1 % This file was created with JabRef 2.7.2.
4 @INPROCEEDINGS{AdelsbachKS06,
5 author = {Andr{\'e} Adelsbach and Stefan Katzenbeisser and Ahmad-Reza Sadeghi},
6 title = {A Computational Model for Watermark Robustness},
7 booktitle = {Information Hiding},
10 bibsource = {DBLP, http://dblp.uni-trier.de},
11 crossref = {DBLP:conf/ih/2006},
12 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_10},
14 timestamp = {2009.06.29}
17 @INPROCEEDINGS{BattiatoCGG99,
18 author = {Sebastiano Battiato and Dario Catalano and Giovanni Gallo and Rosario
20 title = {Robust Watermarking for Images Based on Color Manipulation},
21 booktitle = {Information Hiding},
24 bibsource = {DBLP, http://dblp.uni-trier.de},
25 crossref = {DBLP:conf/ih/1999},
27 timestamp = {2009.06.29}
30 @INPROCEEDINGS{ComesanaPP05,
31 author = {Pedro Comesa{\~n}a and Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez},
32 title = {The Return of the Sensitivity Attack},
36 bibsource = {DBLP, http://dblp.uni-trier.de},
37 crossref = {DBLP:conf/iwdw/2005},
38 ee = {http://dx.doi.org/10.1007/11551492_20},
40 timestamp = {2009.06.29}
43 @INPROCEEDINGS{ComesanaPP05bis,
44 author = {Pedro Comesa{\~n}a and Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez},
45 title = {Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum
47 booktitle = {IH'05: Information Hiding Workshop},
50 publisher = {Lectures Notes in Computer Science, Springer-Verlag},
51 bibsource = {DBLP, http://dblp.uni-trier.de},
52 crossref = {DBLP:conf/ih/2005},
53 ee = {http://dx.doi.org/10.1007/11558859_12},
55 timestamp = {2009.06.30}
58 @INPROCEEDINGS{CongJQZ06,
59 author = {Jin Cong and Yan Jiang and Zhiguo Qu and Zhongmei Zhang},
60 title = {A Wavelet Packets Watermarking Algorithm Based on Chaos Encryption},
61 booktitle = {ICCSA (1)},
64 bibsource = {DBLP, http://dblp.uni-trier.de},
65 crossref = {DBLP:conf/iccsa/2006-1},
66 ee = {http://dx.doi.org/10.1007/11751540_100}
69 @INPROCEEDINGS{DBLP:conf/focs/DziembowskiP08,
70 author = {Stefan Dziembowski and Krzysztof Pietrzak},
71 title = {Leakage-Resilient Cryptography},
75 bibsource = {DBLP, http://dblp.uni-trier.de},
76 crossref = {DBLP:conf/focs/2008},
77 ee = {http://dx.doi.org/10.1109/FOCS.2008.56}
80 @INCOLLECTION{Filiol10,
81 author = {Eric Filiol},
82 title = {Viruses and Malware},
83 booktitle = {Handbook of Information and Communication Security},
86 bibsource = {DBLP, http://dblp.uni-trier.de},
87 crossref = {DBLP:reference/icsec/2010},
88 ee = {http://dx.doi.org/10.1007/978-3-642-04117-4_34}
91 @INPROCEEDINGS{Filiol00,
92 author = {Eric Filiol},
93 title = {Decimation Attack of Stream Ciphers},
94 booktitle = {INDOCRYPT},
97 bibsource = {DBLP, http://dblp.uni-trier.de},
98 crossref = {DBLP:conf/indocrypt/2000},
99 ee = {http://link.springer.de/link/service/series/0558/bibs/1977/19770031.htm}
102 @INPROCEEDINGS{Furon05,
103 author = {Teddy Furon},
104 title = {A Survey of Watermarking Security},
108 bibsource = {DBLP, http://dblp.uni-trier.de},
109 crossref = {DBLP:conf/iwdw/2005},
110 ee = {http://dx.doi.org/10.1007/11551492_16},
112 timestamp = {2009.06.29}
115 @INPROCEEDINGS{DBLP:conf/cec/HiggsSHS10,
116 author = {Trent Higgs and Bela Stantic and Tamjidul Hoque and Abdul Sattar},
117 title = {Genetic algorithm feature-based resampling for protein structure
119 booktitle = {IEEE Congress on Evolutionary Computation},
122 bibsource = {DBLP, http://dblp.uni-trier.de},
123 crossref = {DBLP:conf/cec/2010},
124 ee = {http://dx.doi.org/10.1109/CEC.2010.5586149}
127 @INPROCEEDINGS{Higgs2010,
128 author = {Trent Higgs and Bela Stantic and Tamjidul Hoque and Abdul Sattar},
129 title = {Genetic algorithm feature-based resampling for protein structure
131 booktitle = {IEEE Congress on Evolutionary Computation},
134 bibsource = {DBLP, http://dblp.uni-trier.de},
135 crossref = {DBLP:conf/cec/2010},
136 ee = {http://dx.doi.org/10.1109/CEC.2010.5586149}
139 @INPROCEEDINGS{DBLP:conf/cec/HorvathC10,
140 author = {Dragos Horvath and Camelia Chira},
141 title = {Simplified chain folding models as metaheuristic benchmark for tuning
142 real protein folding algorithms?},
143 booktitle = {IEEE Congress on Evolutionary Computation},
146 bibsource = {DBLP, http://dblp.uni-trier.de},
147 crossref = {DBLP:conf/cec/2010},
148 ee = {http://dx.doi.org/10.1109/CEC.2010.5585932}
151 @INPROCEEDINGS{DBLP:conf/cec/IslamC10,
152 author = {Md. Kamrul Islam and Madhu Chetty},
153 title = {Clustered memetic algorithm for protein structure prediction},
154 booktitle = {IEEE Congress on Evolutionary Computation},
157 bibsource = {DBLP, http://dblp.uni-trier.de},
158 crossref = {DBLP:conf/cec/2010},
159 ee = {http://dx.doi.org/10.1109/CEC.2010.5586187}
162 @INPROCEEDINGS{Ker06,
163 author = {Andrew D. Ker},
164 title = {Batch Steganography and Pooled Steganalysis},
165 booktitle = {Information Hiding},
168 bibsource = {DBLP, http://dblp.uni-trier.de},
169 crossref = {DBLP:conf/ih/2006},
170 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_18},
172 timestamp = {2009.06.29}
175 @INPROCEEDINGS{Lin2009,
176 author = {H.-Y. Lin and T.-C. Chiang},
177 title = {Cooperative Secure Data Aggregation in Sensor Networks Using Elliptic
178 Curve Based Cryptosystems},
182 bibsource = {DBLP, http://dblp.uni-trier.de},
183 crossref = {DBLP:conf/cdve/2009},
184 ee = {http://dx.doi.org/10.1007/978-3-642-04265-2_58}
187 @INPROCEEDINGS{DBLP:conf/cse/MaimourPH09,
188 author = {Moufida Maimour and CongDuc Pham and Doan B. Hoang},
189 title = {A Congestion Control Framework for Handling Video Surveillance Traffics
191 booktitle = {CSE (2)},
194 bibsource = {DBLP, http://dblp.uni-trier.de},
195 crossref = {DBLP:conf/cse/2009},
196 ee = {http://dx.doi.org/10.1109/CSE.2009.200}
199 @INPROCEEDINGS{DBLP:conf/icumt/MakhoulSP09,
200 author = {Abdallah Makhoul and Rachid Saadi and CongDuc Pham},
201 title = {Coverage and adaptive scheduling algorithms for criticality management
202 on video wireless sensor networks},
206 bibsource = {DBLP, http://dblp.uni-trier.de},
207 crossref = {DBLP:conf/icumt/2009},
208 ee = {http://dx.doi.org/10.1109/ICUMT.2009.5345630}
211 @INPROCEEDINGS{Mittelholzer99,
212 author = {Thomas Mittelholzer},
213 title = {An Information-Theoretic Approach to Steganography and Watermarking},
214 booktitle = {Information Hiding},
217 bibsource = {DBLP, http://dblp.uni-trier.de},
218 crossref = {DBLP:conf/ih/1999},
220 timestamp = {2009.06.29}
223 @INPROCEEDINGS{PellegriniBA10,
224 author = {Andrea Pellegrini and Valeria Bertacco and Todd M. Austin},
225 title = {Fault-based attack of RSA authentication},
229 bibsource = {DBLP, http://dblp.uni-trier.de},
230 crossref = {DBLP:conf/date/2010},
231 ee = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5456933}
234 @INPROCEEDINGS{DBLP:conf/cec/Perez-HernandezRG10,
235 author = {Luis Germ{\'a}n P{\'e}rez-Hern{\'a}ndez and Katya Rodr\'{\i}guez-V{\'a}zquez
236 and Ram{\'o}n Gardu{\~n}o-Ju{\'a}rez},
237 title = {Estimation of 3D Protein Structure by means of parallel Particle
239 booktitle = {IEEE Congress on Evolutionary Computation},
242 bibsource = {DBLP, http://dblp.uni-trier.de},
243 crossref = {DBLP:conf/cec/2010},
244 ee = {http://dx.doi.org/10.1109/CEC.2010.5586549}
247 @INPROCEEDINGS{WangNHZH07,
248 author = {Chuntao Wang and Jiangqun Ni and Jiwu Huang and Rongyue Zhang and
250 title = {Robust and High Capacity Image Watermarking Based on Jointly Coding
251 and Embedding Optimization},
252 booktitle = {Information Hiding},
255 bibsource = {DBLP, http://dblp.uni-trier.de},
256 crossref = {DBLP:conf/ih/2007},
257 ee = {http://dx.doi.org/10.1007/978-3-540-77370-2_5},
259 timestamp = {2009.06.29}
262 @INPROCEEDINGS{Zhao04,
263 author = {Jian Zhao and Mingquan Zhou and Hongmei Xie and Jinye Peng and Xin
265 title = {A Novel Wavelet Image Watermarking Scheme Combined with Chaos Sequence
267 booktitle = {ISNN (2)},
270 bibsource = {DBLP, http://dblp.uni-trier.de},
271 crossref = {DBLP:conf/isnn/2004-2},
272 ee = {http://springerlink.metapress.com/openurl.asp?genre=article{\&}issn=0302-9743{\&}volume=3174{\&}spage=663}
275 @INPROCEEDINGS{Acharya05securecomparison,
276 author = {Acharya, Mithun and Girao, Joao and Westhoff, Dirk},
277 title = {Secure Comparison of Encrypted Data in Wireless Sensor Networks},
278 booktitle = {WIOPT '05: Proceedings of the Third International Symposium on Modeling
279 and Optimization in Mobile, Ad Hoc, and Wireless Networks},
282 address = {Washington, DC, USA},
283 publisher = {IEEE Computer Society},
284 doi = {http://dx.doi.org/10.1109/WIOPT.2005.44},
285 isbn = {0-7695-2267-X}
288 @INPROCEEDINGS{Acimez07onthe,
289 author = {Onur Acıi\c{c}mez and \c{C}etin Kaya Ko\c{c} and Jean-Pierre Seifert},
290 title = {On the power of simple branch prediction analysis },
291 booktitle = {2007 ACM Symposium on Information, Computer and Communications Security
295 publisher = {ACM Press}
299 author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},
300 title = {Topological entropy},
301 journal = {Trans. Amer. Math. Soc.},
306 timestamp = {2008.05.29}
309 @INPROCEEDINGS{Agrawal04,
310 author = {Agrawal, Rakesh and Kiernan, Jerry and Srikant, Ramakrishnan and
312 title = {Order preserving encryption for numeric data},
313 booktitle = {SIGMOD '04: Proceedings of the 2004 ACM SIGMOD international conference
314 on Management of data},
317 address = {New York, NY, USA},
319 doi = {http://doi.acm.org/10.1145/1007568.1007632},
320 isbn = {1-58113-859-8},
321 location = {Paris, France}
324 @ARTICLE{Anfinsen20071973,
325 author = {Anfinsen, Christian B.},
326 title = {Principles that Govern the Folding of Protein Chains},
332 doi = {10.1126/science.181.4096.223},
333 eprint = {http://www.sciencemag.org/content/181/4096/223.full.pdf},
334 url = {http://www.sciencemag.org/content/181/4096/223.short}
338 author = {D. G. Arqu\`{e}s and J. P. Fallot and C. J. Michel},
339 title = {An evolutionary analytical model of a complementary circular code
340 simulating the protein coding genes, the 5' and 3' regions.},
341 journal = {Bull Math Biol},
347 abstract = {The self-complementary subset T0 = X0 [symbol: see text] ¿AAA, TTT¿
348 with X0 = ¿AAC, AAT, ACC, ATC, ATT, CAG, CTC, CTG, GAA, GAC, GAG,
349 GAT, GCC, GGC, GGT, GTA, GTC, GTT, TAC, TTC¿ of 22 trinucleotides
350 has a preferential occurrence in the frame 0 (reading frame established
351 by the ATG start trinucleotide) of protein (coding) genes of both
352 prokaryotes and eukaryotes. The subsets T1 = X1 [symbol: see text]
353 ¿CCC¿ and T2 = X2 [symbol: see text] ¿GGG¿ of 21 trinucleotides have
354 a preferential occurrence in the shifted frames 1 and 2 respectively
355 (frame 0 shifted by one and two nucleotides respectively in the 5'-3'
356 direction). T1 and T2 are complementary to each other. The subset
357 T0 contains the subset X0 which has the rarity property (6 x 10(-8)
358 to be a complementary maximal circular code with two permutated maximal
359 circular codes X1 and X2 in the frames 1 and 2 respectively. X0 is
360 called a C3 code. A quantitative study of these three subsets T0,
361 T1, T2 in the three frames 0, 1, 2 of protein genes, and the 5' and
362 3' regions of eukaryotes, shows that their occurrence frequencies
363 are constant functions of the trinucleotide positions in the sequences.
364 The frequencies of T0, T1, T2 in the frame 0 of protein genes are
365 49, 28.5 and 22.5\% respectively. In contrast, the frequencies of
366 T0, T1, T2 in the 5' and 3' regions of eukaryotes, are independent
367 of the frame. Indeed, the frequency of T0 in the three frames of
368 5' (respectively 3') regions is equal to 35.5\% (respectively 38\%)
369 and is greater than the frequencies T1 and T2, both equal to 32.25\%
370 (respectively 31\%) in the three frames. Several frequency asymmetries
371 unexpectedly observed (e.g. the frequency difference between T1 and
372 T2 in the frame 0), are related to a new property of the subset T0
373 involving substitutions. An evolutionary analytical model at three
374 parameters (p, q, t) based on an independent mixing of the 22 codons
375 (trinucleotides in frame 0) of T0 with equiprobability (1/22) followed
376 by t approximately 4 substitutions per codon according to the proportions
377 p approximately 0.1, q approximately 0.1 and r = 1 - p - q approximately
378 0.8 in the three codon sites respectively, retrieves the frequencies
379 of T0, T1, T2 observed in the three frames of protein genes and explains
380 these asymmetries. Furthermore, the same model (0.1, 0.1, t) after
381 t approximately 22 substitutions per codon, retrieves the statistical
382 properties observed in the three frames of the 5' and 3' regions.
