endomorphisms and homogeneous spaces},
1581 journal = {Trans. Amer. Math. Soc.},
1586 timestamp = {15/02/2008}
1590 author = {R. Bowen},
1591 title = {Periodic points and measures for Axiom A diffeomorphisms},
1592 journal = {Trans. Amer. Math. Soc.},
1597 timestamp = {15/02/2008}
1600 @ARTICLE{Braxenthaler97,
1601 author = {Michael Braxenthaler and R. Ron Unger and Ditza Auerbach and John
1603 title = {Chaos in protein dynamics},
1604 journal = {Proteins-structure Function and Bioinformatics},
1608 doi = {10.1002/(SICI)1097-0134(199712)29:4<417::AID-PROT2>3.3.CO;2-O},
1612 @INPROCEEDINGS{Brumley03remotetiming,
1613 author = {David Brumley and Dan Boneh},
1614 title = {Remote Timing Attacks are Practical},
1615 booktitle = {Proceedings of the 12th USENIX Security Symposium},
1620 @ARTICLE{Bohm1991375,
1621 author = {Gerald Böhm},
1622 title = {Protein folding and deterministic chaos: Limits of protein folding
1623 simulations and calculations},
1624 journal = {Chaos, Solitons \& Fractals},
1627 pages = {375 - 382},
1629 doi = {DOI: 10.1016/0960-0779(91)90028-8},
1631 url = {http://www.sciencedirect.com/science/article/B6TJ4-46CBXVT-1X/2/370489c218e4c2732cd9b620ef50c696}
1634 @INCOLLECTION{Cachin2004,
1635 author = {Cachin, Christian},
1636 title = {An Information-Theoretic Model for Steganography},
1637 booktitle = {Information Hiding},
1638 publisher = {Springer Berlin / Heidelberg},
1641 series = {Lecture Notes in Computer Science},
1643 affiliation = {MIT Laboratory for Computer Science 545 Technology Square Cambridge
1648 author = {H. Cam and S. Ozdemir and P. Nair and D. Muthuavinashinappan and
1650 title = {ESPDA: Energy-efficient secure pattern based data aggregation for
1651 wireless sensor networks.},
1652 journal = {Computer Communication journal (29)},
1657 @ARTICLE{CarletCZ98,
1658 author = {Claude Carlet and Pascale Charpin and Victor Zinoviev},
1659 title = {Codes, Bent Functions and Permutations Suitable For DES-like Cryptosystems},
1660 journal = {Des. Codes Cryptography},
1665 bibsource = {DBLP, http://dblp.uni-trier.de}
1668 @INPROCEEDINGS{Castelluccia05efficientaggregation,
1669 author = {Claude Castelluccia},
1670 title = {Efficient aggregation of encrypted data in wireless sensor networks},
1671 booktitle = {MobiQuitous},
1674 publisher = {IEEE Computer Society}
1678 author = {Cayre, F. and Bas, P.},
1679 title = {Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding},
1680 journal = {IEEE Transactions on Information Forensics and Security},
1685 doi = {10.1109/TIFS.2007.916006},
1687 keywords = {cryptography, random sequences, spread spectrum communication, telecommunication
1688 security, watermarking, Kerckhoffs-based embedding security classes,
1689 WOA Data Hiding, pseudorandom sequences, spread-spectrum techniques,
1690 steganography security, watermark-only-attack, watermarking, Security,
1691 spread-spectrum (SS) watermarking},
1693 timestamp = {2009.06.29}
1697 author = {Cayre, F. and Fontaine, C. and Furon, T.},
1698 title = {Watermarking security: theory and practice},
1699 journal = {IEEE Transactions on Signal Processing},
1702 pages = {3976--3987},
1704 doi = {10.1109/TSP.2005.855418},
1706 keywords = {blind source separation, cryptography, watermarking, Fisher information
1707 matrix, blind source separation, cryptanalysis, information theory,
1708 spread spectrum techniques, substitutive scheme, watermarking security,
1709 Blind source separation, Fisher information matrix, equivocation,
1710 security, watermarking},
1712 timestamp = {2009.06.29}
1715 @ARTICLE{Chajakis91,
1716 author = {Chajakis, Emmanuel D. and Zenios, Stavros A.},
1717 title = {Synchronous and asynchronous implementations of relaxation algorithms
1718 for nonlinear network optimization},
1719 journal = {Parallel Comput.},
1724 address = {Amsterdam, The Netherlands, The Netherlands},
1725 doi = {http://dx.doi.org/10.1016/S0167-8191(05)80072-9},
1727 publisher = {Elsevier Science Publishers B. V.}
1731 author = {Chan, Haowen and Perrig, Adrian and Przydatek, Bartosz and Song,
1733 title = {SIA: Secure information aggregation in sensor networks},
1734 journal = {J. Comput. Secur.},
1739 address = {Amsterdam, The Netherlands, The Netherlands},
1741 publisher = {IOS Press}
1744 @ARTICLE{Chandramouli06,
1745 author = {R. Chandramouli and S. Bapatla and K.P. Subbalakshmi},
1746 title = {Battery power-aware encryption},
1747 journal = {ACM transactions on information and system security},
1750 owner = {christophe},
1751 timestamp = {2010.07.31}
1755 author = {Pascale Charpin},
1756 title = {A description of some extended cyclic codes with application to Reed-Solomon
1758 journal = {Discrete Mathematics},
1763 bibsource = {DBLP, http://dblp.uni-trier.de},
1764 ee = {http://dx.doi.org/10.1016/0012-365X(85)90019-6}
1768 author = {D. Chazan and W. Miranker},
1769 title = {Chaotic relaxation},
1770 journal = {Linear algebra and its applications},
1774 timestamp = {2008.05.22}
1778 author = {Cheon, Jung Hee and Kim, Woo-Hwan and Nam, Hyun Soo},
1779 title = {Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy
1780 homomorphism scheme},
1781 journal = {Inf. Process. Lett.},
1786 address = {Amsterdam, The Netherlands, The Netherlands},
1787 doi = {http://dx.doi.org/10.1016/j.ipl.2005.09.016},
1789 publisher = {Elsevier North-Holland, Inc.}
1792 @MISC{Cheon03acryptanalysis,
1793 author = {Jung Hee Cheon and Hyun Soo Nam},
1794 title = {A Cryptanalysis of the Original Domingo-Ferrer's Algebraic Privacy
1800 author = {R.C.C. Cheung and N.J. Telle and W. Luk and P.Y.K. Cheung},
1801 title = {Secure encrypted-data aggregation for wireless sensor networks},
1802 journal = {IEEE Trans. on Very Large Scale Integration Systems},
1805 pages = {1048-1059},
1809 @ARTICLE{Chivian2005,
1810 author = {Chivian, Dylan and Kim, David E. and Malmström, Lars and Schonbrun,
1811 Jack and Rohl, Carol A. and Baker, David},
1812 title = {Prediction of CASP6 structures using automated robetta protocols},
1813 journal = {Proteins},
1819 keywords = {Rosetta, fragment assembly, de novo modeling, homology modeling, parametric
1820 alignment ensemble},
1821 owner = {christophe},
1822 publisher = {Wiley Subscription Services, Inc., A Wiley Company},
1823 timestamp = {2011.01.22},
1824 url = {http://dx.doi.org/10.1002/prot.20733}
1828 author = {Congxu, Zhu and Xuefeng, Liao and Zhihua, Li},
1829 title = {Chaos-based multipurpose image watermarking algorithm},
1830 journal = {Wuhan University Journal of Natural Sciences},
1833 pages = {1675-1678},
1834 note = {10.1007/BF02831848},
1835 abstract = {To achieve the goal of image content authentication and copyright
1836 protection simultaneously, this paper presents a novel image dual
1837 watermarking method based on chaotic map. Firstly, the host image
1838 was split into many nonoverlapping small blocks, and the block-wise
1839 discrete cosine transform (DCT) is computed. Secondly, the robust
1840 watermarks, shuffled by the chaotic sequences, are embedded in the
1841 DC coefficients of blocks to achieve the goal of copyright protection.
1842 The semi-fragile watermarks, generated by chaotic map, are embedded
1843 in the AC coefficients of blocks to obtain the aim of image authentication.
1844 Both of them can be extracted without the original image. Simulation
1845 results demonstrate the effectiveness of our algorithm in terms of
1846 robustness and fragility.},
1847 affiliation = {Central South University School of Information Science and Engineering
1848 410083 Changsha, Hunan China},
1851 keyword = {Mathematics, general},
1852 publisher = {Wuhan University, co-published with Springer},
1853 url = {http://dx.doi.org/10.1007/BF02831848}
1856 @ARTICLE{Conley1978,
1857 author = {C. Conley},
1858 title = {Isolated invariant sets and the Morse index},
1859 journal = {CBMS Regional Conference. AMS.},
1863 timestamp = {2008.01.02}
1867 author = {Philippe Cornu and André Smolarz},
1868 title = {Image characterization by texture},
1869 journal = {Traitement du signal},
1873 file = {:/home/guyeux/Documents/Bibliotheque/These/Watermarking/Caractérisation d'images par textures associées.pdf:PDF},
1875 timestamp = {2008.05.12}
1878 @INPROCEEDINGS{Cox99,
1879 author = {Ingemar Cox and Matt L. Miller and Andrew L. Mckellips},
1880 title = {Watermarking as Communications With Side Information},
1881 booktitle = {Proceedings of the IEEE},
1883 pages = {1127--1141},
1884 owner = {christophe},
1885 timestamp = {2010.03.06}
1888 @ARTICLE{Cox97securespread,
1889 author = {Ingemar J. Cox and Senior Member and Joe Kilian and F. Thomson Leighton
1891 title = {Secure spread spectrum watermarking for multimedia},
1892 journal = {IEEE Transactions on Image Processing},
1895 pages = {1673--1687}
1899 author = {Christopher Cramer and Erol Gelenbe and Hakan Bakircioglu},
1900 title = {Video Compression with Random Neural Networks},
1901 journal = {Neural Networks for Identification, Control, and Robotics, International
1906 address = {Los Alamitos, CA, USA},
1907 isbn = {0-8186-7456-3},
1908 publisher = {IEEE Computer Society}
1911 @INPROCEEDINGS{Crescenzi98,
1912 author = {Crescenzi, Pierluigi and Goldman, Deborah and Papadimitriou, Christos
1913 and Piccolboni, Antonio and Yannakakis, Mihalis},
1914 title = {On the complexity of protein folding (extended abstract)},
1915 booktitle = {Proceedings of the thirtieth annual ACM symposium on Theory of computing},
1917 series = {STOC '98},
1919 address = {New York, NY, USA},
1922 isbn = {0-89791-962-9},
1923 location = {Dallas, Texas, United States},
1928 author = {Zhao Dawei and Chen Guanrong and Liu Wenbo},
1929 title = {A chaos-based robust wavelet-domain watermarking algorithm},
1930 journal = {Chaos, Solitons and Fractals},
1935 timestamp = {2008.10.07}
1939 author = {Anthony Desnos and Robert Erra and Eric Filiol},
1940 title = {Processor-Dependent Malware... and codes},
1942 comment = {arXiv:1011.1638},
1943 eprint = {arXiv:1011.1638}
1947 title = {An Introduction to Chaotic Dynamical Systems},
1948 publisher = {Addison-Wesley},
1950 author = {Devaney, Robert L.},
1951 address = {Redwood City, CA},
1956 author = {Whitfield Diffie and Martin E. Hellman},
1957 title = {New Directions in Cryptography},
1958 journal = {IEEE Transactions on Information Theory},
1963 date = {November 1976},
1965 timestamp = {2009.06.30},
1966 url = {citeseer.ist.psu.edu/diffie76new.html}
1969 @INCOLLECTION{Dijk10,
1970 author = {van Dijk, Marten and Gentry, Craig and Halevi, Shai and Vaikuntanathan,
1972 title = {Fully Homomorphic Encryption over the Integers},
1973 booktitle = {Advances in Cryptology – EUROCRYPT 2010},
1974 publisher = {Springer Berlin / Heidelberg},
1976 editor = {Gilbert, Henri},
1978 series = {Lecture Notes in Computer Science},
1980 abstract = {We construct a simple fully homomorphic encryption scheme, using only
1981 elementary modular arithmetic. We use Gentry’s technique to construct
1982 a fully homomorphic scheme from a bootstrappable somewhat homomorphic
1983 scheme. However, instead of using ideal lattices over a polynomial
1984 ring, our bootstrappable encryption scheme merely uses addition and
1985 multiplication over the integers. The main appeal of our scheme is
1986 the conceptual simplicity. We reduce the security of our scheme to
1987 finding an approximate integer gcd – i.e., given a list of integers
1988 that are near-multiples of a hidden integer, output that hidden integer.
