From: guyeux Date: Sun, 30 Oct 2011 07:20:02 +0000 (+0100) Subject: Mise à jour de la nouvelle base de citation X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/prng_gpu.git/commitdiff_plain/1d47039b10b11f257fe60db61313a82f5d688bd2?ds=inline;hp=700d74decf0ee2b9a708bb7202e0d76abe6152fc Mise à jour de la nouvelle base de citation --- diff --git a/mabase.bib b/mabase.bib new file mode 100644 index 0000000..bb42b6a --- /dev/null +++ b/mabase.bib @@ -0,0 +1,4193 @@ +% This file was created with JabRef 2.7. +% Encoding: UTF8 + +@INPROCEEDINGS{AdelsbachKS06, + author = {Andr{\'e} Adelsbach and Stefan Katzenbeisser and Ahmad-Reza Sadeghi}, + title = {A Computational Model for Watermark Robustness}, + booktitle = {Information Hiding}, + year = {2006}, + pages = {145-160}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + crossref = {DBLP:conf/ih/2006}, + ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_10}, + owner = {guyeux}, + timestamp = {2009.06.29} +} + +@INPROCEEDINGS{BattiatoCGG99, + author = {Sebastiano Battiato and Dario Catalano and Giovanni Gallo and Rosario + Gennaro}, + title = {Robust Watermarking for Images Based on Color Manipulation}, + booktitle = {Information Hiding}, + year = {1999}, + pages = {302-317}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + crossref = {DBLP:conf/ih/1999}, + owner = {guyeux}, + timestamp = {2009.06.29} +} + +@INPROCEEDINGS{ComesanaPP05, + author = {Pedro Comesa{\~n}a and Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez}, + title = {The Return of the Sensitivity Attack}, + booktitle = {IWDW}, + year = {2005}, + pages = {260-274}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + crossref = {DBLP:conf/iwdw/2005}, + ee = {http://dx.doi.org/10.1007/11551492_20}, + owner = {guyeux}, + timestamp = {2009.06.29} +} + +@INPROCEEDINGS{ComesanaPP05bis, + author = {Pedro Comesa{\~n}a and Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez}, + title = {Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum + Analysis}, + booktitle = {IH'05: Information Hiding Workshop}, + year = {2005}, + pages = {146-160}, + publisher = {Lectures Notes in Computer Science, Springer-Verlag}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + crossref = {DBLP:conf/ih/2005}, + ee = {http://dx.doi.org/10.1007/11558859_12}, + owner = {guyeux}, + timestamp = {2009.06.30} +} + +@INPROCEEDINGS{CongJQZ06, + author = {Jin Cong and Yan Jiang and Zhiguo Qu and Zhongmei Zhang}, + title = {A Wavelet Packets Watermarking Algorithm Based on Chaos Encryption}, + booktitle = {ICCSA (1)}, + year = {2006}, + pages = {921-928}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + crossref = {DBLP:conf/iccsa/2006-1}, + ee = {http://dx.doi.org/10.1007/11751540_100} +} + +@INPROCEEDINGS{DBLP:conf/focs/DziembowskiP08, + author = {Stefan Dziembowski and Krzysztof Pietrzak}, + title = {Leakage-Resilient Cryptography}, + booktitle = {FOCS}, + year = {2008}, + pages = {293-302}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + crossref = {DBLP:conf/focs/2008}, + ee = {http://dx.doi.org/10.1109/FOCS.2008.56} +} + +@INCOLLECTION{Filiol10, + author = {Eric Filiol}, + title = {Viruses and Malware}, + booktitle = {Handbook of Information and Communication Security}, + year = {2010}, + pages = {747-769}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + crossref = {DBLP:reference/icsec/2010}, + ee = {http://dx.doi.org/10.1007/978-3-642-04117-4_34} +} + +@INPROCEEDINGS{Filiol00, + author = {Eric Filiol}, + title = {Decimation Attack of Stream Ciphers}, + booktitle = {INDOCRYPT}, + year = {2000}, + pages = {31-42}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + crossref = {DBLP:conf/indocrypt/2000}, + ee = {http://link.springer.de/link/service/series/0558/bibs/1977/19770031.htm} +} + +@INPROCEEDINGS{Furon05, + author = {Teddy Furon}, + title = {A Survey of Watermarking Security}, + booktitle = {IWDW}, + year = {2005}, + pages = {201-215}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + crossref = {DBLP:conf/iwdw/2005}, + ee = {http://dx.doi.org/10.1007/11551492_16}, + owner = {guyeux}, + timestamp = {2009.06.29} +} + +@INPROCEEDINGS{DBLP:conf/cec/HiggsSHS10, + author = {Trent Higgs and Bela Stantic and Tamjidul Hoque and Abdul Sattar}, + title = {Genetic algorithm feature-based resampling for protein structure + prediction}, + booktitle = {IEEE Congress on Evolutionary Computation}, + year = {2010}, + pages = {1-8}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + crossref = {DBLP:conf/cec/2010}, + ee = {http://dx.doi.org/10.1109/CEC.2010.5586149} +} + +@INPROCEEDINGS{Higgs2010, + author = {Trent Higgs and Bela Stantic and Tamjidul Hoque and Abdul Sattar}, + title = {Genetic algorithm feature-based resampling for protein structure + prediction}, + booktitle = {IEEE Congress on Evolutionary Computation}, + year = {2010}, + pages = {1-8}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + crossref = {DBLP:conf/cec/2010}, + ee = {http://dx.doi.org/10.1109/CEC.2010.5586149} +} + +@INPROCEEDINGS{DBLP:conf/cec/HorvathC10, + author = {Dragos Horvath and Camelia Chira}, + title = {Simplified chain folding models as metaheuristic benchmark for tuning + real protein folding algorithms?}, + booktitle = {IEEE Congress on Evolutionary Computation}, + year = {2010}, + pages = {1-8}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + crossref = {DBLP:conf/cec/2010}, + ee = {http://dx.doi.org/10.1109/CEC.2010.5585932} +} + +@INPROCEEDINGS{DBLP:conf/cec/IslamC10, + author = {Md. Kamrul Islam and Madhu Chetty}, + title = {Clustered memetic algorithm for protein structure prediction}, + booktitle = {IEEE Congress on Evolutionary Computation}, + year = {2010}, + pages = {1-8}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + crossref = {DBLP:conf/cec/2010}, + ee = {http://dx.doi.org/10.1109/CEC.2010.5586187} +} + +@INPROCEEDINGS{Ker06, + author = {Andrew D. Ker}, + title = {Batch Steganography and Pooled Steganalysis}, + booktitle = {Information Hiding}, + year = {2006}, + pages = {265-281}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + crossref = {DBLP:conf/ih/2006}, + ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_18}, + owner = {guyeux}, + timestamp = {2009.06.29} +} + +@INPROCEEDINGS{Lin2009, + author = {H.-Y. Lin and T.-C. Chiang}, + title = {Cooperative Secure Data Aggregation in Sensor Networks Using Elliptic + Curve Based Cryptosystems}, + booktitle = {CDVE}, + year = {2009}, + pages = {384-387}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + crossref = {DBLP:conf/cdve/2009}, + ee = {http://dx.doi.org/10.1007/978-3-642-04265-2_58} +} + +@INPROCEEDINGS{DBLP:conf/cse/MaimourPH09, + author = {Moufida Maimour and CongDuc Pham and Doan B. Hoang}, + title = {A Congestion Control Framework for Handling Video Surveillance Traffics + on WSN}, + booktitle = {CSE (2)}, + year = {2009}, + pages = {943-948}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + crossref = {DBLP:conf/cse/2009}, + ee = {http://dx.doi.org/10.1109/CSE.2009.200} +} + +@INPROCEEDINGS{DBLP:conf/icumt/MakhoulSP09, + author = {Abdallah Makhoul and Rachid Saadi and CongDuc Pham}, + title = {Coverage and adaptive scheduling algorithms for criticality management + on video wireless sensor networks}, + booktitle = {ICUMT}, + year = {2009}, + pages = {1-8}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + crossref = {DBLP:conf/icumt/2009}, + ee = {http://dx.doi.org/10.1109/ICUMT.2009.5345630} +} + +@INPROCEEDINGS{Mittelholzer99, + author = {Thomas Mittelholzer}, + title = {An Information-Theoretic Approach to Steganography and Watermarking}, + booktitle = {Information Hiding}, + year = {1999}, + pages = {1-16}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + crossref = {DBLP:conf/ih/1999}, + owner = {guyeux}, + timestamp = {2009.06.29} +} + +@INPROCEEDINGS{PellegriniBA10, + author = {Andrea Pellegrini and Valeria Bertacco and Todd M. Austin}, + title = {Fault-based attack of RSA authentication}, + booktitle = {DATE}, + year = {2010}, + pages = {855-860}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + crossref = {DBLP:conf/date/2010}, + ee = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5456933} +} + +@INPROCEEDINGS{DBLP:conf/cec/Perez-HernandezRG10, + author = {Luis Germ{\'a}n P{\'e}rez-Hern{\'a}ndez and Katya Rodr\'{\i}guez-V{\'a}zquez + and Ram{\'o}n Gardu{\~n}o-Ju{\'a}rez}, + title = {Estimation of 3D Protein Structure by means of parallel Particle + Swarm Optimization}, + booktitle = {IEEE Congress on Evolutionary Computation}, + year = {2010}, + pages = {1-8}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + crossref = {DBLP:conf/cec/2010}, + ee = {http://dx.doi.org/10.1109/CEC.2010.5586549} +} + +@INPROCEEDINGS{WangNHZH07, + author = {Chuntao Wang and Jiangqun Ni and Jiwu Huang and Rongyue Zhang and + Meiying Huang}, + title = {Robust and High Capacity Image Watermarking Based on Jointly Coding + and Embedding Optimization}, + booktitle = {Information Hiding}, + year = {2007}, + pages = {65-79}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + crossref = {DBLP:conf/ih/2007}, + ee = {http://dx.doi.org/10.1007/978-3-540-77370-2_5}, + owner = {guyeux}, + timestamp = {2009.06.29} +} + +@INPROCEEDINGS{Zhao04, + author = {Jian Zhao and Mingquan Zhou and Hongmei Xie and Jinye Peng and Xin + Zhou}, + title = {A Novel Wavelet Image Watermarking Scheme Combined with Chaos Sequence + and Neural Network}, + booktitle = {ISNN (2)}, + year = {2004}, + pages = {663-668}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + crossref = {DBLP:conf/isnn/2004-2}, + ee = {http://springerlink.metapress.com/openurl.asp?genre=article{\&}issn=0302-9743{\&}volume=3174{\&}spage=663} +} + +@INPROCEEDINGS{Acharya05securecomparison, + author = {Acharya, Mithun and Girao, Joao and Westhoff, Dirk}, + title = {Secure Comparison of Encrypted Data in Wireless Sensor Networks}, + booktitle = {WIOPT '05: Proceedings of the Third International Symposium on Modeling + and Optimization in Mobile, Ad Hoc, and Wireless Networks}, + year = {2005}, + pages = {47--53}, + address = {Washington, DC, USA}, + publisher = {IEEE Computer Society}, + doi = {http://dx.doi.org/10.1109/WIOPT.2005.44}, + isbn = {0-7695-2267-X} +} + +@INPROCEEDINGS{Acimez07onthe, + author = {Onur Acıi\c{c}mez and \c{C}etin Kaya Ko\c{c} and Jean-Pierre Seifert}, + title = {On the power of simple branch prediction analysis }, + booktitle = {2007 ACM Symposium on Information, Computer and Communications Security + (ASIACCS'07)}, + year = {2007}, + pages = {312--320}, + publisher = {ACM Press} +} + +@ARTICLE{Adler65, + author = {R. L. Adler and A. G. Konheim and M. H. McAndrew}, + title = {Topological entropy}, + journal = {Trans. Amer. Math. Soc.}, + year = {1965}, + volume = {114}, + pages = {309-319}, + owner = {guyeux}, + timestamp = {2008.05.29} +} + +@INPROCEEDINGS{Agrawal04, + author = {Agrawal, Rakesh and Kiernan, Jerry and Srikant, Ramakrishnan and + Xu, Yirong}, + title = {Order preserving encryption for numeric data}, + booktitle = {SIGMOD '04: Proceedings of the 2004 ACM SIGMOD international conference + on Management of data}, + year = {2004}, + pages = {563--574}, + address = {New York, NY, USA}, + publisher = {ACM}, + doi = {http://doi.acm.org/10.1145/1007568.1007632}, + isbn = {1-58113-859-8}, + location = {Paris, France} +} + +@ARTICLE{Anfinsen20071973, + author = {Anfinsen, Christian B.}, + title = {Principles that Govern the Folding of Protein Chains}, + journal = {Science}, + year = {1973}, + volume = {181}, + pages = {223-230}, + number = {4096}, + doi = {10.1126/science.181.4096.223}, + eprint = {http://www.sciencemag.org/content/181/4096/223.full.pdf}, + url = {http://www.sciencemag.org/content/181/4096/223.short} +} + +@ARTICLE{Arques1994, + author = {D. G. Arques and C. J. Michel}, + title = {Analytical expression of the purine/pyrimidine autocorrelation function + after and before random mutations.}, + journal = {Math Biosci}, + year = {1994}, + volume = {123}, + pages = {103--125}, + number = {1}, + month = {Sep}, + abstract = {The mutation process is a classical evolutionary genetic process. + The type of mutations studied here is the random substitutions of + a purine base R (adenine or guanine) by a pyrimidine base Y (cytosine + or thymine) and reciprocally (transversions). The analytical expressions + derived allow us to analyze in genes the occurrence probabilities + of motifs and d-motifs (two motifs separated by any d bases) on the + R/Y alphabet under transversions. These motif probabilities can be + obtained after transversions (in the evolutionary sense; from the + past to the present) and, unexpectedly, also before transversions + (after back transversions, in the inverse evolutionary sense, from + the present to the past). This theoretical part in Section 2 is a + first generalization of a particular formula recently derived. The + application in Section 3 is based on the analytical expression giving + the autocorrelation function (the d-motif probabilities) before transversions. + It allows us to study primitive genes from actual genes. This approach + solves a biological problem. The protein coding genes of chloroplasts + and mitochondria have a preferential occurrence of the 6-motif YRY(N)6YRY + (maximum of the autocorrelation function for d = 6, N = R or Y) with + a periodicity modulo 3. The YRY(N)6YRY preferential occurrence without + the periodicity modulo 3 is also observed in the RNA coding genes + (ribosomal, transfer, and small nuclear RNA genes) and in the noncoding + genes (introns and 5' regions of eukaryotic nuclei). However, there + are two exceptions to this YRY(N)6YRY rule: the protein coding genes + of eukaryotic nuclei, and prokaryotes, where YRY(N)6YRY has the second + highest value after YRY(N)0YRY (YRYYRY) with a periodicity modulo + 3. When we go backward in time with the analytical expression, the + protein coding genes of both eukaryotic nuclei and prokaryotes retrieve + the YRY(N)6YRY preferential occurrence with a periodicity modulo + 3 after 0.2 back transversions per base. In other words, the actual + protein coding genes of chloroplasts and mitochondria are similar + to the primitive protein coding genes of eukaryotic nuclei and prokaryotes. + On the other hand, this application represents the first result concerning + the mutation process in the model of DNA sequence evolution we recently + proposed. According to this model, the actual genes on the R/Y alphabet + derive from two successive evolutionary genetic processes: an independent + mixing of a few nonrandom types of oligonucleotides leading to genes + called primitive followed by a mutation process in these primitive + genes.(ABSTRACT TRUNCATED AT 400 WORDS)}, + institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon, + France.}, + keywords = {Base Sequence; Biological Evolution; DNA, genetics; Mathematics; Models, + Genetic; Mutation; Probability; Proteins, genetics; Purines; Pyrimidines}, + language = {eng}, + medline-pst = {ppublish}, + owner = {guyeux}, + pii = {0025-5564(94)90020-5}, + pmid = {7949744}, + timestamp = {2011.05.05} +} + +@ARTICLE{Arques1998, + author = {D. G. Arquès and J. P. Fallot and C. J. Michel}, + title = {An evolutionary analytical model of a complementary circular code + simulating the protein coding genes, the 5' and 3' regions.}, + journal = {Bull Math Biol}, + year = {1998}, + volume = {60}, + pages = {163--194}, + number = {1}, + month = {Jan}, + abstract = {The self-complementary subset T0 = X0 [symbol: see text] ¿AAA, TTT¿ + with X0 = ¿AAC, AAT, ACC, ATC, ATT, CAG, CTC, CTG, GAA, GAC, GAG, + GAT, GCC, GGC, GGT, GTA, GTC, GTT, TAC, TTC¿ of 22 trinucleotides + has a preferential occurrence in the frame 0 (reading frame established + by the ATG start trinucleotide) of protein (coding) genes of both + prokaryotes and eukaryotes. The subsets T1 = X1 [symbol: see text] + ¿CCC¿ and T2 = X2 [symbol: see text] ¿GGG¿ of 21 trinucleotides have + a preferential occurrence in the shifted frames 1 and 2 respectively + (frame 0 shifted by one and two nucleotides respectively in the 5'-3' + direction). T1 and T2 are complementary to each other. The subset + T0 contains the subset X0 which has the rarity property (6 x 10(-8) + to be a complementary maximal circular code with two permutated maximal + circular codes X1 and X2 in the frames 1 and 2 respectively. X0 is + called a C3 code. A quantitative study of these three subsets T0, + T1, T2 in the three frames 0, 1, 2 of protein genes, and the 5' and + 3' regions of eukaryotes, shows that their occurrence frequencies + are constant functions of the trinucleotide positions in the sequences. + The frequencies of T0, T1, T2 in the frame 0 of protein genes are + 49, 28.5 and 22.5\% respectively. In contrast, the frequencies of + T0, T1, T2 in the 5' and 3' regions of eukaryotes, are independent + of the frame. Indeed, the frequency of T0 in the three frames of + 5' (respectively 3') regions is equal to 35.5\% (respectively 38\%) + and is greater than the frequencies T1 and T2, both equal to 32.25\% + (respectively 31\%) in the three frames. Several frequency asymmetries + unexpectedly observed (e.g. the frequency difference between T1 and + T2 in the frame 0), are related to a new property of the subset T0 + involving substitutions. An evolutionary analytical model at three + parameters (p, q, t) based on an independent mixing of the 22 codons + (trinucleotides in frame 0) of T0 with equiprobability (1/22) followed + by t approximately 4 substitutions per codon according to the proportions + p approximately 0.1, q approximately 0.1 and r = 1 - p - q approximately + 0.8 in the three codon sites respectively, retrieves the frequencies + of T0, T1, T2 observed in the three frames of protein genes and explains + these asymmetries. Furthermore, the same model (0.1, 0.1, t) after + t approximately 22 substitutions per codon, retrieves the statistical + properties observed in the three frames of the 5' and 3' regions. + The complex behaviour of these analytical curves is totally unexpected + and a priori difficult to imagine.}, + doi = {10.1006/bulm.1997.0033}, + institution = {Equipe de Biologie Théorique, Université de Marne la Vallée, Institut + Gaspard Monge, Noisy Le Grand, France. arques@univ-mlv.fr}, + keywords = {Animals; Biological Evolution; Codon, genetics; Genetic Code; Humans; + Mammals; Models, Genetic; Probability; Proteins, genetics; Rodentia; + Vertebrates}, + language = {eng}, + medline-pst = {ppublish}, + owner = {guyeux}, + pii = {S0092-8240(97)90033-1}, + pmid = {9530018}, + timestamp = {2011.05.05}, + url = {http://dx.doi.org/10.1006/bulm.1997.0033} +} + +@ARTICLE{Arques1993, + author = {D. G. Arquès and C. J. Michel}, + title = {Analytical expression of the purine/pyrimidine codon probability + after and before random mutations.}, + journal = {Bull Math Biol}, + year = {1993}, + volume = {55}, + pages = {1025--1038}, + number = {6}, + month = {Nov}, + abstract = {Recently, we proposed a new model of DNA sequence evolution (Arquès + and Michel. 