383 The complex behaviour of these analytical curves is totally unexpected
384 and a priori difficult to imagine.},
385 doi = {10.1006/bulm.1997.0033},
386 institution = {Equipe de Biologie Théorique, Université de Marne la Vallée, Institut
387 Gaspard Monge, Noisy Le Grand, France. Arqu\`{e}s@univ-mlv.fr},
388 keywords = {Animals; Biological Evolution; Codon, genetics; Genetic Code; Humans;
389 Mammals; Models, Genetic; Probability; Proteins, genetics; Rodentia;
392 medline-pst = {ppublish},
394 pii = {S0092-8240(97)90033-1},
396 timestamp = {2011.05.05},
397 url = {http://dx.doi.org/10.1006/bulm.1997.0033}
401 author = {D. G. Arqu\`{e}s and C. J. Michel},
402 title = {Analytical expression of the purine/pyrimidine autocorrelation function
403 after and before random mutations.},
404 journal = {Math Biosci},
410 abstract = {The mutation process is a classical evolutionary genetic process.
411 The type of mutations studied here is the random substitutions of
412 a purine base R (adenine or guanine) by a pyrimidine base Y (cytosine
413 or thymine) and reciprocally (transversions). The analytical expressions
414 derived allow us to analyze in genes the occurrence probabilities
415 of motifs and d-motifs (two motifs separated by any d bases) on the
416 R/Y alphabet under transversions. These motif probabilities can be
417 obtained after transversions (in the evolutionary sense; from the
418 past to the present) and, unexpectedly, also before transversions
419 (after back transversions, in the inverse evolutionary sense, from
420 the present to the past). This theoretical part in Section 2 is a
421 first generalization of a particular formula recently derived. The
422 application in Section 3 is based on the analytical expression giving
423 the autocorrelation function (the d-motif probabilities) before transversions.
424 It allows us to study primitive genes from actual genes. This approach
425 solves a biological problem. The protein coding genes of chloroplasts
426 and mitochondria have a preferential occurrence of the 6-motif YRY(N)6YRY
427 (maximum of the autocorrelation function for d = 6, N = R or Y) with
428 a periodicity modulo 3. The YRY(N)6YRY preferential occurrence without
429 the periodicity modulo 3 is also observed in the RNA coding genes
430 (ribosomal, transfer, and small nuclear RNA genes) and in the noncoding
431 genes (introns and 5' regions of eukaryotic nuclei). However, there
432 are two exceptions to this YRY(N)6YRY rule: the protein coding genes
433 of eukaryotic nuclei, and prokaryotes, where YRY(N)6YRY has the second
434 highest value after YRY(N)0YRY (YRYYRY) with a periodicity modulo
435 3. When we go backward in time with the analytical expression, the
436 protein coding genes of both eukaryotic nuclei and prokaryotes retrieve
437 the YRY(N)6YRY preferential occurrence with a periodicity modulo
438 3 after 0.2 back transversions per base. In other words, the actual
439 protein coding genes of chloroplasts and mitochondria are similar
440 to the primitive protein coding genes of eukaryotic nuclei and prokaryotes.
441 On the other hand, this application represents the first result concerning
442 the mutation process in the model of DNA sequence evolution we recently
443 proposed. According to this model, the actual genes on the R/Y alphabet
444 derive from two successive evolutionary genetic processes: an independent
445 mixing of a few nonrandom types of oligonucleotides leading to genes
446 called primitive followed by a mutation process in these primitive
447 genes.(ABSTRACT TRUNCATED AT 400 WORDS)},
448 institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon,
450 keywords = {Base Sequence; Biological Evolution; DNA, genetics; Mathematics; Models,
451 Genetic; Mutation; Probability; Proteins, genetics; Purines; Pyrimidines},
453 medline-pst = {ppublish},
455 pii = {0025-5564(94)90020-5},
457 timestamp = {2011.05.05}
461 author = {D. G. Arqu\`{e}s and C. J. Michel},
462 title = {Analytical expression of the purine/pyrimidine codon probability
463 after and before random mutations.},
464 journal = {Bull Math Biol},
467 pages = {1025--1038},
470 abstract = {Recently, we proposed a new model of DNA sequence evolution (Arqu\`{e}s
471 and Michel. 1990b. Bull. math. Biol. 52, 741-772) according to which
472 actual genes on the purine/pyrimidine (R/Y) alphabet (R = purine
473 = adenine or guanine, Y = pyrimidine = cytosine or thymine) are the
474 result of two successive evolutionary genetic processes: (i) a mixing
475 (independent) process of non-random oligonucleotides (words of base
476 length less than 10: YRY(N)6, YRYRYR and YRYYRY are so far identified;
477 N = R or Y) leading to primitive genes (words of several hundreds
478 of base length) and followed by (ii) a random mutation process, i.e.,
479 transformations of a base R (respectively Y) into the base Y (respectively
480 R) at random sites in these primitive genes. Following this model
481 the problem investigated here is the study of the variation of the
482 8 R/Y codon probabilities RRR, ..., YYY under random mutations. Two
483 analytical expressions solved here allow analysis of this variation
484 in the classical evolutionary sense (from the past to the present,
485 i.e., after random mutations), but also in the inverted evolutionary
486 sense (from the present to the past, i.e., before random mutations).
487 Different properties are also derived from these formulae. Finally,
488 a few applications of these formulae are presented. They prove the
489 proposition in Arqu\`{e}s and Michel (1990b. Bull. math. Biol. 52,
490 741-772), Section 3.3.2, with the existence of a maximal mean number
491 of random mutations per base of the order 0.3 in the protein coding
492 genes. They also confirm the mixing process of oligonucleotides by
493 excluding the purine/pyrimidine contiguous and alternating tracts
494 from the formation process of primitive genes.},
495 institution = {Université de Franche-Comté, Besançon, France.},
496 keywords = {Base Sequence; Codon; DNA, chemistry/genetics; Mathematics; Models,
497 Genetic; Mutation; Probability; Purines; Pyrimidines},
499 medline-pst = {ppublish},
502 timestamp = {2011.05.05}
505 @ARTICLE{Arques1993b,
506 author = {D. G. Arqu\`{e}s and C. J. Michel},
507 title = {Identification and simulation of new non-random statistical properties
508 common to different eukaryotic gene subpopulations.},
509 journal = {Biochimie},
514 abstract = {The nucleotide distribution in protein coding genes, introns and transfer
515 RNA genes of eukaryotic subpopulations (primates, rodent and mammals)
516 is studied by autocorrelation functions. The autocorrelation function
517 analysing the occurrence probability of the i-motif YRY(N)iYRY (YRY-function)
518 in protein coding genes and transfer RNA genes of these three eukaryotic
519 subpopulations retrieves the preferential occurrence of YRY(N)6YRY
520 (R = purine = adenine or guanine, Y = pyrimidine = cytosine or thymine,
521 N = R or Y). The autocorrelation functions analysing the occurrence
522 probability of the i-motifs RRR(N)iRRR (RRR-function) and YYY(N)iYYY
523 (YYY-function) identify new non-random genetic statistical properties
524 in these three eukaryotic subpopulations, mainly: i) in their protein
525 coding genes: local maxima for i identical to 6 [12] (peaks for i
526 = 6, 18, 30, 42) with the RRR-function and local maxima for i identical
527 to 8 [10] (peaks for i = 8, 18, 28) with the YYY-function; and ii)
528 in their introns: local maxima for i identical to 3 [6] (peaks for
529 i = 3, 9, 15) and a short linear decrease followed by a large exponential
530 decrease both with the RRR- and YYY-functions. The non-random properties
531 identified in eukaryotic intron subpopulations are modelised with
532 a process of random insertions and deletions of nucleotides simulating
534 institution = {Equipe de Biologie Théorique, Université de Franche-Comté, Laboratoire
535 d'Informatique de Besançon, France.},
536 keywords = {Animals; Base Sequence; Data Interpretation, Statistical; Genes; Introns;
537 Mammals; Models, Genetic; Primates; Probability; Proteins, genetics;
538 RNA Editing; RNA, Transfer, genetics; Rodentia; Sequence Analysis,
541 medline-pst = {ppublish},
543 pii = {0300-9084(93)90173-P},
545 timestamp = {2011.05.05}
549 author = {D. G. Arqu\`{e}s and C. J. Michel},
550 title = {A simulation of the genetic periodicities modulo 2 and 3 with processes
551 of nucleotide insertions and deletions.},
552 journal = {J Theor Biol},
558 abstract = {Recently, a new genetic process termed RNA editing has been identified
559 showing insertions and deletions of nucleotides in particular RNA
560 molecules. On the other hand, there are a few non-random statistical
561 properties in genes: in particular, the periodicity modulo 3 (P3)
562 associated with an open reading frame, the periodicity modulo 2 (P2)
563 associated with alternating purine/pyrimidine stretches, the YRY(N)6YRY
564 preferential occurrence (R = purine = adenine or guanine, Y = pyrimidine
565 = cytosine or thymine, N = R or Y) representing a "code" of the DNA
566 helix pitch, etc. The problem investigated here is whether a process
567 of the type RNA editing can lead to the non-random statistical properties
568 commonly observed in genes. This paper will show in particular that:
569 The process of insertions and deletions of mononucleotides in the
570 initial sequence [YRY(N)3]* [series of YRY(N)3] can lead to the periodicity
571 modulo 2 (P2). The process of insertions and deletions of trinucleotides
572 in the initial sequence [YRY(N)6]* [series of YRY(N)6] can lead to
573 the periodicity modulo 3 (P3) and the YRY(N)6YRY preferential occurrence.
574 Furthermore, these two processes lead to a strong correlation with
575 the reality, namely the mononucleotide insertion/deletion process,
576 with the 5' eukaryotic regions and the trinucleotide insertion/deletion
577 process, with the eukaryotic protein coding genes.},
578 institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon,
579 Unité Associée CNRS No 822, France.},
580 keywords = {Chromosome Deletion; Computer Simulation; Humans; Models, Genetic;
581 Mutagenesis, genetics; RNA, genetics},
583 medline-pst = {ppublish},
586 timestamp = {2011.05.05}
590 author = {D. G. Arqu\`{e}s and C. J. Michel},
591 title = {Periodicities in coding and noncoding regions of the genes.},
592 journal = {J Theor Biol},
598 abstract = {Gene population statistical studies of protein coding genes and introns
599 have identified two types of periodicities on the purine/pyrimidine
600 alphabet: (i) the modulo 3 periodicity or coding periodicity (periodicity
601 P3) in protein coding genes of eukaryotes, prokaryotes, viruses,
602 chloroplasts, mitochondria, plasmids and in introns of viruses and
603 mitochondria, and (ii) the modulo 2 periodicity (periodicity P2)
604 in the eukaryotic introns. The periodicity study is herein extended
605 to the 5' and 3' regions of eukaryotes, prokaryotes and viruses and
606 shows: (i) the periodicity P3 in the 5' and 3' regions of eukaryotes.
607 Therefore, these observations suggest a unitary and dynamic concept
608 for the genes as for a given genome, the 5' and 3' regions have the
609 genetic information for protein coding genes and for introns: (1)
610 In the eukaryotic genome, the 5' (P2 and P3) and 3' (P2 and P3) regions
611 have the information for protein coding genes (P3) and for introns
612 (P2). The intensity of P3 is high in 5' regions and weak in 3' regions,
613 while the intensity of P2 is weak in 5' regions and high in 3' regions.
614 (2) In the prokaryotic genome, the 5' (P3) and 3' (P3) regions have
615 the information for protein coding genes (P3). (3) In the viral genome,
616 the 5' (P3) and 3' (P3) regions have the information for protein
617 coding genes (P3) and for introns (P3). The absence of P2 in viral
618 introns (in opposition to eukaryotic introns) may be related to the
619 absence of P2 in 5' and 3' regions of viruses.},
620 institution = {Université de Franche-Comté, Unité Associée CNRS No. 822, Besançon,
622 keywords = {Animals; Base Sequence; Eukaryotic Cells; Genes; Introns; Prokaryotic
623 Cells; Purine Nucleotides; Pyrimidine Nucleotides; Repetitive Sequences,
624 Nucleic Acid; Viruses, genetics},
626 medline-pst = {ppublish},
629 timestamp = {2011.05.05}
632 @ARTICLE{Arques1990a,
633 author = {D. G. Arqu\`{e}s and C. J. Michel},
634 title = {A model of DNA sequence evolution.},
635 journal = {Bull Math Biol},
640 abstract = {Statistical studies of gene populations on the purine/pyrimidine alphabet
641 have shown that the mean occurrence probability of the i-motif YRY(N)iYRY
642 (R = purine, Y = pyrimidine, N = R or Y) is not uniform by varying
643 i in the range, but presents a maximum at i = 6 in the following
644 populations: protein coding genes of eukaryotes, prokaryotes, chloroplasts
645 and mitochondria, and also viral introns, ribosomal RNA genes and
646 transfer RNA genes (Arqu\`{e}s and Michel, 1987b, J. theor. Biol.
647 128, 457-461). From the "universality" of this observation, we suggested
648 that the oligonucleotide YRY(N)6 is a primitive one and that it has
649 a central function in DNA sequence evolution (Arqu\`{e}s and Michel,
650 1987b, J. theor. Biol. 128, 457-461). Following this idea, we introduce
651 a concept of a model of DNA sequence evolution which will be validated
652 according to a schema presented in three parts. In the first part,
653 using the last version of the gene database, the YRY(N)6YRY preferential
654 occurrence (maximum at i = 6) is confirmed for the populations mentioned
655 above and is extended to some newly analysed populations: chloroplast
656 introns, chloroplast 5' regions, mitochondrial 5' regions and small
657 nuclear RNA genes. On the other hand, the YRY(N)6YRY preferential
658 occurrence and periodicities are used in order to classify 18 gene
659 populations. In the second part, we will demonstrate that several
660 statistical features characterizing different gene populations (in
661 particular the YRY(N)6YRY preferential occurrence and the periodicities)
662 can be retrieved from a simple Markov model based on the mixing of
663 the two oligonucleotides YRY(N)6 and YRY(N)3 and based on the percentages
664 of RYR and YRY in the unspecified trinucleotides (N)3 of YRY(N)6
665 and YRY(N)3. Several properties are identified and prove in particular
666 that the oligonucleotide mixing is an independent process and that
667 several different features are functions of a unique parameter. In
668 the third part, the return of the model to the reality shows a strong
669 correlation between reality and simulation concerning the presence
670 of a large alternating purine/pyrimidine stretches and of periodicities.