1989 We investigate the hardness of this task, building on earlier work
1990 of Howgrave-Graham.},
1991 affiliation = {MIT CSAIL}
1995 author = {Dill, KA},
1996 title = {Theory for the folding and stability of globular proteins.},
1997 journal = {Biochemistry},
2003 abstract = {Using lattice statistical mechanics, we develop theory to account
2004 for the folding of a heteropolymer molecule such as a protein to
2005 the globular and soluble state. Folding is assumed to be driven by
2006 the association of solvophobic monomers to avoid solvent and opposed
2007 by the chain configurational entropy. Theory predicts a phase transition
2008 as a function of temperature or solvent character. Molecules that
2009 are too short or too long or that have too few solvophobic residues
2010 are predicted not to fold. Globular molecules should have a largely
2011 solvophobic core, but there is an entropic tendency for some residues
2012 to be "out of place", particularly in small molecules. For long chains,
2013 molecules comprised of globular domains are predicted to be thermodynamically
2014 more stable than spherical molecules. The number of accessible conformations
2015 in the globular state is calculated to be an exceedingly small fraction
2016 of the number available to the random coil. Previous estimates of
2017 this number, which have motivated kinetic theories of folding, err
2018 by many tens of orders of magnitude.},
2019 comment = {Research Support, Non-U.S. Gov't,Research Support, U.S. Gov't, P.H.S.,},
2020 keywords = {Mathematics, Models, Chemical, Polymers, Protein Conformation},
2021 owner = {christophe},
2022 timestamp = {2011.01.22},
2023 url = {http://ukpmc.ac.uk/abstract/MED/3986190}
2027 author = {Dill, KA and Bromberg, S and Yue, K and Fiebig, KM and Yee, DP and
2028 Thomas, PD and Chan, HS},
2029 title = {Principles of protein folding--a perspective from simple exact models.},
2030 journal = {Protein Sci},
2033 pages = {561-602--},
2036 abstract = {General principles of protein structure, stability, and folding kinetics
2037 have recently been explored in computer simulations of simple exact
2038 lattice models. These models represent protein chains at a rudimentary
2039 level, but they involve few parameters, approximations, or implicit
2040 biases, and they allow complete explorations of conformational and
2041 sequence spaces. Such simulations have resulted in testable predictions
2042 that are sometimes unanticipated: The folding code is mainly binary
2043 and delocalized throughout the amino acid sequence. The secondary
2044 and tertiary structures of a protein are specified mainly by the
2045 sequence of polar and nonpolar monomers. More specific interactions
2046 may refine the structure, rather than dominate the folding code.
2047 Simple exact models can account for the properties that characterize
2048 protein folding: two-state cooperativity, secondary and tertiary
2049 structures, and multistage folding kinetics--fast hydrophobic collapse
2050 followed by slower annealing. These studies suggest the possibility
2051 of creating "foldable" chain molecules other than proteins. The encoding
2052 of a unique compact chain conformation may not require amino acids;
2053 it may require only the ability to synthesize specific monomer sequences
2054 in which at least one monomer type is solvent-averse.},
2055 address = {Department of Pharmaceutical Chemistry, University of California,
2056 San Francisco 94143-1204, USA.},
2057 comment = {Review,Research Support, Non-U.S. Gov't,Research Support, U.S. Gov't,
2058 Non-P.H.S.,Research Support, U.S. Gov't, P.H.S.,},
2059 keywords = {Amino Acid Sequence, Biological Evolution, Hydrogen Bonding, Models,
2060 Molecular, Molecular Sequence Data, Mutation, Protein Conformation,
2061 Protein Denaturation, Protein Folding, Temperature, Thermodynamics},
2062 owner = {christophe},
2063 timestamp = {2011.01.22},
2064 url = {http://ukpmc.ac.uk/abstract/MED/7613459}
2067 @INPROCEEDINGS{Dobbertin96,
2068 author = {Dobbertin, Hans},
2069 title = {Cryptanalysis of MD4},
2070 booktitle = {Proceedings of the Third International Workshop on Fast Software
2074 address = {London, UK},
2075 publisher = {Springer-Verlag},
2076 isbn = {3-540-60865-6}
2079 @INPROCEEDINGS{DomingoFerrer2002,
2080 author = {Domingo-Ferrer, Josep},
2081 title = {A Provably Secure Additive and Multiplicative Privacy Homomorphism},
2082 booktitle = {ISC '02: Proceedings of the 5th International Conference on Information
2086 address = {London, UK},
2087 publisher = {Springer-Verlag},
2088 isbn = {3-540-44270-7}
2091 @ARTICLE{Dubchak1995,
2092 author = {I. Dubchak and I. Muchnik and S. R. Holbrook and S. H. Kim},
2093 title = {Prediction of protein folding class using global description of amino
2095 journal = {Proc Natl Acad Sci U S A},
2098 pages = {8700--8704},
2101 __markedentry = {[guyeux]},
2102 abstract = {We present a method for predicting protein folding class based on
2103 global protein chain description and a voting process. Selection
2104 of the best descriptors was achieved by a computer-simulated neural
2105 network trained on a data base consisting of 83 folding classes.
2106 Protein-chain descriptors include overall composition, transition,
2107 and distribution of amino acid attributes, such as relative hydrophobicity,
2108 predicted secondary structure, and predicted solvent exposure. Cross-validation
2109 testing was performed on 15 of the largest classes. The test shows
2110 that proteins were assigned to the correct class (correct positive
2111 prediction) with an average accuracy of 71.7\%, whereas the inverse
2112 prediction of proteins as not belonging to a particular class (correct
2113 negative prediction) was 90-95\% accurate. When tested on 254 structures
2114 used in this study, the top two predictions contained the correct
2115 class in 91\% of the cases.},
2116 institution = {Department of Chemistry, University of California, Berkeley 94720,
2118 keywords = {Amino Acid Sequence; Amino Acids, chemistry; Computer Simulation;
2119 Databases, Factual; Models, Chemical; Neural Networks (Computer);
2120 Protein Folding; Protein Structure, Secondary; Proteins, chemistry/classification;
2121 Reproducibility of Results; Solvents},
2123 medline-pst = {ppublish},
2126 timestamp = {2011.07.18}
2130 title = {Real analysis and probability},
2131 publisher = {Cambridge University Press},
2132 author = {Richard M. Dudley},
2135 timestamp = {2008.01.02}
2139 author = {El Tarazi, Mouhamed Nabih},
2140 title = {Algorithmes mixtes asynchrones. Etude de convergence monotone},
2141 journal = {Numerische Mathematik},
2145 note = {10.1007/BF01405568},
2146 affiliation = {Department of Mathematics, Faculty of Science Kuwait University P.O.
2150 keyword = {Mathematics and Statistics},
2151 publisher = {Springer Berlin / Heidelberg},
2152 url = {http://dx.doi.org/10.1007/BF01405568}
2156 author = {El Tarazi, Mouhamed Nabih},
2157 title = {Some convergence results for asynchronous algorithms},
2158 journal = {Numerische Mathematik},
2162 note = {10.1007/BF01407866},
2163 affiliation = {Department of Mathematics, Faculty of Science Kuwait University P.O.
2164 Box 5969 Kuwait Kuwait},
2167 keyword = {Mathematics and Statistics},
2168 publisher = {Springer Berlin / Heidelberg},
2169 url = {http://dx.doi.org/10.1007/BF01407866}
2173 author = {Peng Fei and Qiu Shui-Sheng and Long Min},
2174 title = {A secure digital signature algorithm based on elliptic curve and
2176 journal = {Circuits Systems Signal Processing},
2178 volume = {24, No. 5},
2181 timestamp = {2009.01.16}
2184 @BOOK{Feigenbaum1908,
2185 title = {Universal behavior in nonlinear systems},
2186 publisher = {Los Alamos Science},
2188 author = {Feigenbaum},
2190 timestamp = {2008.01.02}
2193 @ARTICLE{Felsenstein1980,
2194 author = {J. Felsenstein},
2195 title = {A view of population genetics.},
2196 journal = {Science},
2202 doi = {10.1126/science.208.4449.1253},
2204 medline-pst = {ppublish},
2206 pii = {208/4449/1253},
2208 timestamp = {2011.05.05},
2209 url = {http://dx.doi.org/10.1126/science.208.4449.1253}
2213 title = {Les virus informatiques : techniques virales et antivirales avancées},
2215 editor = {Springer},
2216 author = {Eric Filiol},
2217 owner = {christophe},
2218 timestamp = {2010.10.13}
2221 @INPROCEEDINGS{FiliolBlackHat,
2222 author = {Eric Filiol},
2223 title = {Passive and Active Leakage of Secret Data from Non Networked Computer},
2224 booktitle = {Black Hat},
2226 owner = {christophe},
2227 timestamp = {2010.11.28}
2230 @PHDTHESIS{Formenti2003,
2231 author = {Enrico Formenti},
2232 title = {De l'algorithmique du chaos dans les systèmes dynamiques discrets},
2233 school = {Université de Provence},
2236 timestamp = {2008.01.02}
2239 @PHDTHESIS{Formenti1998,
2240 author = {Enrico Formenti},
2241 title = {Automates cellulaires et chaos : de la vision topologique à la vision
2243 school = {\'Ecole Normale Supérieure de Lyon},
2245 optmonth = {Octobre},
2247 timestamp = {2008.01.02}
2251 author = {Gabriel Frey and Christian J Michel},
2252 title = {Identification of circular codes in bacterial genomes and their use
2253 in a factorization method for retrieving the reading frames of genes.},
2254 journal = {Comput Biol Chem},
2260 abstract = {We developed a statistical method that allows each trinucleotide to
2261 be associated with a unique frame among the three possible ones in
2262 a (protein coding) gene. An extensive gene study in 175 complete
2263 bacterial genomes based on this statistical approach resulted in
2264 identification of 72 new circular codes. Finding a circular code
2265 enables an immediate retrieval of the reading frame locally anywhere
2266 in a gene. No knowledge of location of the start codon is required
2267 and a short window of only a few nucleotides is sufficient for automatic
2268 retrieval. We have therefore developed a factorization method (that
2269 explores previously found circular codes) for retrieving the reading
2270 frames of bacterial genes. Its principle is new and easy to understand.