1990b. Bull. math. Biol. 52, 741-772) according to which + actual genes on the purine/pyrimidine (R/Y) alphabet (R = purine + = adenine or guanine, Y = pyrimidine = cytosine or thymine) are the + result of two successive evolutionary genetic processes: (i) a mixing + (independent) process of non-random oligonucleotides (words of base + length less than 10: YRY(N)6, YRYRYR and YRYYRY are so far identified; + N = R or Y) leading to primitive genes (words of several hundreds + of base length) and followed by (ii) a random mutation process, i.e., + transformations of a base R (respectively Y) into the base Y (respectively + R) at random sites in these primitive genes. Following this model + the problem investigated here is the study of the variation of the + 8 R/Y codon probabilities RRR, ..., YYY under random mutations. Two + analytical expressions solved here allow analysis of this variation + in the classical evolutionary sense (from the past to the present, + i.e., after random mutations), but also in the inverted evolutionary + sense (from the present to the past, i.e., before random mutations). + Different properties are also derived from these formulae. Finally, + a few applications of these formulae are presented. They prove the + proposition in Arquès and Michel (1990b. Bull. math. Biol. 52, 741-772), + Section 3.3.2, with the existence of a maximal mean number of random + mutations per base of the order 0.3 in the protein coding genes. + They also confirm the mixing process of oligonucleotides by excluding + the purine/pyrimidine contiguous and alternating tracts from the + formation process of primitive genes.}, + institution = {Université de Franche-Comté, Besançon, France.}, + keywords = {Base Sequence; Codon; DNA, chemistry/genetics; Mathematics; Models, + Genetic; Mutation; Probability; Purines; Pyrimidines}, + language = {eng}, + medline-pst = {ppublish}, + owner = {guyeux}, + pmid = {8281128}, + timestamp = {2011.05.05} +} + +@ARTICLE{Arques1993b, + author = {D. G. Arquès and C. J. Michel}, + title = {Identification and simulation of new non-random statistical properties + common to different eukaryotic gene subpopulations.}, + journal = {Biochimie}, + year = {1993}, + volume = {75}, + pages = {399--407}, + number = {5}, + abstract = {The nucleotide distribution in protein coding genes, introns and transfer + RNA genes of eukaryotic subpopulations (primates, rodent and mammals) + is studied by autocorrelation functions. The autocorrelation function + analysing the occurrence probability of the i-motif YRY(N)iYRY (YRY-function) + in protein coding genes and transfer RNA genes of these three eukaryotic + subpopulations retrieves the preferential occurrence of YRY(N)6YRY + (R = purine = adenine or guanine, Y = pyrimidine = cytosine or thymine, + N = R or Y). The autocorrelation functions analysing the occurrence + probability of the i-motifs RRR(N)iRRR (RRR-function) and YYY(N)iYYY + (YYY-function) identify new non-random genetic statistical properties + in these three eukaryotic subpopulations, mainly: i) in their protein + coding genes: local maxima for i identical to 6 [12] (peaks for i + = 6, 18, 30, 42) with the RRR-function and local maxima for i identical + to 8 [10] (peaks for i = 8, 18, 28) with the YYY-function; and ii) + in their introns: local maxima for i identical to 3 [6] (peaks for + i = 3, 9, 15) and a short linear decrease followed by a large exponential + decrease both with the RRR- and YYY-functions. The non-random properties + identified in eukaryotic intron subpopulations are modelised with + a process of random insertions and deletions of nucleotides simulating + the RNA editing.}, + institution = {Equipe de Biologie Théorique, Université de Franche-Comté, Laboratoire + d'Informatique de Besançon, France.}, + keywords = {Animals; Base Sequence; Data Interpretation, Statistical; Genes; Introns; + Mammals; Models, Genetic; Primates; Probability; Proteins, genetics; + RNA Editing; RNA, Transfer, genetics; Rodentia; Sequence Analysis, + DNA}, + language = {eng}, + medline-pst = {ppublish}, + owner = {guyeux}, + pii = {0300-9084(93)90173-P}, + pmid = {8347726}, + timestamp = {2011.05.05} +} + +@ARTICLE{Arques1992, + author = {D. G. Arquès and C. J. Michel}, + title = {A simulation of the genetic periodicities modulo 2 and 3 with processes + of nucleotide insertions and deletions.}, + journal = {J Theor Biol}, + year = {1992}, + volume = {156}, + pages = {113--127}, + number = {1}, + month = {May}, + abstract = {Recently, a new genetic process termed RNA editing has been identified + showing insertions and deletions of nucleotides in particular RNA + molecules. On the other hand, there are a few non-random statistical + properties in genes: in particular, the periodicity modulo 3 (P3) + associated with an open reading frame, the periodicity modulo 2 (P2) + associated with alternating purine/pyrimidine stretches, the YRY(N)6YRY + preferential occurrence (R = purine = adenine or guanine, Y = pyrimidine + = cytosine or thymine, N = R or Y) representing a "code" of the DNA + helix pitch, etc. The problem investigated here is whether a process + of the type RNA editing can lead to the non-random statistical properties + commonly observed in genes. This paper will show in particular that: + The process of insertions and deletions of mononucleotides in the + initial sequence [YRY(N)3]* [series of YRY(N)3] can lead to the periodicity + modulo 2 (P2). The process of insertions and deletions of trinucleotides + in the initial sequence [YRY(N)6]* [series of YRY(N)6] can lead to + the periodicity modulo 3 (P3) and the YRY(N)6YRY preferential occurrence. + Furthermore, these two processes lead to a strong correlation with + the reality, namely the mononucleotide insertion/deletion process, + with the 5' eukaryotic regions and the trinucleotide insertion/deletion + process, with the eukaryotic protein coding genes.}, + institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon, + Unité Associée CNRS No 822, France.}, + keywords = {Chromosome Deletion; Computer Simulation; Humans; Models, Genetic; + Mutagenesis, genetics; RNA, genetics}, + language = {eng}, + medline-pst = {ppublish}, + owner = {guyeux}, + pmid = {1379311}, + timestamp = {2011.05.05} +} + +@ARTICLE{Arques1990, + author = {D. G. Arquès and C. J. Michel}, + title = {Periodicities in coding and noncoding regions of the genes.}, + journal = {J Theor Biol}, + year = {1990}, + volume = {143}, + pages = {307--318}, + number = {3}, + month = {Apr}, + abstract = {Gene population statistical studies of protein coding genes and introns + have identified two types of periodicities on the purine/pyrimidine + alphabet: (i) the modulo 3 periodicity or coding periodicity (periodicity + P3) in protein coding genes of eukaryotes, prokaryotes, viruses, + chloroplasts, mitochondria, plasmids and in introns of viruses and + mitochondria, and (ii) the modulo 2 periodicity (periodicity P2) + in the eukaryotic introns. The periodicity study is herein extended + to the 5' and 3' regions of eukaryotes, prokaryotes and viruses and + shows: (i) the periodicity P3 in the 5' and 3' regions of eukaryotes. + Therefore, these observations suggest a unitary and dynamic concept + for the genes as for a given genome, the 5' and 3' regions have the + genetic information for protein coding genes and for introns: (1) + In the eukaryotic genome, the 5' (P2 and P3) and 3' (P2 and P3) regions + have the information for protein coding genes (P3) and for introns + (P2). The intensity of P3 is high in 5' regions and weak in 3' regions, + while the intensity of P2 is weak in 5' regions and high in 3' regions. + (2) In the prokaryotic genome, the 5' (P3) and 3' (P3) regions have + the information for protein coding genes (P3). (3) In the viral genome, + the 5' (P3) and 3' (P3) regions have the information for protein + coding genes (P3) and for introns (P3). The absence of P2 in viral + introns (in opposition to eukaryotic introns) may be related to the + absence of P2 in 5' and 3' regions of viruses.}, + institution = {Université de Franche-Comté, Unité Associée CNRS No. 822, Besançon, + France.}, + keywords = {Animals; Base Sequence; Eukaryotic Cells; Genes; Introns; Prokaryotic + Cells; Purine Nucleotides; Pyrimidine Nucleotides; Repetitive Sequences, + Nucleic Acid; Viruses, genetics}, + language = {eng}, + medline-pst = {ppublish}, + owner = {guyeux}, + pmid = {2385108}, + timestamp = {2011.05.05} +} + +@ARTICLE{Arques1990a, + author = {D. G. Arquès and C. J. Michel}, + title = {A model of DNA sequence evolution.}, + journal = {Bull Math Biol}, + year = {1990}, + volume = {52}, + pages = {741--772}, + number = {6}, + abstract = {Statistical studies of gene populations on the purine/pyrimidine alphabet + have shown that the mean occurrence probability of the i-motif YRY(N)iYRY + (R = purine, Y = pyrimidine, N = R or Y) is not uniform by varying + i in the range, but presents a maximum at i = 6 in the following + populations: protein coding genes of eukaryotes, prokaryotes, chloroplasts + and mitochondria, and also viral introns, ribosomal RNA genes and + transfer RNA genes (Arquès and Michel, 1987b, J. theor. Biol. 128, + 457-461). From the "universality" of this observation, we suggested + that the oligonucleotide YRY(N)6 is a primitive one and that it has + a central function in DNA sequence evolution (Arquès and Michel, + 1987b, J. theor. Biol. 128, 457-461). Following this idea, we introduce + a concept of a model of DNA sequence evolution which will be validated + according to a schema presented in three parts. In the first part, + using the last version of the gene database, the YRY(N)6YRY preferential + occurrence (maximum at i = 6) is confirmed for the populations mentioned + above and is extended to some newly analysed populations: chloroplast + introns, chloroplast 5' regions, mitochondrial 5' regions and small + nuclear RNA genes. On the other hand, the YRY(N)6YRY preferential + occurrence and periodicities are used in order to classify 18 gene + populations. In the second part, we will demonstrate that several + statistical features characterizing different gene populations (in + particular the YRY(N)6YRY preferential occurrence and the periodicities) + can be retrieved from a simple Markov model based on the mixing of + the two oligonucleotides YRY(N)6 and YRY(N)3 and based on the percentages + of RYR and YRY in the unspecified trinucleotides (N)3 of YRY(N)6 + and YRY(N)3. Several properties are identified and prove in particular + that the oligonucleotide mixing is an independent process and that + several different features are functions of a unique parameter. In + the third part, the return of the model to the reality shows a strong + correlation between reality and simulation concerning the presence + of a large alternating purine/pyrimidine stretches and of periodicities. + It also contributes to a greater understanding of biological reality, + e.g. the presence or the absence of large alternating purine/pyrimidine + stretches can be explained as being a simple consequence of the mixing + of two particular oligonucleotides. Finally, we believe that such + an approach is the first step toward a unified model of DNA sequence + evolution allowing the molecular understanding of both the origin + of life and the actual biological reality.}, + institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon, + Unité Associée CNRS No 822, France.}, + keywords = {Base Sequence; Biological Evolution; DNA, genetics; Genetics, Population; + Models, Genetic}, + language = {eng}, + medline-pst = {ppublish}, + owner = {guyeux}, + pmid = {2279193}, + timestamp = {2011.05.05} +} + +@ARTICLE{Arques1993a, + author = {D. G. Arquès and C. J. Michel and K. Orieux}, + title = {Identification and simulation of new non-random statistical properties + common to different populations of eukaryotic non-coding genes.}, + journal = {J Theor Biol}, + year = {1993}, + volume = {161}, + pages = {329--342}, + number = {3}, + month = {Apr}, + abstract = {The autocorrelation function analysing the occurrence probability + of the i-motif YRY(N)iYRY in genes allows the identification of mainly + two periodicities modulo 2, 3 and the preferential occurrence of + the motif YRY(N)6YRY (R = purine = adenine or guanine, Y = pyrimidine + = cytosine or thymine, N = R or Y). These non-random genetic statistical + properties can be simulated by an independent mixing of the three + oligonucleotides YRYRYR, YRYYRY and YRY(N)6 (Arquès & Michel, 1990b). + The problem investigated in this study is whether new properties + can be identified in genes with other autocorrelation functions and + also simulated with an oligonucleotide mixing model. The two autocorrelation + functions analysing the occurrence probability of the i-motifs RRR(N)iRRR + and YYY(N)iYYY simultaneously identify three new non-random genetic + statistical properties: a short linear decrease, local maxima for + i identical to 3[6] (i = 3, 9, etc) and a large exponential decrease. + Furthermore, these properties are common to three different populations + of eukaryotic non-coding genes: 5' regions, introns and 3' regions + (see section 2). These three non-random properties can also be simulated + by an independent mixing of the four oligonucleotides R8, Y8, RRRYRYRRR, + YYYRYRYYY and large alternating R/Y series. The short linear decrease + is a result of R8 and Y8, the local maxima for i identical to 3[6], + of RRRYRYRRR and YYYRYRYYY, and the large exponential decrease, of + large alternating R/Y series (section 3). The biological meaning + of these results and their relation to the previous oligonucleotide + mixing model are presented in the Discussion.}, + doi = {10.1006/jtbi.1993.1059}, + institution = {Equipe de Biologie Théorique, Université de Franche-Comté, Laboratoire + d'Informatique de Besançon, France.}, + keywords = {Animals; Biological Evolution; Genes, genetics; Models, Genetic; Models, + Statistical; Mutation, genetics; Oligonucleotides, genetics; Probability}, + language = {eng}, + medline-pst = {ppublish}, + owner = {guyeux}, + pii = {S0022-5193(83)71059-3}, + pmid = {8331957}, + timestamp = {2011.05.05}, + url = {http://dx.doi.org/10.1006/jtbi.1993.1059} +} + +@ARTICLE{Arroyo08, + author = {David Arroyo and Gonzalo Alvarez and Veronica Fernandez}, + title = {On the inadequacy of the logistic map for cryptographic applications}, + journal = {X Reunión Española sobre Criptología y Seguridad de la Información + (X RECSI)}, + year = {2008}, + volume = {1}, + pages = {77-82}, + owner = {christophe}, + timestamp = {2010.03.01} +} + +@MISC{Backofen99algorithmicapproach, + author = {R. Backofen and S. Will and P. Clote}, + title = {Algorithmic Approach To Quantifying The Hydrophobic Force Contribution + In Protein Folding}, + year = {1999} +} + +@INPROCEEDINGS{bcgr11:ip, + author = {Bahi, Jacques and Couchot, Jean-fran\c{c}ois and Guyeux, Christophe + and Richard, Adrien}, + title = {On the Link Between Strongly Connected Iteration Graphs and Chaotic + Boolean Discrete-Time Dynamical Systems}, + booktitle = {FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory}, + year = {2011}, + volume = {*}, + series = {LNCS}, + pages = {***--***}, + address = {Oslo, Norway}, + month = aug, + note = {To appear}, + classement = {ACTI}, + domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, + equipe = {and}, + inhal = {no} +} + +@ARTICLE{bg10:ij, + author = {Bahi, Jacques and Guyeux, Christophe}, + title = {Hash Functions Using Chaotic Iterations}, + journal = {Journal of Algorithms \& Computational Technology}, + year = {2010}, + volume = {4}, + pages = {167--181}, + number = {2}, + classement = {ACLI}, + doi = {10.1260/1748-3018.4.2.167}, + domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, + equipe = {and}, + impact-factor = {#}, + inhal = {no}, + isi-acro = {#}, + url = {http://dx.doi.org/10.1260/1748-3018.4.2.167} +} + +@INPROCEEDINGS{guyeux10ter, + author = {Bahi, Jacques and Guyeux, Christophe}, + title = {A new chaos-based watermarking algorithm}, + booktitle = {SECRYPT'10, Int. conf. on security and cryptography}, + year = {2010}, + pages = {455--458}, + address = {Athens, Greece}, + month = jul, + publisher = {SciTePress}, + classement = {ACTI}, + domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, + equipe = {and}, + inhal = {no} +} + +@INPROCEEDINGS{bgc11:ip, + author = {Bahi, Jacques and Guyeux, Christophe and Cote, Nathalie}, + title = {Chaos of Protein Folding}, + booktitle = {IJCNN 2011, Int. Joint Conf. on Neural Networks}, + year = {2011}, + pages = {***--***}, + address = {San Jose, California, United States}, + month = jul, + note = {To appear}, + classement = {ACTI}, + domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, + equipe = {and}, + inhal = {no} +} + +@INPROCEEDINGS{guyeux10bis, + author = {Bahi, Jacques and Guyeux, Christophe and Makhoul, Abdallah}, + title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor + Networks}, + booktitle = {SENSORCOMM'10, 4-th Int. Conf. on Sensor Technologies and Applications}, + year = {2010}, + pages = {472--477}, + address = {Venice-Mestre, Italy}, + month = jul, + classement = {ACTI}, + doi = {10.1109/SENSORCOMM.2010.76}, + domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, + equipe = {and}, + inhal = {no}, + url = {http://dx.doi.org/10.1109/SENSORCOMM.2010.76} +} + +@INPROCEEDINGS{guyeuxVictoria, + author = {Bahi, Jacques and Guyeux, Christophe and Makhoul, Abdallah}, + title = {Secure Data Aggregation in Wireless Sensor Networks. Homomorphism + versus Watermarking Approach}, + booktitle = {ADHOCNETS 2010, 2nd Int. Conf. on Ad Hoc Networks}, + year = {2010}, + volume = {49}, + series = {Lecture Notes in ICST}, + pages = {344--358}, + address = {Victoria, Canada}, + month = aug, + classement = {ACTI}, + doi = {10.1007/978-3-642-17994-5_23}, + domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, + equipe = {and}, + inhal = {no}, + url = {http://dx.doi.org/10.1007/978-3-642-17994-5_23} +} + +@INPROCEEDINGS{bgs11:ip, + author = {Bahi, Jacques and Guyeux, Christophe and Salomon, Michel}, + title = {Building a Chaotic Proven Neural Network}, + booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network + Security}, + year = {2011}, + pages = {***--***}, + address = {Maldives, Maldives}, + month = may, + classement = {ACTI}, + domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, + equipe = {and}, + inhal = {no} +} + +@INPROCEEDINGS{bgw10:ip, + author = {Bahi, Jacques and Guyeux, Christophe and Wang, Qianxue}, + title = {A Pseudo Random Numbers Generator Based on Chaotic Iterations. Application + to Watermarking}, + booktitle = {WISM 2010, Int. Conf. on Web Information Systems and Mining}, + year = {2010}, + volume = {6318}, + series = {LNCS}, + pages = {202--211}, + address = {Sanya, China}, + month = oct, + classement = {ACTI}, + doi = {10.1007/978-3-642-16515-3_26}, + domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, + equipe = {and}, + inhal = {no}, + url = {http://dx.doi.org/10.1007/978-3-642-16515-3_26} +} + +@INPROCEEDINGS{bgw09:ip, + author = {Bahi, Jacques and Guyeux, Christophe and Wang, Qianxue}, + title = {A novel pseudo-random generator based on discrete chaotic iterations}, + booktitle = {INTERNET'09, 1-st Int. Conf. on Evolving Internet}, + year = {2009}, + pages = {71--76}, + address = {Cannes, France}, + month = aug, + classement = {ACTI}, + domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, + equipe = {and}, + inhal = {no} +} + +@INPROCEEDINGS{bmg10:onp, + author = {Bahi, Jacques and Makhoul, Abdallah and Guyeux, Christophe}, + title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor + Networks for critical applications}, + booktitle = {RESSACS, Journ\'ee th\'ematique PHC/ResCom sur RESeaux de capteurS + et Applications Critiques de Surveillance}, + year = {2010}, + address = {Bayonne, France}, + month = jun, + note = {Communication orale}, + classement = {COM}, + domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, + equipe = {and}, + inhal = {no} +} + +@INPROCEEDINGS{guyeuxBayonne, + author = {Bahi, Jacques and Makhoul, Abdallah and Guyeux, Christophe}, + title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor + Networks for critical applications}, + booktitle = {RESSACS, Journ\'ee th\'ematique PHC/ResCom sur RESeaux de capteurS + et Applications Critiques de Surveillance}, + year = {2010}, + address = {Bayonne, France}, + month = jun, + note = {Communication orale}, + classement = {COM}, + equipe = {and}, + inhal = {no} +} + +@ARTICLE{bs10:ij, + author = {Bahi, Jacques and Salomon, Michel}, + title = {A Decentralized Energy-based Diffusion Algorithm to Increase the + Lifetime of {MANETs}}, + journal = {Computer Networks Journal}, + year = {2010}, + pages = {***--***}, + note = {Accepted manuscript. To appear}, + classement = {ACLI}, + equipe = {and}, + impact-factor = {1.201}, + inhal = {no}, + isi-acro = {#}, + publisher = {Elsevier} +} + +@ARTICLE{Bahi2000, + author = {J. M. Bahi}, + title = {Boolean totally asynchronous iterations}, + journal = {Int. Journal of Mathematical Algorithms}, + year = {2000}, + volume = {1}, + pages = {331--346}, + owner = {guyeux}, + timestamp = {17/02/2008} +} + +@ARTICLE{Bahi2000bis, + author = {Jacques M. Bahi}, + title = {Asynchronous iterative algorithms for nonexpansive linear systems}, + journal = {Journal of Parallel and Distributed Computing}, + year = {2000}, + volume = {60}, + pages = {92--112}, + owner = {guyeux}, + timestamp = {2009.01.10} +} + +@ARTICLE{Bahi1999, + author = {J. M. Bahi}, + title = {Parallel synchronous chaotic iterations for singular linear systems}, + journal = {Parallel Algorithms and Applications}, + year = {1999}, + volume = {14}, + pages = {19--35}, + owner = {guyeux}, + timestamp = {17/02/2008} +} + +@ARTICLE{Bahi1998, + author = {Jacques M. Bahi}, + title = {Algorithmes paralleles asynchrones pour les systemes singuliers}, + journal = {Comptes Rendus de l'Academie des Sciences}, + year = {1998}, + volume = {t. 326, serie 1}, + pages = {1421--1425}, + owner = {guyeux}, + timestamp = {2009.01.18} +} + +@PHDTHESIS{bahi98, + author = {Jacques M. Bahi}, + title = {Méthodes itératives dans des espaces produits. Application au calcul + parallèle}, + school = {Université de Franche-Comté}, + year = {1998}, + type = {Habilitation à diriger des recherches}, + owner = {christophe}, + timestamp = {2010.08.24} +} + +@PHDTHESIS{bahi91, + author = {Jacques M. Bahi}, + title = {Algorithmes asynchrones pour des systèmes différentiels-algébriques. + Simulation numérique sur des exemples de circuits électriques}, + school = {Université de Franche-Comté}, + year = {1991}, + owner = {christophe}, + timestamp = {2010.08.24} +} + +@ARTICLE{bcv06:ij, + author = {Jacques M. Bahi and Sylvain Contassot-Vivier}, + title = {Basins of attraction in fully asynchronous discrete-time discrete-state + dynamic networks}, + journal = {IEEE Transactions on Neural Networks}, + year = {2006}, + volume = {17}, + pages = {397--408}, + number = {2}, + inhal = {no}, + owner = {guyeux}, + timestamp = {2009.12.04} +} + +@ARTICLE{Bahi2002, + author = {J.~M. Bahi and S. Contassot-Vivier}, + title = {Stability of fully asynchronous discrete-time discrete state dynamic + networks}, + journal = {IEEE Transactions on Neural Networks}, + year = {2002}, + volume = {13(6)}, + pages = {1353-1363}, + owner = {guyeux}, + timestamp = {2009.02.14} +} + +@TECHREPORT{bcgg10:ir, + author = {Bahi, J. M. and Couchot, J.-F. and Grasset, O. and Guyeux, C.}, + title = {{D}iscrete {D}ynamical {S}ystems: {N}ecessary {D}ivergence {C}onditions + for {S}ynchronous {I}terations}, + institution = {LIFC - Laboratoire d'{I}nformatique de l'{U}niversit\'{e} de {F}ranche + {C}omt\'{e}}, + year = {2010}, + type = {Research Report}, + number = {RR2010-04}, + month = sep, + pdf = {/~publis/papers/pub/2010/RR2010-04.pdf} +} + +@ARTICLE{guyeux09, + author = {Bahi, Jacques M. and Guyeux, Christophe}, + title = {Hash Functions Using Chaotic Iterations}, + journal = {Journal of Algorithms \& Computational Technology}, + year = {2010}, + volume = {4}, + pages = {167--181}, + number = {2}, + classement = {ACLNI}, + domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, + equipe = {and}, + impact-factor = {#}, + inhal = {no}, + isi-acro = {#} +} + +@INPROCEEDINGS{guyeux10, + author = {Bahi, Jacques M. and Guyeux, Christophe}, + title = {Topological chaos and chaotic iterations, application to Hash functions}, + booktitle = {WCCI'10, IEEE World Congress on Computational Intelligence}, + year = {2010}, + pages = {1--7}, + address = {Barcelona, Spain}, + month = jul, + note = {Best paper award}, + classement = {ACTI}, + domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, + equipe = {and}, + inhal = {no} +} + +@MISC{ih10, + author = {Jacques M. Bahi and Christophe Guyeux}, + title = {A chaos-based approach for information hiding security.}, + howpublished = {arXiv}, + month = {April}, + year = {2010}, + institution = {Computer Science Laboratory LIFC, University of Franche-Comte, France} +} + +@ARTICLE{arxiv, + author = {Jacques M. Bahi and Christophe Guyeux}, + title = {A watermarking algorithm satisfying topological chaos properties}, + journal = {CoRR}, + year = {2008}, + volume = {abs/0810.4713}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + ee = {http://arxiv.org/abs/0810.4713} +} + +@ARTICLE{Bahi2008, + author = {Jacques M. Bahi and Christophe Guyeux}, + title = {Chaotic iterations and topological chaos}, + year = {2008}, + abstract = {Chaotic iterations have been introduced on the one hand by Chazan, + Miranker [5] and Miellou [9] in a numerical analysis context, and + on the other hand by Robert [11] and Pellegrin [10] in the discrete + dynamical systems framework. In both cases, the objective was to + derive conditions of convergence of such iterations to a fixed state. + In this paper, a new point of view is presented, the goal here is + to derive conditions under which chaotic iterations admit a chaotic + behaviour in a rigorous mathematical sense. Contrary to what has + been studied in the literature, convergence is not desired. More + precisely, we establish in this paper a link between the concept + of chaotic iterations on a finite set and the notion of topological + chaos [8], [6], [7]. We are motivated by concrete applications of + our approach, such as the use of chaotic boolean iterations in the + computer security field. Indeed, the concept of chaos is used in + many areas of data security without real rigorous theoretical foundations, + and without using the fundamental properties that allow chaos. The + wish of this paper is to bring a bit more mathematical rigour in + this field.}, + citeseerurl = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}}, + comment = {arXiv}, + comments = {6 pages}, + eprint = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}}, + oai2identifier = {0810.3154}, + owner = {guyeux}, + timestamp = {2008.10.23}, + url = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}} +} + +@ARTICLE{arxivRNNchaos, + author = {Jacques M. Bahi and Christophe Guyeux and Michel Salomon}, + title = {Building a Chaotic Proved Neural Network}, + journal = {CoRR}, + year = {2011}, + volume = {abs/1101.4351}, + ee = {http://arxiv.org/abs/1101.4351} +} + +@INPROCEEDINGS{guyeuxTaiwan10, + author = {Bahi, Jacques M. and Guyeux, Christophe and Wang, Qianxue}, + title = {Improving random number generators by chaotic iterations. Application + in data hiding}, + booktitle = {ICCASM 2010, Int. Conf. on Computer Application and System Modeling}, + year = {2010}, + pages = {V13-643--V13-647}, + address = {Taiyuan, China}, + month = oct, + classement = {ACTI}, + doi = {10.1109/ICCASM.2010.5622199}, + domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, + equipe = {and}, + inhal = {no}, + url = {http://dx.doi.org/10.1109/ICCASM.2010.5622199} +} + +@ARTICLE{Bahi2009, + author = {Jacques M Bahi and Christian J Michel}, + title = {A stochastic model of gene evolution with time dependent pseudochaotic + mutations.}, + journal = {Bull Math Biol}, + year = {2009}, + volume = {71}, + pages = {681--700}, + number = {3}, + month = {Apr}, + abstract = {We develop here a new class of stochastic models of gene evolution + in which a random subset of the 64 possible trinucleotides mutates + at each evolutionary time t according to some time dependent substitution + probabilities. Therefore, at each time t, the numbers and the types + of mutable trinucleotides are unknown. Thus, the mutation matrix + changes at each time t. This pseudochaotic model developed generalizes + the standard model in which all the trinucleotides mutate at each + time t. It determines the occurrence probabilities at time t of trinucleotides + which pseudochaotically mutate according to 3 time dependent substitution + parameters associated with the 3 trinucleotide sites. The main result + proves that under suitable assumptions, this pseudochaotic model + converges to a uniform probability vector identical to that of the + standard model. Furthermore, an application of this pseudochaotic + model allows an evolutionary study of the 3 circular codes identified + in both eukaryotic and prokaryotic genes. A circular code is a particular + set of trinucleotides whose main property is the retrieval of the + frames in genes locally, i.e., anywhere in genes and particularly + without start codons, and automatically with a window of a few nucleotides. + After a certain evolutionary time and with particular time dependent + functions for the 3 substitution parameters, precisely an exponential + decrease in the 1st and 2nd trinucleotide sites and an exponential + increase in the 3rd one, this pseudochaotic model retrieves the main + statistical properties of the 3 circular codes observed in genes. + Furthermore, it leads to a circular code asymmetry stronger than + the standard model (nonpseudochaotic) and, therefore, to a better + correlation with the genes.}, + doi = {10.1007/s11538-008-9376-4}, + institution = {LIFC-EA 4157, Université de Franche-Comté, IUT de Belfort, BP 527, + 90016, Belfort Cedex, France. jacques.bahi@univ-fcomte.fr}, + keywords = {Evolution, Molecular; Genes; Models, Genetic; Mutation; Stochastic + Processes}, + language = {eng}, + medline-pst = {ppublish}, + owner = {guyeux}, + pmid = {19198957}, + timestamp = {2011.05.05}, + url = {http://dx.doi.org/10.1007/s11538-008-9376-4} +} + +@ARTICLE{Bahi2008a, + author = {Jacques M Bahi and Christian J Michel}, + title = {A stochastic model of gene evolution with chaotic mutations.}, + journal = {J Theor Biol}, + year = {2008}, + volume = {255}, + pages = {53--63}, + number = {1}, + month = {Nov}, + abstract = {We develop here a new class of stochastic models of gene evolution + in which the mutations are chaotic, i.e. a random subset of the 64 + possible trinucleotides mutates at each evolutionary time t according + to some substitution probabilities. Therefore, at each time t, the + numbers and the types of mutable trinucleotides are unknown. Thus, + the mutation matrix changes at each time t. The chaotic model developed + generalizes the standard model in which all the trinucleotides mutate + at each time t. It determines the occurrence probabilities at time + t of trinucleotides which chaotically mutate according to three substitution + parameters associated with the three trinucleotide sites. Two theorems + prove that this chaotic model has a probability vector at each time + t and that it converges to a uniform probability vector identical + to that of the standard model. Furthermore, four applications of + this chaotic model (with a uniform random strategy for the 64 trinucleotides + and with a particular strategy for the three stop codons) allow an + evolutionary study of the three circular codes identified in both + eukaryotic and prokaryotic genes. A circular code is a particular + set of trinucleotides whose main property is the retrieval of the + frames in genes locally, i.e. anywhere in genes and particularly + without start codons, and automatically with a window of a few nucleotides. + After a certain evolutionary time and with particular values for + the three substitution parameters, the chaotic models retrieve the + main statistical properties of the three circular codes observed + in genes. These applications also allow an evolutionary comparison + between the standard and chaotic models.}, + doi = {10.1016/j.jtbi.2008.07.028}, + institution = {LIFC-EA 4157, Université de Franche-Comté, IUT de Belfort, BP 527, + 90016 Belfort Cedex, France. jacques.bahi@univ-fcomte.fr}, + keywords = {Animals; Computer Simulation; DNA, Circular, genetics; Evolution, + Molecular; Genetic Code; Models, Genetic; Mutation; Nonlinear Dynamics; + Stochastic Processes; Time}, + language = {eng}, + medline-pst = {ppublish}, + owner = {guyeux}, + pii = {S0022-5193(08)00395-0}, + pmid = {18706428}, + timestamp = {2011.05.05}, + url = {http://dx.doi.org/10.1016/j.jtbi.2008.07.028} +} + +@ARTICLE{Bahi2008bis, + author = {Bahi, J. M. and Michel, C. J.}, + title = {A stochastic model of gene evolution with chaotic mutations}, + journal = {Journal of Theoretical Biology}, + year = {2008}, + volume = {255}, + pages = {53-63}, + owner = {guyeux}, + timestamp = {2009.01.10} +} + +@ARTICLE{Bahi2004, + author = {Jacques M Bahi and Christian J Michel}, + title = {A stochastic gene evolution model with time dependent mutations.}, + journal = {Bull Math Biol}, + year = {2004}, + volume = {66}, + pages = {763--778}, + number = {4}, + month = {Jul}, + abstract = {We develop here a new class of gene evolution models in which the + nucleotide mutations are time dependent. These models allow to study + nonlinear gene evolution by accelerating or decelerating the mutation + rates at different evolutionary times. They generalize the previous + ones which are based on constant mutation rates. The stochastic model + developed in this class determines at some time t the occurrence + probabilities of trinucleotides mutating according to 3 time dependent + substitution parameters associated with the 3 trinucleotide sites. + Therefore, it allows to simulate the evolution of the circular code + recently observed in genes. By varying the class of function for + the substitution parameters, 1 among 12 models retrieves after mutation + the statistical properties of the observed circular code in the 3 + frames of actual genes. In this model, the mutation rate in the 3rd + trinucleotide site increases during gene evolution while the mutation + rates in the 1st and 2nd sites decrease. This property agrees with + the actual degeneracy of the genetic code. This approach can easily + be generalized to study evolution of motifs of various lengths, e.g., + dicodons, etc., with time dependent mutations.}, + doi = {10.1016/j.bulm.2003.10.004}, + institution = {LIFC - FRE CNRS 2661, IUT de Belfort, Université de Franche-Comté, + BP 527, 90016 Belfort Cédex, France. bahi@iut-bm.univ-fcomte.fr}, + keywords = {Codon, genetics; Evolution, Molecular; Genes, genetics; Genetic Code, + genetics; Models, Genetic; Mutation; Stochastic Processes}, + language = {eng}, + medline-pst = {ppublish}, + owner = {guyeux}, + pii = {S0092824003001174}, + pmid = {15210317}, + timestamp = {2011.05.05}, + url = {http://dx.doi.org/10.1016/j.bulm.2003.10.004} +} + +@ARTICLE{Banks92, + author = {J. Banks and J. Brooks and G. Cairns and P. Stacey}, + title = {On Devaney's Definition of Chaos}, + journal = {Amer. Math. Monthly}, + year = {1992}, + volume = {99}, + pages = {332--334}, + keywords = {(c+),}, + owner = {guyeux}, + timestamp = {27/01/2008} +} + +@MISC{Nist10, + author = {E. Barker and A. Roginsky}, + title = {DRAFT NIST Special Publication 800-131 Recommendation for the Transitioning + of Cryptographic Algorithms and Key Sizes}, + year = {2010}, + owner = {christophe}, + timestamp = {2010.08.18} +} + +@ARTICLE{BarniBF03, + author = {Mauro Barni and Franco Bartolini and Teddy Furon}, + title = {A general framework for robust watermarking security}, + journal = {Signal Processing}, + year = {2003}, + volume = {83}, + pages = {2069-2084}, + number = {10}, + note = {Special issue on Security of Data Hiding Technologies, invited paper}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + ee = {http://dx.doi.org/10.1016/S0165-1684(03)00168-3}, + owner = {guyeux}, + timestamp = {2009.06.30} +} + +@ARTICLE{Baudet78, + author = {Baudet, G\'{e}rard M.}, + title = {Asynchronous Iterative Methods for Multiprocessors}, + journal = {J. ACM}, + year = {1978}, + volume = {25}, + pages = {226--244}, + number = {2}, + address = {New York, NY, USA}, + doi = {http://doi.acm.org/10.1145/322063.322067}, + issn = {0004-5411}, + publisher = {ACM} +} + +@PHDTHESIS{Baz98, + author = {Didier El Baz}, + title = {Contribution à l'algorithmique parallèle. Le concept d'asynchronisme + : étude théorique, mise en œuvre, et application}, + school = {Institut national polytechnique de Toulouse}, + year = {1998}, + type = {Habilitation à diriger des recherches}, + owner = {christophe}, + timestamp = {2010.08.24} +} + +@ARTICLE{bhr09c:bl, + author = {Benoit, Anne and Hakem, Mourad and Robert, Yves}, + title = {Contention awareness and fault-tolerant scheduling for precedence + constrained tasks in heterogeneous systems}, + journal = {Parallel Computing}, + year = {2009}, + volume = {35}, + pages = {83--108}, + number = {2}, + classement = {*}, + doi = {10.1016/j.parco.2008.11.001}, + equipe = {and}, + inhal = {no}, + url = {http://dx.doi.org/10.1016/j.parco.2008.11.001} +} + +@INPROCEEDINGS{bhr08b:bl, + author = {Benoit, Anne and Hakem, Mourad and Robert, Yves}, + title = {Fault tolerant scheduling of precedence task graphs on heterogeneous + platforms}, + booktitle = {IPDPS'08}, + year = {2008}, + pages = {1--8}, + publisher = {IEEE Computer Society Press}, + classement = {*}, + equipe = {and}, + inhal = {no} +} + +@INPROCEEDINGS{Berger98, + author = {Berger, Bonnie and Leighton, Tom}, + title = {Protein folding in the hydrophobic-hydrophilic (HP) is NP-complete}, + booktitle = {Proceedings of the second annual international conference on Computational + molecular biology}, + year = {1998}, + series = {RECOMB '98}, + pages = {30--39}, + address = {New York, NY, USA}, + publisher = {ACM}, + acmid = {279080}, + isbn = {0-89791-976-9}, + location = {New York, New York, United States}, + numpages = {10} +} + +@BOOK{Bertsekas89, + title = {Parallel and distributed computation: numerical methods}, + publisher = {Prentice-Hall, Inc.