671 It also contributes to a greater understanding of biological reality,
672 e.g. the presence or the absence of large alternating purine/pyrimidine
673 stretches can be explained as being a simple consequence of the mixing
674 of two particular oligonucleotides. Finally, we believe that such
675 an approach is the first step toward a unified model of DNA sequence
676 evolution allowing the molecular understanding of both the origin
677 of life and the actual biological reality.},
678 institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon,
679 Unité Associée CNRS No 822, France.},
680 keywords = {Base Sequence; Biological Evolution; DNA, genetics; Genetics, Population;
683 medline-pst = {ppublish},
686 timestamp = {2011.05.05}
689 @ARTICLE{Arques1993a,
690 author = {D. G. Arqu\`{e}s and C. J. Michel and K. Orieux},
691 title = {Identification and simulation of new non-random statistical properties
692 common to different populations of eukaryotic non-coding genes.},
693 journal = {J Theor Biol},
699 abstract = {The autocorrelation function analysing the occurrence probability
700 of the i-motif YRY(N)iYRY in genes allows the identification of mainly
701 two periodicities modulo 2, 3 and the preferential occurrence of
702 the motif YRY(N)6YRY (R = purine = adenine or guanine, Y = pyrimidine
703 = cytosine or thymine, N = R or Y). These non-random genetic statistical
704 properties can be simulated by an independent mixing of the three
705 oligonucleotides YRYRYR, YRYYRY and YRY(N)6 (Arqu\`{e}s & Michel,
706 1990b). The problem investigated in this study is whether new properties
707 can be identified in genes with other autocorrelation functions and
708 also simulated with an oligonucleotide mixing model. The two autocorrelation
709 functions analysing the occurrence probability of the i-motifs RRR(N)iRRR
710 and YYY(N)iYYY simultaneously identify three new non-random genetic
711 statistical properties: a short linear decrease, local maxima for
712 i identical to 3[6] (i = 3, 9, etc) and a large exponential decrease.
713 Furthermore, these properties are common to three different populations
714 of eukaryotic non-coding genes: 5' regions, introns and 3' regions
715 (see section 2). These three non-random properties can also be simulated
716 by an independent mixing of the four oligonucleotides R8, Y8, RRRYRYRRR,
717 YYYRYRYYY and large alternating R/Y series. The short linear decrease
718 is a result of R8 and Y8, the local maxima for i identical to 3[6],
719 of RRRYRYRRR and YYYRYRYYY, and the large exponential decrease, of
720 large alternating R/Y series (section 3). The biological meaning
721 of these results and their relation to the previous oligonucleotide
722 mixing model are presented in the Discussion.},
723 doi = {10.1006/jtbi.1993.1059},
724 institution = {Equipe de Biologie Théorique, Université de Franche-Comté, Laboratoire
725 d'Informatique de Besançon, France.},
726 keywords = {Animals; Biological Evolution; Genes, genetics; Models, Genetic; Models,
727 Statistical; Mutation, genetics; Oligonucleotides, genetics; Probability},
729 medline-pst = {ppublish},
731 pii = {S0022-5193(83)71059-3},
733 timestamp = {2011.05.05},
734 url = {http://dx.doi.org/10.1006/jtbi.1993.1059}
738 author = {David Arroyo and Gonzalo Alvarez and Veronica Fernandez},
739 title = {On the inadequacy of the logistic map for cryptographic applications},
740 journal = {X Reunión Española sobre Criptología y Seguridad de la Información
745 owner = {christophe},
746 timestamp = {2010.03.01}
749 @MISC{Backofen99algorithmicapproach,
750 author = {R. Backofen and S. Will and P. Clote},
751 title = {Algorithmic Approach To Quantifying The Hydrophobic Force Contribution
756 @INPROCEEDINGS{bgc11:ip,
757 author = {Bahi, Jacques and C\^ot\'e, Nathalie and Guyeux, Christophe},
758 title = {Chaos of Protein Folding},
759 booktitle = {IJCNN 2011, Int. Joint Conf. on Neural Networks},
761 pages = {1948--1954},
762 address = {San Jose, California, United States},
765 doi = {10.1109/IJCNN.2011.6033463},
766 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
769 url = {http://dx.doi.org/10.1109/IJCNN.2011.6033463}
773 author = {Bahi, Jacques and C\^ot\'e, Nathalie and Guyeux, Christophe and Salomon,
775 title = {Protein Folding in the {2D} Hydrophobic-Hydrophilic {(HP)} Square
776 Lattice Model is Chaotic},
777 journal = {Cognitive Computation},
780 note = {Published online. Paper version to appear},
782 doi = {10.1007/s12559-011-9118-z},
783 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
788 publisher = {Springer},
789 url = {http://dx.doi.org/10.1007/s12559-011-9118-z}
792 @INPROCEEDINGS{bcgr11:ip,
793 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe
794 and Richard, Adrien},
795 title = {On the Link Between Strongly Connected Iteration Graphs and Chaotic
796 Boolean Discrete-Time Dynamical Systems},
797 booktitle = {FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory},
802 address = {Oslo, Norway},
806 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
812 author = {Bahi, Jacques and Guyeux, Christophe},
813 title = {Hash Functions Using Chaotic Iterations},
814 journal = {Journal of Algorithms \& Computational Technology},
820 doi = {10.1260/1748-3018.4.2.167},
821 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
826 url = {http://dx.doi.org/10.1260/1748-3018.4.2.167}
829 @INPROCEEDINGS{guyeux10ter,
830 author = {Bahi, Jacques and Guyeux, Christophe},
831 title = {A new chaos-based watermarking algorithm},
832 booktitle = {SECRYPT'10, Int. conf. on security and cryptography},
835 address = {Athens, Greece},
837 publisher = {SciTePress},
839 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
845 author = {Bahi, Jacques and Guyeux, Christophe and Makhoul, Abdallah},
846 title = {Two Security Layers for Hierarchical Data Aggregation in Sensor Networks},
847 journal = {IJAACS, International Journal of Autonomous and Adaptive Communications
853 note = {Accepted manuscript. To appear},
855 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
862 @INPROCEEDINGS{guyeux10bis,
863 author = {Bahi, Jacques and Guyeux, Christophe and Makhoul, Abdallah},
864 title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor
866 booktitle = {SENSORCOMM'10, 4-th Int. Conf. on Sensor Technologies and Applications},
869 address = {Venice-Mestre, Italy},
872 doi = {10.1109/SENSORCOMM.2010.76},
873 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
876 url = {http://dx.doi.org/10.1109/SENSORCOMM.2010.76}
879 @INPROCEEDINGS{guyeuxVictoria,
880 author = {Bahi, Jacques and Guyeux, Christophe and Makhoul, Abdallah},
881 title = {Secure Data Aggregation in Wireless Sensor Networks. Homomorphism
882 versus Watermarking Approach},
883 booktitle = {ADHOCNETS 2010, 2nd Int. Conf. on Ad Hoc Networks},
886 series = {Lecture Notes in ICST},
888 address = {Victoria, Canada},
891 doi = {10.1007/978-3-642-17994-5_23},
892 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
895 url = {http://dx.doi.org/10.1007/978-3-642-17994-5_23}
898 @INPROCEEDINGS{bgmp11:ip,
899 author = {Bahi, Jacques and Guyeux, Christophe and Makhoul, Abdallah and Pham,
901 title = {Secure scheduling of wireless video sensor nodes for surveillance
903 booktitle = {ADHOCNETS 11, 3rd Int. ICST Conference on Ad Hoc Networks},
908 address = {Paris, France},
910 publisher = {Springer},
913 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
918 @INPROCEEDINGS{bgs11:ip,
919 author = {Bahi, Jacques and Guyeux, Christophe and Salomon, Michel},
920 title = {Building a Chaotic Proven Neural Network},
921 booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network
925 address = {Maldives, Maldives},
928 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
933 @INPROCEEDINGS{bgw10:ip,
934 author = {Bahi, Jacques and Guyeux, Christophe and Wang, Qianxue},
935 title = {A Pseudo Random Numbers Generator Based on Chaotic Iterations. Application
937 booktitle = {WISM 2010, Int. Conf. on Web Information Systems and Mining},
942 address = {Sanya, China},
945 doi = {10.1007/978-3-642-16515-3_26},
946 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
949 url = {http://dx.doi.org/10.1007/978-3-642-16515-3_26}
952 @INPROCEEDINGS{bgw09:ip,
953 author = {Bahi, Jacques and Guyeux, Christophe and Wang, Qianxue},
954 title = {A novel pseudo-random generator based on discrete chaotic iterations},
955 booktitle = {INTERNET'09, 1-st Int. Conf. on Evolving Internet},
958 address = {Cannes, France},
961 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
966 @INPROCEEDINGS{bmg10:onp,
967 author = {Bahi, Jacques and Makhoul, Abdallah and Guyeux, Christophe},
968 title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor
969 Networks for critical applications},
970 booktitle = {RESSACS, Journ\'ee th\'ematique PHC/ResCom sur RESeaux de capteurS
971 et Applications Critiques de Surveillance},
973 address = {Bayonne, France},
975 note = {Communication orale},
977 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
982 @INPROCEEDINGS{guyeuxBayonne,
983 author = {Bahi, Jacques and Makhoul, Abdallah and Guyeux, Christophe},
984 title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor
985 Networks for critical applications},
986 booktitle = {RESSACS, Journ\'ee th\'ematique PHC/ResCom sur RESeaux de capteurS
987 et Applications Critiques de Surveillance},
989 address = {Bayonne, France},
991 note = {Communication orale},
998 author = {Bahi, Jacques and Salomon, Michel},
999 title = {A Decentralized Energy-based Diffusion Algorithm to Increase the
1000 Lifetime of {MANETs}},
1001 journal = {Computer Networks Journal},
1004 note = {Accepted manuscript. To appear},
1005 classement = {ACLI},
1007 impact-factor = {1.201},
1010 publisher = {Elsevier}
1014 author = {J. M. Bahi},
1015 title = {Boolean totally asynchronous iterations},
1016 journal = {Int. Journal of Mathematical Algorithms},
1021 timestamp = {17/02/2008}
1024 @ARTICLE{Bahi2000bis,
1025 author = {Jacques M. Bahi},
1026 title = {Asynchronous iterative algorithms for nonexpansive linear systems},
1027 journal = {Journal of Parallel and Distributed Computing},
1032 timestamp = {2009.01.10}
1036 author = {J. M. Bahi},
1037 title = {Parallel synchronous chaotic iterations for singular linear systems},
1038 journal = {Parallel Algorithms and Applications},
1043 timestamp = {17/02/2008}
1047 author = {Jacques M. Bahi},
1048 title = {Algorithmes paralleles asynchrones pour les systemes singuliers},
1049 journal = {Comptes Rendus de l'Academie des Sciences},
1051 volume = {t. 326, serie 1},
1052 pages = {1421--1425},
1054 timestamp = {2009.01.18}
1058 author = {Jacques M. Bahi},
1059 title = {Méthodes itératives dans des espaces produits. Application au calcul
1061 school = {Université de Franche-Comté},
1063 type = {Habilitation à diriger des recherches},
1064 owner = {christophe},
1065 timestamp = {2010.08.24}
1069 author = {Jacques M. Bahi},
1070 title = {Algorithmes asynchrones pour des syst\`{e}mes différentiels-algébriques.
1071 Simulation numérique sur des exemples de circuits électriques},
1072 school = {Université de Franche-Comté},
1074 owner = {christophe},
1075 timestamp = {2010.08.24}
1079 author = {Jacques M. Bahi and Sylvain Contassot-Vivier},
1080 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
1082 journal = {IEEE Transactions on Neural Networks},
1089 timestamp = {2009.12.04}
1093 author = {J.~M. Bahi and S. Contassot-Vivier},
1094 title = {Stability of fully asynchronous discrete-time discrete state dynamic
1096 journal = {IEEE Transactions on Neural Networks},
1099 pages = {1353-1363},
1101 timestamp = {2009.02.14}
1104 @TECHREPORT{bcgg10:ir,
1105 author = {Bahi, J. M. and Couchot, J.-F. and Grasset, O. and Guyeux, C.},
1106 title = {{D}iscrete {D}ynamical {S}ystems: {N}ecessary {D}ivergence {C}onditions
1107 for {S}ynchronous {I}terations},
1108 institution = {LIFC - Laboratoire d'{I}nformatique de l'{U}niversit\'{e} de {F}ranche
1111 type = {Research Report},
1112 number = {RR2010-04},
1114 pdf = {/~publis/papers/pub/2010/RR2010-04.pdf}
1118 author = {Bahi, Jacques M. and Guyeux, Christophe},
1119 title = {Hash Functions Using Chaotic Iterations},
1120 journal = {Journal of Algorithms \& Computational Technology},
1125 classement = {ACLNI},
1126 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1128 impact-factor = {#},
1133 @INPROCEEDINGS{guyeux10,
1134 author = {Bahi, Jacques M. and Guyeux, Christophe},
1135 title = {Topological chaos and chaotic iterations, application to Hash functions},
1136 booktitle = {WCCI'10, IEEE World Congress on Computational Intelligence},
1139 address = {Barcelona, Spain},
1141 note = {Best paper award},
1142 classement = {ACTI},
1143 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1149 author = {Jacques M. Bahi and Christophe Guyeux},
1150 title = {A chaos-based approach for information hiding security.},
1151 howpublished = {arXiv},
1154 institution = {Computer Science Laboratory LIFC, University of Franche-Comte, France}
1158 author = {Jacques M. Bahi and Christophe Guyeux},
1159 title = {A watermarking algorithm satisfying topological chaos properties},
1162 volume = {abs/0810.4713},
1163 bibsource = {DBLP, http://dblp.uni-trier.de},
1164 ee = {http://arxiv.org/abs/0810.4713}
1168 author = {Jacques M. Bahi and Christophe Guyeux},
1169 title = {Chaotic iterations and topological chaos},
1171 abstract = {Chaotic iterations have been introduced on the one hand by Chazan,
1172 Miranker [5] and Miellou [9] in a numerical analysis context, and
1173 on the other hand by Robert [11] and Pellegrin [10] in the discrete
1174 dynamical systems framework. In both cases, the objective was to
1175 derive conditions of convergence of such iterations to a fixed state.