2271 Neither complex treatment nor specific information on the nucleotide
2272 sequences is necessary. Moreover, the method can be used for short
2273 regions in nucleotide sequences (less than 25 nucleotides in protein
2274 coding genes). Selected additional properties of circular codes and
2275 their possible biological consequences are also discussed.},
2276 doi = {10.1016/j.compbiolchem.2005.11.001},
2277 institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université
2278 Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant,
2279 67400 Illkirch, France. frey@dpt-info.u-strasbg.fr},
2280 keywords = {Base Sequence; Computational Biology; Genes, Bacterial; Genome, Bacterial;
2281 Genomics, statistics /&/ numerical data; Models, Genetic; Models,
2282 Statistical; Reading Frames},
2284 medline-pst = {ppublish},
2286 pii = {S1476-9271(05)00111-8},
2288 timestamp = {2011.05.05},
2289 url = {http://dx.doi.org/10.1016/j.compbiolchem.2005.11.001}
2293 author = {Gabriel Frey and Christian J Michel},
2294 title = {An analytical model of gene evolution with six mutation parameters:
2295 an application to archaeal circular codes.},
2296 journal = {Comput Biol Chem},
2302 abstract = {We develop here an analytical evolutionary model based on a trinucleotide
2303 mutation matrix 64 x 64 with six substitution parameters associated
2304 with the transitions and transversions in the three trinucleotide
2305 sites. It generalizes the previous models based on the nucleotide
2306 mutation matrices 4 x 4 and the trinucleotide mutation matrix 64
2307 x 64 with three parameters. It determines at some time t the exact
2308 occurrence probabilities of trinucleotides mutating randomly according
2309 to six substitution parameters. An application of this model allows
2310 an evolutionary study of the common circular code COM and the 15
2311 archaeal circular codes X which have been recently identified in
2312 several archaeal genomes. The main property of a circular code is
2313 the retrieval of the reading frames in genes, both locally, i.e.
2314 anywhere in genes and in particular without a start codon, and automatically
2315 with a window of a few nucleotides. In genes, the circular code is
2316 superimposed on the traditional genetic one. Very unexpectedly, the
2317 evolutionary model demonstrates that the archaeal circular codes
2318 can derive from the common circular code subjected to random substitutions
2319 with particular values for six substitutions parameters. It has a
2320 strong correlation with the statistical observations of three archaeal
2321 codes in actual genes. Furthermore, the properties of these substitution
2322 rates allow proposal of an evolutionary classification of the 15
2323 archaeal codes into three main classes according to this model. In
2324 almost all the cases, they agree with the actual degeneracy of the
2325 genetic code with substitutions more frequent in the third trinucleotide
2326 site and with transitions more frequent that transversions in any
2327 trinucleotide site.},
2328 doi = {10.1016/j.compbiolchem.2005.09.001},
2329 institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université
2330 Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant,
2331 67400 Illkirch, France. frey@dpt-info.u-strasbg.fr},
2332 keywords = {Archaea, genetics; DNA, Circular; Evolution, Molecular; Genetic Code;
2333 Genome, Archaeal; Models, Genetic; Mutation; Trinucleotide Repeats},
2335 medline-pst = {ppublish},
2337 pii = {S1476-9271(05)00083-6},
2339 timestamp = {2011.05.05},
2340 url = {http://dx.doi.org/10.1016/j.compbiolchem.2005.09.001}
2343 @INPROCEEDINGS{fgb11:ip,
2344 author = {Friot, Nicolas and Guyeux, Christophe and Bahi, Jacques},
2345 title = {Chaotic Iterations for Steganography - Stego-security and chaos-security},
2346 booktitle = {SECRYPT'2011, Int. Conf. on Security and Cryptography},
2349 address = {Sevilla, Spain},
2352 classement = {ACTI},
2353 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2359 author = {Alain Frisch},
2360 title = {Entropie topologique et définition du chaos},
2362 note = {Rapport de tipe},
2363 file = {Tipe_Entropie Topologique et Definition du Chaos (Alain Frisch).ps:Chaos/Tipe_Entropie Topologique et Definition du Chaos (Alain Frisch).ps:PDF},
2364 keywords = {Chaos, Entropie Topologique, Tipe},
2366 timestamp = {2008.01.02},
2367 url = {http://alain.frisch.fr/math.html}
2371 author = {Alain Frisch},
2372 title = {Entropie topologique et définition du chaos},
2374 note = {[En ligne; Page disponible le 12-août-2010]},
2375 url = {\url{http://alain.frisch.fr/math.html}}
2378 @ARTICLE{Frommer97asynchronousweighted,
2379 author = {Andreas Frommer and Hartmut Schwandt and Daniel and Daniel B. Szyld},
2380 title = {Asynchronous Weighted Additive Schwarz Methods},
2381 journal = {Electronic Transactions on Numerical Analysis},
2387 @MISC{Frommer94asynchronoustwo-stage,
2388 author = {Andreas Frommer and Daniel B. Szyld},
2389 title = {Asynchronous Two-Stage Iterative Methods},
2394 title = {Introduction to Chaos and Coherence},
2395 publisher = {IOP Publishing},
2397 author = {J. Frøyland},
2399 timestamp = {2008.01.02}
2403 author = {T. Furon},
2404 title = {Security analysis},
2406 note = {European Project IST-1999-10987 CERTIMARK, Deliverable D.5.5},
2408 timestamp = {2009.06.30}
2412 author = {Furon, Teddy and Bas, Patrick},
2413 title = {Broken arrows},
2414 journal = {EURASIP J. Inf. Secur.},
2418 address = {New York, NY, United States},
2419 doi = {http://dx.doi.org/10.1155/2008/597040},
2421 owner = {christophe},
2422 publisher = {Hindawi Publishing Corp.},
2423 timestamp = {2010.03.06}
2426 @ARTICLE{P1150442004,
2427 author = {G.S.El-Taweel and H.M. Onsi and M.Samy and M.G. Darwish},
2428 title = {Secure and Non-Blind Watermarking Scheme for Color Images Based on
2430 journal = {ICGST International Journal on Graphics, Vision and Image Processing},
2436 owner = {christophe},
2437 timestamp = {2010.03.07}
2440 @INPROCEEDINGS{Gentry09,
2441 author = {Gentry, Craig},
2442 title = {Fully homomorphic encryption using ideal lattices},
2443 booktitle = {STOC '09: Proceedings of the 41st annual ACM symposium on Theory
2447 address = {New York, NY, USA},
2449 doi = {http://doi.acm.org/10.1145/1536414.1536440},
2450 isbn = {978-1-60558-506-2},
2451 location = {Bethesda, MD, USA}
2454 @INPROCEEDINGS{Girao04,
2455 author = {J. Girao and M. Schneider and D. Westhoff},
2456 title = {CDA: Concealed data aggregation in wireless sensor networks},
2457 booktitle = {Proceedings of the ACM Workshop on Wireless Security},
2459 owner = {christophe},
2460 timestamp = {2010.07.31}
2463 @CONFERENCE{Gotsman88,
2464 author = {C. Gotsman and D. Lehmann and E. Shamir},
2465 title = {Asynchronous Dynamics of Random Boolean Networks},
2466 booktitle = {San Diego '88 Neural Networks Conference},
2469 timestamp = {30/03/2008}
2472 @ARTICLE{Guckenheimer1979,
2473 author = {J. Guckenheimer},
2474 title = {Sensitive dependence to initial conditions for one-dimensional maps},
2475 journal = {Comm. Math. Phys.},
2477 optpages = {133-160},
2479 timestamp = {2008.01.02}
2483 title = {Nonlinear oscillations, dynamical systems, and bifurcations of vector
2485 publisher = {Springer Verlag},
2487 author = {J. Guckenheimer and P. Holmes},
2489 timestamp = {2008.01.02}
2492 @ARTICLE{Guo20093201,
2493 author = {Wei Guo and Xiaoming Wang and Dake He and Yang Cao},
2494 title = {Cryptanalysis on a parallel keyed hash function based on chaotic
2496 journal = {Physics Letters A},
2499 pages = {3201 - 3206},
2501 abstract = {This Letter analyzes the security of a novel parallel keyed hash function
2502 based on chaotic maps, proposed by Xiao et al. to improve the efficiency
2503 in parallel computing environment. We show how to devise forgery
2504 attacks on Xiao's scheme with differential cryptanalysis and give
2505 the experiment results of two kinds of forgery attacks firstly. Furthermore,
2506 we discuss the problem of weak keys in the scheme and demonstrate
2507 how to utilize weak keys to construct collision.},
2509 keywords = {Cryptanalysis}
2512 @PHDTHESIS{GuyeuxThese10,
2513 author = {Christophe Guyeux},
2514 title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}
2515 en s\'{e}curit\'{e} informatique},
2516 school = {Universit\'{e} de Franche-Comt\'{e}},
2518 owner = {christophe},
2519 timestamp = {2010.12.21}
2523 author = {Guyeux, Christophe and Bahi, Jacques},
2524 title = {\'Etude topologique de l'\'etalement de spectre},
2525 howpublished = {Journ\'ees Codes et St\'eganographie, \'Ecoles Militaires de Saint-Cyr,
2530 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2535 @INPROCEEDINGS{bg10:ip,
2536 author = {Guyeux, Christophe and Bahi, Jacques},
2537 title = {An improved watermarking algorithm for Internet applications},
2538 booktitle = {INTERNET'2010. The 2nd Int. Conf. on Evolving Internet},
2541 address = {Valencia, Spain},
2543 classement = {ACTI},
2544 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2549 @INPROCEEDINGS{gfb10:ip,
2550 author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques},
2551 title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},
2552 booktitle = {IIH-MSP'10, 6-th Int. Conf. on Intelligent Information Hiding and
2553 Multimedia Signal Processing},
2556 address = {Darmstadt, Germany},
2558 classement = {ACTI},
2559 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2565 author = {Christophe Guyeux and Nicolas Friot and Jacques M. Bahi},
2566 title = {A more secure information hiding scheme than spread-spectrum obtained
2568 journal = {arXiv 0032565},
2571 timestamp = {2010.04.30}
2575 title = {Guide to Elliptic Curve Cryptography},
2576 publisher = {Springer Professional Computing},
2578 editor = {Springer},
2579 author = {D. Hankerson and A. Menezes and S. Vanstone},
2580 owner = {christophe},
2581 timestamp = {2010.07.31}
2584 @ARTICLE{Hasegawa1985,
2585 author = {M. Hasegawa and H. Kishino and T. Yano},
2586 title = {Dating of the human-ape splitting by a molecular clock of mitochondrial
2588 journal = {J Mol Evol},
2593 abstract = {A new statistical method for estimating divergence dates of species
2594 from DNA sequence data by a molecular clock approach is developed.