}, + year = {1989}, + author = {Bertsekas, Dimitri P. and Tsitsiklis, John N.}, + address = {Upper Saddle River, NJ, USA}, + isbn = {0-13-648700-9} +} + +@MISC{Bertsekas88paralleland, + author = {Dimitri P. Bertsekas and John N. Tsitsiklis}, + title = {Parallel and distributed iterative algorithms: a selective survey}, + year = {1988} +} + +@UNPUBLISHED{F.a, + author = {F. Blanchard and E. Glasner and S. Kolyada and A.Maass}, + title = {On Li-Yorke pairs}, + note = {Preprint}, + optkey = {2000}, + owner = {guyeux}, + timestamp = {2008.01.02} +} + +@UNPUBLISHED{F., + author = {F. Blanchard and B. Host and S. Ruette}, + title = {Asymptotic pairs in positive-entropy systems}, + note = {Preprint}, + optannote = {to appear in Ergod. Th. Dynam. Sys.}, + optkey = {2000}, + owner = {guyeux}, + timestamp = {2008.01.02} +} + +@ARTICLE{BFibe, + author = {Dan Boneh and Matt Franklin}, + title = {Identity-Based Encryption from the {Weil} Pairing}, + journal = {SIAM J. of Computing}, + year = {2003}, + volume = {32}, + pages = {586-615}, + number = {3}, + note = {Extended abstract in Crypto'01} +} + +@INCOLLECTION{boneh, + author = {Boneh, Dan and Goh, Eu-Jin and Nissim, Kobbi}, + title = {Evaluating 2-DNF Formulas on Ciphertexts}, + year = {2005}, + pages = {325--341}, + abstract = {Let ψ be a 2-DNF formula on boolean variables x 1,..., x n ∈ {0,1}. + We present a homomorphic public key encryption scheme that allows + the public evaluation of ψ given an encryption of the variables x + 1,..., x n. In other words, given the encryption of the bits x 1,..., + x n, anyone can create the encryption of ψ( x 1,..., x n). More generally, + we can evaluate quadratic multi-variate polynomials on ciphertexts + provided the resulting value falls within a small set. We present + a number of applications of the system: 1 In a database of size n, + the total communication in the basic step of the Kushilevitz-Ostrovsky + PIR protocol is reduced from to . 2 An efficient election system + based on homomorphic encryption where voters do not need to include + non-interactive zero knowledge proofs that their ballots are valid. + The election system is proved secure without random oracles but still + efficient. 3 A protocol for universally verifiable computation.}, + citeulike-article-id = {2719460}, + citeulike-linkout-0 = {http://www.springerlink.com/content/wtt5caxkr94laxkg}, + journal = {Theory of Cryptography}, + keywords = {homomorphic, pairings}, + posted-at = {2008-04-25 21:53:15}, + priority = {2}, + url = {http://www.springerlink.com/content/wtt5caxkr94laxkg} +} + +@ARTICLE{Bonneau01, + author = {Bonneau, Richard and Baker, David}, + title = {AB INITIO PROTEIN STRUCTURE PREDICTION: Progress and Prospects}, + journal = {Annual Review of Biophysics and Biomolecular Structure}, + year = {2001}, + volume = {30}, + pages = {173-189}, + number = {1}, + doi = {10.1146/annurev.biophys.30.1.173} +} + +@ARTICLE{Bowen, + author = {R. Bowen}, + title = {Entropy for group endomorphisms and homogeneous spaces}, + journal = {Trans. Amer. Math. Soc.}, + year = {1971}, + volume = {153}, + pages = {401-414}, + owner = {guyeux}, + timestamp = {15/02/2008} +} + +@ARTICLE{Bowen1971, + author = {R. Bowen}, + title = {Periodic points and measures for Axiom A diffeomorphisms}, + journal = {Trans. Amer. Math. Soc.}, + year = {1971}, + volume = {154}, + pages = {377-397}, + owner = {guyeux}, + timestamp = {15/02/2008} +} + +@ARTICLE{Braxenthaler97, + author = {Michael Braxenthaler and R. Ron Unger and Ditza Auerbach and John + Moult}, + title = {Chaos in protein dynamics}, + journal = {Proteins-structure Function and Bioinformatics}, + year = {1997}, + volume = {29}, + pages = {417--425}, + doi = {10.1002/(SICI)1097-0134(199712)29:4<417::AID-PROT2>3.3.CO;2-O}, + masid = {2824140} +} + +@INPROCEEDINGS{Brumley03remotetiming, + author = {David Brumley and Dan Boneh}, + title = {Remote Timing Attacks are Practical}, + booktitle = {Proceedings of the 12th USENIX Security Symposium}, + year = {2003}, + pages = {1--14} +} + +@ARTICLE{Bohm1991375, + author = {Gerald Böhm}, + title = {Protein folding and deterministic chaos: Limits of protein folding + simulations and calculations}, + journal = {Chaos, Solitons \& Fractals}, + year = {1991}, + volume = {1}, + pages = {375 - 382}, + number = {4}, + doi = {DOI: 10.1016/0960-0779(91)90028-8}, + issn = {0960-0779}, + url = {http://www.sciencedirect.com/science/article/B6TJ4-46CBXVT-1X/2/370489c218e4c2732cd9b620ef50c696} +} + +@INCOLLECTION{Cachin2004, + author = {Cachin, Christian}, + title = {An Information-Theoretic Model for Steganography}, + booktitle = {Information Hiding}, + publisher = {Springer Berlin / Heidelberg}, + year = {1998}, + volume = {1525}, + series = {Lecture Notes in Computer Science}, + pages = {306-318}, + affiliation = {MIT Laboratory for Computer Science 545 Technology Square Cambridge + MA 02139 USA} +} + +@ARTICLE{Cam2006, + author = {H. Cam and S. Ozdemir and P. Nair and D. Muthuavinashinappan and + H. O. Sanli}, + title = {ESPDA: Energy-efficient secure pattern based data aggregation for + wireless sensor networks.}, + journal = {Computer Communication journal (29)}, + year = {2006}, + pages = {446-455} +} + +@ARTICLE{CarletCZ98, + author = {Claude Carlet and Pascale Charpin and Victor Zinoviev}, + title = {Codes, Bent Functions and Permutations Suitable For DES-like Cryptosystems}, + journal = {Des. Codes Cryptography}, + year = {1998}, + volume = {15}, + pages = {125-156}, + number = {2}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + +@INPROCEEDINGS{Castelluccia05efficientaggregation, + author = {Claude Castelluccia}, + title = {Efficient aggregation of encrypted data in wireless sensor networks}, + booktitle = {MobiQuitous}, + year = {2005}, + pages = {109--117}, + publisher = {IEEE Computer Society} +} + +@ARTICLE{Cayre2008, + author = {Cayre, F. and Bas, P.}, + title = {Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding}, + journal = {IEEE Transactions on Information Forensics and Security}, + year = {2008}, + volume = {3}, + pages = {1--15}, + number = {1}, + doi = {10.1109/TIFS.2007.916006}, + issn = {1556-6013}, + keywords = {cryptography, random sequences, spread spectrum communication, telecommunication + security, watermarking, Kerckhoffs-based embedding security classes, + WOA Data Hiding, pseudorandom sequences, spread-spectrum techniques, + steganography security, watermark-only-attack, watermarking, Security, + spread-spectrum (SS) watermarking}, + owner = {guyeux}, + timestamp = {2009.06.29} +} + +@ARTICLE{Cayre2005, + author = {Cayre, F. and Fontaine, C. and Furon, T.}, + title = {Watermarking security: theory and practice}, + journal = {IEEE Transactions on Signal Processing}, + year = {2005}, + volume = {53}, + pages = {3976--3987}, + number = {10}, + doi = {10.1109/TSP.2005.855418}, + issn = {1053-587X}, + keywords = {blind source separation, cryptography, watermarking, Fisher information + matrix, blind source separation, cryptanalysis, information theory, + spread spectrum techniques, substitutive scheme, watermarking security, + Blind source separation, Fisher information matrix, equivocation, + security, watermarking}, + owner = {guyeux}, + timestamp = {2009.06.29} +} + +@ARTICLE{Chajakis91, + author = {Chajakis, Emmanuel D. and Zenios, Stavros A.}, + title = {Synchronous and asynchronous implementations of relaxation algorithms + for nonlinear network optimization}, + journal = {Parallel Comput.}, + year = {1991}, + volume = {17}, + pages = {873--894}, + number = {8}, + address = {Amsterdam, The Netherlands, The Netherlands}, + doi = {http://dx.doi.org/10.1016/S0167-8191(05)80072-9}, + issn = {0167-8191}, + publisher = {Elsevier Science Publishers B. V.} +} + +@ARTICLE{Chan2007, + author = {Chan, Haowen and Perrig, Adrian and Przydatek, Bartosz and Song, + Dawn}, + title = {SIA: Secure information aggregation in sensor networks}, + journal = {J. Comput. Secur.}, + year = {2007}, + volume = {15}, + pages = {69--102}, + number = {1}, + address = {Amsterdam, The Netherlands, The Netherlands}, + issn = {0926-227X}, + publisher = {IOS Press} +} + +@ARTICLE{Chandramouli06, + author = {R. Chandramouli and S. Bapatla and K.P. Subbalakshmi}, + title = {Battery power-aware encryption}, + journal = {ACM transactions on information and system security}, + year = {2006}, + pages = {162--180}, + owner = {christophe}, + timestamp = {2010.07.31} +} + +@ARTICLE{Charpin85, + author = {Pascale Charpin}, + title = {A description of some extended cyclic codes with application to Reed-Solomon + codes}, + journal = {Discrete Mathematics}, + year = {1985}, + volume = {56}, + pages = {117-124}, + number = {2-3}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + ee = {http://dx.doi.org/10.1016/0012-365X(85)90019-6} +} + +@ARTICLE{Chazan69, + author = {D. Chazan and W. Miranker}, + title = {Chaotic relaxation}, + journal = {Linear algebra and its applications}, + year = {1969}, + pages = {199-222}, + owner = {guyeux}, + timestamp = {2008.05.22} +} + +@ARTICLE{Cheon2006, + author = {Cheon, Jung Hee and Kim, Woo-Hwan and Nam, Hyun Soo}, + title = {Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy + homomorphism scheme}, + journal = {Inf. Process. Lett.}, + year = {2006}, + volume = {97}, + pages = {118--123}, + number = {3}, + address = {Amsterdam, The Netherlands, The Netherlands}, + doi = {http://dx.doi.org/10.1016/j.ipl.2005.09.016}, + issn = {0020-0190}, + publisher = {Elsevier North-Holland, Inc.} +} + +@MISC{Cheon03acryptanalysis, + author = {Jung Hee Cheon and Hyun Soo Nam}, + title = {A Cryptanalysis of the Original Domingo-Ferrer's Algebraic Privacy + Homomorphism}, + year = {2003} +} + +@ARTICLE{Cheung05, + author = {R.C.C. Cheung and N.J. Telle and W. Luk and P.Y.K. Cheung}, + title = {Secure encrypted-data aggregation for wireless sensor networks}, + journal = {IEEE Trans. on Very Large Scale Integration Systems}, + year = {2005}, + volume = {13}, + pages = {1048-1059}, + number = {9} +} + +@ARTICLE{Chivian2005, + author = {Chivian, Dylan and Kim, David E. and Malmström, Lars and Schonbrun, + Jack and Rohl, Carol A. and Baker, David}, + title = {Prediction of CASP6 structures using automated robetta protocols}, + journal = {Proteins}, + year = {2005}, + volume = {61}, + pages = {157--166}, + number = {S7}, + issn = {1097-0134}, + keywords = {Rosetta, fragment assembly, de novo modeling, homology modeling, parametric + alignment ensemble}, + owner = {christophe}, + publisher = {Wiley Subscription Services, Inc., A Wiley Company}, + timestamp = {2011.01.22}, + url = {http://dx.doi.org/10.1002/prot.20733} +} + +@ARTICLE{Zhu06, + author = {Congxu, Zhu and Xuefeng, Liao and Zhihua, Li}, + title = {Chaos-based multipurpose image watermarking algorithm}, + journal = {Wuhan University Journal of Natural Sciences}, + year = {2006}, + volume = {11}, + pages = {1675-1678}, + note = {10.1007/BF02831848}, + abstract = {To achieve the goal of image content authentication and copyright + protection simultaneously, this paper presents a novel image dual + watermarking method based on chaotic map. Firstly, the host image + was split into many nonoverlapping small blocks, and the block-wise + discrete cosine transform (DCT) is computed. Secondly, the robust + watermarks, shuffled by the chaotic sequences, are embedded in the + DC coefficients of blocks to achieve the goal of copyright protection. + The semi-fragile watermarks, generated by chaotic map, are embedded + in the AC coefficients of blocks to obtain the aim of image authentication. + Both of them can be extracted without the original image. Simulation + results demonstrate the effectiveness of our algorithm in terms of + robustness and fragility.}, + affiliation = {Central South University School of Information Science and Engineering + 410083 Changsha, Hunan China}, + issn = {1007-1202}, + issue = {6}, + keyword = {Mathematics, general}, + publisher = {Wuhan University, co-published with Springer}, + url = {http://dx.doi.org/10.1007/BF02831848} +} + +@ARTICLE{Conley1978, + author = {C. Conley}, + title = {Isolated invariant sets and the Morse index}, + journal = {CBMS Regional Conference. AMS.}, + year = {1978}, + optvolume = {38}, + owner = {guyeux}, + timestamp = {2008.01.02} +} + +@ARTICLE{Cornu2002, + author = {Philippe Cornu and André Smolarz}, + title = {Image characterization by texture}, + journal = {Traitement du signal}, + year = {2002}, + volume = {19}, + pages = {29-35}, + file = {:/home/guyeux/Documents/Bibliotheque/These/Watermarking/Caractérisation d'images par textures associées.pdf:PDF}, + owner = {guyeux}, + timestamp = {2008.05.12} +} + +@INPROCEEDINGS{Cox99, + author = {Ingemar Cox and Matt L. Miller and Andrew L. Mckellips}, + title = {Watermarking as Communications With Side Information}, + booktitle = {Proceedings of the IEEE}, + year = {1999}, + pages = {1127--1141}, + owner = {christophe}, + timestamp = {2010.03.06} +} + +@ARTICLE{Cox97securespread, + author = {Ingemar J. Cox and Senior Member and Joe Kilian and F. Thomson Leighton + and Talal Shamoon}, + title = {Secure spread spectrum watermarking for multimedia}, + journal = {IEEE Transactions on Image Processing}, + year = {1997}, + volume = {6}, + pages = {1673--1687} +} + +@ARTICLE{Cramer96, + author = {Christopher Cramer and Erol Gelenbe and Hakan Bakircioglu}, + title = {Video Compression with Random Neural Networks}, + journal = {Neural Networks for Identification, Control, and Robotics, International + Workshop}, + year = {1996}, + volume = {0}, + pages = {0476}, + address = {Los Alamitos, CA, USA}, + isbn = {0-8186-7456-3}, + publisher = {IEEE Computer Society} +} + +@INPROCEEDINGS{Crescenzi98, + author = {Crescenzi, Pierluigi and Goldman, Deborah and Papadimitriou, Christos + and Piccolboni, Antonio and Yannakakis, Mihalis}, + title = {On the complexity of protein folding (extended abstract)}, + booktitle = {Proceedings of the thirtieth annual ACM symposium on Theory of computing}, + year = {1998}, + series = {STOC '98}, + pages = {597--603}, + address = {New York, NY, USA}, + publisher = {ACM}, + acmid = {276875}, + isbn = {0-89791-962-9}, + location = {Dallas, Texas, United States}, + numpages = {7} +} + +@ARTICLE{Dawei2004, + author = {Zhao Dawei and Chen Guanrong and Liu Wenbo}, + title = {A chaos-based robust wavelet-domain watermarking algorithm}, + journal = {Chaos, Solitons and Fractals}, + year = {2004}, + volume = {22}, + pages = {47-54}, + owner = {guyeux}, + timestamp = {2008.10.07} +} + +@MISC{1011.1638, + author = {Anthony Desnos and Robert Erra and Eric Filiol}, + title = {Processor-Dependent Malware... and codes}, + year = {2010}, + comment = {arXiv:1011.1638}, + eprint = {arXiv:1011.1638} +} + +@BOOK{devaney, + title = {An Introduction to Chaotic Dynamical Systems}, + publisher = {Addison-Wesley}, + year = {1989}, + author = {Devaney, Robert L.}, + address = {Redwood City, CA}, + edition = {2nd} +} + +@ARTICLE{diffie76, + author = {Whitfield Diffie and Martin E. Hellman}, + title = {New Directions in Cryptography}, + journal = {IEEE Transactions on Information Theory}, + year = {1976}, + volume = {IT-22}, + pages = {644--654}, + number = {6}, + date = {November 1976}, + owner = {guyeux}, + timestamp = {2009.06.30}, + url = {citeseer.ist.psu.edu/diffie76new.html} +} + +@INCOLLECTION{Dijk10, + author = {van Dijk, Marten and Gentry, Craig and Halevi, Shai and Vaikuntanathan, + Vinod}, + title = {Fully Homomorphic Encryption over the Integers}, + booktitle = {Advances in Cryptology – EUROCRYPT 2010}, + publisher = {Springer Berlin / Heidelberg}, + year = {2010}, + editor = {Gilbert, Henri}, + volume = {6110}, + series = {Lecture Notes in Computer Science}, + pages = {24-43}, + abstract = {We construct a simple fully homomorphic encryption scheme, using only + elementary modular arithmetic. We use Gentry’s technique to construct + a fully homomorphic scheme from a bootstrappable somewhat homomorphic + scheme. However, instead of using ideal lattices over a polynomial + ring, our bootstrappable encryption scheme merely uses addition and + multiplication over the integers. The main appeal of our scheme is + the conceptual simplicity. We reduce the security of our scheme to + finding an approximate integer gcd – i.e., given a list of integers + that are near-multiples of a hidden integer, output that hidden integer. + We investigate the hardness of this task, building on earlier work + of Howgrave-Graham.}, + affiliation = {MIT CSAIL} +} + +@ARTICLE{Dill1985, + author = {Dill, KA}, + title = {Theory for the folding and stability of globular proteins.}, + journal = {Biochemistry}, + year = {1985}, + volume = {24}, + pages = {1501-9--}, + number = {6}, + month = mar, + abstract = {Using lattice statistical mechanics, we develop theory to account + for the folding of a heteropolymer molecule such as a protein to + the globular and soluble state. Folding is assumed to be driven by + the association of solvophobic monomers to avoid solvent and opposed + by the chain configurational entropy. Theory predicts a phase transition + as a function of temperature or solvent character. Molecules that + are too short or too long or that have too few solvophobic residues + are predicted not to fold. Globular molecules should have a largely + solvophobic core, but there is an entropic tendency for some residues + to be "out of place", particularly in small molecules. For long chains, + molecules comprised of globular domains are predicted to be thermodynamically + more stable than spherical molecules. The number of accessible conformations + in the globular state is calculated to be an exceedingly small fraction + of the number available to the random coil. Previous estimates of + this number, which have motivated kinetic theories of folding, err + by many tens of orders of magnitude.}, + comment = {Research Support, Non-U.S. Gov't,Research Support, U.S. Gov't, P.H.S.,}, + keywords = {Mathematics, Models, Chemical, Polymers, Protein Conformation}, + owner = {christophe}, + timestamp = {2011.01.22}, + url = {http://ukpmc.ac.uk/abstract/MED/3986190} +} + +@ARTICLE{Dill1995, + author = {Dill, KA and Bromberg, S and Yue, K and Fiebig, KM and Yee, DP and + Thomas, PD and Chan, HS}, + title = {Principles of protein folding--a perspective from simple exact models.}, + journal = {Protein Sci}, + year = {1995}, + volume = {4}, + pages = {561-602--}, + number = {4}, + month = apr, + abstract = {General principles of protein structure, stability, and folding kinetics + have recently been explored in computer simulations of simple exact + lattice models. These models represent protein chains at a rudimentary + level, but they involve few parameters, approximations, or implicit + biases, and they allow complete explorations of conformational and + sequence spaces. Such simulations have resulted in testable predictions + that are sometimes unanticipated: The folding code is mainly binary + and delocalized throughout the amino acid sequence. The secondary + and tertiary structures of a protein are specified mainly by the + sequence of polar and nonpolar monomers. More specific interactions + may refine the structure, rather than dominate the folding code. + Simple exact models can account for the properties that characterize + protein folding: two-state cooperativity, secondary and tertiary + structures, and multistage folding kinetics--fast hydrophobic collapse + followed by slower annealing. These studies suggest the possibility + of creating "foldable" chain molecules other than proteins. The encoding + of a unique compact chain conformation may not require amino acids; + it may require only the ability to synthesize specific monomer sequences + in which at least one monomer type is solvent-averse.