1176 In this paper, a new point of view is presented, the goal here is
1177 to derive conditions under which chaotic iterations admit a chaotic
1178 behaviour in a rigorous mathematical sense. Contrary to what has
1179 been studied in the literature, convergence is not desired. More
1180 precisely, we establish in this paper a link between the concept
1181 of chaotic iterations on a finite set and the notion of topological
1182 chaos [8], [6], [7]. We are motivated by concrete applications of
1183 our approach, such as the use of chaotic boolean iterations in the
1184 computer security field. Indeed, the concept of chaos is used in
1185 many areas of data security without real rigorous theoretical foundations,
1186 and without using the fundamental properties that allow chaos. The
1187 wish of this paper is to bring a bit more mathematical rigour in
1189 citeseerurl = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}},
1191 comments = {6 pages},
1192 eprint = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}},
1193 oai2identifier = {0810.3154},
1195 timestamp = {2008.10.23},
1196 url = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}}
1199 @ARTICLE{arxivRNNchaos,
1200 author = {Jacques M. Bahi and Christophe Guyeux and Michel Salomon},
1201 title = {Building a Chaotic Proved Neural Network},
1204 volume = {abs/1101.4351},
1205 ee = {http://arxiv.org/abs/1101.4351}
1208 @INPROCEEDINGS{guyeuxTaiwan10,
1209 author = {Bahi, Jacques M. and Guyeux, Christophe and Wang, Qianxue},
1210 title = {Improving random number generators by chaotic iterations. Application
1212 booktitle = {ICCASM 2010, Int. Conf. on Computer Application and System Modeling},
1214 pages = {V13-643--V13-647},
1215 address = {Taiyuan, China},
1217 classement = {ACTI},
1218 doi = {10.1109/ICCASM.2010.5622199},
1219 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1222 url = {http://dx.doi.org/10.1109/ICCASM.2010.5622199}
1226 author = {Jacques M Bahi and Christian J Michel},
1227 title = {A stochastic model of gene evolution with time dependent pseudochaotic
1229 journal = {Bull Math Biol},
1235 abstract = {We develop here a new class of stochastic models of gene evolution
1236 in which a random subset of the 64 possible trinucleotides mutates
1237 at each evolutionary time t according to some time dependent substitution
1238 probabilities. Therefore, at each time t, the numbers and the types
1239 of mutable trinucleotides are unknown. Thus, the mutation matrix
1240 changes at each time t. This pseudochaotic model developed generalizes
1241 the standard model in which all the trinucleotides mutate at each
1242 time t. It determines the occurrence probabilities at time t of trinucleotides
1243 which pseudochaotically mutate according to 3 time dependent substitution
1244 parameters associated with the 3 trinucleotide sites. The main result
1245 proves that under suitable assumptions, this pseudochaotic model
1246 converges to a uniform probability vector identical to that of the
1247 standard model. Furthermore, an application of this pseudochaotic
1248 model allows an evolutionary study of the 3 circular codes identified
1249 in both eukaryotic and prokaryotic genes. A circular code is a particular
1250 set of trinucleotides whose main property is the retrieval of the
1251 frames in genes locally, i.e., anywhere in genes and particularly
1252 without start codons, and automatically with a window of a few nucleotides.
1253 After a certain evolutionary time and with particular time dependent
1254 functions for the 3 substitution parameters, precisely an exponential
1255 decrease in the 1st and 2nd trinucleotide sites and an exponential
1256 increase in the 3rd one, this pseudochaotic model retrieves the main
1257 statistical properties of the 3 circular codes observed in genes.
1258 Furthermore, it leads to a circular code asymmetry stronger than
1259 the standard model (nonpseudochaotic) and, therefore, to a better
1260 correlation with the genes.},
1261 doi = {10.1007/s11538-008-9376-4},
1262 institution = {LIFC-EA 4157, Université de Franche-Comté, IUT de Belfort, BP 527,
1263 90016, Belfort Cedex, France. jacques.bahi@univ-fcomte.fr},
1264 keywords = {Evolution, Molecular; Genes; Models, Genetic; Mutation; Stochastic
1267 medline-pst = {ppublish},
1270 timestamp = {2011.05.05},
1271 url = {http://dx.doi.org/10.1007/s11538-008-9376-4}
1275 author = {Jacques M Bahi and Christian J Michel},
1276 title = {A stochastic model of gene evolution with chaotic mutations.},
1277 journal = {J Theor Biol},
1283 abstract = {We develop here a new class of stochastic models of gene evolution
1284 in which the mutations are chaotic, i.e. a random subset of the 64
1285 possible trinucleotides mutates at each evolutionary time t according
1286 to some substitution probabilities. Therefore, at each time t, the
1287 numbers and the types of mutable trinucleotides are unknown. Thus,
1288 the mutation matrix changes at each time t. The chaotic model developed
1289 generalizes the standard model in which all the trinucleotides mutate
1290 at each time t. It determines the occurrence probabilities at time
1291 t of trinucleotides which chaotically mutate according to three substitution
1292 parameters associated with the three trinucleotide sites. Two theorems
1293 prove that this chaotic model has a probability vector at each time
1294 t and that it converges to a uniform probability vector identical
1295 to that of the standard model. Furthermore, four applications of
1296 this chaotic model (with a uniform random strategy for the 64 trinucleotides
1297 and with a particular strategy for the three stop codons) allow an
1298 evolutionary study of the three circular codes identified in both
1299 eukaryotic and prokaryotic genes. A circular code is a particular
1300 set of trinucleotides whose main property is the retrieval of the
1301 frames in genes locally, i.e. anywhere in genes and particularly
1302 without start codons, and automatically with a window of a few nucleotides.
1303 After a certain evolutionary time and with particular values for
1304 the three substitution parameters, the chaotic models retrieve the
1305 main statistical properties of the three circular codes observed
1306 in genes. These applications also allow an evolutionary comparison
1307 between the standard and chaotic models.},
1308 doi = {10.1016/j.jtbi.2008.07.028},
1309 institution = {LIFC-EA 4157, Université de Franche-Comté, IUT de Belfort, BP 527,
1310 90016 Belfort Cedex, France. jacques.bahi@univ-fcomte.fr},
1311 keywords = {Animals; Computer Simulation; DNA, Circular, genetics; Evolution,
1312 Molecular; Genetic Code; Models, Genetic; Mutation; Nonlinear Dynamics;
1313 Stochastic Processes; Time},
1315 medline-pst = {ppublish},
1317 pii = {S0022-5193(08)00395-0},
1319 timestamp = {2011.05.05},
1320 url = {http://dx.doi.org/10.1016/j.jtbi.2008.07.028}
1323 @ARTICLE{Bahi2008bis,
1324 author = {Bahi, J. M. and Michel, C. J.},
1325 title = {A stochastic model of gene evolution with chaotic mutations},
1326 journal = {Journal of Theoretical Biology},
1331 timestamp = {2009.01.10}
1335 author = {Jacques M Bahi and Christian J Michel},
1336 title = {A stochastic gene evolution model with time dependent mutations.},
1337 journal = {Bull Math Biol},
1343 abstract = {We develop here a new class of gene evolution models in which the
1344 nucleotide mutations are time dependent. These models allow to study
1345 nonlinear gene evolution by accelerating or decelerating the mutation
1346 rates at different evolutionary times. They generalize the previous
1347 ones which are based on constant mutation rates. The stochastic model
1348 developed in this class determines at some time t the occurrence
1349 probabilities of trinucleotides mutating according to 3 time dependent
1350 substitution parameters associated with the 3 trinucleotide sites.
1351 Therefore, it allows to simulate the evolution of the circular code
1352 recently observed in genes. By varying the class of function for
1353 the substitution parameters, 1 among 12 models retrieves after mutation
1354 the statistical properties of the observed circular code in the 3
1355 frames of actual genes. In this model, the mutation rate in the 3rd
1356 trinucleotide site increases during gene evolution while the mutation
1357 rates in the 1st and 2nd sites decrease. This property agrees with
1358 the actual degeneracy of the genetic code. This approach can easily
1359 be generalized to study evolution of motifs of various lengths, e.g.,
1360 dicodons, etc., with time dependent mutations.},
1361 doi = {10.1016/j.bulm.2003.10.004},
1362 institution = {LIFC - FRE CNRS 2661, IUT de Belfort, Université de Franche-Comté,
1363 BP 527, 90016 Belfort Cédex, France. bahi@iut-bm.univ-fcomte.fr},
1364 keywords = {Codon, genetics; Evolution, Molecular; Genes, genetics; Genetic Code,
1365 genetics; Models, Genetic; Mutation; Stochastic Processes},
1367 medline-pst = {ppublish},
1369 pii = {S0092824003001174},
1371 timestamp = {2011.05.05},
1372 url = {http://dx.doi.org/10.1016/j.bulm.2003.10.004}
1376 author = {J. Banks and J. Brooks and G. Cairns and P. Stacey},
1377 title = {On Devaney's Definition of Chaos},
1378 journal = {Amer. Math. Monthly},
1384 timestamp = {27/01/2008}
1388 author = {E. Barker and A. Roginsky},
1389 title = {DRAFT NIST Special Publication 800-131 Recommendation for the Transitioning
1390 of Cryptographic Algorithms and Key Sizes},
1392 owner = {christophe},
1393 timestamp = {2010.08.18}
1397 author = {Mauro Barni and Franco Bartolini and Teddy Furon},
1398 title = {A general framework for robust watermarking security},
1399 journal = {Signal Processing},
1402 pages = {2069-2084},
1404 note = {Special issue on Security of Data Hiding Technologies, invited paper},
1405 bibsource = {DBLP, http://dblp.uni-trier.de},
1406 ee = {http://dx.doi.org/10.1016/S0165-1684(03)00168-3},
1408 timestamp = {2009.06.30}
1412 author = {Baudet, G\'{e}rard M.},
1413 title = {Asynchronous Iterative Methods for Multiprocessors},
1419 address = {New York, NY, USA},
1420 doi = {http://doi.acm.org/10.1145/322063.322067},
1426 author = {Didier El Baz},
1427 title = {Contribution à l'algorithmique parall\`{e}le. Le concept d'asynchronisme
1428 : étude théorique, mise en œuvre, et application},
1429 school = {Institut national polytechnique de Toulouse},
1431 type = {Habilitation à diriger des recherches},
1432 owner = {christophe},
1433 timestamp = {2010.08.24}
1437 author = {Benoit, Anne and Hakem, Mourad and Robert, Yves},
1438 title = {Contention awareness and fault-tolerant scheduling for precedence
1439 constrained tasks in heterogeneous systems},
1440 journal = {Parallel Computing},
1446 doi = {10.1016/j.parco.2008.11.001},
1449 url = {http://dx.doi.org/10.1016/j.parco.2008.11.001}
1452 @INPROCEEDINGS{bhr08b:bl,
1453 author = {Benoit, Anne and Hakem, Mourad and Robert, Yves},
1454 title = {Fault tolerant scheduling of precedence task graphs on heterogeneous
1456 booktitle = {IPDPS'08},
1459 publisher = {IEEE Computer Society Press},
1465 @INPROCEEDINGS{Berger98,
1466 author = {Berger, Bonnie and Leighton, Tom},
1467 title = {Protein folding in the hydrophobic-hydrophilic (HP) is NP-complete},
1468 booktitle = {Proceedings of the second annual international conference on Computational
1471 series = {RECOMB '98},
1473 address = {New York, NY, USA},
1476 isbn = {0-89791-976-9},
1477 location = {New York, New York, United States},
1482 title = {Parallel and distributed computation: numerical methods},
1483 publisher = {Prentice-Hall, Inc.},
1485 author = {Bertsekas, Dimitri P. and Tsitsiklis, John N.},
1486 address = {Upper Saddle River, NJ, USA},
1487 isbn = {0-13-648700-9}
1490 @MISC{Bertsekas88paralleland,
1491 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
1492 title = {Parallel and distributed iterative algorithms: a selective survey},
1497 author = {F. Blanchard and E. Glasner and S. Kolyada and A.Maass},
1498 title = {On Li-Yorke pairs},
1502 timestamp = {2008.01.02}
1506 author = {F. Blanchard and B. Host and S. Ruette},
1507 title = {Asymptotic pairs in positive-entropy systems},
1509 optannote = {to appear in Ergod. Th. Dynam. Sys.},
1512 timestamp = {2008.01.02}
1515 @INPROCEEDINGS{Blum:1985:EPP:19478.19501,
1516 author = {Blum, Manuel and Goldwasser, Shafi},
1517 title = {An efficient probabilistic public key encryption scheme which hides
1518 all partial information},
1519 booktitle = {Proceedings of CRYPTO 84 on Advances in cryptology},
1522 address = {New York, NY, USA},
1523 publisher = {Springer-Verlag New York, Inc.},
1525 isbn = {0-387-15658-5},
1526 keywords = {chosen cyphertext attack, integer factorization, partial information,
1527 passive adversaries, probabilistic encryption},
1528 location = {Santa Barbara, California, United States},
1530 url = {http://dl.acm.org/citation.cfm?id=19478.19501}
1534 author = {Dan Boneh and Matt Franklin},
1535 title = {Identity-Based Encryption from the {Weil} Pairing},
1536 journal = {SIAM J. of Computing},
1541 note = {Extended abstract in Crypto'01}
1544 @INCOLLECTION{boneh,
1545 author = {Boneh, Dan and Goh, Eu-Jin and Nissim, Kobbi},
1546 title = {Evaluating 2-DNF Formulas on Ciphertexts},
1549 abstract = {Let ψ be a 2-DNF formula on boolean variables x 1,..., x n ∈ {0,1}.
1550 We present a homomorphic public key encryption scheme that allows
1551 the public evaluation of ψ given an encryption of the variables x
1552 1,..., x n. In other words, given the encryption of the bits x 1,...,
1553 x n, anyone can create the encryption of ψ( x 1,..., x n). More generally,
1554 we can evaluate quadratic multi-variate polynomials on ciphertexts
1555 provided the resulting value falls within a small set. We present
1556 a number of applications of the system: 1 In a database of size n,
1557 the total communication in the basic step of the Kushilevitz-Ostrovsky
1558 PIR protocol is reduced from to . 2 An efficient election system
1559 based on homomorphic encryption where voters do not need to include
1560 non-interactive zero knowledge proofs that their ballots are valid.