2595 This method takes into account effectively the information contained
2596 in a set of DNA sequence data. The molecular clock of mitochondrial
2597 DNA (mtDNA) was calibrated by setting the date of divergence between
2598 primates and ungulates at the Cretaceous-Tertiary boundary (65 million
2599 years ago), when the extinction of dinosaurs occurred. A generalized
2600 least-squares method was applied in fitting a model to mtDNA sequence
2601 data, and the clock gave dates of 92.3 +/- 11.7, 13.3 +/- 1.5, 10.9
2602 +/- 1.2, 3.7 +/- 0.6, and 2.7 +/- 0.6 million years ago (where the
2603 second of each pair of numbers is the standard deviation) for the
2604 separation of mouse, gibbon, orangutan, gorilla, and chimpanzee,
2605 respectively, from the line leading to humans. Although there is
2606 some uncertainty in the clock, this dating may pose a problem for
2607 the widely believed hypothesis that the pipedal creature Australopithecus
2608 afarensis, which lived some 3.7 million years ago at Laetoli in Tanzania
2609 and at Hadar in Ethiopia, was ancestral to man and evolved after
2610 the human-ape splitting. Another likelier possibility is that mtDNA
2611 was transferred through hybridization between a proto-human and a
2612 proto-chimpanzee after the former had developed bipedalism.},
2613 keywords = {Animals; Biological Evolution; DNA, Mitochondrial, genetics; Genes;
2614 Haplorhini, genetics; Humans; Mathematics; Models, Genetic; Nucleic
2615 Acid Hybridization; Primates, genetics; Proteins, genetics; Species
2618 medline-pst = {ppublish},
2621 timestamp = {2011.05.05}
2625 title = {A First Course in Discrete Dynamical Systems},
2626 publisher = {Springer-Verlag},
2628 author = {R. Homlgren},
2631 timestamp = {2008.01.02}
2634 @INCOLLECTION{Hoque09,
2635 author = {Hoque, Md. and Chetty, Madhu and Sattar, Abdul},
2636 title = {Genetic Algorithm in Ab Initio Protein Structure Prediction Using
2637 Low Resolution Model: A Review},
2638 booktitle = {Biomedical Data and Applications},
2639 publisher = {Springer Berlin Heidelberg},
2641 editor = {Sidhu, Amandeep and Dillon, Tharam},
2643 series = {Studies in Computational Intelligence},
2645 affiliation = {IIIS, Griffith University, Nathan, QLD-4111 Australia}
2648 @CONFERENCE{Houmansadr09,
2649 author = {A. Houmansadr and N. Kiyavash and N. Borisov},
2650 title = {Rainbow: A robust and invisible non-blind watermark for network flows},
2651 booktitle = {NDSS’09: 16th Annual Network and Distributed System Security Symposium},
2653 owner = {christophe},
2654 timestamp = {2010.03.07}
2658 author = {Huang, Shih-I and Shieh, Shiuhpyng and Tygar, J.},
2659 title = {Secure encrypted-data aggregation for wireless sensor networks},
2660 journal = {Wireless Networks},
2661 abstract = {Abstract\ \ This paper proposes a secure encrypted-data
2662 aggregation scheme for wireless sensor networks. Our design for data
2663 aggregation eliminates redundant sensor readings without using encryption
2664 and maintains data secrecy and privacy during transmission. Conventional
2665 aggregation functions operate when readings are received in plaintext.
2666 If readings are encrypted, aggregation requires decryption creating
2667 extra overhead and key management issues. In contrast to conventional
2668 schemes, our proposed scheme provides security and privacy, and duplicate
2669 instances of original readings will be aggregated into a single packet.
2670 Our scheme is resilient to known-plaintext attacks, chosen-plaintext
2671 attacks, ciphertext-only attacks and man-in-the-middle attacks. Our
2672 experiments show that our proposed aggregation method significantly
2673 reduces communication overhead and can be practically implemented
2674 in on-the-shelf sensor platforms.},
2675 citeulike-article-id = {4499496},
2676 citeulike-linkout-0 = {http://dx.doi.org/10.1007/s11276-009-0177-y},
2677 citeulike-linkout-1 = {http://www.springerlink.com/content/g573138072642u63},
2678 doi = {10.1007/s11276-009-0177-y},
2679 posted-at = {2009-05-10 09:55:44},
2680 url = {http://dx.doi.org/10.1007/s11276-009-0177-y}
2684 author = {Huang, Shih-I and Shieh, Shiuhpyng and Tygar, J. D.},
2685 title = {Secure encrypted-data aggregation for wireless sensor networks},
2686 journal = {Wirel. Netw.},
2691 address = {Hingham, MA, USA},
2692 doi = {http://dx.doi.org/10.1007/s11276-009-0177-y},
2694 publisher = {Kluwer Academic Publishers}
2698 author = {W. Huang and X. Ye},
2699 title = {Homeomorphisms with the whole compacta being scrambled sets},
2700 journal = {Ergod. Th. Dynam. Systems},
2706 timestamp = {2008.01.02}
2709 @ARTICLE{Hurley1982,
2710 author = {M. Hurley},
2711 title = {Attractors, persistence and density of their bassin},
2712 journal = {Transactions of AMS},
2714 optpages = {247-271},
2717 timestamp = {2008.01.02}
2720 @INPROCEEDINGS{Islam:2009:NMA:1695134.1695181,
2721 author = {Islam, Md. Kamrul and Chetty, Madhu},
2722 title = {Novel Memetic Algorithm for Protein Structure Prediction},
2723 booktitle = {Proceedings of the 22nd Australasian Joint Conference on Advances
2724 in Artificial Intelligence},
2728 address = {Berlin, Heidelberg},
2729 publisher = {Springer-Verlag},
2731 isbn = {978-3-642-10438-1},
2732 keywords = {Guided search space, Memetic Algorithm, Modified fitness function,
2733 Pair-wise-interchange, Schema preservation, Tabu Search},
2734 location = {Melbourne, Australia},
2738 @PHDTHESIS{Jacquemard77,
2739 author = {C. Jacquemard},
2740 title = {Contribution à l'étude d'algorithmes à convergence monotone},
2741 school = {Université de Franche-Comté},
2743 owner = {christophe},
2744 timestamp = {2010.08.25}
2748 title = {{Evolution of Protein Molecules}},
2749 publisher = {Academy Press},
2751 editor = {Munro, H. N.},
2752 author = {Jukes, T. H. and Cantor, C. R.},
2753 booktitle = {Evolution of Protein Molecules},
2754 citeulike-article-id = {1673661},
2755 keywords = {compbio, fresco},
2756 posted-at = {2007-09-19 06:23:18},
2760 @INPROCEEDINGS{Kalker2001,
2761 author = {Kalker, T.},
2762 title = {Considerations on watermarking security},
2765 abstract = {In this paper we address the usually implicit assumption that digital
2766 watermarking has as its main target copyright and copy protection
2767 applications. From these target applications a great many conclusions
2768 are drawn about the required security of a watermarking system, and
2769 in fact, a considerably percentage of the watermarking literature
2770 has this very topic as its main focus of attention. In this paper
2771 we take a step back, and try to do a more careful analysis of the
2772 'watermarking-is-for-security-applications' paradigm. The intention
2773 of this paper is to discuss the meaning of the concept security in
2774 the context of watermarking, and try to show that one has to be careful
2775 in using analogies from the related field of cryptography},
2776 citeulike-article-id = {1226513},
2777 journal = {2001 IEEE Fourth Workshop on Multimedia Signal Processing},
2778 keywords = {security, wateramarking},
2780 posted-at = {2007-04-14 14:30:06},
2782 timestamp = {2009.06.30}
2785 @ARTICLE{Kerckhoffs83,
2786 author = {Kerckhoffs, Auguste},
2787 title = {La cryptographie militaire},
2788 journal = {Journal des sciences militaires},
2793 abstract = {pp. 161–191, Feb. 1883.},
2794 citeulike-article-id = {505508},
2795 keywords = {cryptography, master},
2797 posted-at = {2006-02-15 04:49:15},
2799 timestamp = {2009.06.30}
2803 author = {Kimura, Motoo},
2804 title = {A simple method for estimating evolutionary rates of base substitutions
2805 through comparative studies of nucleotide sequences},
2806 journal = {Journal of Molecular Evolution},
2810 note = {10.1007/BF01731581},
2811 affiliation = {National Institute of Genetics 411 Mishima Japan},
2814 keyword = {Biomedical and Life Sciences},
2815 publisher = {Springer New York},
2816 url = {http://dx.doi.org/10.1007/BF01731581}
2821 title = {Chaos Without Nonperiodicity},
2822 journal = {Amer. Math. Monthly},
2826 timestamp = {27/01/2008}
2829 @PHDTHESIS{Knudsen1994a,
2830 author = {C. Knudsen},
2831 title = {Aspects of noninvertible dynamics and chaos},
2832 school = {Technical University of Denmark},
2835 timestamp = {2008.01.02}
2839 author = {L. Kocarev and J. Szczepanski and J.M. Amigo and I. Tomovski},
2840 title = {Discrete Chaos - I: Theory},
2841 journal = {IEEE Trans. on Circuits Systems},
2844 pages = {1300-1309},
2845 owner = {christophe},
2846 timestamp = {2010.10.10}
2849 @INPROCEEDINGS{Kocher95cryptanalysisof,
2850 author = {Paul C. Kocher},
2851 title = {Cryptanalysis of Diffie-Hellman, RSA, DSS, and Other Systems Using
2852 Timing Attacks (Extended Abstract)},
2853 booktitle = {Advances in Cryptology, CRYPTO '95: 15th Annual International Cryptology
2857 publisher = {Springer-Verlag}
2860 @ARTICLE{Kullback1951,
2861 author = {Kullback, Solomon and Leibler, Richard A.},
2862 title = {On Information and Sufficiency},
2863 journal = {The Annals of Mathematical Statistics},
2868 citeulike-article-id = {3245942},
2869 keywords = {file-import-08-09-12},
2871 posted-at = {2008-09-12 14:30:37},
2873 timestamp = {2009.06.29}
2877 author = {Eshter Ledoux},
2878 title = {Introduction à la théorie du chaos},
2880 note = {[En ligne; Page disponible le 12-août-2010]},
2881 url = {\url{http://www.nux.be/eledoux/mem/node1.html}}
2885 title = {Analyse en dimension finie},
2886 publisher = {Masson},
2892 timestamp = {2008.01.02}
2896 author = {A.K. Lenstra and E.R. Verheul},
2897 title = {Selecting Cryptographic Key Sizes},
2898 journal = {Jour. of the International Association for Cryptologic Research},
2906 author = {Lettvin, J.Y. and Maturana, H.R. and McCulloch, W.S. and Pitts, W.H.},
2907 title = {What the Frog's Eye Tells the Frog's Brain},
2908 journal = {Proceedings of the IRE},
2913 owner = {christophe},
2914 timestamp = {2010.12.21}
2918 author = {T. Y. Li and J. A. Yorke},
2919 title = {Period three implies chaos},
2920 journal = {Amer. Math. Monthly},
2926 timestamp = {27/01/2008}
2930 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2931 title = {A novel Hash algorithm construction based on chaotic neural network},
2932 journal = {Neural Computing and Applications},
2935 affiliation = {Chongqing University College of Computer Science 400044 Chongqing
2938 keyword = {Computer Science},
2939 publisher = {Springer London}
2942 @INPROCEEDINGS{Lin09,
2943 author = {Lin, Hua-Yi and Chiang, Tzu-Chiang},
2944 title = {Cooperative secure data aggregation in sensor networks using elliptic
2945 curve based cryptosystems},
2946 booktitle = {CDVE'09: Proceedings of the 6th international conference on Cooperative
2947 design, visualization, and engineering},
2950 address = {Berlin, Heidelberg},
2951 publisher = {Springer-Verlag},
2952 isbn = {3-642-04264-3, 978-3-642-04264-5},
2953 location = {Luxembourg, Luxembourg}
2956 @INPROCEEDINGS{Liu2008,
2957 author = {Liu, An and Ning, Peng},
2958 title = {TinyECC: A Configurable Library for Elliptic Curve Cryptography in
2959 Wireless Sensor Networks},
2960 booktitle = {7th International Conference on Information Processing in Sensor
2961 Networks (IPSN 2008)},