}, + address = {Department of Pharmaceutical Chemistry, University of California, + San Francisco 94143-1204, USA.}, + comment = {Review,Research Support, Non-U.S. Gov't,Research Support, U.S. Gov't, + Non-P.H.S.,Research Support, U.S. Gov't, P.H.S.,}, + keywords = {Amino Acid Sequence, Biological Evolution, Hydrogen Bonding, Models, + Molecular, Molecular Sequence Data, Mutation, Protein Conformation, + Protein Denaturation, Protein Folding, Temperature, Thermodynamics}, + owner = {christophe}, + timestamp = {2011.01.22}, + url = {http://ukpmc.ac.uk/abstract/MED/7613459} +} + +@INPROCEEDINGS{Dobbertin96, + author = {Dobbertin, Hans}, + title = {Cryptanalysis of MD4}, + booktitle = {Proceedings of the Third International Workshop on Fast Software + Encryption}, + year = {1996}, + pages = {53--69}, + address = {London, UK}, + publisher = {Springer-Verlag}, + isbn = {3-540-60865-6} +} + +@INPROCEEDINGS{DomingoFerrer2002, + author = {Domingo-Ferrer, Josep}, + title = {A Provably Secure Additive and Multiplicative Privacy Homomorphism}, + booktitle = {ISC '02: Proceedings of the 5th International Conference on Information + Security}, + year = {2002}, + pages = {471--483}, + address = {London, UK}, + publisher = {Springer-Verlag}, + isbn = {3-540-44270-7} +} + +@ARTICLE{Dubchak1995, + author = {I. Dubchak and I. Muchnik and S. R. Holbrook and S. H. Kim}, + title = {Prediction of protein folding class using global description of amino + acid sequence.}, + journal = {Proc Natl Acad Sci U S A}, + year = {1995}, + volume = {92}, + pages = {8700--8704}, + number = {19}, + month = {Sep}, + __markedentry = {[guyeux]}, + abstract = {We present a method for predicting protein folding class based on + global protein chain description and a voting process. Selection + of the best descriptors was achieved by a computer-simulated neural + network trained on a data base consisting of 83 folding classes. + Protein-chain descriptors include overall composition, transition, + and distribution of amino acid attributes, such as relative hydrophobicity, + predicted secondary structure, and predicted solvent exposure. Cross-validation + testing was performed on 15 of the largest classes. The test shows + that proteins were assigned to the correct class (correct positive + prediction) with an average accuracy of 71.7\%, whereas the inverse + prediction of proteins as not belonging to a particular class (correct + negative prediction) was 90-95\% accurate. When tested on 254 structures + used in this study, the top two predictions contained the correct + class in 91\% of the cases.}, + institution = {Department of Chemistry, University of California, Berkeley 94720, + USA.}, + keywords = {Amino Acid Sequence; Amino Acids, chemistry; Computer Simulation; + Databases, Factual; Models, Chemical; Neural Networks (Computer); + Protein Folding; Protein Structure, Secondary; Proteins, chemistry/classification; + Reproducibility of Results; Solvents}, + language = {eng}, + medline-pst = {ppublish}, + owner = {guyeux}, + pmid = {7568000}, + timestamp = {2011.07.18} +} + +@BOOK{Dudley, + title = {Real analysis and probability}, + publisher = {Cambridge University Press}, + author = {Richard M. Dudley}, + optpages = {209}, + owner = {guyeux}, + timestamp = {2008.01.02} +} + +@ARTICLE{Tarazi84, + author = {El Tarazi, Mouhamed Nabih}, + title = {Algorithmes mixtes asynchrones. Etude de convergence monotone}, + journal = {Numerische Mathematik}, + year = {1984}, + volume = {44}, + pages = {363-369}, + note = {10.1007/BF01405568}, + affiliation = {Department of Mathematics, Faculty of Science Kuwait University P.O. + Box 5969 Kuwait}, + issn = {0029-599X}, + issue = {3}, + keyword = {Mathematics and Statistics}, + publisher = {Springer Berlin / Heidelberg}, + url = {http://dx.doi.org/10.1007/BF01405568} +} + +@ARTICLE{Tarazi82, + author = {El Tarazi, Mouhamed Nabih}, + title = {Some convergence results for asynchronous algorithms}, + journal = {Numerische Mathematik}, + year = {1982}, + volume = {39}, + pages = {325-340}, + note = {10.1007/BF01407866}, + affiliation = {Department of Mathematics, Faculty of Science Kuwait University P.O. + Box 5969 Kuwait Kuwait}, + issn = {0029-599X}, + issue = {3}, + keyword = {Mathematics and Statistics}, + publisher = {Springer Berlin / Heidelberg}, + url = {http://dx.doi.org/10.1007/BF01407866} +} + +@ARTICLE{Fei2005, + author = {Peng Fei and Qiu Shui-Sheng and Long Min}, + title = {A secure digital signature algorithm based on elliptic curve and + chaotic mappings}, + journal = {Circuits Systems Signal Processing}, + year = {2005}, + volume = {24, No. 5}, + pages = {585--597}, + owner = {guyeux}, + timestamp = {2009.01.16} +} + +@BOOK{Feigenbaum1908, + title = {Universal behavior in nonlinear systems}, + publisher = {Los Alamos Science}, + year = {1908}, + author = {Feigenbaum}, + owner = {guyeux}, + timestamp = {2008.01.02} +} + +@ARTICLE{Felsenstein1980, + author = {J. Felsenstein}, + title = {A view of population genetics.}, + journal = {Science}, + year = {1980}, + volume = {208}, + pages = {1253}, + number = {4449}, + month = {Jun}, + doi = {10.1126/science.208.4449.1253}, + language = {eng}, + medline-pst = {ppublish}, + owner = {guyeux}, + pii = {208/4449/1253}, + pmid = {17830806}, + timestamp = {2011.05.05}, + url = {http://dx.doi.org/10.1126/science.208.4449.1253} +} + +@BOOK{Filiol09, + title = {Les virus informatiques : techniques virales et antivirales avancées}, + year = {2009}, + editor = {Springer}, + author = {Eric Filiol}, + owner = {christophe}, + timestamp = {2010.10.13} +} + +@INPROCEEDINGS{FiliolBlackHat, + author = {Eric Filiol}, + title = {Passive and Active Leakage of Secret Data from Non Networked Computer}, + booktitle = {Black Hat}, + year = {2008}, + owner = {christophe}, + timestamp = {2010.11.28} +} + +@PHDTHESIS{Formenti2003, + author = {Enrico Formenti}, + title = {De l'algorithmique du chaos dans les systèmes dynamiques discrets}, + school = {Université de Provence}, + year = {2003}, + owner = {guyeux}, + timestamp = {2008.01.02} +} + +@PHDTHESIS{Formenti1998, + author = {Enrico Formenti}, + title = {Automates cellulaires et chaos : de la vision topologique à la vision + algorithmique}, + school = {\'Ecole Normale Supérieure de Lyon}, + year = {1998}, + optmonth = {Octobre}, + owner = {guyeux}, + timestamp = {2008.01.02} +} + +@ARTICLE{Frey2006, + author = {Gabriel Frey and Christian J Michel}, + title = {Identification of circular codes in bacterial genomes and their use + in a factorization method for retrieving the reading frames of genes.}, + journal = {Comput Biol Chem}, + year = {2006}, + volume = {30}, + pages = {87--101}, + number = {2}, + month = {Apr}, + abstract = {We developed a statistical method that allows each trinucleotide to + be associated with a unique frame among the three possible ones in + a (protein coding) gene. An extensive gene study in 175 complete + bacterial genomes based on this statistical approach resulted in + identification of 72 new circular codes. Finding a circular code + enables an immediate retrieval of the reading frame locally anywhere + in a gene. No knowledge of location of the start codon is required + and a short window of only a few nucleotides is sufficient for automatic + retrieval. We have therefore developed a factorization method (that + explores previously found circular codes) for retrieving the reading + frames of bacterial genes. Its principle is new and easy to understand. + Neither complex treatment nor specific information on the nucleotide + sequences is necessary. Moreover, the method can be used for short + regions in nucleotide sequences (less than 25 nucleotides in protein + coding genes). Selected additional properties of circular codes and + their possible biological consequences are also discussed.}, + doi = {10.1016/j.compbiolchem.2005.11.001}, + institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université + Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant, + 67400 Illkirch, France. frey@dpt-info.u-strasbg.fr}, + keywords = {Base Sequence; Computational Biology; Genes, Bacterial; Genome, Bacterial; + Genomics, statistics /&/ numerical data; Models, Genetic; Models, + Statistical; Reading Frames}, + language = {eng}, + medline-pst = {ppublish}, + owner = {guyeux}, + pii = {S1476-9271(05)00111-8}, + pmid = {16439185}, + timestamp = {2011.05.05}, + url = {http://dx.doi.org/10.1016/j.compbiolchem.2005.11.001} +} + +@ARTICLE{Frey2006a, + author = {Gabriel Frey and Christian J Michel}, + title = {An analytical model of gene evolution with six mutation parameters: + an application to archaeal circular codes.}, + journal = {Comput Biol Chem}, + year = {2006}, + volume = {30}, + pages = {1--11}, + number = {1}, + month = {Feb}, + abstract = {We develop here an analytical evolutionary model based on a trinucleotide + mutation matrix 64 x 64 with six substitution parameters associated + with the transitions and transversions in the three trinucleotide + sites. It generalizes the previous models based on the nucleotide + mutation matrices 4 x 4 and the trinucleotide mutation matrix 64 + x 64 with three parameters. It determines at some time t the exact + occurrence probabilities of trinucleotides mutating randomly according + to six substitution parameters. An application of this model allows + an evolutionary study of the common circular code COM and the 15 + archaeal circular codes X which have been recently identified in + several archaeal genomes. The main property of a circular code is + the retrieval of the reading frames in genes, both locally, i.e. + anywhere in genes and in particular without a start codon, and automatically + with a window of a few nucleotides. In genes, the circular code is + superimposed on the traditional genetic one. Very unexpectedly, the + evolutionary model demonstrates that the archaeal circular codes + can derive from the common circular code subjected to random substitutions + with particular values for six substitutions parameters. It has a + strong correlation with the statistical observations of three archaeal + codes in actual genes. Furthermore, the properties of these substitution + rates allow proposal of an evolutionary classification of the 15 + archaeal codes into three main classes according to this model. In + almost all the cases, they agree with the actual degeneracy of the + genetic code with substitutions more frequent in the third trinucleotide + site and with transitions more frequent that transversions in any + trinucleotide site.}, + doi = {10.1016/j.compbiolchem.2005.09.001}, + institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université + Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant, + 67400 Illkirch, France. frey@dpt-info.u-strasbg.fr}, + keywords = {Archaea, genetics; DNA, Circular; Evolution, Molecular; Genetic Code; + Genome, Archaeal; Models, Genetic; Mutation; Trinucleotide Repeats}, + language = {eng}, + medline-pst = {ppublish}, + owner = {guyeux}, + pii = {S1476-9271(05)00083-6}, + pmid = {16324886}, + timestamp = {2011.05.05}, + url = {http://dx.doi.org/10.1016/j.compbiolchem.2005.09.001} +} + +@INPROCEEDINGS{fgb11:ip, + author = {Friot, Nicolas and Guyeux, Christophe and Bahi, Jacques}, + title = {Chaotic Iterations for Steganography - Stego-security and chaos-security}, + booktitle = {SECRYPT'2011, Int. Conf. on Security and Cryptography}, + year = {2011}, + pages = {***--***}, + address = {Sevilla, Spain}, + month = jul, + note = {To appear}, + classement = {ACTI}, + domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, + equipe = {and}, + inhal = {no} +} + +@MISC{Frisch, + author = {Alain Frisch}, + title = {Entropie topologique et définition du chaos}, + year = {1998}, + note = {Rapport de tipe}, + file = {Tipe_Entropie Topologique et Definition du Chaos (Alain Frisch).ps:Chaos/Tipe_Entropie Topologique et Definition du Chaos (Alain Frisch).ps:PDF}, + keywords = {Chaos, Entropie Topologique, Tipe}, + owner = {guyeux}, + timestamp = {2008.01.02}, + url = {http://alain.frisch.fr/math.html} +} + +@MISC{Frisch98, + author = {Alain Frisch}, + title = {Entropie topologique et définition du chaos}, + year = {1998}, + note = {[En ligne; Page disponible le 12-août-2010]}, + url = {\url{http://alain.frisch.fr/math.html}} +} + +@ARTICLE{Frommer97asynchronousweighted, + author = {Andreas Frommer and Hartmut Schwandt and Daniel and Daniel B. Szyld}, + title = {Asynchronous Weighted Additive Schwarz Methods}, + journal = {Electronic Transactions on Numerical Analysis}, + year = {1997}, + volume = {5}, + pages = {48--61} +} + +@MISC{Frommer94asynchronoustwo-stage, + author = {Andreas Frommer and Daniel B. Szyld}, + title = {Asynchronous Two-Stage Iterative Methods}, + year = {1994} +} + +@BOOK{J1992, + title = {Introduction to Chaos and Coherence}, + publisher = {IOP Publishing}, + year = {1992}, + author = {J. Frøyland}, + owner = {guyeux}, + timestamp = {2008.01.02} +} + +@MISC{Furon2002, + author = {T. Furon}, + title = {Security analysis}, + year = {2002}, + note = {European Project IST-1999-10987 CERTIMARK, Deliverable D.5.5}, + owner = {guyeux}, + timestamp = {2009.06.30} +} + +@ARTICLE{Furon08, + author = {Furon, Teddy and Bas, Patrick}, + title = {Broken arrows}, + journal = {EURASIP J. Inf. Secur.}, + year = {2008}, + volume = {2008}, + pages = {1--13}, + address = {New York, NY, United States}, + doi = {http://dx.doi.org/10.1155/2008/597040}, + issn = {1687-4161}, + owner = {christophe}, + publisher = {Hindawi Publishing Corp.}, + timestamp = {2010.03.06} +} + +@ARTICLE{P1150442004, + author = {G.S.El-Taweel and H.M. Onsi and M.Samy and M.G. Darwish}, + title = {Secure and Non-Blind Watermarking Scheme for Color Images Based on + DWT}, + journal = {ICGST International Journal on Graphics, Vision and Image Processing}, + year = {2005}, + volume = {05}, + pages = {1--5}, + month = {April}, + issue = {4}, + owner = {christophe}, + timestamp = {2010.03.07} +} + +@INPROCEEDINGS{Gentry09, + author = {Gentry, Craig}, + title = {Fully homomorphic encryption using ideal lattices}, + booktitle = {STOC '09: Proceedings of the 41st annual ACM symposium on Theory + of computing}, + year = {2009}, + pages = {169--178}, + address = {New York, NY, USA}, + publisher = {ACM}, + doi = {http://doi.acm.org/10.1145/1536414.1536440}, + isbn = {978-1-60558-506-2}, + location = {Bethesda, MD, USA} +} + +@INPROCEEDINGS{Girao04, + author = {J. Girao and M. Schneider and D. Westhoff}, + title = {CDA: Concealed data aggregation in wireless sensor networks}, + booktitle = {Proceedings of the ACM Workshop on Wireless Security}, + year = {2004}, + owner = {christophe}, + timestamp = {2010.07.31} +} + +@CONFERENCE{Gotsman88, + author = {C. Gotsman and D. Lehmann and E. Shamir}, + title = {Asynchronous Dynamics of Random Boolean Networks}, + booktitle = {San Diego '88 Neural Networks Conference}, + year = {1988}, + owner = {guyeux}, + timestamp = {30/03/2008} +} + +@ARTICLE{Guckenheimer1979, + author = {J. Guckenheimer}, + title = {Sensitive dependence to initial conditions for one-dimensional maps}, + journal = {Comm. Math. Phys.}, + year = {1979}, + optpages = {133-160}, + owner = {guyeux}, + timestamp = {2008.01.02} +} + +@BOOK{J.1983, + title = {Nonlinear oscillations, dynamical systems, and bifurcations of vector + fields}, + publisher = {Springer Verlag}, + year = {1983}, + author = {J. Guckenheimer and P. Holmes}, + owner = {guyeux}, + timestamp = {2008.01.02} +} + +@ARTICLE{Guo20093201, + author = {Wei Guo and Xiaoming Wang and Dake He and Yang Cao}, + title = {Cryptanalysis on a parallel keyed hash function based on chaotic + maps}, + journal = {Physics Letters A}, + year = {2009}, + volume = {373}, + pages = {3201 - 3206}, + number = {36}, + abstract = {This Letter analyzes the security of a novel parallel keyed hash function + based on chaotic maps, proposed by Xiao et al. to improve the efficiency + in parallel computing environment. We show how to devise forgery + attacks on Xiao's scheme with differential cryptanalysis and give + the experiment results of two kinds of forgery attacks firstly. Furthermore, + we discuss the problem of weak keys in the scheme and demonstrate + how to utilize weak keys to construct collision.}, + issn = {0375-9601}, + keywords = {Cryptanalysis} +} + +@PHDTHESIS{GuyeuxThese10, + author = {Christophe Guyeux}, + title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e} + en s\'{e}curit\'{e} informatique}, + school = {Universit\'{e} de Franche-Comt\'{e}}, + year = {2010}, + owner = {christophe}, + timestamp = {2010.12.21} +} + +@MISC{gb11:onp, + author = {Guyeux, Christophe and Bahi, Jacques}, + title = {\'Etude topologique de l'\'etalement de spectre}, + howpublished = {Journ\'ees Codes et St\'eganographie, \'Ecoles Militaires de Saint-Cyr, + Co\"etquidan}, + month = jan, + year = {2011}, + classement = {COM}, + domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, + equipe = {and}, + inhal = {no} +} + +@INPROCEEDINGS{bg10:ip, + author = {Guyeux, Christophe and Bahi, Jacques}, + title = {An improved watermarking algorithm for Internet applications}, + booktitle = {INTERNET'2010. The 2nd Int. Conf. on Evolving Internet}, + year = {2010}, + pages = {119--124}, + address = {Valencia, Spain}, + month = sep, + classement = {ACTI}, + domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, + equipe = {and}, + inhal = {no} +} + +@INPROCEEDINGS{gfb10:ip, + author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques}, + title = {Chaotic iterations versus Spread-spectrum: chaos and stego security}, + booktitle = {IIH-MSP'10, 6-th Int. Conf. on Intelligent Information Hiding and + Multimedia Signal Processing}, + year = {2010}, + pages = {208--211}, + address = {Darmstadt, Germany}, + month = oct, + classement = {ACTI}, + domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, + equipe = {and}, + inhal = {no} +} + +@ARTICLE{friot10, + author = {Christophe Guyeux and Nicolas Friot and Jacques M. Bahi}, + title = {A more secure information hiding scheme than spread-spectrum obtained + by chaos-security}, + journal = {arXiv 0032565}, + year = {2010}, + owner = {guyeux}, + timestamp = {2010.04.30} +} + +@BOOK{ECC, + title = {Guide to Elliptic Curve Cryptography}, + publisher = {Springer Professional Computing}, + year = {2004}, + editor = {Springer}, + author = {D. Hankerson and A. Menezes and S. Vanstone}, + owner = {christophe}, + timestamp = {2010.07.31} +} + +@ARTICLE{Hasegawa1985, + author = {M. Hasegawa and H. Kishino and T. Yano}, + title = {Dating of the human-ape splitting by a molecular clock of mitochondrial + DNA.