1561 The election system is proved secure without random oracles but still
1562 efficient. 3 A protocol for universally verifiable computation.},
1563 citeulike-article-id = {2719460},
1564 citeulike-linkout-0 = {http://www.springerlink.com/content/wtt5caxkr94laxkg},
1565 journal = {Theory of Cryptography},
1566 keywords = {homomorphic, pairings},
1567 posted-at = {2008-04-25 21:53:15},
1569 url = {http://www.springerlink.com/content/wtt5caxkr94laxkg}
1573 author = {Bonneau, Richard and Baker, David},
1574 title = {AB INITIO PROTEIN STRUCTURE PREDICTION: Progress and Prospects},
1575 journal = {Annual Review of Biophysics and Biomolecular Structure},
1580 doi = {10.1146/annurev.biophys.30.1.173}
1584 author = {R. Bowen},
1585 title = {Entropy for group endomorphisms and homogeneous spaces},
1586 journal = {Trans. Amer. Math. Soc.},
1591 timestamp = {15/02/2008}
1595 author = {R. Bowen},
1596 title = {Periodic points and measures for Axiom A diffeomorphisms},
1597 journal = {Trans. Amer. Math. Soc.},
1602 timestamp = {15/02/2008}
1605 @ARTICLE{Braxenthaler97,
1606 author = {Michael Braxenthaler and R. Ron Unger and Ditza Auerbach and John
1608 title = {Chaos in protein dynamics},
1609 journal = {Proteins-structure Function and Bioinformatics},
1613 doi = {10.1002/(SICI)1097-0134(199712)29:4<417::AID-PROT2>3.3.CO;2-O},
1618 author = {Brin, Sergey and Page, Larry},
1622 note = {\texttt{http://www.google.com}}
1626 author = {Brin, Sergey and Page, Larry},
1630 note = {\texttt{https://plus.google.com}}
1633 @INPROCEEDINGS{Brumley03remotetiming,
1634 author = {David Brumley and Dan Boneh},
1635 title = {Remote Timing Attacks are Practical},
1636 booktitle = {Proceedings of the 12th USENIX Security Symposium},
1641 @ARTICLE{Bohm1991375,
1642 author = {Gerald Böhm},
1643 title = {Protein folding and deterministic chaos: Limits of protein folding
1644 simulations and calculations},
1645 journal = {Chaos, Solitons \& Fractals},
1648 pages = {375 - 382},
1650 doi = {DOI: 10.1016/0960-0779(91)90028-8},
1652 url = {http://www.sciencedirect.com/science/article/B6TJ4-46CBXVT-1X/2/370489c218e4c2732cd9b620ef50c696}
1655 @INCOLLECTION{Cachin2004,
1656 author = {Cachin, Christian},
1657 title = {An Information-Theoretic Model for Steganography},
1658 booktitle = {Information Hiding},
1659 publisher = {Springer Berlin / Heidelberg},
1662 series = {Lecture Notes in Computer Science},
1664 affiliation = {MIT Laboratory for Computer Science 545 Technology Square Cambridge
1669 author = {H. Cam and S. Ozdemir and P. Nair and D. Muthuavinashinappan and
1671 title = {ESPDA: Energy-efficient secure pattern based data aggregation for
1672 wireless sensor networks.},
1673 journal = {Computer Communication journal (29)},
1678 @ARTICLE{CarletCZ98,
1679 author = {Claude Carlet and Pascale Charpin and Victor Zinoviev},
1680 title = {Codes, Bent Functions and Permutations Suitable For DES-like Cryptosystems},
1681 journal = {Des. Codes Cryptography},
1686 bibsource = {DBLP, http://dblp.uni-trier.de}
1689 @INPROCEEDINGS{Castelluccia05efficientaggregation,
1690 author = {Claude Castelluccia},
1691 title = {Efficient aggregation of encrypted data in wireless sensor networks},
1692 booktitle = {MobiQuitous},
1695 publisher = {IEEE Computer Society}
1699 author = {Cayre, F. and Bas, P.},
1700 title = {Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding},
1701 journal = {IEEE Transactions on Information Forensics and Security},
1706 doi = {10.1109/TIFS.2007.916006},
1708 keywords = {cryptography, random sequences, spread spectrum communication, telecommunication
1709 security, watermarking, Kerckhoffs-based embedding security classes,
1710 WOA Data Hiding, pseudorandom sequences, spread-spectrum techniques,
1711 steganography security, watermark-only-attack, watermarking, Security,
1712 spread-spectrum (SS) watermarking},
1714 timestamp = {2009.06.29}
1718 author = {Cayre, F. and Fontaine, C. and Furon, T.},
1719 title = {Watermarking security: theory and practice},
1720 journal = {IEEE Transactions on Signal Processing},
1723 pages = {3976--3987},
1725 doi = {10.1109/TSP.2005.855418},
1727 keywords = {blind source separation, cryptography, watermarking, Fisher information
1728 matrix, blind source separation, cryptanalysis, information theory,
1729 spread spectrum techniques, substitutive scheme, watermarking security,
1730 Blind source separation, Fisher information matrix, equivocation,
1731 security, watermarking},
1733 timestamp = {2009.06.29}
1736 @ARTICLE{Chajakis91,
1737 author = {Chajakis, Emmanuel D. and Zenios, Stavros A.},
1738 title = {Synchronous and asynchronous implementations of relaxation algorithms
1739 for nonlinear network optimization},
1740 journal = {Parallel Comput.},
1745 address = {Amsterdam, The Netherlands, The Netherlands},
1746 doi = {http://dx.doi.org/10.1016/S0167-8191(05)80072-9},
1748 publisher = {Elsevier Science Publishers B. V.}
1752 author = {Chan, Haowen and Perrig, Adrian and Przydatek, Bartosz and Song,
1754 title = {SIA: Secure information aggregation in sensor networks},
1755 journal = {J. Comput. Secur.},
1760 address = {Amsterdam, The Netherlands, The Netherlands},
1762 publisher = {IOS Press}
1765 @ARTICLE{Chandramouli06,
1766 author = {R. Chandramouli and S. Bapatla and K.P. Subbalakshmi},
1767 title = {Battery power-aware encryption},
1768 journal = {ACM transactions on information and system security},
1771 owner = {christophe},
1772 timestamp = {2010.07.31}
1776 author = {Pascale Charpin},
1777 title = {A description of some extended cyclic codes with application to Reed-Solomon
1779 journal = {Discrete Mathematics},
1784 bibsource = {DBLP, http://dblp.uni-trier.de},
1785 ee = {http://dx.doi.org/10.1016/0012-365X(85)90019-6}
1789 author = {D. Chazan and W. Miranker},
1790 title = {Chaotic relaxation},
1791 journal = {Linear algebra and its applications},
1795 timestamp = {2008.05.22}
1799 author = {Cheon, Jung Hee and Kim, Woo-Hwan and Nam, Hyun Soo},
1800 title = {Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy
1801 homomorphism scheme},
1802 journal = {Inf. Process. Lett.},
1807 address = {Amsterdam, The Netherlands, The Netherlands},
1808 doi = {http://dx.doi.org/10.1016/j.ipl.2005.09.016},
1810 publisher = {Elsevier North-Holland, Inc.}
1813 @MISC{Cheon03acryptanalysis,
1814 author = {Jung Hee Cheon and Hyun Soo Nam},
1815 title = {A Cryptanalysis of the Original Domingo-Ferrer's Algebraic Privacy
1821 author = {R.C.C. Cheung and N.J. Telle and W. Luk and P.Y.K. Cheung},
1822 title = {Secure encrypted-data aggregation for wireless sensor networks},
1823 journal = {IEEE Trans. on Very Large Scale Integration Systems},
1826 pages = {1048-1059},
1830 @ARTICLE{Chivian2005,
1831 author = {Chivian, Dylan and Kim, David E. and Malmström, Lars and Schonbrun,
1832 Jack and Rohl, Carol A. and Baker, David},
1833 title = {Prediction of CASP6 structures using automated robetta protocols},
1834 journal = {Proteins},
1840 keywords = {Rosetta, fragment assembly, de novo modeling, homology modeling, parametric
1841 alignment ensemble},
1842 owner = {christophe},
1843 publisher = {Wiley Subscription Services, Inc., A Wiley Company},
1844 timestamp = {2011.01.22},
1845 url = {http://dx.doi.org/10.1002/prot.20733}
1849 author = {Congxu, Zhu and Xuefeng, Liao and Zhihua, Li},
1850 title = {Chaos-based multipurpose image watermarking algorithm},
1851 journal = {Wuhan University Journal of Natural Sciences},
1854 pages = {1675-1678},
1855 note = {10.1007/BF02831848},
1856 abstract = {To achieve the goal of image content authentication and copyright
1857 protection simultaneously, this paper presents a novel image dual
1858 watermarking method based on chaotic map. Firstly, the host image
1859 was split into many nonoverlapping small blocks, and the block-wise
1860 discrete cosine transform (DCT) is computed. Secondly, the robust
1861 watermarks, shuffled by the chaotic sequences, are embedded in the
1862 DC coefficients of blocks to achieve the goal of copyright protection.
1863 The semi-fragile watermarks, generated by chaotic map, are embedded
1864 in the AC coefficients of blocks to obtain the aim of image authentication.
1865 Both of them can be extracted without the original image. Simulation
1866 results demonstrate the effectiveness of our algorithm in terms of
1867 robustness and fragility.},
1868 affiliation = {Central South University School of Information Science and Engineering
1869 410083 Changsha, Hunan China},
1872 keyword = {Mathematics, general},
1873 publisher = {Wuhan University, co-published with Springer},
1874 url = {http://dx.doi.org/10.1007/BF02831848}
1877 @ARTICLE{Conley1978,
1878 author = {C. Conley},
1879 title = {Isolated invariant sets and the Morse index},
1880 journal = {CBMS Regional Conference. AMS.},
1884 timestamp = {2008.01.02}
1888 author = {Coppel,W. A.},
1889 title = {The solution of equations by iteration},
1890 journal = {Mathematical Proceedings of the Cambridge Philosophical Society},
1895 doi = {10.1017/S030500410002990X},
1896 eprint = {http://journals.cambridge.org/article_S030500410002990X},
1897 url = {http://dx.doi.org/10.1017/S030500410002990X}
1901 author = {Philippe Cornu and André Smolarz},
1902 title = {Image characterization by texture},
1903 journal = {Traitement du signal},
1907 file = {:/home/guyeux/Documents/Bibliotheque/These/Watermarking/Caractérisation d'images par textures associées.pdf:PDF},
1909 timestamp = {2008.05.12}
1912 @INPROCEEDINGS{Cox99,
1913 author = {Ingemar Cox and Matt L. Miller and Andrew L. Mckellips},
1914 title = {Watermarking as Communications With Side Information},
1915 booktitle = {Proceedings of the IEEE},
1917 pages = {1127--1141},
1918 owner = {christophe},
1919 timestamp = {2010.03.06}
1922 @ARTICLE{Cox97securespread,
1923 author = {Ingemar J. Cox and Senior Member and Joe Kilian and F. Thomson Leighton
1925 title = {Secure spread spectrum watermarking for multimedia},
1926 journal = {IEEE Transactions on Image Processing},
1929 pages = {1673--1687}
1933 author = {Christopher Cramer and Erol Gelenbe and Hakan Bakircioglu},
1934 title = {Video Compression with Random Neural Networks},
1935 journal = {Neural Networks for Identification, Control, and Robotics, International
1940 address = {Los Alamitos, CA, USA},
1941 isbn = {0-8186-7456-3},
1942 publisher = {IEEE Computer Society}
1945 @INPROCEEDINGS{Crescenzi98,
1946 author = {Crescenzi, Pierluigi and Goldman, Deborah and Papadimitriou, Christos
1947 and Piccolboni, Antonio and Yannakakis, Mihalis},
1948 title = {On the complexity of protein folding (extended abstract)},
1949 booktitle = {Proceedings of the thirtieth annual ACM symposium on Theory of computing},
1951 series = {STOC '98},
1953 address = {New York, NY, USA},
1956 isbn = {0-89791-962-9},
1957 location = {Dallas, Texas, United States},
1962 author = {Zhao Dawei and Chen Guanrong and Liu Wenbo},
1963 title = {A chaos-based robust wavelet-domain watermarking algorithm},
1964 journal = {Chaos, Solitons and Fractals},
1969 timestamp = {2008.10.07}
1973 author = {Anthony Desnos and Robert Erra and Eric Filiol},
1974 title = {Processor-Dependent Malware... and codes},
1976 comment = {arXiv:1011.1638},
1977 eprint = {arXiv:1011.1638}
1981 title = {An Introduction to Chaotic Dynamical Systems},
1982 publisher = {Addison-Wesley},
1984 author = {Devaney, Robert L.},
1985 address = {Redwood City, CA},
1990 author = {Whitfield Diffie and Martin E. Hellman},
1991 title = {New Directions in Cryptography},
1992 journal = {IEEE Transactions on Information Theory},
1997 date = {November 1976},
1999 timestamp = {2009.06.30},
2000 url = {citeseer.ist.psu.edu/diffie76new.html}
2003 @INCOLLECTION{Dijk10,
2004 author = {van Dijk, Marten and Gentry, Craig and Halevi, Shai and Vaikuntanathan,
2006 title = {Fully Homomorphic Encryption over the Integers},
2007 booktitle = {Advances in Cryptology – EUROCRYPT 2010},
2008 publisher = {Springer Berlin / Heidelberg},
2010 editor = {Gilbert, Henri},
2012 series = {Lecture Notes in Computer Science},
2014 abstract = {We construct a simple fully homomorphic encryption scheme, using only
2015 elementary modular arithmetic. We use Gentry’s technique to construct
2016 a fully homomorphic scheme from a bootstrappable somewhat homomorphic
2017 scheme. However, instead of using ideal lattices over a polynomial
2018 ring, our bootstrappable encryption scheme merely uses addition and
2019 multiplication over the integers. The main appeal of our scheme is
2020 the conceptual simplicity. We reduce the security of our scheme to
2021 finding an approximate integer gcd – i.e., given a list of integers
2022 that are near-multiples of a hidden integer, output that hidden integer.
2023 We investigate the hardness of this task, building on earlier work
2024 of Howgrave-Graham.},
2025 affiliation = {MIT CSAIL}
2029 author = {Dill, KA},
2030 title = {Theory for the folding and stability of globular proteins.},
2031 journal = {Biochemistry},
2037 abstract = {Using lattice statistical mechanics, we develop theory to account
2038 for the folding of a heteropolymer molecule such as a protein to
2039 the globular and soluble state. Folding is assumed to be driven by
2040 the association of solvophobic monomers to avoid solvent and opposed
2041 by the chain configurational entropy. Theory predicts a phase transition
2042 as a function of temperature or solvent character. Molecules that
2043 are too short or too long or that have too few solvophobic residues
2044 are predicted not to fold. Globular molecules should have a largely
2045 solvophobic core, but there is an entropic tendency for some residues
2046 to be "out of place", particularly in small molecules. For long chains,
2047 molecules comprised of globular domains are predicted to be thermodynamically
2048 more stable than spherical molecules. The number of accessible conformations
2049 in the globular state is calculated to be an exceedingly small fraction
2050 of the number available to the random coil. Previous estimates of
2051 this number, which have motivated kinetic theories of folding, err
2052 by many tens of orders of magnitude.},
2053 comment = {Research Support, Non-U.S. Gov't,Research Support, U.S. Gov't, P.H.S.,},
2054 keywords = {Mathematics, Models, Chemical, Polymers, Protein Conformation},
2055 owner = {christophe},
2056 timestamp = {2011.01.22},
2057 url = {http://ukpmc.ac.uk/abstract/MED/3986190}
2061 author = {Dill, KA and Bromberg, S and Yue, K and Fiebig, KM and Yee, DP and
2062 Thomas, PD and Chan, HS},
2063 title = {Principles of protein folding--a perspective from simple exact models.},
2064 journal = {Protein Sci},
2067 pages = {561-602--},
2070 abstract = {General principles of protein structure, stability, and folding kinetics
2071 have recently been explored in computer simulations of simple exact
2072 lattice models. These models represent protein chains at a rudimentary
2073 level, but they involve few parameters, approximations, or implicit
2074 biases, and they allow complete explorations of conformational and
2075 sequence spaces. Such simulations have resulted in testable predictions
2076 that are sometimes unanticipated: The folding code is mainly binary
2077 and delocalized throughout the amino acid sequence. The secondary
2078 and tertiary structures of a protein are specified mainly by the
2079 sequence of polar and nonpolar monomers. More specific interactions
2080 may refine the structure, rather than dominate the folding code.