2965 citeulike-article-id = {3041699},
2966 howpublished = {SPOTS Track},
2968 posted-at = {2008-07-25 05:25:05},
2972 @ARTICLE{Liu2007bis,
2973 author = {Shao-Hui Liu and Hong-Xun Yao and Wen Gao and Yong-Liang Liu},
2974 title = {An image fragile watermark scheme based on chaotic image pattern
2976 journal = {Applied Mathematics and Computation},
2981 timestamp = {2008.10.07}
2984 @INPROCEEDINGS{Liu07,
2985 author = {Liu, Zhen and Xi, Lifeng},
2986 title = {Image Information Hiding Encryption Using Chaotic Sequence},
2987 booktitle = {KES '07: Knowledge-Based Intelligent Information and Engineering
2988 Systems and the XVII Italian Workshop on Neural Networks on Proceedings
2989 of the 11th International Conference},
2992 address = {Berlin, Heidelberg},
2993 publisher = {Springer-Verlag},
2994 doi = {http://dx.doi.org/10.1007/978-3-540-74827-4_26},
2995 isbn = {978-3-540-74826-7},
2996 location = {Vietri sul Mare, Italy}
3000 author = {Zhen Liu and Lifeng Xi},
3001 title = {Image Information Hiding Encryption Using Chaotic Sequence},
3007 timestamp = {11/04/2008}
3010 @ARTICLE{Lubachevsky86,
3011 author = {Lubachevsky, Boris and Mitra, Debasis},
3012 title = {A chaotic asynchronous algorithm for computing the fixed point of
3013 a nonnegative matrix of unit spectral radius},
3019 address = {New York, NY, USA},
3020 doi = {http://doi.acm.org/10.1145/4904.4801},
3026 author = {{L}arger, {L}. and {D}udley, {J}.{M}.},
3027 title = { {N}onlinear dynamics {O}ptoelectronic chaos},
3028 journal = {{N}ature },
3034 abstract = {{O}ptoelectronic circuits with delayed feedback provide a convenient
3035 bench-top platform to study a wide range of nonlinear dynamic systems,
3036 from ultrastable clocks to complex chaotic devices.},
3037 affiliation = {{F}ranche-{C}omt{\'e} {\'E}lectronique {M}{\'e}canique, {T}hermique
3038 et {O}ptique - {S}ciences et {T}echnologies - {FEMTO}-{ST} - {CNRS}
3039 : {UMR}6174 - {U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {U}niversit{\'e}
3040 de {T}echnologie de {B}elfort-{M}ontbeliard - {E}cole {N}ationale
3041 {S}up{\'e}rieure de {M}{\'e}canique et des {M}icrotechniques },
3042 audience = {internationale },
3044 doi = {10.1038/465041a },
3045 hal_id = {hal-00517696},
3046 language = {{A}nglais},
3047 url = {http://hal.archives-ouvertes.fr/hal-00517696/en/}
3050 @INPROCEEDINGS{Mahoney00,
3051 author = {Mahoney, Matthew V.},
3052 title = {Fast Text Compression with Neural Networks},
3053 booktitle = {Proceedings of the Thirteenth International Florida Artificial Intelligence
3054 Research Society Conference},
3057 publisher = {AAAI Press},
3059 isbn = {1-57735-113-4},
3063 @INPROCEEDINGS{msp10:bl,
3064 author = {Makhoul, Abdallah and Saadi, Rachid and Pham, Congduc},
3065 title = {Risk Management in Intrusion Detection Applications with Wireless
3066 Video Sensor Networks},
3067 booktitle = {WCNC'10 IEEE Int. Conf.},
3070 address = {Sydney, Australia},
3079 author = {H.S. Malvar and D. Florêncio},
3080 title = {Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking},
3081 journal = {IEEE Trans. Signal Proceeding},
3085 owner = {christophe},
3086 timestamp = {2010.03.07}
3089 @ARTICLE{Marsaglia2003,
3090 author = {G. Marsaglia},
3091 title = {Xorshift RNGs},
3092 journal = {Journal of Statistical Software},
3097 timestamp = {2009.10.28}
3100 @ARTICLE{Marsaglia1996,
3101 author = {G. Marsaglia},
3102 title = {DIEHARD: a battery of tests of randomness.},
3103 journal = {http://stat.fsu.edu/~geo/diehard.html},
3106 timestamp = {2009.11.09}
3109 @ARTICLE{Simard07testu01:a,
3110 author = {Richard Simard and Université De Montréal},
3111 title = {TestU01: A C library for empirical testing of random number generators},
3112 journal = {ACM Transactions on Mathematical Software},
3117 @ARTICLE{DefiningChaos,
3118 author = {M. Martelli and M. Dang and T. Seph},
3119 title = {Defining chaos},
3120 journal = {Mathematics Magazine},
3124 owner = {christophe},
3125 timestamp = {2010.08.11}
3128 @ARTICLE{Michel2007c,
3129 author = {Christian J Michel},
3130 title = {An analytical model of gene evolution with 9 mutation parameters:
3131 an application to the amino acids coded by the common circular code.},
3132 journal = {Bull Math Biol},
3138 abstract = {We develop here an analytical evolutionary model based on a trinucleotide
3139 mutation matrix 64 x 64 with nine substitution parameters associated
3140 with the three types of substitutions in the three trinucleotide
3141 sites. It generalizes the previous models based on the nucleotide
3142 mutation matrices 4 x 4 and the trinucleotide mutation matrix 64
3143 x 64 with three and six parameters. It determines at some time t
3144 the exact occurrence probabilities of trinucleotides mutating randomly
3145 according to these nine substitution parameters. An application of
3146 this model allows an evolutionary study of the common circular code
3147 [Formula: see text] of eukaryotes and prokaryotes and its 12 coded
3148 amino acids. The main property of this code [Formula: see text] is
3149 the retrieval of the reading frames in genes, both locally, i.e.
3150 anywhere in genes and in particular without a start codon, and automatically
3151 with a window of a few nucleotides. However, since its identification
3152 in 1996, amino acid information coded by [Formula: see text] has
3153 never been studied. Very unexpectedly, this evolutionary model demonstrates
3154 that random substitutions in this code [Formula: see text] and with
3155 particular values for the nine substitutions parameters retrieve
3156 after a certain time of evolution a frequency distribution of these
3157 12 amino acids very close to the one coded by the actual genes.},
3158 doi = {10.1007/s11538-006-9147-z},
3159 institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université
3160 Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant,
3161 67400 Illkirch, France. michel@dpt-info.u-strasbg.fr},
3162 keywords = {Amino Acids, genetics; Codon, genetics; Eukaryotic Cells; Evolution,
3163 Molecular; Models, Genetic; Prokaryotic Cells},
3165 medline-pst = {ppublish},
3168 timestamp = {2011.05.05},
3169 url = {http://dx.doi.org/10.1007/s11538-006-9147-z}
3173 author = {J.-C. Miellou},
3174 title = {Algorithmes de relaxation chaotique \`{a} retards},
3180 timestamp = {2008.05.22}
3183 @ARTICLE{Miellou75b,
3184 author = {Miellou, J.-C.},
3185 title = {Itérations chaotiques à retards, étude de la convergence dans le
3186 cas d'espaces partiellement ordonnés},
3187 journal = {C.R.A.S. Paris},
3191 owner = {christophe},
3192 timestamp = {2010.08.17}
3196 author = {Jean-Claude Miellou and Pierre Spitéri},
3197 title = {Un critère de convergence pour des méthodes générales de point fixe},
3198 journal = {Rairo -- Modélisation mathématique et analyse numérique},
3203 owner = {christophe},
3204 timestamp = {2010.10.13}
3208 author = {Aidan Mooney and John G. Keating and Ioannis Pitas},
3209 title = {A comparative study of chaotic and white noise signals in digital
3211 journal = {Chaos, Solitons and Fractals},
3215 owner = {christophe},
3216 timestamp = {2010.03.01}
3219 @ARTICLE{Nakashima2003,
3220 author = {Nakashima, Y. and Tachibana, R. and Babaguchi, N.},
3221 title = {Watermarked Movie Soundtrack Finds the Position of the Camcorder
3223 journal = {IEEE Transactions on Multimedia},
3225 note = {Accepted for future publication Multimedia}
3228 @INCOLLECTION{springerlink:10.1007/978-3-642-04431-1_16,
3229 author = {Nelson, Michael and Nahapetian, Ani and Koushanfar, Farinaz and Potkonjak,
3231 title = {SVD-Based Ghost Circuitry Detection},
3232 booktitle = {Information Hiding},
3233 publisher = {Springer Berlin / Heidelberg},
3235 editor = {Katzenbeisser, Stefan and Sadeghi, Ahmad-Reza},
3237 series = {Lecture Notes in Computer Science},
3239 note = {10.1007/978-3-642-04431-1_16},
3240 affiliation = {Computer Science Department, UCLA, Los Angeles, CA 90095, USA},
3241 url = {http://dx.doi.org/10.1007/978-3-642-04431-1_16}
3244 @INPROCEEDINGS{Perez-Hernandez09,
3245 author = {P\'{e}rez-Hern\'{a}ndez, Luis Germ\'{a}n and Rodr\'{\i}guez-V\'{a}zquez,
3246 Katya and Gardu\~{n}o-Ju\'{a}rez, Ram\'{o}n},
3247 title = {Parallel particle swarm optimization applied to the protein folding
3249 booktitle = {Proceedings of the 11th Annual conference on Genetic and evolutionary
3252 series = {GECCO '09},
3253 pages = {1791--1792},
3254 address = {New York, NY, USA},
3257 isbn = {978-1-60558-325-9},
3258 keywords = {bioinformatics, biology and chemistry, combinatorial optimization,
3259 parallelization, swarm intelligence},
3260 location = {Montreal, Qu\&\#233;bec, Canada},
3264 @PHDTHESIS{Pellegrin1986,
3265 author = {D. Pellegrin},
3266 title = {Algorithmique discr\`{e}te et r\'{e}seaux d'automates},
3267 school = {Grenoble},
3270 timestamp = {2008.05.22}
3274 author = {F. Peng and S.-S. Qiu and M. Long},
3275 title = {One way Hash function construction based on two-dimensional hyperchaotic
3277 journal = {Acta Phys. Sinici.},
3282 timestamp = {2009.01.16}
3285 @INPROCEEDINGS{Perez06,
3286 author = {Luis Perez-Freire and F. Pérez-gonzalez and Pedro Comesaña},
3287 title = {Secret Dither Estimation in Lattice-Quantization Data Hiding: A Set-Membership
3289 booktitle = {Security, Steganography, and Watermarking of Multimedia Contents},
3291 editor = {Edward J. Delp and Ping W. Wong},
3292 address = {San Jose, California, USA},
3294 organization = {SPIE},
3296 timestamp = {2009.06.30}
3299 @INPROCEEDINGS{Perez-Freire06,
3300 author = {Luis Perez-Freire and Pedro Comesana and Juan Ramon Troncoso-Pastoriza
3301 and Fernando Perez-Gonzalez},
3302 title = {Watermarking Security: a Survey},
3303 booktitle = {LNCS Transactions on Data Hiding and Multimedia Security},
3306 timestamp = {2009.06.29}
3309 @PROCEEDINGS{Peter07,
3310 title = {On Concealed Data Aggregation for WSNs},
3312 author = {Peter, Steffen and Piotrowski, Krzysztof and Langendoerfer, Peter},
3313 booktitle = {Consumer Communications and Networking Conference, 2007. CCNC 2007.
3315 citeulike-article-id = {2281643},
3316 citeulike-linkout-0 = {http://dx.doi.org/10.1109/CCNC.2007.45},
3317 citeulike-linkout-1 = {http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=4199133},
3318 doi = {10.1109/CCNC.2007.45},
3319 journal = {Consumer Communications and Networking Conference, 2007. CCNC 2007.
3323 posted-at = {2008-01-23 19:36:19},
3325 url = {http://dx.doi.org/10.1109/CCNC.2007.45}
3329 author = {Pham, Congduc and Makhoul, Abdallah and Saadi, Rachid},
3330 title = {Risk-based Adaptive Scheduling in Randomly Deployed Video Sensor
3331 Networks for Critical Surveillance Applications},
3332 journal = {Journal of Network and Computer Applications},
3337 note = {Accepted manuscript. To appear},
3338 classement = {ACLI},
3340 impact-factor = {1.111},
3342 isi-acro = {J NETW COMPU APPL},
3343 publisher = {Springer}
3347 author = {Edgar Alan Poe},
3348 title = {The Raven},
3351 note = {American Museum (Baltimore)},
3352 owner = {christophe},
3353 timestamp = {2010.11.23}
3356 @ARTICLE{Perez-Freire2006:Security,
3357 author = {L. P{\'e}rez-Freire and F. P{\'e}rez-González and T. Furon and P.