}, + journal = {J Mol Evol}, + year = {1985}, + volume = {22}, + pages = {160--174}, + number = {2}, + abstract = {A new statistical method for estimating divergence dates of species + from DNA sequence data by a molecular clock approach is developed. + This method takes into account effectively the information contained + in a set of DNA sequence data. The molecular clock of mitochondrial + DNA (mtDNA) was calibrated by setting the date of divergence between + primates and ungulates at the Cretaceous-Tertiary boundary (65 million + years ago), when the extinction of dinosaurs occurred. A generalized + least-squares method was applied in fitting a model to mtDNA sequence + data, and the clock gave dates of 92.3 +/- 11.7, 13.3 +/- 1.5, 10.9 + +/- 1.2, 3.7 +/- 0.6, and 2.7 +/- 0.6 million years ago (where the + second of each pair of numbers is the standard deviation) for the + separation of mouse, gibbon, orangutan, gorilla, and chimpanzee, + respectively, from the line leading to humans. Although there is + some uncertainty in the clock, this dating may pose a problem for + the widely believed hypothesis that the pipedal creature Australopithecus + afarensis, which lived some 3.7 million years ago at Laetoli in Tanzania + and at Hadar in Ethiopia, was ancestral to man and evolved after + the human-ape splitting. Another likelier possibility is that mtDNA + was transferred through hybridization between a proto-human and a + proto-chimpanzee after the former had developed bipedalism.}, + keywords = {Animals; Biological Evolution; DNA, Mitochondrial, genetics; Genes; + Haplorhini, genetics; Humans; Mathematics; Models, Genetic; Nucleic + Acid Hybridization; Primates, genetics; Proteins, genetics; Species + Specificity}, + language = {eng}, + medline-pst = {ppublish}, + owner = {guyeux}, + pmid = {3934395}, + timestamp = {2011.05.05} +} + +@BOOK{R1994, + title = {A First Course in Discrete Dynamical Systems}, + publisher = {Springer-Verlag}, + year = {1994}, + author = {R. Homlgren}, + optpages = {106}, + owner = {guyeux}, + timestamp = {2008.01.02} +} + +@INCOLLECTION{Hoque09, + author = {Hoque, Md. and Chetty, Madhu and Sattar, Abdul}, + title = {Genetic Algorithm in Ab Initio Protein Structure Prediction Using + Low Resolution Model: A Review}, + booktitle = {Biomedical Data and Applications}, + publisher = {Springer Berlin Heidelberg}, + year = {2009}, + editor = {Sidhu, Amandeep and Dillon, Tharam}, + volume = {224}, + series = {Studies in Computational Intelligence}, + pages = {317-342}, + affiliation = {IIIS, Griffith University, Nathan, QLD-4111 Australia} +} + +@CONFERENCE{Houmansadr09, + author = {A. Houmansadr and N. Kiyavash and N. Borisov}, + title = {Rainbow: A robust and invisible non-blind watermark for network flows}, + booktitle = {NDSS’09: 16th Annual Network and Distributed System Security Symposium}, + year = {2009}, + owner = {christophe}, + timestamp = {2010.03.07} +} + +@ARTICLE{Huang, + author = {Huang, Shih-I and Shieh, Shiuhpyng and Tygar, J.}, + title = {Secure encrypted-data aggregation for wireless sensor networks}, + journal = {Wireless Networks}, + abstract = {Abstract\ \ This paper proposes a secure encrypted-data + aggregation scheme for wireless sensor networks. Our design for data + aggregation eliminates redundant sensor readings without using encryption + and maintains data secrecy and privacy during transmission. Conventional + aggregation functions operate when readings are received in plaintext. + If readings are encrypted, aggregation requires decryption creating + extra overhead and key management issues. In contrast to conventional + schemes, our proposed scheme provides security and privacy, and duplicate + instances of original readings will be aggregated into a single packet. + Our scheme is resilient to known-plaintext attacks, chosen-plaintext + attacks, ciphertext-only attacks and man-in-the-middle attacks. Our + experiments show that our proposed aggregation method significantly + reduces communication overhead and can be practically implemented + in on-the-shelf sensor platforms.}, + citeulike-article-id = {4499496}, + citeulike-linkout-0 = {http://dx.doi.org/10.1007/s11276-009-0177-y}, + citeulike-linkout-1 = {http://www.springerlink.com/content/g573138072642u63}, + doi = {10.1007/s11276-009-0177-y}, + posted-at = {2009-05-10 09:55:44}, + url = {http://dx.doi.org/10.1007/s11276-009-0177-y} +} + +@ARTICLE{Huang10, + author = {Huang, Shih-I and Shieh, Shiuhpyng and Tygar, J. D.}, + title = {Secure encrypted-data aggregation for wireless sensor networks}, + journal = {Wirel. Netw.}, + year = {2010}, + volume = {16}, + pages = {915--927}, + number = {4}, + address = {Hingham, MA, USA}, + doi = {http://dx.doi.org/10.1007/s11276-009-0177-y}, + issn = {1022-0038}, + publisher = {Kluwer Academic Publishers} +} + +@ARTICLE{W.2001, + author = {W. Huang and X. Ye}, + title = {Homeomorphisms with the whole compacta being scrambled sets}, + journal = {Ergod. Th. Dynam. Systems}, + year = {2001}, + optnumber = {1}, + optpages = {77-91}, + optvolume = {21}, + owner = {guyeux}, + timestamp = {2008.01.02} +} + +@ARTICLE{Hurley1982, + author = {M. Hurley}, + title = {Attractors, persistence and density of their bassin}, + journal = {Transactions of AMS}, + year = {1982}, + optpages = {247-271}, + optvolume = {269}, + owner = {guyeux}, + timestamp = {2008.01.02} +} + +@INPROCEEDINGS{Islam:2009:NMA:1695134.1695181, + author = {Islam, Md. Kamrul and Chetty, Madhu}, + title = {Novel Memetic Algorithm for Protein Structure Prediction}, + booktitle = {Proceedings of the 22nd Australasian Joint Conference on Advances + in Artificial Intelligence}, + year = {2009}, + series = {AI '09}, + pages = {412--421}, + address = {Berlin, Heidelberg}, + publisher = {Springer-Verlag}, + acmid = {1695181}, + isbn = {978-3-642-10438-1}, + keywords = {Guided search space, Memetic Algorithm, Modified fitness function, + Pair-wise-interchange, Schema preservation, Tabu Search}, + location = {Melbourne, Australia}, + numpages = {10} +} + +@PHDTHESIS{Jacquemard77, + author = {C. Jacquemard}, + title = {Contribution à l'étude d'algorithmes à convergence monotone}, + school = {Université de Franche-Comté}, + year = {1977}, + owner = {christophe}, + timestamp = {2010.08.25} +} + +@BOOK{Jukes69, + title = {{Evolution of Protein Molecules}}, + publisher = {Academy Press}, + year = {1969}, + editor = {Munro, H. N.}, + author = {Jukes, T. H. and Cantor, C. R.}, + booktitle = {Evolution of Protein Molecules}, + citeulike-article-id = {1673661}, + keywords = {compbio, fresco}, + posted-at = {2007-09-19 06:23:18}, + priority = {2} +} + +@INPROCEEDINGS{Kalker2001, + author = {Kalker, T.}, + title = {Considerations on watermarking security}, + year = {2001}, + pages = {201--206}, + abstract = {In this paper we address the usually implicit assumption that digital + watermarking has as its main target copyright and copy protection + applications. From these target applications a great many conclusions + are drawn about the required security of a watermarking system, and + in fact, a considerably percentage of the watermarking literature + has this very topic as its main focus of attention. In this paper + we take a step back, and try to do a more careful analysis of the + 'watermarking-is-for-security-applications' paradigm. The intention + of this paper is to discuss the meaning of the concept security in + the context of watermarking, and try to show that one has to be careful + in using analogies from the related field of cryptography}, + citeulike-article-id = {1226513}, + journal = {2001 IEEE Fourth Workshop on Multimedia Signal Processing}, + keywords = {security, wateramarking}, + owner = {guyeux}, + posted-at = {2007-04-14 14:30:06}, + priority = {2}, + timestamp = {2009.06.30} +} + +@ARTICLE{Kerckhoffs83, + author = {Kerckhoffs, Auguste}, + title = {La cryptographie militaire}, + journal = {Journal des sciences militaires}, + year = {1883}, + volume = {IX}, + pages = {5--83}, + month = {January}, + abstract = {pp. 161–191, Feb. 1883.}, + citeulike-article-id = {505508}, + keywords = {cryptography, master}, + owner = {guyeux}, + posted-at = {2006-02-15 04:49:15}, + priority = {2}, + timestamp = {2009.06.30} +} + +@ARTICLE{Kimura80, + author = {Kimura, Motoo}, + title = {A simple method for estimating evolutionary rates of base substitutions + through comparative studies of nucleotide sequences}, + journal = {Journal of Molecular Evolution}, + year = {1980}, + volume = {16}, + pages = {111-120}, + note = {10.1007/BF01731581}, + affiliation = {National Institute of Genetics 411 Mishima Japan}, + issn = {0022-2844}, + issue = {2}, + keyword = {Biomedical and Life Sciences}, + publisher = {Springer New York}, + url = {http://dx.doi.org/10.1007/BF01731581} +} + +@ARTICLE{Knudsen94, + author = {Knudsen}, + title = {Chaos Without Nonperiodicity}, + journal = {Amer. Math. Monthly}, + year = {1994}, + volume = {101}, + owner = {guyeux}, + timestamp = {27/01/2008} +} + +@PHDTHESIS{Knudsen1994a, + author = {C. Knudsen}, + title = {Aspects of noninvertible dynamics and chaos}, + school = {Technical University of Denmark}, + year = {1994}, + owner = {guyeux}, + timestamp = {2008.01.02} +} + +@ARTICLE{Kocarev06, + author = {L. Kocarev and J. Szczepanski and J.M. Amigo and I. Tomovski}, + title = {Discrete Chaos - I: Theory}, + journal = {IEEE Trans. on Circuits Systems}, + year = {2006}, + volume = {53}, + pages = {1300-1309}, + owner = {christophe}, + timestamp = {2010.10.10} +} + +@INPROCEEDINGS{Kocher95cryptanalysisof, + author = {Paul C. Kocher}, + title = {Cryptanalysis of Diffie-Hellman, RSA, DSS, and Other Systems Using + Timing Attacks (Extended Abstract)}, + booktitle = {Advances in Cryptology, CRYPTO '95: 15th Annual International Cryptology + Conference}, + year = {1995}, + pages = {27--31}, + publisher = {Springer-Verlag} +} + +@ARTICLE{Kullback1951, + author = {Kullback, Solomon and Leibler, Richard A.}, + title = {On Information and Sufficiency}, + journal = {The Annals of Mathematical Statistics}, + year = {1951}, + volume = {22}, + pages = {79--86}, + number = {1}, + citeulike-article-id = {3245942}, + keywords = {file-import-08-09-12}, + owner = {guyeux}, + posted-at = {2008-09-12 14:30:37}, + priority = {2}, + timestamp = {2009.06.29} +} + +@MISC{ledoux, + author = {Eshter Ledoux}, + title = {Introduction à la théorie du chaos}, + year = {2002}, + note = {[En ligne; Page disponible le 12-août-2010]}, + url = {\url{http://www.nux.be/eledoux/mem/node1.html}} +} + +@BOOK{Lehning1997, + title = {Analyse en dimension finie}, + publisher = {Masson}, + year = {1997}, + author = {Lehning}, + optpages = {28}, + optvolume = {4}, + owner = {guyeux}, + timestamp = {2008.01.02} +} + +@ARTICLE{Lenstra01, + author = {A.K. Lenstra and E.R. Verheul}, + title = {Selecting Cryptographic Key Sizes}, + journal = {Jour. of the International Association for Cryptologic Research}, + year = {2001}, + volume = {14}, + pages = {255-293}, + number = {4} +} + +@ARTICLE{Pitts59, + author = {Lettvin, J.Y. and Maturana, H.R. and McCulloch, W.S. and Pitts, W.H.}, + title = {What the Frog's Eye Tells the Frog's Brain}, + journal = {Proceedings of the IRE}, + year = {1959}, + volume = {47}, + pages = {1940--51}, + number = {11}, + owner = {christophe}, + timestamp = {2010.12.21} +} + +@ARTICLE{Li75, + author = {T. Y. Li and J. A. Yorke}, + title = {Period three implies chaos}, + journal = {Amer. Math. Monthly}, + year = {1975}, + volume = {82}, + pages = {985--992}, + number = {10}, + owner = {guyeux}, + timestamp = {27/01/2008} +} + +@ARTICLE{Xiao10, + author = {Li, Yantao and Deng, Shaojiang and Xiao, Di}, + title = {A novel Hash algorithm construction based on chaotic neural network}, + journal = {Neural Computing and Applications}, + year = {2010}, + pages = {1-9}, + affiliation = {Chongqing University College of Computer Science 400044 Chongqing + China}, + issn = {0941-0643}, + keyword = {Computer Science}, + publisher = {Springer London} +} + +@INPROCEEDINGS{Lin09, + author = {Lin, Hua-Yi and Chiang, Tzu-Chiang}, + title = {Cooperative secure data aggregation in sensor networks using elliptic + curve based cryptosystems}, + booktitle = {CDVE'09: Proceedings of the 6th international conference on Cooperative + design, visualization, and engineering}, + year = {2009}, + pages = {384--387}, + address = {Berlin, Heidelberg}, + publisher = {Springer-Verlag}, + isbn = {3-642-04264-3, 978-3-642-04264-5}, + location = {Luxembourg, Luxembourg} +} + +@INPROCEEDINGS{Liu2008, + author = {Liu, An and Ning, Peng}, + title = {TinyECC: A Configurable Library for Elliptic Curve Cryptography in + Wireless Sensor Networks}, + booktitle = {7th International Conference on Information Processing in Sensor + Networks (IPSN 2008)}, + year = {2008}, + pages = {245--256}, + month = {April}, + citeulike-article-id = {3041699}, + howpublished = {SPOTS Track}, + keywords = {hagg}, + posted-at = {2008-07-25 05:25:05}, + priority = {2} +} + +@ARTICLE{Liu2007bis, + author = {Shao-Hui Liu and Hong-Xun Yao and Wen Gao and Yong-Liang Liu}, + title = {An image fragile watermark scheme based on chaotic image pattern + and pixel-pairs}, + journal = {Applied Mathematics and Computation}, + year = {2007}, + volume = {185}, + pages = {869-882}, + owner = {guyeux}, + timestamp = {2008.10.07} +} + +@INPROCEEDINGS{Liu07, + author = {Liu, Zhen and Xi, Lifeng}, + title = {Image Information Hiding Encryption Using Chaotic Sequence}, + booktitle = {KES '07: Knowledge-Based Intelligent Information and Engineering + Systems and the XVII Italian Workshop on Neural Networks on Proceedings + of the 11th International Conference}, + year = {2007}, + pages = {202--208}, + address = {Berlin, Heidelberg}, + publisher = {Springer-Verlag}, + doi = {http://dx.doi.org/10.1007/978-3-540-74827-4_26}, + isbn = {978-3-540-74826-7}, + location = {Vietri sul Mare, Italy} +} + +@ARTICLE{Liu2007, + author = {Zhen Liu and Lifeng Xi}, + title = {Image Information Hiding Encryption Using Chaotic Sequence}, + journal = {LNAI}, + year = {2007}, + volume = {4693}, + pages = {202-208}, + owner = {guyeux}, + timestamp = {11/04/2008} +} + +@ARTICLE{Lubachevsky86, + author = {Lubachevsky, Boris and Mitra, Debasis}, + title = {A chaotic asynchronous algorithm for computing the fixed point of + a nonnegative matrix of unit spectral radius}, + journal = {J. ACM}, + year = {1986}, + volume = {33}, + pages = {130--150}, + number = {1}, + address = {New York, NY, USA}, + doi = {http://doi.acm.org/10.1145/4904.4801}, + issn = {0004-5411}, + publisher = {ACM} +} + +@ARTICLE{Larger10, + author = {{L}arger, {L}. and {D}udley, {J}.{M}.}, + title = { {N}onlinear dynamics {O}ptoelectronic chaos}, + journal = {{N}ature }, + year = {2010}, + volume = {465 }, + pages = {41-42 }, + number = {7294 }, + month = {05}, + abstract = {{O}ptoelectronic circuits with delayed feedback provide a convenient + bench-top platform to study a wide range of nonlinear dynamic systems, + from ultrastable clocks to complex chaotic devices.}, + affiliation = {{F}ranche-{C}omt{\'e} {\'E}lectronique {M}{\'e}canique, {T}hermique + et {O}ptique - {S}ciences et {T}echnologies - {FEMTO}-{ST} - {CNRS} + : {UMR}6174 - {U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {U}niversit{\'e} + de {T}echnologie de {B}elfort-{M}ontbeliard - {E}cole {N}ationale + {S}up{\'e}rieure de {M}{\'e}canique et des {M}icrotechniques }, + audience = {internationale }, + day = {05}, + doi = {10.1038/465041a }, + hal_id = {hal-00517696}, + language = {{A}nglais}, + url = {http://hal.archives-ouvertes.fr/hal-00517696/en/} +} + +@INPROCEEDINGS{Mahoney00, + author = {Mahoney, Matthew V.}, + title = {Fast Text Compression with Neural Networks}, + booktitle = {Proceedings of the Thirteenth International Florida Artificial Intelligence + Research Society Conference}, + year = {2000}, + pages = {230--234}, + publisher = {AAAI Press}, + acmid = {707654}, + isbn = {1-57735-113-4}, + numpages = {5} +} + +@INPROCEEDINGS{msp10:bl, + author = {Makhoul, Abdallah and Saadi, Rachid and Pham, Congduc}, + title = {Risk Management in Intrusion Detection Applications with Wireless + Video Sensor Networks}, + booktitle = {WCNC'10 IEEE Int. Conf.}, + year = {2010}, + pages = {***--***}, + address = {Sydney, Australia}, + month = apr, + note = {To appear}, + classement = {*}, + equipe = {and}, + inhal = {no} +} + +@ARTICLE{Malvar03, + author = {H.S. Malvar and D. Florêncio}, + title = {Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking}, + journal = {IEEE Trans. Signal Proceeding}, + year = {2003}, + volume = {53}, + pages = {898--905}, + owner = {christophe}, + timestamp = {2010.03.07} +} + +@ARTICLE{Marsaglia2003, + author = {G. Marsaglia}, + title = {Xorshift RNGs}, + journal = {Journal of Statistical Software}, + year = {2003}, + volume = {8(14)}, + pages = {1--6}, + owner = {qianxue}, + timestamp = {2009.10.28} +} + +@ARTICLE{Marsaglia1996, + author = {G. Marsaglia}, + title = {DIEHARD: a battery of tests of randomness.}, + journal = {http://stat.fsu.edu/~geo/diehard.html}, + year = {1996}, + owner = {qianxue}, + timestamp = {2009.11.09} +} + +@ARTICLE{DefiningChaos, + author = {M. Martelli and M. Dang and T. Seph}, + title = {Defining chaos}, + journal = {Mathematics Magazine}, + year = {1998}, + volume = {71}, + pages = {112--122}, + owner = {christophe}, + timestamp = {2010.08.11} +} + +@ARTICLE{Michel2007c, + author = {Christian J Michel}, + title = {An analytical model of gene evolution with 9 mutation parameters: + an application to the amino acids coded by the common circular code.}, + journal = {Bull Math Biol}, + year = {2007}, + volume = {69}, + pages = {677--698}, + number = {2}, + month = {Feb}, + abstract = {We develop here an analytical evolutionary model based on a trinucleotide + mutation matrix 64 x 64 with nine substitution parameters associated + with the three types of substitutions in the three trinucleotide + sites. It generalizes the previous models based on the nucleotide + mutation matrices 4 x 4 and the trinucleotide mutation matrix 64 + x 64 with three and six parameters. It determines at some time t + the exact occurrence probabilities of trinucleotides mutating randomly + according to these nine substitution parameters. An application of + this model allows an evolutionary study of the common circular code + [Formula: see text] of eukaryotes and prokaryotes and its 12 coded + amino acids. The main property of this code [Formula: see text] is + the retrieval of the reading frames in genes, both locally, i.e. + anywhere in genes and in particular without a start codon, and automatically + with a window of a few nucleotides. However, since its identification + in 1996, amino acid information coded by [Formula: see text] has + never been studied. Very unexpectedly, this evolutionary model demonstrates + that random substitutions in this code [Formula: see text] and with + particular values for the nine substitutions parameters retrieve + after a certain time of evolution a frequency distribution of these + 12 amino acids very close to the one coded by the actual genes.