2081 Simple exact models can account for the properties that characterize
2082 protein folding: two-state cooperativity, secondary and tertiary
2083 structures, and multistage folding kinetics--fast hydrophobic collapse
2084 followed by slower annealing. These studies suggest the possibility
2085 of creating "foldable" chain molecules other than proteins. The encoding
2086 of a unique compact chain conformation may not require amino acids;
2087 it may require only the ability to synthesize specific monomer sequences
2088 in which at least one monomer type is solvent-averse.},
2089 address = {Department of Pharmaceutical Chemistry, University of California,
2090 San Francisco 94143-1204, USA.},
2091 comment = {Review,Research Support, Non-U.S. Gov't,Research Support, U.S. Gov't,
2092 Non-P.H.S.,Research Support, U.S. Gov't, P.H.S.,},
2093 keywords = {Amino Acid Sequence, Biological Evolution, Hydrogen Bonding, Models,
2094 Molecular, Molecular Sequence Data, Mutation, Protein Conformation,
2095 Protein Denaturation, Protein Folding, Temperature, Thermodynamics},
2096 owner = {christophe},
2097 timestamp = {2011.01.22},
2098 url = {http://ukpmc.ac.uk/abstract/MED/7613459}
2101 @INPROCEEDINGS{Dobbertin96,
2102 author = {Dobbertin, Hans},
2103 title = {Cryptanalysis of MD4},
2104 booktitle = {Proceedings of the Third International Workshop on Fast Software
2108 address = {London, UK},
2109 publisher = {Springer-Verlag},
2110 isbn = {3-540-60865-6}
2113 @INPROCEEDINGS{DomingoFerrer2002,
2114 author = {Domingo-Ferrer, Josep},
2115 title = {A Provably Secure Additive and Multiplicative Privacy Homomorphism},
2116 booktitle = {ISC '02: Proceedings of the 5th International Conference on Information
2120 address = {London, UK},
2121 publisher = {Springer-Verlag},
2122 isbn = {3-540-44270-7}
2125 @ARTICLE{Dubchak1995,
2126 author = {I. Dubchak and I. Muchnik and S. R. Holbrook and S. H. Kim},
2127 title = {Prediction of protein folding class using global description of amino
2129 journal = {Proc Natl Acad Sci U S A},
2132 pages = {8700--8704},
2135 __markedentry = {[guyeux]},
2136 abstract = {We present a method for predicting protein folding class based on
2137 global protein chain description and a voting process. Selection
2138 of the best descriptors was achieved by a computer-simulated neural
2139 network trained on a data base consisting of 83 folding classes.
2140 Protein-chain descriptors include overall composition, transition,
2141 and distribution of amino acid attributes, such as relative hydrophobicity,
2142 predicted secondary structure, and predicted solvent exposure. Cross-validation
2143 testing was performed on 15 of the largest classes. The test shows
2144 that proteins were assigned to the correct class (correct positive
2145 prediction) with an average accuracy of 71.7\%, whereas the inverse
2146 prediction of proteins as not belonging to a particular class (correct
2147 negative prediction) was 90-95\% accurate. When tested on 254 structures
2148 used in this study, the top two predictions contained the correct
2149 class in 91\% of the cases.},
2150 institution = {Department of Chemistry, University of California, Berkeley 94720,
2152 keywords = {Amino Acid Sequence; Amino Acids, chemistry; Computer Simulation;
2153 Databases, Factual; Models, Chemical; Neural Networks (Computer);
2154 Protein Folding; Protein Structure, Secondary; Proteins, chemistry/classification;
2155 Reproducibility of Results; Solvents},
2157 medline-pst = {ppublish},
2160 timestamp = {2011.07.18}
2164 title = {Real analysis and probability},
2165 publisher = {Cambridge University Press},
2166 author = {Richard M. Dudley},
2169 timestamp = {2008.01.02}
2173 author = {El Tarazi, Mouhamed Nabih},
2174 title = {Algorithmes mixtes asynchrones. Etude de convergence monotone},
2175 journal = {Numerische Mathematik},
2179 note = {10.1007/BF01405568},
2180 affiliation = {Department of Mathematics, Faculty of Science Kuwait University P.O.
2184 keyword = {Mathematics and Statistics},
2185 publisher = {Springer Berlin / Heidelberg},
2186 url = {http://dx.doi.org/10.1007/BF01405568}
2190 author = {El Tarazi, Mouhamed Nabih},
2191 title = {Some convergence results for asynchronous algorithms},
2192 journal = {Numerische Mathematik},
2196 note = {10.1007/BF01407866},
2197 affiliation = {Department of Mathematics, Faculty of Science Kuwait University P.O.
2198 Box 5969 Kuwait Kuwait},
2201 keyword = {Mathematics and Statistics},
2202 publisher = {Springer Berlin / Heidelberg},
2203 url = {http://dx.doi.org/10.1007/BF01407866}
2207 author = {Peng Fei and Qiu Shui-Sheng and Long Min},
2208 title = {A secure digital signature algorithm based on elliptic curve and
2210 journal = {Circuits Systems Signal Processing},
2212 volume = {24, No. 5},
2215 timestamp = {2009.01.16}
2218 @BOOK{Feigenbaum1908,
2219 title = {Universal behavior in nonlinear systems},
2220 publisher = {Los Alamos Science},
2222 author = {Feigenbaum},
2224 timestamp = {2008.01.02}
2227 @ARTICLE{Felsenstein1980,
2228 author = {J. Felsenstein},
2229 title = {A view of population genetics.},
2230 journal = {Science},
2236 doi = {10.1126/science.208.4449.1253},
2238 medline-pst = {ppublish},
2240 pii = {208/4449/1253},
2242 timestamp = {2011.05.05},
2243 url = {http://dx.doi.org/10.1126/science.208.4449.1253}
2247 title = {Les virus informatiques : techniques virales et antivirales avancées},
2249 editor = {Springer},
2250 author = {Eric Filiol},
2251 owner = {christophe},
2252 timestamp = {2010.10.13}
2255 @INPROCEEDINGS{FiliolBlackHat,
2256 author = {Eric Filiol},
2257 title = {Passive and Active Leakage of Secret Data from Non Networked Computer},
2258 booktitle = {Black Hat},
2260 owner = {christophe},
2261 timestamp = {2010.11.28}
2264 @INPROCEEDINGS{Fischlin,
2265 author = {Fischlin, R. and Schnorr, C. P.},
2266 title = {Stronger security proofs for RSA and rabin bits},
2267 booktitle = {Proceedings of the 16th annual international conference on Theory
2268 and application of cryptographic techniques},
2270 series = {EUROCRYPT'97},
2272 address = {Berlin, Heidelberg},
2273 publisher = {Springer-Verlag},
2275 isbn = {3-540-62975-0},
2276 location = {Konstanz, Germany},
2278 url = {http://dl.acm.org/citation.cfm?id=1754542.1754569}
2281 @PHDTHESIS{Formenti2003,
2282 author = {Enrico Formenti},
2283 title = {De l'algorithmique du chaos dans les syst\`{e}mes dynamiques discrets},
2284 school = {Université de Provence},
2287 timestamp = {2008.01.02}
2290 @PHDTHESIS{Formenti1998,
2291 author = {Enrico Formenti},
2292 title = {Automates cellulaires et chaos : de la vision topologique à la vision
2294 school = {\'Ecole Normale Supérieure de Lyon},
2296 optmonth = {Octobre},
2298 timestamp = {2008.01.02}
2302 author = {Gabriel Frey and Christian J Michel},
2303 title = {Identification of circular codes in bacterial genomes and their use
2304 in a factorization method for retrieving the reading frames of genes.},
2305 journal = {Comput Biol Chem},
2311 abstract = {We developed a statistical method that allows each trinucleotide to
2312 be associated with a unique frame among the three possible ones in
2313 a (protein coding) gene. An extensive gene study in 175 complete
2314 bacterial genomes based on this statistical approach resulted in
2315 identification of 72 new circular codes. Finding a circular code
2316 enables an immediate retrieval of the reading frame locally anywhere
2317 in a gene. No knowledge of location of the start codon is required
2318 and a short window of only a few nucleotides is sufficient for automatic
2319 retrieval. We have therefore developed a factorization method (that
2320 explores previously found circular codes) for retrieving the reading
2321 frames of bacterial genes. Its principle is new and easy to understand.
2322 Neither complex treatment nor specific information on the nucleotide
2323 sequences is necessary. Moreover, the method can be used for short
2324 regions in nucleotide sequences (less than 25 nucleotides in protein
2325 coding genes). Selected additional properties of circular codes and
2326 their possible biological consequences are also discussed.},
2327 doi = {10.1016/j.compbiolchem.2005.11.001},
2328 institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université
2329 Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant,
2330 67400 Illkirch, France. frey@dpt-info.u-strasbg.fr},
2331 keywords = {Base Sequence; Computational Biology; Genes, Bacterial; Genome, Bacterial;
2332 Genomics, statistics /&/ numerical data; Models, Genetic; Models,
2333 Statistical; Reading Frames},
2335 medline-pst = {ppublish},
2337 pii = {S1476-9271(05)00111-8},
2339 timestamp = {2011.05.05},
2340 url = {http://dx.doi.org/10.1016/j.compbiolchem.2005.11.001}
2344 author = {Gabriel Frey and Christian J Michel},
2345 title = {An analytical model of gene evolution with six mutation parameters:
2346 an application to archaeal circular codes.},
2347 journal = {Comput Biol Chem},
2353 abstract = {We develop here an analytical evolutionary model based on a trinucleotide
2354 mutation matrix 64 x 64 with six substitution parameters associated
2355 with the transitions and transversions in the three trinucleotide
2356 sites. It generalizes the previous models based on the nucleotide
2357 mutation matrices 4 x 4 and the trinucleotide mutation matrix 64
2358 x 64 with three parameters. It determines at some time t the exact
2359 occurrence probabilities of trinucleotides mutating randomly according
2360 to six substitution parameters. An application of this model allows
2361 an evolutionary study of the common circular code COM and the 15
2362 archaeal circular codes X which have been recently identified in
2363 several archaeal genomes. The main property of a circular code is
2364 the retrieval of the reading frames in genes, both locally, i.e.