3359 title = {Security of lattice-based data hiding against the known message attack},
3360 journal = {IEEE Trans. on Information Forensics and Security},
3367 timestamp = {2009.12.06}
3370 @MISC{Quisquater02sidechannel,
3371 author = {J-J. Quisquater and D. Samyde and Université Catholique De Louvain
3373 title = {Side Channel Cryptanalysis},
3377 @ARTICLE{Raynal2001,
3378 author = {Frédéric Raynal and Fabien A. P. Petitcolas and Caroline Fontaine},
3379 title = {Evaluation automatique des méthodes de tatouage},
3380 journal = {Traitement du signal},
3385 timestamp = {2008.05.21}
3389 author = {Vincent Rijmen and Elisabeth Oswald},
3390 title = {Update on SHA-1},
3391 howpublished = {Cryptology ePrint Archive, Report 2005/010},
3393 note = {\url{http://eprint.iacr.org/}}
3397 title = {Discrete Iterations, a Metric Study},
3398 publisher = {Springer-Verlag},
3400 editor = {Berlin Heidelberg New-York},
3401 author = {François Robert},
3403 series = {Series in Computational Mathematics}
3407 title = {Discrete Iterations: A Metric Study},
3409 editor = {Springer-Verlag},
3410 author = {F. Robert},
3412 series = {Springer Series in Computational Mathematics},
3414 timestamp = {17/02/2008}
3418 author = {Rudenko, O. and Snytkin, M.},
3419 title = {Image compression based on the neural network art},
3420 journal = {Cybernetics and Systems Analysis},
3424 affiliation = {Kharkov National University of Radio Electronics Kharkov Ukraine},
3427 keyword = {Computer Science},
3428 publisher = {Springer New York}
3431 @PHDTHESIS{Ruette2001,
3432 author = {Sylvie Ruette},
3433 title = {Chaos en dynamique topologique, en particulier sur l'intervalle,
3434 mesures d'entropie maximale},
3435 school = {Université d'Aix-Marseille II},
3437 optmonth = {Novembre},
3439 timestamp = {2008.01.02}
3442 @MASTERSTHESIS{Saulnier02,
3443 author = {Boris Saulnier},
3444 title = {Entropie topologique},
3445 school = {DEA Sémantique, Preuves et Langages, Paris 7},
3447 owner = {christophe},
3448 timestamp = {2010.08.12}
3451 @ARTICLE{Schmitz2001,
3452 author = {Roland Schmitz},
3453 title = {Use of chaotic dynamical systems in cryptography},
3454 journal = {Journal of Franklin Institute},
3459 timestamp = {17/02/2008}
3463 title = {Analyse: topologie g\'{e}n\'{e}rale et analyse fonctionnelle},
3464 publisher = {Hermann},
3467 author = {Laurent Schwartz},
3468 owner = {christophe},
3469 timestamp = {2010.09.15}
3473 author = {Shannon, Claude E.},
3474 title = {Communication Theory of Secrecy Systems},
3475 journal = {Bell Systems Technical Journal},
3479 citeulike-article-id = {507362},
3480 keywords = {master, secrecy\_systems, teoria-informacao, theory\_communication,
3481 theory\_cryptography},
3483 posted-at = {2006-02-16 23:24:09},
3485 timestamp = {2009.06.29}
3488 @ARTICLE{Shmygelska05,
3489 author = {Shmygelska, Alena and Hoos, Holger},
3490 title = {An ant colony optimisation algorithm for the 2D and 3D hydrophobic
3491 polar protein folding problem},
3492 journal = {BMC Bioinformatics},
3497 abstract = {BACKGROUND:The protein folding problem is a fundamental problems in
3498 computational molecular biology and biochemical physics. Various
3499 optimisation methods have been applied to formulations of the ab-initio
3500 folding problem that are based on reduced models of protein structure,
3501 including Monte Carlo methods, Evolutionary Algorithms, Tabu Search
3502 and hybrid approaches. In our work, we have introduced an ant colony
3503 optimisation (ACO) algorithm to address the non-deterministic polynomial-time
3504 hard (NP-hard) combinatorial problem of predicting a protein's conformation
3505 from its amino acid sequence under a widely studied, conceptually
3506 simple model - the 2-dimensional (2D) and 3-dimensional (3D) hydrophobic-polar
3507 (HP) model.RESULTS:We present an improvement of our previous ACO
3508 algorithm for the 2D HP model and its extension to the 3D HP model.
3509 We show that this new algorithm, dubbed ACO-HPPFP-3, performs better
3510 than previous state-of-the-art algorithms on sequences whose native
3511 conformations do not contain structural nuclei (parts of the native
3512 fold that predominantly consist of local interactions) at the ends,
3513 but rather in the middle of the sequence, and that it generally finds
3514 a more diverse set of native conformations.CONCLUSIONS:The application
3515 of ACO to this bioinformatics problem compares favourably with specialised,
3516 state-of-the-art methods for the 2D and 3D HP protein folding problem;
3517 our empirical results indicate that our rather simple ACO algorithm
3518 scales worse with sequence length but usually finds a more diverse
3519 ensemble of native states. Therefore the development of ACO algorithms
3520 for more complex and realistic models of protein structure holds
3521 significant promise.},
3522 doi = {10.1186/1471-2105-6-30},
3524 pubmedid = {15710037}
3527 @OTHER{Shmygelska2005Feb,
3528 __markedentry = {[christophe]},
3529 abstract = {Abstract Background The protein folding problem is a fundamental problems
3530 in computational molecular biology and biochemical physics. Various
3531 optimisation methods have been applied to formulations of the ab-initio
3532 folding problem that are based on reduced models of protein structure,
3533 including Monte Carlo methods, Evolutionary Algorithms, Tabu Search
3534 and hybrid approaches. In our work, we have introduced an ant colony
3535 optimisation (ACO) algorithm to address the non-deterministic polynomial-time
3536 hard (NP-hard) combinatorial problem of predicting a protein's conformation
3537 from its amino acid sequence under a widely studied, conceptually
3538 simple model – the 2-dimensional (2D) and 3-dimensional (3D) hydrophobic-polar
3539 (HP) model. Results We present an improvement of our previous ACO
3540 algorithm for the 2D HP model and its extension to the 3D HP model.
3541 We show that this new algorithm, dubbed ACO-HPPFP-3, performs better
3542 than previous state-of-the-art algorithms on sequences whose native
3543 conformations do not contain structural nuclei (parts of the native
3544 fold that predominantly consist of local interactions) at the ends,
3545 but rather in the middle of the sequence, and that it generally finds
3546 a more diverse set of native conformations. Conclusions The application
3547 of ACO to this bioinformatics problem compares favourably with specialised,
3548 state-of-the-art methods for the 2D and 3D HP protein folding problem;
3549 our empirical results indicate that our rather simple ACO algorithm
3550 scales worse with sequence length but usually finds a more diverse
3551 ensemble of native states. Therefore the development of ACO algorithms
3552 for more complex and realistic models of protein structure holds
3553 significant promise.},
3554 author = {Shmygelska, Alena and Hoos, Holger H},
3555 journal = {BMC Bioinformatics. 2005 Feb 14},
3557 owner = {christophe},
3559 timestamp = {2011.01.24},
3560 title = {An ant colony optimisation algorithm for the 2D and 3D hydrophobic
3561 polar protein folding problem},
3567 author = {Li Shujun and Li Qi and Li Wenmin and Mou Xuanqin and Cai Yuanlong},
3568 title = {Statistical Properties of Digital Piecewise Linear Chaotic Maps and
3569 Their Roles in Cryptography and Pseudo-Random Coding},
3570 journal = {Proceedings of the 8th IMA International Conference on Cryptography
3575 owner = {christophe},
3576 timestamp = {2010.03.06}
3579 @INPROCEEDINGS{Simmons83,
3580 author = {Gustavus J. Simmons},
3581 title = {The Prisoners' Problem and the Subliminal Channel},
3582 booktitle = {Advances in Cryptology, Proc. CRYPTO'83},
3585 bibsource = {DBLP, http://dblp.uni-trier.de},
3587 timestamp = {2009.06.29}
3590 @ARTICLE{Solak2004389,
3591 author = {Ercan Solak},
3592 title = {On the security of a class of discrete-time chaotic cryptosystems},
3593 journal = {Physics Letters A},
3596 pages = {389 - 395},
3598 doi = {DOI: 10.1016/j.physleta.2003.11.008},
3600 keywords = {Communication using chaos},
3602 timestamp = {2009.12.12},
3603 url = {http://www.sciencedirect.com/science/article/B6TVM-4B22RC9-2/2/99a0af737c9b6ba8af47ae4d3c7a326d}
3606 @PHDTHESIS{Spiteri74,
3607 author = {Pierre Spitéri},
3608 title = {Contribution à l'étude de la stabilite au sens de liapounov de certains
3609 systemes differentiels non lineaires},
3610 school = {Université de Franche-Comté},
3612 owner = {christophe},
3613 timestamp = {2010.10.13}
3617 title = {Does God Play Dices ?: the mathematics of chaos},
3618 publisher = {Penguin},
3620 author = {Ian Stewart},
3622 timestamp = {2008.01.02}
3626 title = {Cryptography: Theory and Practice, Second Edition},
3627 publisher = {{Chapman \& Hall/CRC}},
3629 author = {Stinson, Douglas R.},
3631 abstract = {{Douglas R. Stinson's <I>Cryptography: Theory and Practice</I> is
3632 a mathematically intensive examination of cryptography, including
3633 ciphers, the Data Encryption Standard (DES), public key cryptography,
3634 one-way hash functions, and digital signatures. Stinson's explication
3635 of "zero-sum proofs"--a process by which one person lets another
3636 person know that he or she has a password without actually revealing
3637 any information--is especially good.<P> If you are new to the math
3638 behind cryptography but want to tackle it, the author covers all
3639 of the required background to understand the real mathematics here.