}, + doi = {10.1007/s11538-006-9147-z}, + institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université + Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant, + 67400 Illkirch, France. michel@dpt-info.u-strasbg.fr}, + keywords = {Amino Acids, genetics; Codon, genetics; Eukaryotic Cells; Evolution, + Molecular; Models, Genetic; Prokaryotic Cells}, + language = {eng}, + medline-pst = {ppublish}, + owner = {guyeux}, + pmid = {16952018}, + timestamp = {2011.05.05}, + url = {http://dx.doi.org/10.1007/s11538-006-9147-z} +} + +@ARTICLE{Miellou75, + author = {J.-C. Miellou}, + title = {Algorithmes de relaxation chaotique \`{a} retards}, + journal = {Rairo}, + year = {1975}, + volume = {R1}, + pages = {148-162}, + owner = {guyeux}, + timestamp = {2008.05.22} +} + +@ARTICLE{Miellou75b, + author = {Miellou, J.-C.}, + title = {Itérations chaotiques à retards, étude de la convergence dans le + cas d'espaces partiellement ordonnés}, + journal = {C.R.A.S. Paris}, + year = {1975}, + volume = {280}, + pages = {233--236}, + owner = {christophe}, + timestamp = {2010.08.17} +} + +@ARTICLE{Spiteri85, + author = {Jean-Claude Miellou and Pierre Spitéri}, + title = {Un critère de convergence pour des méthodes générales de point fixe}, + journal = {Rairo -- Modélisation mathématique et analyse numérique}, + year = {1985}, + volume = {19}, + pages = {645--669}, + number = {4}, + owner = {christophe}, + timestamp = {2010.10.13} +} + +@ARTICLE{Mooney08, + author = {Aidan Mooney and John G. Keating and Ioannis Pitas}, + title = {A comparative study of chaotic and white noise signals in digital + watermarking}, + journal = {Chaos, Solitons and Fractals}, + year = {2008}, + volume = {35}, + pages = {913-921}, + owner = {christophe}, + timestamp = {2010.03.01} +} + +@ARTICLE{Nakashima2003, + author = {Nakashima, Y. and Tachibana, R. and Babaguchi, N.}, + title = {Watermarked Movie Soundtrack Finds the Position of the Camcorder + in a Theater}, + journal = {IEEE Transactions on Multimedia}, + year = {2009}, + note = {Accepted for future publication Multimedia} +} + +@INCOLLECTION{springerlink:10.1007/978-3-642-04431-1_16, + author = {Nelson, Michael and Nahapetian, Ani and Koushanfar, Farinaz and Potkonjak, + Miodrag}, + title = {SVD-Based Ghost Circuitry Detection}, + booktitle = {Information Hiding}, + publisher = {Springer Berlin / Heidelberg}, + year = {2009}, + editor = {Katzenbeisser, Stefan and Sadeghi, Ahmad-Reza}, + volume = {5806}, + series = {Lecture Notes in Computer Science}, + pages = {221-234}, + note = {10.1007/978-3-642-04431-1_16}, + affiliation = {Computer Science Department, UCLA, Los Angeles, CA 90095, USA}, + url = {http://dx.doi.org/10.1007/978-3-642-04431-1_16} +} + +@INPROCEEDINGS{Perez-Hernandez09, + author = {P\'{e}rez-Hern\'{a}ndez, Luis Germ\'{a}n and Rodr\'{\i}guez-V\'{a}zquez, + Katya and Gardu\~{n}o-Ju\'{a}rez, Ram\'{o}n}, + title = {Parallel particle swarm optimization applied to the protein folding + problem}, + booktitle = {Proceedings of the 11th Annual conference on Genetic and evolutionary + computation}, + year = {2009}, + series = {GECCO '09}, + pages = {1791--1792}, + address = {New York, NY, USA}, + publisher = {ACM}, + acmid = {1570163}, + isbn = {978-1-60558-325-9}, + keywords = {bioinformatics, biology and chemistry, combinatorial optimization, + parallelization, swarm intelligence}, + location = {Montreal, Qu\&\#233;bec, Canada}, + numpages = {2} +} + +@PHDTHESIS{Pellegrin1986, + author = {D. Pellegrin}, + title = {Algorithmique discr\`{e}te et r\'{e}seaux d'automates}, + school = {Grenoble}, + year = {1986}, + owner = {guyeux}, + timestamp = {2008.05.22} +} + +@ARTICLE{Peng2005, + author = {F. Peng and S.-S. Qiu and M. Long}, + title = {One way Hash function construction based on two-dimensional hyperchaotic + mappings}, + journal = {Acta Phys. Sinici.}, + year = {2005}, + volume = {54}, + pages = {98--104}, + owner = {guyeux}, + timestamp = {2009.01.16} +} + +@INPROCEEDINGS{Perez06, + author = {Luis Perez-Freire and F. Pérez-gonzalez and Pedro Comesaña}, + title = {Secret Dither Estimation in Lattice-Quantization Data Hiding: A Set-Membership + Approach}, + booktitle = {Security, Steganography, and Watermarking of Multimedia Contents}, + year = {2006}, + editor = {Edward J. Delp and Ping W. Wong}, + address = {San Jose, California, USA}, + month = {January}, + organization = {SPIE}, + owner = {guyeux}, + timestamp = {2009.06.30} +} + +@INPROCEEDINGS{Perez-Freire06, + author = {Luis Perez-Freire and Pedro Comesana and Juan Ramon Troncoso-Pastoriza + and Fernando Perez-Gonzalez}, + title = {Watermarking Security: a Survey}, + booktitle = {LNCS Transactions on Data Hiding and Multimedia Security}, + year = {2006}, + owner = {guyeux}, + timestamp = {2009.06.29} +} + +@PROCEEDINGS{Peter07, + title = {On Concealed Data Aggregation for WSNs}, + year = {2007}, + author = {Peter, Steffen and Piotrowski, Krzysztof and Langendoerfer, Peter}, + booktitle = {Consumer Communications and Networking Conference, 2007. CCNC 2007. + 4th IEEE}, + citeulike-article-id = {2281643}, + citeulike-linkout-0 = {http://dx.doi.org/10.1109/CCNC.2007.45}, + citeulike-linkout-1 = {http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=4199133}, + doi = {10.1109/CCNC.2007.45}, + journal = {Consumer Communications and Networking Conference, 2007. CCNC 2007. + 4th IEEE}, + keywords = {hagg}, + pages = {192--196}, + posted-at = {2008-01-23 19:36:19}, + priority = {3}, + url = {http://dx.doi.org/10.1109/CCNC.2007.45} +} + +@ARTICLE{pms11:ij, + author = {Pham, Congduc and Makhoul, Abdallah and Saadi, Rachid}, + title = {Risk-based Adaptive Scheduling in Randomly Deployed Video Sensor + Networks for Critical Surveillance Applications}, + journal = {Journal of Network and Computer Applications}, + year = {2011}, + volume = {*}, + pages = {***--***}, + number = {*}, + note = {Accepted manuscript. To appear}, + classement = {ACLI}, + equipe = {and}, + impact-factor = {1.111}, + inhal = {no}, + isi-acro = {J NETW COMPU APPL}, + publisher = {Springer} +} + +@MISC{Poe, + author = {Edgar Alan Poe}, + title = {The Raven}, + month = {April}, + year = {1839}, + note = {American Museum (Baltimore)}, + owner = {christophe}, + timestamp = {2010.11.23} +} + +@ARTICLE{Perez-Freire2006:Security, + author = {L. P{\'e}rez-Freire and F. P{\'e}rez-González and T. Furon and P. + Comesaña}, + title = {Security of lattice-based data hiding against the known message attack}, + journal = {IEEE Trans. on Information Forensics and Security}, + year = {2006}, + volume = {1}, + pages = {421-439}, + number = {4}, + month = {dec}, + owner = {guyeux}, + timestamp = {2009.12.06} +} + +@MISC{Quisquater02sidechannel, + author = {J-J. Quisquater and D. Samyde and Université Catholique De Louvain + and Groupe Crypto}, + title = {Side Channel Cryptanalysis}, + year = {2002} +} + +@ARTICLE{Raynal2001, + author = {Frédéric Raynal and Fabien A. P. Petitcolas and Caroline Fontaine}, + title = {Evaluation automatique des méthodes de tatouage}, + journal = {Traitement du signal}, + year = {2001}, + volume = {18}, + pages = {271-282}, + owner = {guyeux}, + timestamp = {2008.05.21} +} + +@MISC{rijmen05, + author = {Vincent Rijmen and Elisabeth Oswald}, + title = {Update on SHA-1}, + howpublished = {Cryptology ePrint Archive, Report 2005/010}, + year = {2005}, + note = {\url{http://eprint.iacr.org/}} +} + +@BOOK{Robert, + title = {Discrete Iterations, a Metric Study}, + publisher = {Springer-Verlag}, + year = {1986}, + editor = {Berlin Heidelberg New-York}, + author = {François Robert}, + volume = {6}, + series = {Series in Computational Mathematics} +} + +@BOOK{Robert1986, + title = {Discrete Iterations: A Metric Study}, + year = {1986}, + editor = {Springer-Verlag}, + author = {F. Robert}, + volume = {6}, + series = {Springer Series in Computational Mathematics}, + owner = {guyeux}, + timestamp = {17/02/2008} +} + +@ARTICLE{Rudenko08, + author = {Rudenko, O. and Snytkin, M.}, + title = {Image compression based on the neural network art}, + journal = {Cybernetics and Systems Analysis}, + year = {2008}, + volume = {44}, + pages = {797-802}, + affiliation = {Kharkov National University of Radio Electronics Kharkov Ukraine}, + issn = {1060-0396}, + issue = {6}, + keyword = {Computer Science}, + publisher = {Springer New York} +} + +@PHDTHESIS{Ruette2001, + author = {Sylvie Ruette}, + title = {Chaos en dynamique topologique, en particulier sur l'intervalle, + mesures d'entropie maximale}, + school = {Université d'Aix-Marseille II}, + year = {2001}, + optmonth = {Novembre}, + owner = {guyeux}, + timestamp = {2008.01.02} +} + +@MASTERSTHESIS{Saulnier02, + author = {Boris Saulnier}, + title = {Entropie topologique}, + school = {DEA Sémantique, Preuves et Langages, Paris 7}, + year = {2002}, + owner = {christophe}, + timestamp = {2010.08.12} +} + +@ARTICLE{Schmitz2001, + author = {Roland Schmitz}, + title = {Use of chaotic dynamical systems in cryptography}, + journal = {Journal of Franklin Institute}, + year = {2001}, + volume = {338}, + pages = {429-441}, + owner = {guyeux}, + timestamp = {17/02/2008} +} + +@BOOK{Schwartz80, + title = {Analyse: topologie g\'{e}n\'{e}rale et analyse fonctionnelle}, + publisher = {Hermann}, + year = {1980}, + editor = {Hermann}, + author = {Laurent Schwartz}, + owner = {christophe}, + timestamp = {2010.09.15} +} + +@ARTICLE{Shannon49, + author = {Shannon, Claude E.}, + title = {Communication Theory of Secrecy Systems}, + journal = {Bell Systems Technical Journal}, + year = {1949}, + volume = {28}, + pages = {656--715}, + citeulike-article-id = {507362}, + keywords = {master, secrecy\_systems, teoria-informacao, theory\_communication, + theory\_cryptography}, + owner = {guyeux}, + posted-at = {2006-02-16 23:24:09}, + priority = {2}, + timestamp = {2009.06.29} +} + +@ARTICLE{Shmygelska05, + author = {Shmygelska, Alena and Hoos, Holger}, + title = {An ant colony optimisation algorithm for the 2D and 3D hydrophobic + polar protein folding problem}, + journal = {BMC Bioinformatics}, + year = {2005}, + volume = {6}, + pages = {30}, + number = {1}, + abstract = {BACKGROUND:The protein folding problem is a fundamental problems in + computational molecular biology and biochemical physics. Various + optimisation methods have been applied to formulations of the ab-initio + folding problem that are based on reduced models of protein structure, + including Monte Carlo methods, Evolutionary Algorithms, Tabu Search + and hybrid approaches. In our work, we have introduced an ant colony + optimisation (ACO) algorithm to address the non-deterministic polynomial-time + hard (NP-hard) combinatorial problem of predicting a protein's conformation + from its amino acid sequence under a widely studied, conceptually + simple model - the 2-dimensional (2D) and 3-dimensional (3D) hydrophobic-polar + (HP) model.RESULTS:We present an improvement of our previous ACO + algorithm for the 2D HP model and its extension to the 3D HP model. + We show that this new algorithm, dubbed ACO-HPPFP-3, performs better + than previous state-of-the-art algorithms on sequences whose native + conformations do not contain structural nuclei (parts of the native + fold that predominantly consist of local interactions) at the ends, + but rather in the middle of the sequence, and that it generally finds + a more diverse set of native conformations.CONCLUSIONS:The application + of ACO to this bioinformatics problem compares favourably with specialised, + state-of-the-art methods for the 2D and 3D HP protein folding problem; + our empirical results indicate that our rather simple ACO algorithm + scales worse with sequence length but usually finds a more diverse + ensemble of native states. Therefore the development of ACO algorithms + for more complex and realistic models of protein structure holds + significant promise.}, + doi = {10.1186/1471-2105-6-30}, + issn = {1471-2105}, + pubmedid = {15710037} +} + +@OTHER{Shmygelska2005Feb, + __markedentry = {[christophe]}, + abstract = {Abstract Background The protein folding problem is a fundamental problems + in computational molecular biology and biochemical physics. Various + optimisation methods have been applied to formulations of the ab-initio + folding problem that are based on reduced models of protein structure, + including Monte Carlo methods, Evolutionary Algorithms, Tabu Search + and hybrid approaches. In our work, we have introduced an ant colony + optimisation (ACO) algorithm to address the non-deterministic polynomial-time + hard (NP-hard) combinatorial problem of predicting a protein's conformation + from its amino acid sequence under a widely studied, conceptually + simple model – the 2-dimensional (2D) and 3-dimensional (3D) hydrophobic-polar + (HP) model. Results We present an improvement of our previous ACO + algorithm for the 2D HP model and its extension to the 3D HP model. + We show that this new algorithm, dubbed ACO-HPPFP-3, performs better + than previous state-of-the-art algorithms on sequences whose native + conformations do not contain structural nuclei (parts of the native + fold that predominantly consist of local interactions) at the ends, + but rather in the middle of the sequence, and that it generally finds + a more diverse set of native conformations. Conclusions The application + of ACO to this bioinformatics problem compares favourably with specialised, + state-of-the-art methods for the 2D and 3D HP protein folding problem; + our empirical results indicate that our rather simple ACO algorithm + scales worse with sequence length but usually finds a more diverse + ensemble of native states. Therefore the development of ACO algorithms + for more complex and realistic models of protein structure holds + significant promise.}, + author = {Shmygelska, Alena and Hoos, Holger H}, + journal = {BMC Bioinformatics. 2005 Feb 14}, + number = {1}, + owner = {christophe}, + pages = {30}, + timestamp = {2011.01.24}, + title = {An ant colony optimisation algorithm for the 2D and 3D hydrophobic + polar protein folding problem}, + volume = {6}, + year = {2005 Feb} +} + +@ARTICLE{Shujun1, + author = {Li Shujun and Li Qi and Li Wenmin and Mou Xuanqin and Cai Yuanlong}, + title = {Statistical Properties of Digital Piecewise Linear Chaotic Maps and + Their Roles in Cryptography and Pseudo-Random Coding}, + journal = {Proceedings of the 8th IMA International Conference on Cryptography + and Coding}, + year = {2001}, + volume = {1}, + pages = {205--221}, + owner = {christophe}, + timestamp = {2010.03.06} +} + +@INPROCEEDINGS{Simmons83, + author = {Gustavus J. Simmons}, + title = {The Prisoners' Problem and the Subliminal Channel}, + booktitle = {Advances in Cryptology, Proc. CRYPTO'83}, + year = {1984}, + pages = {51--67}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + owner = {guyeux}, + timestamp = {2009.06.29} +} + +@ARTICLE{Solak2004389, + author = {Ercan Solak}, + title = {On the security of a class of discrete-time chaotic cryptosystems}, + journal = {Physics Letters A}, + year = {2004}, + volume = {320}, + pages = {389 - 395}, + number = {5-6}, + doi = {DOI: 10.1016/j.physleta.2003.11.008}, + issn = {0375-9601}, + keywords = {Communication using chaos}, + owner = {guyeux}, + timestamp = {2009.12.12}, + url = {http://www.sciencedirect.com/science/article/B6TVM-4B22RC9-2/2/99a0af737c9b6ba8af47ae4d3c7a326d} +} + +@PHDTHESIS{Spiteri74, + author = {Pierre Spitéri}, + title = {Contribution à l'étude de la stabilite au sens de liapounov de certains + systemes differentiels non lineaires}, + school = {Université de Franche-Comté}, + year = {1974}, + owner = {christophe}, + timestamp = {2010.10.13} +} + +@BOOK{Stewart1989, + title = {Does God Play Dices ?: the mathematics of chaos}, + publisher = {Penguin}, + year = {1989}, + author = {Ian Stewart}, + owner = {guyeux}, + timestamp = {2008.01.02} +} + +@BOOK{Stinson02, + title = {Cryptography: Theory and Practice, Second Edition}, + publisher = {{Chapman \& Hall/CRC}}, + year = {2002}, + author = {Stinson, Douglas R.}, + month = {February}, + abstract = {{Douglas R. Stinson's Cryptography: Theory and Practice is + a mathematically intensive examination of cryptography, including + ciphers, the Data Encryption Standard (DES), public key cryptography, + one-way hash functions, and digital signatures. Stinson's explication + of "zero-sum proofs"--a process by which one person lets another + person know that he or she has a password without actually revealing + any information--is especially good.

If you are new to the math + behind cryptography but want to tackle it, the author covers all + of the required background to understand the real mathematics here. + Cryptography includes extensive exercises with each chapter + and makes an ideal introduction for any math-literate person willing + to get acquainted with this material.} {

Major advances over the + last five years precipitated this major revision of the bestselling + Cryptography: Theory and Practice. With more than 40 percent new + or updated material, the second edition now provides an even more + comprehensive treatment of modern cryptography. It focuses on the + new Advanced Encryption Standards and features an entirely new chapter + on that subject. Another new chapter explores the applications of + secret sharing schemes, including ramp schemes, visual cryptography, + threshold cryptography, and broadcast encryption. This is an ideal + introductory text for both computer science and mathematics students + and a valuable reference for professionals.