2365 anywhere in genes and in particular without a start codon, and automatically
2366 with a window of a few nucleotides. In genes, the circular code is
2367 superimposed on the traditional genetic one. Very unexpectedly, the
2368 evolutionary model demonstrates that the archaeal circular codes
2369 can derive from the common circular code subjected to random substitutions
2370 with particular values for six substitutions parameters. It has a
2371 strong correlation with the statistical observations of three archaeal
2372 codes in actual genes. Furthermore, the properties of these substitution
2373 rates allow proposal of an evolutionary classification of the 15
2374 archaeal codes into three main classes according to this model. In
2375 almost all the cases, they agree with the actual degeneracy of the
2376 genetic code with substitutions more frequent in the third trinucleotide
2377 site and with transitions more frequent that transversions in any
2378 trinucleotide site.},
2379 doi = {10.1016/j.compbiolchem.2005.09.001},
2380 institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université
2381 Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant,
2382 67400 Illkirch, France. frey@dpt-info.u-strasbg.fr},
2383 keywords = {Archaea, genetics; DNA, Circular; Evolution, Molecular; Genetic Code;
2384 Genome, Archaeal; Models, Genetic; Mutation; Trinucleotide Repeats},
2386 medline-pst = {ppublish},
2388 pii = {S1476-9271(05)00083-6},
2390 timestamp = {2011.05.05},
2391 url = {http://dx.doi.org/10.1016/j.compbiolchem.2005.09.001}
2394 @INPROCEEDINGS{fgb11:ip,
2395 author = {Friot, Nicolas and Guyeux, Christophe and Bahi, Jacques},
2396 title = {Chaotic Iterations for Steganography - Stego-security and chaos-security},
2397 booktitle = {SECRYPT'2011, Int. Conf. on Security and Cryptography},
2400 address = {Sevilla, Spain},
2403 classement = {ACTI},
2404 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2410 author = {Alain Frisch},
2411 title = {Entropie topologique et définition du chaos},
2413 note = {Rapport de tipe},
2414 file = {Tipe_Entropie Topologique et Definition du Chaos (Alain Frisch).ps:Chaos/Tipe_Entropie Topologique et Definition du Chaos (Alain Frisch).ps:PDF},
2415 keywords = {Chaos, Entropie Topologique, Tipe},
2417 timestamp = {2008.01.02},
2418 url = {http://alain.frisch.fr/math.html}
2422 author = {Alain Frisch},
2423 title = {Entropie topologique et définition du chaos},
2425 note = {[En ligne; Page disponible le 12-août-2010]},
2426 url = {\url{http://alain.frisch.fr/math.html}}
2429 @ARTICLE{Frommer97asynchronousweighted,
2430 author = {Andreas Frommer and Hartmut Schwandt and Daniel and Daniel B. Szyld},
2431 title = {Asynchronous Weighted Additive Schwarz Methods},
2432 journal = {Electronic Transactions on Numerical Analysis},
2438 @MISC{Frommer94asynchronoustwo-stage,
2439 author = {Andreas Frommer and Daniel B. Szyld},
2440 title = {Asynchronous Two-Stage Iterative Methods},
2445 title = {Introduction to Chaos and Coherence},
2446 publisher = {IOP Publishing},
2448 author = {J. Frøyland},
2450 timestamp = {2008.01.02}
2454 author = {T. Furon},
2455 title = {Security analysis},
2457 note = {European Project IST-1999-10987 CERTIMARK, Deliverable D.5.5},
2459 timestamp = {2009.06.30}
2463 author = {Furon, Teddy and Bas, Patrick},
2464 title = {Broken arrows},
2465 journal = {EURASIP J. Inf. Secur.},
2469 address = {New York, NY, United States},
2470 doi = {http://dx.doi.org/10.1155/2008/597040},
2472 owner = {christophe},
2473 publisher = {Hindawi Publishing Corp.},
2474 timestamp = {2010.03.06}
2477 @ARTICLE{P1150442004,
2478 author = {G.S.El-Taweel and H.M. Onsi and M.Samy and M.G. Darwish},
2479 title = {Secure and Non-Blind Watermarking Scheme for Color Images Based on
2481 journal = {ICGST International Journal on Graphics, Vision and Image Processing},
2487 owner = {christophe},
2488 timestamp = {2010.03.07}
2491 @INPROCEEDINGS{Gentry09,
2492 author = {Gentry, Craig},
2493 title = {Fully homomorphic encryption using ideal lattices},
2494 booktitle = {STOC '09: Proceedings of the 41st annual ACM symposium on Theory
2498 address = {New York, NY, USA},
2500 doi = {http://doi.acm.org/10.1145/1536414.1536440},
2501 isbn = {978-1-60558-506-2},
2502 location = {Bethesda, MD, USA}
2505 @INPROCEEDINGS{Girao04,
2506 author = {J. Girao and M. Schneider and D. Westhoff},
2507 title = {CDA: Concealed data aggregation in wireless sensor networks},
2508 booktitle = {Proceedings of the ACM Workshop on Wireless Security},
2510 owner = {christophe},
2511 timestamp = {2010.07.31}
2514 @ARTICLE{Goldreich86,
2515 author = {Goldreich, Oded and Goldwasser, Shafi and Micali, Silvio},
2516 title = {How to construct random functions},
2523 address = {New York, NY, USA},
2524 doi = {http://doi.acm.org/10.1145/6490.6503},
2529 url = {http://doi.acm.org/10.1145/6490.6503}
2532 @CONFERENCE{Gotsman88,
2533 author = {C. Gotsman and D. Lehmann and E. Shamir},
2534 title = {Asynchronous Dynamics of Random Boolean Networks},
2535 booktitle = {San Diego '88 Neural Networks Conference},
2538 timestamp = {30/03/2008}
2541 @ARTICLE{Guckenheimer1979,
2542 author = {J. Guckenheimer},
2543 title = {Sensitive dependence to initial conditions for one-dimensional maps},
2544 journal = {Comm. Math. Phys.},
2546 optpages = {133-160},
2548 timestamp = {2008.01.02}
2552 title = {Nonlinear oscillations, dynamical systems, and bifurcations of vector
2554 publisher = {Springer Verlag},
2556 author = {J. Guckenheimer and P. Holmes},
2558 timestamp = {2008.01.02}
2561 @ARTICLE{Guo20093201,
2562 author = {Wei Guo and Xiaoming Wang and Dake He and Yang Cao},
2563 title = {Cryptanalysis on a parallel keyed hash function based on chaotic
2565 journal = {Physics Letters A},
2568 pages = {3201 - 3206},
2570 abstract = {This Letter analyzes the security of a novel parallel keyed hash function
2571 based on chaotic maps, proposed by Xiao et al. to improve the efficiency
2572 in parallel computing environment. We show how to devise forgery
2573 attacks on Xiao's scheme with differential cryptanalysis and give
2574 the experiment results of two kinds of forgery attacks firstly. Furthermore,
2575 we discuss the problem of weak keys in the scheme and demonstrate
2576 how to utilize weak keys to construct collision.},
2578 keywords = {Cryptanalysis}
2581 @PHDTHESIS{GuyeuxThese10,
2582 author = {Christophe Guyeux},
2583 title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}
2584 en s\'{e}curit\'{e} informatique},
2585 school = {Universit\'{e} de Franche-Comt\'{e}},
2587 owner = {christophe},
2588 timestamp = {2010.12.21}
2592 author = {Guyeux, Christophe and Bahi, Jacques},
2593 title = {\'Etude topologique de l'\'etalement de spectre},
2594 howpublished = {Journ\'ees Codes et St\'eganographie, \'Ecoles Militaires de Saint-Cyr,
2599 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2604 @INPROCEEDINGS{bg10:ip,
2605 author = {Guyeux, Christophe and Bahi, Jacques},
2606 title = {An improved watermarking algorithm for Internet applications},
2607 booktitle = {INTERNET'2010. The 2nd Int. Conf. on Evolving Internet},
2610 address = {Valencia, Spain},
2612 classement = {ACTI},
2613 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2618 @INPROCEEDINGS{gfb10:ip,
2619 author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques},
2620 title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},
2621 booktitle = {IIH-MSP'10, 6-th Int. Conf. on Intelligent Information Hiding and
2622 Multimedia Signal Processing},
2625 address = {Darmstadt, Germany},
2627 classement = {ACTI},
2628 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2634 author = {Christophe Guyeux and Nicolas Friot and Jacques M. Bahi},
2635 title = {A more secure information hiding scheme than spread-spectrum obtained
2637 journal = {arXiv 0032565},
2640 timestamp = {2010.04.30}
2644 title = {Guide to Elliptic Curve Cryptography},
2645 publisher = {Springer Professional Computing},
2647 editor = {Springer},
2648 author = {D. Hankerson and A. Menezes and S. Vanstone},
2649 owner = {christophe},
2650 timestamp = {2010.07.31}
2653 @ARTICLE{Hasegawa1985,
2654 author = {M. Hasegawa and H. Kishino and T. Yano},
2655 title = {Dating of the human-ape splitting by a molecular clock of mitochondrial
2657 journal = {J Mol Evol},
2662 abstract = {A new statistical method for estimating divergence dates of species
2663 from DNA sequence data by a molecular clock approach is developed.
2664 This method takes into account effectively the information contained
2665 in a set of DNA sequence data. The molecular clock of mitochondrial
2666 DNA (mtDNA) was calibrated by setting the date of divergence between
2667 primates and ungulates at the Cretaceous-Tertiary boundary (65 million
2668 years ago), when the extinction of dinosaurs occurred. A generalized
2669 least-squares method was applied in fitting a model to mtDNA sequence
2670 data, and the clock gave dates of 92.3 +/- 11.7, 13.3 +/- 1.5, 10.9
2671 +/- 1.2, 3.7 +/- 0.6, and 2.7 +/- 0.6 million years ago (where the
2672 second of each pair of numbers is the standard deviation) for the
2673 separation of mouse, gibbon, orangutan, gorilla, and chimpanzee,
2674 respectively, from the line leading to humans. Although there is
2675 some uncertainty in the clock, this dating may pose a problem for
2676 the widely believed hypothesis that the pipedal creature Australopithecus
2677 afarensis, which lived some 3.7 million years ago at Laetoli in Tanzania
2678 and at Hadar in Ethiopia, was ancestral to man and evolved after
2679 the human-ape splitting. Another likelier possibility is that mtDNA
2680 was transferred through hybridization between a proto-human and a
2681 proto-chimpanzee after the former had developed bipedalism.},
2682 keywords = {Animals; Biological Evolution; DNA, Mitochondrial, genetics; Genes;
2683 Haplorhini, genetics; Humans; Mathematics; Models, Genetic; Nucleic
2684 Acid Hybridization; Primates, genetics; Proteins, genetics; Species
2687 medline-pst = {ppublish},
2690 timestamp = {2011.05.05}
2694 title = {A First Course in Discrete Dynamical Systems},
2695 publisher = {Springer-Verlag},
2697 author = {R. Homlgren},
2700 timestamp = {2008.01.02}
2703 @INCOLLECTION{Hoque09,
2704 author = {Hoque, Md. and Chetty, Madhu and Sattar, Abdul},
2705 title = {Genetic Algorithm in Ab Initio Protein Structure Prediction Using
2706 Low Resolution Model: A Review},
2707 booktitle = {Biomedical Data and Applications},
2708 publisher = {Springer Berlin Heidelberg},
2710 editor = {Sidhu, Amandeep and Dillon, Tharam},
2712 series = {Studies in Computational Intelligence},
2714 affiliation = {IIIS, Griffith University, Nathan, QLD-4111 Australia}
2717 @CONFERENCE{Houmansadr09,
2718 author = {A. Houmansadr and N. Kiyavash and N. Borisov},
2719 title = {Rainbow: A robust and invisible non-blind watermark for network flows},
2720 booktitle = {NDSS’09: 16th Annual Network and Distributed System Security Symposium},
2722 owner = {christophe},
2723 timestamp = {2010.03.07}
2727 author = {Huang, Shih-I and Shieh, Shiuhpyng and Tygar, J.},
2728 title = {Secure encrypted-data aggregation for wireless sensor networks},
2729 journal = {Wireless Networks},
2730 abstract = {Abstract\ \ This paper proposes a secure encrypted-data
2731 aggregation scheme for wireless sensor networks. Our design for data
2732 aggregation eliminates redundant sensor readings without using encryption
2733 and maintains data secrecy and privacy during transmission. Conventional
2734 aggregation functions operate when readings are received in plaintext.
2735 If readings are encrypted, aggregation requires decryption creating
2736 extra overhead and key management issues. In contrast to conventional
2737 schemes, our proposed scheme provides security and privacy, and duplicate
2738 instances of original readings will be aggregated into a single packet.
2739 Our scheme is resilient to known-plaintext attacks, chosen-plaintext
2740 attacks, ciphertext-only attacks and man-in-the-middle attacks. Our
2741 experiments show that our proposed aggregation method significantly
2742 reduces communication overhead and can be practically implemented
2743 in on-the-shelf sensor platforms.},
2744 citeulike-article-id = {4499496},
2745 citeulike-linkout-0 = {http://dx.doi.org/10.1007/s11276-009-0177-y},
2746 citeulike-linkout-1 = {http://www.springerlink.com/content/g573138072642u63},
2747 doi = {10.1007/s11276-009-0177-y},
2748 posted-at = {2009-05-10 09:55:44},
2749 url = {http://dx.doi.org/10.1007/s11276-009-0177-y}
2753 author = {W. Huang and X. Ye},
2754 title = {Homeomorphisms with the whole compacta being scrambled sets},
2755 journal = {Ergod. Th. Dynam. Systems},
2761 timestamp = {2008.01.02}
2764 @ARTICLE{Hurley1982,
2765 author = {M. Hurley},
2766 title = {Attractors, persistence and density of their bassin},
2767 journal = {Transactions of AMS},
2769 optpages = {247-271},
2772 timestamp = {2008.01.02}
2775 @INPROCEEDINGS{Islam:2009:NMA:1695134.1695181,
2776 author = {Islam, Md. Kamrul and Chetty, Madhu},
2777 title = {Novel Memetic Algorithm for Protein Structure Prediction},
2778 booktitle = {Proceedings of the 22nd Australasian Joint Conference on Advances
2779 in Artificial Intelligence},
2783 address = {Berlin, Heidelberg},
2784 publisher = {Springer-Verlag},
2786 isbn = {978-3-642-10438-1},
2787 keywords = {Guided search space, Memetic Algorithm, Modified fitness function,
2788 Pair-wise-interchange, Schema preservation, Tabu Search},
2789 location = {Melbourne, Australia},
2793 @PHDTHESIS{Jacquemard77,
2794 author = {C. Jacquemard},
2795 title = {Contribution à l'étude d'algorithmes à convergence monotone},
2796 school = {Université de Franche-Comté},
2798 owner = {christophe},
2799 timestamp = {2010.08.25}
2803 title = {{Evolution of Protein Molecules}},
2804 publisher = {Academy Press},
2806 editor = {Munro, H. N.},
2807 author = {Jukes, T. H. and Cantor, C. R.},
2808 booktitle = {Evolution of Protein Molecules},
2809 citeulike-article-id = {1673661},
2810 keywords = {compbio, fresco},
2811 posted-at = {2007-09-19 06:23:18},
2815 @INPROCEEDINGS{Kalker2001,
2816 author = {Kalker, T.},
2817 title = {Considerations on watermarking security},
2820 abstract = {In this paper we address the usually implicit assumption that digital
2821 watermarking has as its main target copyright and copy protection
2822 applications. From these target applications a great many conclusions
2823 are drawn about the required security of a watermarking system, and
2824 in fact, a considerably percentage of the watermarking literature
2825 has this very topic as its main focus of attention. In this paper
2826 we take a step back, and try to do a more careful analysis of the
2827 'watermarking-is-for-security-applications' paradigm. The intention
2828 of this paper is to discuss the meaning of the concept security in
2829 the context of watermarking, and try to show that one has to be careful
2830 in using analogies from the related field of cryptography},