3640 <I>Cryptography</I> includes extensive exercises with each chapter
3641 and makes an ideal introduction for any math-literate person willing
3642 to get acquainted with this material.} {<P>Major advances over the
3643 last five years precipitated this major revision of the bestselling
3644 Cryptography: Theory and Practice. With more than 40 percent new
3645 or updated material, the second edition now provides an even more
3646 comprehensive treatment of modern cryptography. It focuses on the
3647 new Advanced Encryption Standards and features an entirely new chapter
3648 on that subject. Another new chapter explores the applications of
3649 secret sharing schemes, including ramp schemes, visual cryptography,
3650 threshold cryptography, and broadcast encryption. This is an ideal
3651 introductory text for both computer science and mathematics students
3652 and a valuable reference for professionals.</P>}},
3653 citeulike-article-id = {2401855},
3655 howpublished = {Hardcover},
3656 isbn = {1584882069},
3657 keywords = {security},
3658 posted-at = {2008-02-20 08:28:49},
3660 url = {http://www.amazon.com/exec/obidos/redirect?tag=citeulike07-20\&path=ASIN/1584882069}
3663 @INPROCEEDINGS{Takana90,
3664 author = {K. Tanaka and Y. Nakamura and K. Matsui},
3665 title = {Embedding Secret Information into a Dithered Multi-level Image},
3666 booktitle = {IEEE Military Communications Conference},
3668 owner = {christophe},
3669 timestamp = {2010.08.05}
3672 @PHDTHESIS{ElTarazi81,
3673 author = {M. N. El Tarazi},
3674 title = {Contraction et ordre partiel pour l'étude d'algorithmes synchrones
3675 et asynchrones en analyse numérique},
3676 school = {Faculté des Sciences et Techniques de l'Université de Franche-Comté,
3679 owner = {christophe},
3680 timestamp = {2010.08.17}
3683 @INPROCEEDINGS{Unger93,
3684 author = {Unger, Ron and Moult, John},
3685 title = {Genetic Algorithm for 3D Protein Folding Simulations},
3686 booktitle = {Proceedings of the 5th International Conference on Genetic Algorithms},
3689 address = {San Francisco, CA, USA},
3690 publisher = {Morgan Kaufmann Publishers Inc.},
3692 isbn = {1-55860-299-2},
3696 @MISC{Van93electronicwater,
3697 author = {Tirkel Rankin Van},
3698 title = {Electronic Water Mark},
3702 @ARTICLE{Venkatesan2007397,
3703 author = {R.C. Venkatesan},
3704 title = {Encryption of covert information into multiple statistical distributions},
3705 journal = {Physics Letters A},
3708 pages = {397 - 404},
3710 doi = {DOI: 10.1016/j.physleta.2007.05.117},
3712 keywords = {Statistical encryption/decryption},
3714 timestamp = {2009.12.12},
3715 url = {http://www.sciencedirect.com/science/article/B6TVM-4P4FV2M-1/2/cd11a2ec144526e3c4552d2a7e7906cc}
3719 author = {G. Voyatzis and I. Pitas},
3720 title = {Chaotic watermarks for embedding in the spatial digital image domain},
3721 journal = {Proceedings of IEEE ICIP},
3725 owner = {christophe},
3726 timestamp = {2010.03.06}
3729 @INCOLLECTION{Wagner03,
3730 author = {Wagner, David},
3731 title = {Cryptanalysis of an Algebraic Privacy Homomorphism},
3732 booktitle = {Information Security},
3733 publisher = {Springer Berlin, Heidelberg},
3736 series = {Lecture Notes in Computer Science},
3738 abstract = {We use linear algebra to show that an algebraic privacy homomorphism
3739 proposed by Domingo-Ferrer is insecure for some parameter settings.},
3740 affiliation = {University of California, Berkeley USA}
3743 @INPROCEEDINGS{Wagner03cryptanalysisof,
3744 author = {David Wagner},
3745 title = {Cryptanalysis of an Algebraic Privacy Homomorphism},
3746 booktitle = {Proc. Sixth Information Security Conf. (ISC03},
3751 @ARTICLE{Wang_ellipticcurve,
3752 author = {Haodong Wang and Bo Sheng and Qun Li},
3753 title = {Elliptic curve cryptography-based access control in sensor networks},
3754 journal = {Int. J. Security and Networks}
3757 @INPROCEEDINGS{wbg10:ip,
3758 author = {Wang, Qianxue and Bahi, Jacques M. and Guyeux, Christophe and Fang,
3760 title = {Randomness quality of {CI} chaotic generators. Application to Internet
3762 booktitle = {INTERNET'2010. The 2nd Int. Conf. on Evolving Internet},
3765 address = {Valencia, Spain},
3767 publisher = {IEEE Computer Society Press},
3768 note = {Best Paper award},
3769 classement = {ACTI},
3770 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
3776 author = {X. M. Wang and J. S. Zhang and W. F. Zhang},
3777 title = {One-way hash function construction based on the extended chaotic
3779 journal = {Acta Phys. Sinici.},
3781 volume = {52, No. 11},
3782 pages = {2737--2742},
3784 timestamp = {2009.01.16}
3788 author = {Westhoff, Dirk and Girao, Joao and Acharya, Mithun},
3789 title = {Concealed Data Aggregation for Reverse Multicast Traffic in Sensor
3790 Networks: Encryption, Key Distribution, and Routing Adaptation},
3791 journal = {IEEE Transactions on Mobile Computing},
3794 pages = {1417--1431},
3796 address = {Piscataway, NJ, USA},
3797 doi = {http://dx.doi.org/10.1109/TMC.2006.144},
3799 publisher = {IEEE Educational Activities Department}
3803 author = {Wikipédia},
3804 title = {Exposant de Lyapunov -- Site web d'André Lévesque},
3806 note = {[En ligne; Page disponible le 9-septembre-2010]},
3807 url = {\url{http://math.cmaisonneuve.qc.ca/alevesque/chaos_fract/Lyapunov/Exposant.html}}
3811 author = {Wikipédia},
3812 title = {Espace complet --- Wikipédia{,} l'encyclopédie libre},
3814 note = {[En ligne; Page disponible le 9-août-2010]},
3815 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Espace_complet&oldid=52734266}}
3819 author = {Wikipédia},
3820 title = {Densité (mathématiques) --- Wikipédia{,} l'encyclopédie libre},
3822 note = {[En ligne; Page disponible le 8-août-2010]},
3823 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Densit%C3%A9_(math%C3%A9matiques)&oldid=53938121}}
3827 author = {Wikipédia},
3828 title = {Information de Fisher --- Wikipédia{,} l'encyclopédie libre},
3830 note = {[En ligne; Page disponible le 5-août-2010]},
3831 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Information_de_Fisher&oldid=52877871}}
3834 @MISC{wiki:Kerkhoffs,
3835 author = {Wikipédia},
3836 title = {Principe de Kerckhoffs --- Wikipédia{,} l'encyclopédie libre},
3838 note = {[En ligne; Page disponible le 20-août-2010]},
3839 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Principe_de_Kerckhoffs&oldid=52133114}}
3842 @MISC{wiki:sarkovskii,
3843 author = {Wikipédia},
3844 title = {Théorème de Sarkovskii --- Wikipédia{,} l'encyclopédie libre},
3846 note = {[En ligne; Page disponible le 8-août-2010]},
3847 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Th%C3%A9or%C3%A8me_de_Sarkovskii&oldid=54196167}}
3850 @MISC{wiki:steganographie,
3851 author = {Wikipédia},
3852 title = {Stéganographie --- Wikipédia{,} l'encyclopédie libre},
3854 note = {[En ligne; Page disponible le 5-août-2010]},
3855 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=St%C3%A9ganographie&oldid=54724435}}
3858 @MISC{wiki:tatouage,
3859 author = {Wikipédia},
3860 title = {Tatouage numérique --- Wikipédia{,} l'encyclopédie libre},
3862 note = {[En ligne; Page disponible le 5-août-2010]},
3863 url = {https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Tatouage_num%C3%A9rique&oldid=55484940}
3866 @MISC{wiki:testsHypothese,
3867 author = {Wikipédia},
3868 title = {Test d'hypothèse --- Wikipédia{,} l'encyclopédie libre},
3870 note = {[En ligne; Page disponible le 5-août-2010]},
3871 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Test_d%27hypoth%C3%A8se&oldid=55344108}}
3875 author = {Xianyong Wu and Zhi-Hong Guan},
3876 title = {A novel digital watermark algorithm based on chaotic maps},
3877 journal = {Physics Letters A},
3880 pages = {403 - 406},
3882 doi = {DOI: 10.1016/j.physleta.2007.01.034},
3884 keywords = {Watermarking},
3885 url = {http://www.sciencedirect.com/science/article/B6TVM-4MY0MF3-8/2/0b4d1298fa84337d2e59b3fefe26f583}
3888 @INPROCEEDINGS{Wu2007,
3889 author = {Wu, Xianyong and Guan, Zhi-Hong and Wu, Zhengping},
3890 title = {A Chaos Based Robust Spatial Domain Watermarking Algorithm},
3891 booktitle = {ISNN '07: Proceedings of the 4th international symposium on Neural
3895 address = {Berlin, Heidelberg},
3896 publisher = {Springer-Verlag},
3897 doi = {http://dx.doi.org/10.1007/978-3-540-72393-6_15},
3898 isbn = {978-3-540-72392-9},
3899 location = {Nanjing, China}
3902 @ARTICLE{Xiao20092288,
3903 author = {Di Xiao and Xiaofeng Liao and Yong Wang},
3904 title = {Parallel keyed hash function construction based on chaotic neural
3906 journal = {Neurocomputing},
3909 pages = {2288 - 2296},
3911 note = {Lattice Computing and Natural Computing (JCIS 2007) / Neural Networks
3912 in Intelligent Systems Designn (ISDA 2007)},
3913 abstract = {Recently, various hash functions based on chaos or neural networks
3914 were proposed. Nevertheless, none of them works efficiently in parallel
3915 computing environment. In this paper, an algorithm for parallel keyed
3916 hash function construction based on chaotic neural network is proposed.
3917 The mechanism of changeable-parameter and self-synchronization establishes
3918 a close relation between the hash value bit and message, and the
3919 algorithm structure ensures the uniform sensitivity of the hash value
3920 to the message blocks at different positions. The proposed algorithm
3921 can satisfy the performance requirements of hash function. These
3922 properties make it a promising choice for hashing on parallel computing
3925 keywords = {Chaotic neural network}
3928 @ARTICLE{Xiao20094346,
3929 author = {Di Xiao and Xiaofeng Liao and Yong Wang},
3930 title = {Improving the security of a parallel keyed hash function based on
3932 journal = {Physics Letters A},
3935 pages = {4346 - 4353},
3938 keywords = {Hash function},
3940 timestamp = {2009.12.12}
3943 @ARTICLE{Xiao20102254,
3944 author = {Di Xiao and Frank Y. Shih and Xiaofeng Liao},
3945 title = {A chaos-based hash function with both modification detection and
3946 localization capabilities},
3947 journal = {Communications in Nonlinear Science and Numerical Simulation},
3950 pages = {2254 - 2261},
3952 abstract = {Recently, a variety of chaos-based hash functions have been proposed.