}}, + citeulike-article-id = {2401855}, + day = {27}, + howpublished = {Hardcover}, + isbn = {1584882069}, + keywords = {security}, + posted-at = {2008-02-20 08:28:49}, + priority = {0}, + url = {http://www.amazon.com/exec/obidos/redirect?tag=citeulike07-20\&path=ASIN/1584882069} +} + +@INPROCEEDINGS{Takana90, + author = {K. Tanaka and Y. Nakamura and K. Matsui}, + title = {Embedding Secret Information into a Dithered Multi-level Image}, + booktitle = {IEEE Military Communications Conference}, + year = {1990}, + owner = {christophe}, + timestamp = {2010.08.05} +} + +@PHDTHESIS{ElTarazi81, + author = {M. N. El Tarazi}, + title = {Contraction et ordre partiel pour l'étude d'algorithmes synchrones + et asynchrones en analyse numérique}, + school = {Faculté des Sciences et Techniques de l'Université de Franche-Comté, + Besançon}, + year = {1981}, + owner = {christophe}, + timestamp = {2010.08.17} +} + +@INPROCEEDINGS{Unger93, + author = {Unger, Ron and Moult, John}, + title = {Genetic Algorithm for 3D Protein Folding Simulations}, + booktitle = {Proceedings of the 5th International Conference on Genetic Algorithms}, + year = {1993}, + pages = {581--588}, + address = {San Francisco, CA, USA}, + publisher = {Morgan Kaufmann Publishers Inc.}, + acmid = {657747}, + isbn = {1-55860-299-2}, + numpages = {8} +} + +@MISC{Van93electronicwater, + author = {Tirkel Rankin Van}, + title = {Electronic Water Mark}, + year = {1993} +} + +@ARTICLE{Venkatesan2007397, + author = {R.C. Venkatesan}, + title = {Encryption of covert information into multiple statistical distributions}, + journal = {Physics Letters A}, + year = {2007}, + volume = {370}, + pages = {397 - 404}, + number = {5-6}, + doi = {DOI: 10.1016/j.physleta.2007.05.117}, + issn = {0375-9601}, + keywords = {Statistical encryption/decryption}, + owner = {guyeux}, + timestamp = {2009.12.12}, + url = {http://www.sciencedirect.com/science/article/B6TVM-4P4FV2M-1/2/cd11a2ec144526e3c4552d2a7e7906cc} +} + +@ARTICLE{pitas, + author = {G. Voyatzis and I. Pitas}, + title = {Chaotic watermarks for embedding in the spatial digital image domain}, + journal = {Proceedings of IEEE ICIP}, + year = {1998}, + volume = {2}, + pages = {432-436}, + owner = {christophe}, + timestamp = {2010.03.06} +} + +@INCOLLECTION{Wagner03, + author = {Wagner, David}, + title = {Cryptanalysis of an Algebraic Privacy Homomorphism}, + booktitle = {Information Security}, + publisher = {Springer Berlin, Heidelberg}, + year = {2003}, + volume = {2851}, + series = {Lecture Notes in Computer Science}, + pages = {234-239}, + abstract = {We use linear algebra to show that an algebraic privacy homomorphism + proposed by Domingo-Ferrer is insecure for some parameter settings.}, + affiliation = {University of California, Berkeley USA} +} + +@INPROCEEDINGS{Wagner03cryptanalysisof, + author = {David Wagner}, + title = {Cryptanalysis of an Algebraic Privacy Homomorphism}, + booktitle = {Proc. Sixth Information Security Conf. (ISC03}, + year = {2003}, + pages = {234--239} +} + +@ARTICLE{Wang_ellipticcurve, + author = {Haodong Wang and Bo Sheng and Qun Li}, + title = {Elliptic curve cryptography-based access control in sensor networks}, + journal = {Int. J. Security and Networks} +} + +@INPROCEEDINGS{wbg10:ip, + author = {Wang, Qianxue and Bahi, Jacques and Guyeux, Christophe and Fang, + Xiaole}, + title = {Randomness quality of {CI} chaotic generators. Application to Internet + security}, + booktitle = {INTERNET'2010. The 2nd Int. Conf. on Evolving Internet}, + year = {2010}, + pages = {125--130}, + address = {Valencia, Spain}, + month = sep, + publisher = {IEEE Computer Society Press}, + note = {Best Paper award}, + classement = {ACTI}, + domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, + equipe = {and}, + inhal = {no} +} + +@ARTICLE{Wang2003, + author = {X. M. Wang and J. S. Zhang and W. F. Zhang}, + title = {One-way hash function construction based on the extended chaotic + maps switch}, + journal = {Acta Phys. Sinici.}, + year = {2003}, + volume = {52, No. 11}, + pages = {2737--2742}, + owner = {guyeux}, + timestamp = {2009.01.16} +} + +@ARTICLE{Girao06, + author = {Westhoff, Dirk and Girao, Joao and Acharya, Mithun}, + title = {Concealed Data Aggregation for Reverse Multicast Traffic in Sensor + Networks: Encryption, Key Distribution, and Routing Adaptation}, + journal = {IEEE Transactions on Mobile Computing}, + year = {2006}, + volume = {5}, + pages = {1417--1431}, + number = {10}, + address = {Piscataway, NJ, USA}, + doi = {http://dx.doi.org/10.1109/TMC.2006.144}, + issn = {1536-1233}, + publisher = {IEEE Educational Activities Department} +} + +@MISC{web:lyapunov, + author = {Wikipédia}, + title = {Exposant de Lyapunov -- Site web d'André Lévesque}, + year = {2010}, + note = {[En ligne; Page disponible le 9-septembre-2010]}, + url = {\url{http://math.cmaisonneuve.qc.ca/alevesque/chaos_fract/Lyapunov/Exposant.html}} +} + +@MISC{wiki:complet, + author = {Wikipédia}, + title = {Espace complet --- Wikipédia{,} l'encyclopédie libre}, + year = {2010}, + note = {[En ligne; Page disponible le 9-août-2010]}, + url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Espace_complet&oldid=52734266}} +} + +@MISC{wiki:densite, + author = {Wikipédia}, + title = {Densité (mathématiques) --- Wikipédia{,} l'encyclopédie libre}, + year = {2010}, + note = {[En ligne; Page disponible le 8-août-2010]}, + url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Densit%C3%A9_(math%C3%A9matiques)&oldid=53938121}} +} + +@MISC{wiki:fisher, + author = {Wikipédia}, + title = {Information de Fisher --- Wikipédia{,} l'encyclopédie libre}, + year = {2010}, + note = {[En ligne; Page disponible le 5-août-2010]}, + url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Information_de_Fisher&oldid=52877871}} +} + +@MISC{wiki:Kerkhoffs, + author = {Wikipédia}, + title = {Principe de Kerckhoffs --- Wikipédia{,} l'encyclopédie libre}, + year = {2010}, + note = {[En ligne; Page disponible le 20-août-2010]}, + url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Principe_de_Kerckhoffs&oldid=52133114}} +} + +@MISC{wiki:sarkovskii, + author = {Wikipédia}, + title = {Théorème de Sarkovskii --- Wikipédia{,} l'encyclopédie libre}, + year = {2010}, + note = {[En ligne; Page disponible le 8-août-2010]}, + url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Th%C3%A9or%C3%A8me_de_Sarkovskii&oldid=54196167}} +} + +@MISC{wiki:steganographie, + author = {Wikipédia}, + title = {Stéganographie --- Wikipédia{,} l'encyclopédie libre}, + year = {2010}, + note = {[En ligne; Page disponible le 5-août-2010]}, + url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=St%C3%A9ganographie&oldid=54724435}} +} + +@MISC{wiki:tatouage, + author = {Wikipédia}, + title = {Tatouage numérique --- Wikipédia{,} l'encyclopédie libre}, + year = {2010}, + note = {[En ligne; Page disponible le 5-août-2010]}, + url = {https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Tatouage_num%C3%A9rique&oldid=55484940} +} + +@MISC{wiki:testsHypothese, + author = {Wikipédia}, + title = {Test d'hypothèse --- Wikipédia{,} l'encyclopédie libre}, + year = {2010}, + note = {[En ligne; Page disponible le 5-août-2010]}, + url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Test_d%27hypoth%C3%A8se&oldid=55344108}} +} + +@ARTICLE{Wu2007bis, + author = {Xianyong Wu and Zhi-Hong Guan}, + title = {A novel digital watermark algorithm based on chaotic maps}, + journal = {Physics Letters A}, + year = {2007}, + volume = {365}, + pages = {403 - 406}, + number = {5-6}, + doi = {DOI: 10.1016/j.physleta.2007.01.034}, + issn = {0375-9601}, + keywords = {Watermarking}, + url = {http://www.sciencedirect.com/science/article/B6TVM-4MY0MF3-8/2/0b4d1298fa84337d2e59b3fefe26f583} +} + +@INPROCEEDINGS{Wu2007, + author = {Wu, Xianyong and Guan, Zhi-Hong and Wu, Zhengping}, + title = {A Chaos Based Robust Spatial Domain Watermarking Algorithm}, + booktitle = {ISNN '07: Proceedings of the 4th international symposium on Neural + Networks}, + year = {2007}, + pages = {113--119}, + address = {Berlin, Heidelberg}, + publisher = {Springer-Verlag}, + doi = {http://dx.doi.org/10.1007/978-3-540-72393-6_15}, + isbn = {978-3-540-72392-9}, + location = {Nanjing, China} +} + +@ARTICLE{Xiao20092288, + author = {Di Xiao and Xiaofeng Liao and Yong Wang}, + title = {Parallel keyed hash function construction based on chaotic neural + network}, + journal = {Neurocomputing}, + year = {2009}, + volume = {72}, + pages = {2288 - 2296}, + number = {10-12}, + note = {Lattice Computing and Natural Computing (JCIS 2007) / Neural Networks + in Intelligent Systems Designn (ISDA 2007)}, + abstract = {Recently, various hash functions based on chaos or neural networks + were proposed. Nevertheless, none of them works efficiently in parallel + computing environment. In this paper, an algorithm for parallel keyed + hash function construction based on chaotic neural network is proposed. + The mechanism of changeable-parameter and self-synchronization establishes + a close relation between the hash value bit and message, and the + algorithm structure ensures the uniform sensitivity of the hash value + to the message blocks at different positions. The proposed algorithm + can satisfy the performance requirements of hash function. These + properties make it a promising choice for hashing on parallel computing + platform.}, + issn = {0925-2312}, + keywords = {Chaotic neural network} +} + +@ARTICLE{Xiao20094346, + author = {Di Xiao and Xiaofeng Liao and Yong Wang}, + title = {Improving the security of a parallel keyed hash function based on + chaotic maps}, + journal = {Physics Letters A}, + year = {2009}, + volume = {373}, + pages = {4346 - 4353}, + number = {47}, + issn = {0375-9601}, + keywords = {Hash function}, + owner = {guyeux}, + timestamp = {2009.12.12} +} + +@ARTICLE{Xiao20102254, + author = {Di Xiao and Frank Y. Shih and Xiaofeng Liao}, + title = {A chaos-based hash function with both modification detection and + localization capabilities}, + journal = {Communications in Nonlinear Science and Numerical Simulation}, + year = {2010}, + volume = {15}, + pages = {2254 - 2261}, + number = {9}, + abstract = {Recently, a variety of chaos-based hash functions have been proposed. + Nevertheless, none of them can realize modification localization. + In this paper, a hash function with both modification detection and + localization capabilities is proposed, which can also support the + parallel processing mode. By using the mechanism of changeable-parameter + and self-synchronization, the keystream can establish a close relation + with the algorithm key, the content, and the order of each message + unit. Theoretical analysis and computer simulation indicate that + the proposed algorithm can satisfy the performance requirements of + hash functions.}, + issn = {1007-5704}, + keywords = {Hash function} +} + +@INPROCEEDINGS{Yu06, + author = {Yu, Yu and Leiwo, Jussipekka and Premkumar, Benjamin}, + title = {A Study on the Security of Privacy Homomorphism}, + booktitle = {ITNG '06: Proceedings of the Third International Conference on Information + Technology: New Generations}, + year = {2006}, + pages = {470--475}, + address = {Washington, DC, USA}, + publisher = {IEEE Computer Society}, + doi = {http://dx.doi.org/10.1109/ITNG.2006.19}, + isbn = {0-7695-2497-4} +} + +@ARTICLE{Zhang2008658, + author = {Wei Zhang and Yonghe Liu and Sajal K. Das and Pradip De}, + title = {Secure data aggregation in wireless sensor networks: A watermark + based authentication supportive approach}, + journal = {Pervasive and Mobile Computing}, + year = {2008}, + volume = {4}, + pages = {658 - 680}, + number = {5}, + doi = {DOI: 10.1016/j.pmcj.2008.05.005}, + issn = {1574-1192}, + keywords = {Wireless sensor networks}, + url = {http://www.sciencedirect.com/science/article/B7MF1-4SKB3MD-1/2/b73948dcaa3eb63a2c21d09041882625} +} + +@ARTICLE{Zhang2005, + author = {Zhang, Yang and Arakaki, Adrian K. and Skolnick, Jeffrey}, + title = {TASSER: An automated method for the prediction of protein tertiary + structures in CASP6}, + journal = {Proteins}, + year = {2005}, + volume = {61}, + pages = {91--98}, + number = {S7}, + issn = {1097-0134}, + keywords = {comparative modeling, threading, ab initio prediction, TASSER, PROSPECTOR_3}, + owner = {christophe}, + publisher = {Wiley Subscription Services, Inc., A Wiley Company}, + timestamp = {2011.01.22}, + url = {http://dx.doi.org/10.1002/prot.20724} +} + +@ARTICLE{Zhou1997429, + author = {Chang-song Zhou and Tian-lun Chen}, + title = {Extracting information masked by chaos and contaminated with noise: + Some considerations on the security of communication approaches using + chaos}, + journal = {Physics Letters A}, + year = {1997}, + volume = {234}, + pages = {429 - 435}, + number = {6}, + issn = {0375-9601}, + keywords = {Communication}, + owner = {guyeux}, + timestamp = {2009.12.12} +} + +@ARTICLE{Zhou96, + author = {Zhou, Huai-bei and Wang, Lu}, + title = {Chaos in Biomolecular Dynamics}, + journal = {The Journal of Physical Chemistry}, + year = {1996}, + volume = {100}, + pages = {8101-8105}, + number = {20}, + doi = {10.1021/jp953409x} +} + +@PROCEEDINGS{DBLP:conf/iwdw/2005, + title = {IWDW'05: 4th International Workshop on Digital Watermarking}, + year = {2005}, + editor = {Mauro Barni and Ingemar J. Cox and Ton Kalker and Hyoung Joong Kim}, + volume = {3710}, + series = {Lecture Notes in Computer Science}, + address = {Siena, Italy}, + publisher = {Springer}, + month = {September 15-17}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + booktitle = {IWDW}, + isbn = {3-540-28768-X}, + owner = {guyeux}, + timestamp = {2009.06.29} +} + +@PROCEEDINGS{DBLP:conf/ih/2006, + title = {IH 2006: Information Hiding, 8th International Workshop}, + year = {2007}, + editor = {Jan Camenisch and Christian S. Collberg and Neil F. Johnson and Phil + Sallee}, + volume = {4437}, + series = {Lecture Notes in Computer Science}, + address = {Alexandria, VA, USA}, + publisher = {Springer}, + month = {July}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + booktitle = {Information Hiding}, + isbn = {978-3-540-74123-7}, + owner = {guyeux}, + timestamp = {2009.06.29} +} + +@PROCEEDINGS{DBLP:conf/ih/2007, + title = {Information Hiding, 9th International Workshop, IH 2007, Saint Malo, + France, June 11-13, 2007, Revised Selected Papers}, + year = {2008}, + editor = {Teddy Furon and Fran\c{c}ois Cayre and Gwena{\"e}l J. Do{\"e}rr and + Patrick Bas}, + volume = {4567}, + series = {Lecture Notes in Computer Science}, + publisher = {Springer}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + booktitle = {Information Hiding}, + isbn = {978-3-540-77369-6}, + owner = {guyeux}, + timestamp = {2009.06.29} +} + +@PROCEEDINGS{DBLP:conf/iccsa/2006-1, + title = {Computational Science and Its Applications - ICCSA 2006, International + Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part I}, + year = {2006}, + editor = {Marina L. Gavrilova and Osvaldo Gervasi and Vipin Kumar and Chih + Jeng Kenneth Tan and David Taniar and Antonio Lagan{\`a} and Youngsong + Mun and Hyunseung Choo}, + volume = {3980}, + series = {Lecture Notes in Computer Science}, + publisher = {Springer}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + booktitle = {ICCSA (1)}, + isbn = {3-540-34070-X} +} + +@PROCEEDINGS{DBLP:conf/secrypt/2010, + title = {SECRYPT 2010 - Proceedings of the International Conference on Security + and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part + of ICETE - The International Joint Conference on e-Business and Telecommunications}, + year = {2010}, + editor = {Sokratis K. Katsikas and Pierangela Samarati}, + publisher = {SciTePress}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + booktitle = {SECRYPT}, + isbn = {978-989-8425-18-8} +} + +@BOOK{Katzenbeisser00, + title = {Information Hiding Techniques for Steganography and Digital Watermarking}, + publisher = {Artech House, Inc.}, + year = {2000}, + editor = {Katzenbeisser, Stefan and Petitcolas, Fabien A.}, + address = {Norwood, MA, USA}, + isbn = {1580530354} +} + +@PROCEEDINGS{DBLP:conf/ih/1999, + title = {IH'99: 3rd International Workshop on Information Hiding}, + year = {2000}, + editor = {Andreas Pfitzmann}, + volume = {1768}, + series = {Lecture Notes in Computer Science}, + address = {Dresden, Germany}, + publisher = {Springer}, + month = {September 29 - October 1.}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + booktitle = {Information Hiding}, + isbn = {3-540-67182-X}, + owner = {guyeux}, + timestamp = {2009.06.29} +} + +@PROCEEDINGS{DBLP:conf/indocrypt/2000, + title = {Progress in Cryptology - INDOCRYPT 2000, First International Conference + in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings}, + year = {2000}, + editor = {Bimal K. Roy and Eiji Okamoto}, + volume = {1977}, + series = {Lecture Notes in Computer Science}, + publisher = {Springer}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + booktitle = {INDOCRYPT}, + isbn = {3-540-41452-5} +} + +@BOOK{DBLP:reference/icsec/2010, + title = {Handbook of Information and Communication Security}, + publisher = {Springer}, + year = {2010}, + editor = {Peter P. Stavroulakis and Mark Stamp}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + booktitle = {Handbook of Information and Communication Security}, + ee = {http://dx.doi.org/10.1007/978-3-642-04117-4}, + isbn = {978-3-642-04116-7} +} + +@PROCEEDINGS{DBLP:conf/isnn/2004-2, + title = {Advances in Neural Networks - ISNN 2004, International Symposium + on Neural Networks, Dalian, China, August 19-21, 2004, Proceedings, + Part II}, + year = {2004}, + editor = {Fuliang Yin and Jun Wang and Chengan Guo}, + volume = {3174}, + series = {Lecture Notes in Computer Science}, + publisher = {Springer}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + booktitle = {ISNN (2)}, + isbn = {3-540-22843-8} +} + +@PROCEEDINGS{DBLP:conf/adhocnets/2010, + title = {Ad Hoc Networks - Second International Conference, ADHOCNETS 2010, + Victoria, BC, Canada, August 18-20, 2010, Revised Selected Papers}, + year = {2010}, + editor = {Jun Zheng and David Simplot-Ryl and Victor C. M. Leung}, + volume = {49}, + series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics + and Telecommunications Engineering}, + publisher = {Springer}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + booktitle = {ADHOCNETS}, + ee = {http://dx.doi.org/10.1007/978-3-642-17994-5}, + isbn = {978-3-642-17993-8} +} + +@INPROCEEDINGS{, + owner = {guyeux}, + timestamp = {2011.03.29} +} + +@MISC{Delicious, + title = {Delicious social bookmarking, http://delicious.com/}, + comment = {http://delicious.com/}, + type = {web page}, + url = {http://delicious.com/} +} + +@MISC{Frick, + title = {The Frick Collection, http://www.frick.org/}, + comment = {http://www.frick.org/}, + type = {web page}, + url = {http://www.frick.org/} +} + +@PROCEEDINGS{2010, + title = {Proceedings of the IEEE Congress on Evolutionary Computation, CEC + 2010, Barcelona, Spain, 18-23 July 2010}, + year = {2010}, + publisher = {IEEE}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + booktitle = {IEEE Congress on Evolutionary Computation} +} + +@PROCEEDINGS{DBLP:conf/cec/2010, + title = {Proceedings of the IEEE Congress on Evolutionary Computation, CEC + 2010, Barcelona, Spain, 18-23 July 2010}, + year = {2010}, + publisher = {IEEE}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + booktitle = {IEEE Congress on Evolutionary Computation} +} + +@PROCEEDINGS{DBLP:conf/date/2010, + title = {Design, Automation and Test in Europe, DATE 2010, Dresden, Germany, + March 8-12, 2010}, + year = {2010}, + publisher = {IEEE}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + booktitle = {DATE} +} + +@PROCEEDINGS{DBLP:conf/cse/2009, + title = {Proceedings IEEE CSE'09, 12th IEEE International Conference on Computational + Science and Engineering, August 29-31, 2009, Vancouver, BC, Canada}, + year = {2009}, + publisher = {IEEE Computer Society}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + booktitle = {CSE} +} + +@PROCEEDINGS{DBLP:conf/icumt/2009, + title = {Proceedings of the International Conference on Ultra Modern Telecommunications, + ICUMT 2009, 12-14 October 2009, St. Petersburg, Russia}, + year = {2009}, + publisher = {IEEE}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + booktitle = {ICUMT} +} + +@PROCEEDINGS{DBLP:conf/focs/2008, + title = {49th Annual IEEE Symposium on Foundations of Computer Science, FOCS + 2008, October 25-28, 2008, Philadelphia, PA, USA}, + year = {2008}, + publisher = {IEEE Computer Society}, + bibsource = {DBLP, http://dblp.uni-trier.de}, + booktitle = {FOCS} +} + +@comment{jabref-meta: selector_publisher:} + +@comment{jabref-meta: selector_author:} + +@comment{jabref-meta: selector_journal:} + +@comment{jabref-meta: selector_keywords:Chaos;Entropie Topologique;Tip +e;} +