3953 Nevertheless, none of them can realize modification localization.
3954 In this paper, a hash function with both modification detection and
3955 localization capabilities is proposed, which can also support the
3956 parallel processing mode. By using the mechanism of changeable-parameter
3957 and self-synchronization, the keystream can establish a close relation
3958 with the algorithm key, the content, and the order of each message
3959 unit. Theoretical analysis and computer simulation indicate that
3960 the proposed algorithm can satisfy the performance requirements of
3963 keywords = {Hash function}
3966 @INPROCEEDINGS{Yu06,
3967 author = {Yu, Yu and Leiwo, Jussipekka and Premkumar, Benjamin},
3968 title = {A Study on the Security of Privacy Homomorphism},
3969 booktitle = {ITNG '06: Proceedings of the Third International Conference on Information
3970 Technology: New Generations},
3973 address = {Washington, DC, USA},
3974 publisher = {IEEE Computer Society},
3975 doi = {http://dx.doi.org/10.1109/ITNG.2006.19},
3976 isbn = {0-7695-2497-4}
3979 @ARTICLE{Zhang2008658,
3980 author = {Wei Zhang and Yonghe Liu and Sajal K. Das and Pradip De},
3981 title = {Secure data aggregation in wireless sensor networks: A watermark
3982 based authentication supportive approach},
3983 journal = {Pervasive and Mobile Computing},
3986 pages = {658 - 680},
3988 doi = {DOI: 10.1016/j.pmcj.2008.05.005},
3990 keywords = {Wireless sensor networks},
3991 url = {http://www.sciencedirect.com/science/article/B7MF1-4SKB3MD-1/2/b73948dcaa3eb63a2c21d09041882625}
3995 author = {Zhang, Yang and Arakaki, Adrian K. and Skolnick, Jeffrey},
3996 title = {TASSER: An automated method for the prediction of protein tertiary
3997 structures in CASP6},
3998 journal = {Proteins},
4004 keywords = {comparative modeling, threading, ab initio prediction, TASSER, PROSPECTOR_3},
4005 owner = {christophe},
4006 publisher = {Wiley Subscription Services, Inc., A Wiley Company},
4007 timestamp = {2011.01.22},
4008 url = {http://dx.doi.org/10.1002/prot.20724}
4011 @ARTICLE{Zhou1997429,
4012 author = {Chang-song Zhou and Tian-lun Chen},
4013 title = {Extracting information masked by chaos and contaminated with noise:
4014 Some considerations on the security of communication approaches using
4016 journal = {Physics Letters A},
4019 pages = {429 - 435},
4022 keywords = {Communication},
4024 timestamp = {2009.12.12}
4028 author = {Zhou, Huai-bei and Wang, Lu},
4029 title = {Chaos in Biomolecular Dynamics},
4030 journal = {The Journal of Physical Chemistry},
4033 pages = {8101-8105},
4035 doi = {10.1021/jp953409x}
4038 @PROCEEDINGS{DBLP:conf/iwdw/2005,
4039 title = {IWDW'05: 4th International Workshop on Digital Watermarking},
4041 editor = {Mauro Barni and Ingemar J. Cox and Ton Kalker and Hyoung Joong Kim},
4043 series = {Lecture Notes in Computer Science},
4044 address = {Siena, Italy},
4045 publisher = {Springer},
4046 month = {September 15-17},
4047 bibsource = {DBLP, http://dblp.uni-trier.de},
4049 isbn = {3-540-28768-X},
4051 timestamp = {2009.06.29}
4054 @PROCEEDINGS{DBLP:conf/ih/2006,
4055 title = {IH 2006: Information Hiding, 8th International Workshop},
4057 editor = {Jan Camenisch and Christian S. Collberg and Neil F. Johnson and Phil
4060 series = {Lecture Notes in Computer Science},
4061 address = {Alexandria, VA, USA},
4062 publisher = {Springer},
4064 bibsource = {DBLP, http://dblp.uni-trier.de},
4065 booktitle = {Information Hiding},
4066 isbn = {978-3-540-74123-7},
4068 timestamp = {2009.06.29}
4071 @PROCEEDINGS{DBLP:conf/ih/2007,
4072 title = {Information Hiding, 9th International Workshop, IH 2007, Saint Malo,
4073 France, June 11-13, 2007, Revised Selected Papers},
4075 editor = {Teddy Furon and Fran\c{c}ois Cayre and Gwena{\"e}l J. Do{\"e}rr and
4078 series = {Lecture Notes in Computer Science},
4079 publisher = {Springer},
4080 bibsource = {DBLP, http://dblp.uni-trier.de},
4081 booktitle = {Information Hiding},
4082 isbn = {978-3-540-77369-6},
4084 timestamp = {2009.06.29}
4087 @PROCEEDINGS{DBLP:conf/iccsa/2006-1,
4088 title = {Computational Science and Its Applications - ICCSA 2006, International
4089 Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part I},
4091 editor = {Marina L. Gavrilova and Osvaldo Gervasi and Vipin Kumar and Chih
4092 Jeng Kenneth Tan and David Taniar and Antonio Lagan{\`a} and Youngsong
4093 Mun and Hyunseung Choo},
4095 series = {Lecture Notes in Computer Science},
4096 publisher = {Springer},
4097 bibsource = {DBLP, http://dblp.uni-trier.de},
4098 booktitle = {ICCSA (1)},
4099 isbn = {3-540-34070-X}
4102 @PROCEEDINGS{DBLP:conf/secrypt/2010,
4103 title = {SECRYPT 2010 - Proceedings of the International Conference on Security
4104 and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part
4105 of ICETE - The International Joint Conference on e-Business and Telecommunications},
4107 editor = {Sokratis K. Katsikas and Pierangela Samarati},
4108 publisher = {SciTePress},
4109 bibsource = {DBLP, http://dblp.uni-trier.de},
4110 booktitle = {SECRYPT},
4111 isbn = {978-989-8425-18-8}
4114 @BOOK{Katzenbeisser00,
4115 title = {Information Hiding Techniques for Steganography and Digital Watermarking},
4116 publisher = {Artech House, Inc.},
4118 editor = {Katzenbeisser, Stefan and Petitcolas, Fabien A.},
4119 address = {Norwood, MA, USA},
4123 @PROCEEDINGS{DBLP:conf/ih/1999,
4124 title = {IH'99: 3rd International Workshop on Information Hiding},
4126 editor = {Andreas Pfitzmann},
4128 series = {Lecture Notes in Computer Science},
4129 address = {Dresden, Germany},
4130 publisher = {Springer},
4131 month = {September 29 - October 1.},
4132 bibsource = {DBLP, http://dblp.uni-trier.de},
4133 booktitle = {Information Hiding},
4134 isbn = {3-540-67182-X},
4136 timestamp = {2009.06.29}
4139 @PROCEEDINGS{DBLP:conf/indocrypt/2000,
4140 title = {Progress in Cryptology - INDOCRYPT 2000, First International Conference
4141 in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings},
4143 editor = {Bimal K. Roy and Eiji Okamoto},
4145 series = {Lecture Notes in Computer Science},
4146 publisher = {Springer},
4147 bibsource = {DBLP, http://dblp.uni-trier.de},
4148 booktitle = {INDOCRYPT},
4149 isbn = {3-540-41452-5}
4152 @BOOK{DBLP:reference/icsec/2010,
4153 title = {Handbook of Information and Communication Security},
4154 publisher = {Springer},
4156 editor = {Peter P. Stavroulakis and Mark Stamp},
4157 bibsource = {DBLP, http://dblp.uni-trier.de},
4158 booktitle = {Handbook of Information and Communication Security},
4159 ee = {http://dx.doi.org/10.1007/978-3-642-04117-4},
4160 isbn = {978-3-642-04116-7}
4163 @PROCEEDINGS{DBLP:conf/isnn/2004-2,
4164 title = {Advances in Neural Networks - ISNN 2004, International Symposium
4165 on Neural Networks, Dalian, China, August 19-21, 2004, Proceedings,
4168 editor = {Fuliang Yin and Jun Wang and Chengan Guo},
4170 series = {Lecture Notes in Computer Science},
4171 publisher = {Springer},
4172 bibsource = {DBLP, http://dblp.uni-trier.de},
4173 booktitle = {ISNN (2)},
4174 isbn = {3-540-22843-8}
4177 @PROCEEDINGS{DBLP:conf/adhocnets/2010,
4178 title = {Ad Hoc Networks - Second International Conference, ADHOCNETS 2010,
4179 Victoria, BC, Canada, August 18-20, 2010, Revised Selected Papers},
4181 editor = {Jun Zheng and David Simplot-Ryl and Victor C. M. Leung},
4183 series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
4184 and Telecommunications Engineering},
4185 publisher = {Springer},
4186 bibsource = {DBLP, http://dblp.uni-trier.de},
4187 booktitle = {ADHOCNETS},
4188 ee = {http://dx.doi.org/10.1007/978-3-642-17994-5},
4189 isbn = {978-3-642-17993-8}
4194 timestamp = {2011.03.29}
4198 title = {Delicious social bookmarking, http://delicious.com/},
4199 comment = {http://delicious.com/},
4201 url = {http://delicious.com/}
4205 title = {The Frick Collection, http://www.frick.org/},
4206 comment = {http://www.frick.org/},
4208 url = {http://www.frick.org/}
4212 title = {Proceedings of the IEEE Congress on Evolutionary Computation, CEC
4213 2010, Barcelona, Spain, 18-23 July 2010},
4216 bibsource = {DBLP, http://dblp.uni-trier.de},
4217 booktitle = {IEEE Congress on Evolutionary Computation}
4220 @PROCEEDINGS{DBLP:conf/cec/2010,
4221 title = {Proceedings of the IEEE Congress on Evolutionary Computation, CEC
4222 2010, Barcelona, Spain, 18-23 July 2010},
4225 bibsource = {DBLP, http://dblp.uni-trier.de},
4226 booktitle = {IEEE Congress on Evolutionary Computation}
4229 @PROCEEDINGS{DBLP:conf/date/2010,
4230 title = {Design, Automation and Test in Europe, DATE 2010, Dresden, Germany,
4234 bibsource = {DBLP, http://dblp.uni-trier.de},
4238 @PROCEEDINGS{DBLP:conf/cse/2009,
4239 title = {Proceedings IEEE CSE'09, 12th IEEE International Conference on Computational
4240 Science and Engineering, August 29-31, 2009, Vancouver, BC, Canada},
4242 publisher = {IEEE Computer Society},
4243 bibsource = {DBLP, http://dblp.uni-trier.de},
4247 @PROCEEDINGS{DBLP:conf/icumt/2009,
4248 title = {Proceedings of the International Conference on Ultra Modern Telecommunications,
4249 ICUMT 2009, 12-14 October 2009, St. Petersburg, Russia},
4252 bibsource = {DBLP, http://dblp.uni-trier.de},
4256 @PROCEEDINGS{DBLP:conf/focs/2008,
4257 title = {49th Annual IEEE Symposium on Foundations of Computer Science, FOCS
4258 2008, October 25-28, 2008, Philadelphia, PA, USA},
4260 publisher = {IEEE Computer Society},
4261 bibsource = {DBLP, http://dblp.uni-trier.de},
4265 @comment{jabref-meta: selector_publisher:}
4267 @comment{jabref-meta: selector_author:}
4269 @comment{jabref-meta: selector_journal:}
4271 @comment{jabref-meta: selector_keywords:Chaos;Entropie Topologique;Tip
4276 @InProceedings{Pang:2008:cec,
4277 author = "Wai-Man Pang and Tien-Tsin Wong and Pheng-Ann Heng",
4278 title = "Generating Massive High-Quality Random Numbers using
4280 booktitle = "2008 IEEE World Congress on Computational
4283 editor = "Jun Wang",
4284 address = "Hong Kong",
4285 organization = "IEEE Computational Intelligence Society",
4286 publisher = "IEEE Press",
4290 @Article{LEcuyerS07,
4291 title = "Test{U01}: {A} {C} library for empirical testing of
4292 random number generators",
4293 author = "Pierre L'Ecuyer and Richard J. Simard",
4294 journal = "ACM Trans. Math. Softw",
4298 bibdate = "2007-11-06",
4300 http://dblp.uni-trier.de/db/journals/toms/toms33.html#LEcuyerS07",
4301 URL = "http://doi.acm.org/10.1145/1268776.1268777",
4305 author = {A. Zhmurov and K. Rybnikov and Y. Kholodov and V. Barsegov},
4306 title = {Generation of Random Numbers on Graphics Processors: Forced Indentation In Silico of the Bacteriophage HK97},
4307 journal = {J. Phys. Chem. B},
4311 pages = {5278--5288},
4316 @comment {regarder : Pseudo-Random Number Generation for Brownian Dynamics and Dissipative Particle Dynamics Simulations on GPU Devices}
4317 @comment {CL Phillips, JA Anderson… - Journal of Computational Physics, 2011 - Elsevier}
4319 @InProceedings{conf/fpga/ThomasHL09,
4320 title = "A comparison of {CPU}s, {GPU}s, {FPGA}s, and massively
4321 parallel processor arrays for random number
4323 author = "David B. Thomas and Lee W. Howes and Wayne Luk",
4324 booktitle = "Proceedings of the {ACM}/{SIGDA} 17th International
4325 Symposium on Field Programmable Gate Arrays, {FPGA}
4326 2009, Monterey, California, {USA}, February 22-24,
4328 bibdate = "2010-06-29",
4331 editor = "Paul Chow and Peter Y. K. Cheung",
4332 ISBN = "978-1-60558-410-2",
4334 URL = "http://doi.acm.org/10.1145/1508128.1508139",
4339 @InProceedings{Jenkins96,
4342 booktitle = "IWFSE: International Workshop on Fast Software
4349 title = {Cuda cublas library},
4351 Note = {Version 4.0},
4356 title = {Curand library},
4358 Note = {Version 4.0},
4364 author = {Lenore Blum and Manuel Blum and Michael Shub},
4365 title = {A Simple Unpredictable Pseudo-Random Number Generator},
4366 journal = {SIAM Journal on Computing},
4373 author = {Oded Goldreich},
4375 title = {Foundations of Cryptography: Basic Tools},
4376 publisher = {Cambridge University Press},