2831 citeulike-article-id = {1226513},
2832 journal = {2001 IEEE Fourth Workshop on Multimedia Signal Processing},
2833 keywords = {security, wateramarking},
2835 posted-at = {2007-04-14 14:30:06},
2837 timestamp = {2009.06.30}
2840 @ARTICLE{Kerckhoffs83,
2841 author = {Kerckhoffs, Auguste},
2842 title = {La cryptographie militaire},
2843 journal = {Journal des sciences militaires},
2848 abstract = {pp. 161–191, Feb. 1883.},
2849 citeulike-article-id = {505508},
2850 keywords = {cryptography, master},
2852 posted-at = {2006-02-15 04:49:15},
2854 timestamp = {2009.06.30}
2858 author = {Kimura, Motoo},
2859 title = {A simple method for estimating evolutionary rates of base substitutions
2860 through comparative studies of nucleotide sequences},
2861 journal = {Journal of Molecular Evolution},
2865 note = {10.1007/BF01731581},
2866 affiliation = {National Institute of Genetics 411 Mishima Japan},
2869 keyword = {Biomedical and Life Sciences},
2870 publisher = {Springer New York},
2871 url = {http://dx.doi.org/10.1007/BF01731581}
2876 title = {Chaos Without Nonperiodicity},
2877 journal = {Amer. Math. Monthly},
2881 timestamp = {27/01/2008}
2884 @PHDTHESIS{Knudsen1994a,
2885 author = {C. Knudsen},
2886 title = {Aspects of noninvertible dynamics and chaos},
2887 school = {Technical University of Denmark},
2890 timestamp = {2008.01.02}
2894 title = {Seminumerical Algorithms},
2895 publisher = {Addison-Wesley, Reading, MA, USA},
2897 author = {D. E. Knuth},
2899 edition = {Third Edition},
2901 timestamp = {2012.02.15}
2905 author = {L. Kocarev and J. Szczepanski and J.M. Amigo and I. Tomovski},
2906 title = {Discrete Chaos - I: Theory},
2907 journal = {IEEE Trans. on Circuits Systems},
2910 pages = {1300-1309},
2911 owner = {christophe},
2912 timestamp = {2010.10.10}
2915 @INPROCEEDINGS{Kocher95cryptanalysisof,
2916 author = {Paul C. Kocher},
2917 title = {Cryptanalysis of Diffie-Hellman, RSA, DSS, and Other Systems Using
2918 Timing Attacks (Extended Abstract)},
2919 booktitle = {Advances in Cryptology, CRYPTO '95: 15th Annual International Cryptology
2923 publisher = {Springer-Verlag}
2926 @ARTICLE{Kullback1951,
2927 author = {Kullback, Solomon and Leibler, Richard A.},
2928 title = {On Information and Sufficiency},
2929 journal = {The Annals of Mathematical Statistics},
2934 citeulike-article-id = {3245942},
2935 keywords = {file-import-08-09-12},
2937 posted-at = {2008-09-12 14:30:37},
2939 timestamp = {2009.06.29}
2943 author = {Lang, Gregory I. and Murray, Andrew W.},
2944 title = {Estimating the Per-Base-Pair Mutation Rate in the Yeast Saccharomyces
2946 journal = {Genetics},
2947 year = {January 2008},
2951 abstract = {Although mutation rates are a key determinant of the rate of evolution
2952 they are difficult to measure precisely and global mutations rates
2953 (mutations per genome per generation) are often extrapolated from
2954 the per-base-pair mutation rate assuming that mutation rate is uniform
2955 across the genome. Using budding yeast, we describe an improved method
2956 for the accurate calculation of mutation rates based on the fluctuation
2957 assay. Our analysis suggests that the per-base-pair mutation rates
2958 at two genes differ significantly (3.80 × 10−10 at URA3 and 6.44
2959 × 10−10 at CAN1) and we propose a definition for the effective target
2960 size of genes (the probability that a mutation inactivates the gene)
2961 that acknowledges that the mutation rate is nonuniform across the
2963 doi = {10.1534/genetics.107.071506},
2964 eprint = {http://www.genetics.org/content/178/1/67.full.pdf+html},
2965 url = {http://www.genetics.org/content/178/1/67.abstract}
2969 author = {Eshter Ledoux},
2970 title = {Introduction à la théorie du chaos},
2972 note = {[En ligne; Page disponible le 12-août-2010]},
2973 url = {\url{http://www.nux.be/eledoux/mem/node1.html}}
2977 title = {Analyse en dimension finie},
2978 publisher = {Masson},
2984 timestamp = {2008.01.02}
2988 author = {A.K. Lenstra and E.R. Verheul},
2989 title = {Selecting Cryptographic Key Sizes},
2990 journal = {Jour. of the International Association for Cryptologic Research},
2998 author = {Lettvin, J.Y. and Maturana, H.R. and McCulloch, W.S. and Pitts, W.H.},
2999 title = {What the Frog's Eye Tells the Frog's Brain},
3000 journal = {Proceedings of the IRE},
3005 owner = {christophe},
3006 timestamp = {2010.12.21}
3011 title = {User-Centric Security and Privacy Mechanisms in Untrusted Networking
3012 and Computing Environments},
3013 school = {Worcester Polytechnic Institute},
3016 timestamp = {2012.05.04}
3020 author = {T. Y. Li and J. A. Yorke},
3021 title = {Period three implies chaos},
3022 journal = {Amer. Math. Monthly},
3028 timestamp = {27/01/2008}
3032 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
3033 title = {A novel Hash algorithm construction based on chaotic neural network},
3034 journal = {Neural Computing and Applications},
3037 affiliation = {Chongqing University College of Computer Science 400044 Chongqing
3040 keyword = {Computer Science},
3041 publisher = {Springer London}
3044 @INPROCEEDINGS{Lin09,
3045 author = {Lin, Hua-Yi and Chiang, Tzu-Chiang},
3046 title = {Cooperative secure data aggregation in sensor networks using elliptic
3047 curve based cryptosystems},
3048 booktitle = {CDVE'09: Proceedings of the 6th international conference on Cooperative
3049 design, visualization, and engineering},
3052 address = {Berlin, Heidelberg},
3053 publisher = {Springer-Verlag},
3054 isbn = {3-642-04264-3, 978-3-642-04264-5},
3055 location = {Luxembourg, Luxembourg}
3058 @INPROCEEDINGS{Liu2008,
3059 author = {Liu, An and Ning, Peng},
3060 title = {TinyECC: A Configurable Library for Elliptic Curve Cryptography in
3061 Wireless Sensor Networks},
3062 booktitle = {7th International Conference on Information Processing in Sensor
3063 Networks (IPSN 2008)},
3067 citeulike-article-id = {3041699},
3068 howpublished = {SPOTS Track},
3070 posted-at = {2008-07-25 05:25:05},
3074 @ARTICLE{Liu2007bis,
3075 author = {Shao-Hui Liu and Hong-Xun Yao and Wen Gao and Yong-Liang Liu},
3076 title = {An image fragile watermark scheme based on chaotic image pattern
3078 journal = {Applied Mathematics and Computation},
3083 timestamp = {2008.10.07}
3086 @INPROCEEDINGS{Liu07,
3087 author = {Liu, Zhen and Xi, Lifeng},
3088 title = {Image Information Hiding Encryption Using Chaotic Sequence},
3089 booktitle = {KES '07: Knowledge-Based Intelligent Information and Engineering
3090 Systems and the XVII Italian Workshop on Neural Networks on Proceedings
3091 of the 11th International Conference},
3094 address = {Berlin, Heidelberg},
3095 publisher = {Springer-Verlag},
3096 doi = {http://dx.doi.org/10.1007/978-3-540-74827-4_26},
3097 isbn = {978-3-540-74826-7},
3098 location = {Vietri sul Mare, Italy}
3102 author = {Zhen Liu and Lifeng Xi},
3103 title = {Image Information Hiding Encryption Using Chaotic Sequence},
3109 timestamp = {11/04/2008}
3112 @ARTICLE{Lubachevsky86,
3113 author = {Lubachevsky, Boris and Mitra, Debasis},
3114 title = {A chaotic asynchronous algorithm for computing the fixed point of
3115 a nonnegative matrix of unit spectral radius},
3121 address = {New York, NY, USA},
3122 doi = {http://doi.acm.org/10.1145/4904.4801},
3128 author = {{L}arger, {L}. and {D}udley, {J}.{M}.},
3129 title = { {N}onlinear dynamics {O}ptoelectronic chaos},
3130 journal = {{N}ature },
3136 abstract = {{O}ptoelectronic circuits with delayed feedback provide a convenient
3137 bench-top platform to study a wide range of nonlinear dynamic systems,
3138 from ultrastable clocks to complex chaotic devices.},
3139 affiliation = {{F}ranche-{C}omt{\'e} {\'E}lectronique {M}{\'e}canique, {T}hermique
3140 et {O}ptique - {S}ciences et {T}echnologies - {FEMTO}-{ST} - {CNRS}
3141 : {UMR}6174 - {U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {U}niversit{\'e}
3142 de {T}echnologie de {B}elfort-{M}ontbeliard - {E}cole {N}ationale
3143 {S}up{\'e}rieure de {M}{\'e}canique et des {M}icrotechniques },
3144 audience = {internationale },
3146 doi = {10.1038/465041a },
3147 hal_id = {hal-00517696},
3148 language = {{A}nglais},
3149 url = {http://hal.archives-ouvertes.fr/hal-00517696/en/}
3152 @INPROCEEDINGS{Mahoney00,
3153 author = {Mahoney, Matthew V.},
3154 title = {Fast Text Compression with Neural Networks},
3155 booktitle = {Proceedings of the Thirteenth International Florida Artificial Intelligence
3156 Research Society Conference},
3159 publisher = {AAAI Press},
3161 isbn = {1-57735-113-4},
3165 @INPROCEEDINGS{msp10:bl,
3166 author = {Makhoul, Abdallah and Saadi, Rachid and Pham, Congduc},
3167 title = {Risk Management in Intrusion Detection Applications with Wireless
3168 Video Sensor Networks},
3169 booktitle = {WCNC'10 IEEE Int. Conf.},
3172 address = {Sydney, Australia},
3181 author = {H.S. Malvar and D. Florêncio},
3182 title = {Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking},
3183 journal = {IEEE Trans. Signal Proceeding},
3187 owner = {christophe},
3188 timestamp = {2010.03.07}
3191 @ARTICLE{Marsaglia2003,
3192 author = {G. Marsaglia},
3193 title = {Xorshift RNGs},
3194 journal = {Journal of Statistical Software},
3199 timestamp = {2009.10.28}
3202 @ARTICLE{Marsaglia1996,
3203 author = {G. Marsaglia},
3204 title = {DIEHARD: a battery of tests of randomness.},
3205 journal = {http://stat.fsu.edu/~geo/diehard.html},
3208 timestamp = {2009.11.09}
3211 @ARTICLE{DefiningChaos,
3212 author = {M. Martelli and M. Dang and T. Seph},
3213 title = {Defining chaos},
3214 journal = {Mathematics Magazine},
3218 owner = {christophe},
3219 timestamp = {2010.08.11}
3222 @ARTICLE{Michel2007c,
3223 author = {Christian J Michel},
3224 title = {An analytical model of gene evolution with 9 mutation parameters:
3225 an application to the amino acids coded by the common circular code.},
3226 journal = {Bull Math Biol},
3232 abstract = {We develop here an analytical evolutionary model based on a trinucleotide
3233 mutation matrix 64 x 64 with nine substitution parameters associated
3234 with the three types of substitutions in the three trinucleotide
3235 sites. It generalizes the previous models based on the nucleotide
3236 mutation matrices 4 x 4 and the trinucleotide mutation matrix 64
3237 x 64 with three and six parameters. It determines at some time t
3238 the exact occurrence probabilities of trinucleotides mutating randomly
3239 according to these nine substitution parameters. An application of
3240 this model allows an evolutionary study of the common circular code
3241 [Formula: see text] of eukaryotes and prokaryotes and its 12 coded
3242 amino acids. The main property of this code [Formula: see text] is
3243 the retrieval of the reading frames in genes, both locally, i.e.
3244 anywhere in genes and in particular without a start codon, and automatically
3245 with a window of a few nucleotides. However, since its identification
3246 in 1996, amino acid information coded by [Formula: see text] has
3247 never been studied. Very unexpectedly, this evolutionary model demonstrates
3248 that random substitutions in this code [Formula: see text] and with
3249 particular values for the nine substitutions parameters retrieve
3250 after a certain time of evolution a frequency distribution of these
3251 12 amino acids very close to the one coded by the actual genes.},
3252 doi = {10.1007/s11538-006-9147-z},
3253 institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université
3254 Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant,
3255 67400 Illkirch, France. michel@dpt-info.u-strasbg.fr},
3256 keywords = {Amino Acids, genetics; Codon, genetics; Eukaryotic Cells; Evolution,
3257 Molecular; Models, Genetic; Prokaryotic Cells},
3259 medline-pst = {ppublish},
3262 timestamp = {2011.05.05},
3263 url = {http://dx.doi.org/10.1007/s11538-006-9147-z}
3267 author = {J.-C. Miellou},
3268 title = {Algorithmes de relaxation chaotique \`{a} retards},
3274 timestamp = {2008.05.22}
3277 @ARTICLE{Miellou75b,
3278 author = {Miellou, J.-C.},
3279 title = {Itérations chaotiques à retards, étude de la convergence dans le
3280 cas d'espaces partiellement ordonnés},
3281 journal = {C.R.A.S. Paris},
3285 owner = {christophe},
3286 timestamp = {2010.08.17}
3290 author = {Jean-Claude Miellou and Pierre Spitéri},
3291 title = {Un crit\`{e}re de convergence pour des méthodes générales de point
3293 journal = {Rairo -- Modélisation mathématique et analyse numérique},
3298 owner = {christophe},
3299 timestamp = {2010.10.13}
3303 author = {Aidan Mooney and John G. Keating and Ioannis Pitas},
3304 title = {A comparative study of chaotic and white noise signals in digital
3306 journal = {Chaos, Solitons and Fractals},
3310 owner = {christophe},
3311 timestamp = {2010.03.01}
3314 @ARTICLE{Nakashima2003,
3315 author = {Nakashima, Y. and Tachibana, R. and Babaguchi, N.},
3316 title = {Watermarked Movie Soundtrack Finds the Position of the Camcorder
3318 journal = {IEEE Transactions on Multimedia},
3320 note = {Accepted for future publication Multimedia}
3323 @INCOLLECTION{springerlink:10.1007/978-3-642-04431-1_16,
3324 author = {Nelson, Michael and Nahapetian, Ani and Koushanfar, Farinaz and Potkonjak,
3326 title = {SVD-Based Ghost Circuitry Detection},
3327 booktitle = {Information Hiding},
3328 publisher = {Springer Berlin / Heidelberg},
3330 editor = {Katzenbeisser, Stefan and Sadeghi, Ahmad-Reza},
3332 series = {Lecture Notes in Computer Science},
3334 note = {10.1007/978-3-642-04431-1_16},
3335 affiliation = {Computer Science Department, UCLA, Los Angeles, CA 90095, USA},
3336 url = {http://dx.doi.org/10.1007/978-3-642-04431-1_16}
3339 @INPROCEEDINGS{Perez-Hernandez09,
3340 author = {P\'{e}rez-Hern\'{a}ndez, Luis Germ\'{a}n and Rodr\'{\i}guez-V\'{a}zquez,
3341 Katya and Gardu\~{n}o-Ju\'{a}rez, Ram\'{o}n},
3342 title = {Parallel particle swarm optimization applied to the protein folding
3344 booktitle = {Proceedings of the 11th Annual conference on Genetic and evolutionary
3347 series = {GECCO '09},
3348 pages = {1791--1792},
3349 address = {New York, NY, USA},
3352 isbn = {978-1-60558-325-9},
3353 keywords = {bioinformatics, biology and chemistry, combinatorial optimization,
3354 parallelization, swarm intelligence},
3355 location = {Montreal, Qu\&\#233;bec, Canada},
3359 @INPROCEEDINGS{Paillier99,
3360 author = {Paillier, Pascal},
3361 title = {Public-key cryptosystems based on composite degree residuosity classes},
3362 booktitle = {Proceedings of the 17th international conference on Theory and application
3363 of cryptographic techniques},
3365 series = {EUROCRYPT'99},
3367 address = {Berlin, Heidelberg},
3368 publisher = {Springer-Verlag},
3370 isbn = {3-540-65889-0},
3371 location = {Prague, Czech Republic},
3373 url = {http://dl.acm.org/citation.cfm?id=1756123.1756146}
3376 @PHDTHESIS{Pellegrin1986,
3377 author = {D. Pellegrin},
3378 title = {Algorithmique discr\`{e}te et r\'{e}seaux d'automates},
3379 school = {Grenoble},
3382 timestamp = {2008.05.22}
3386 author = {F. Peng and S.-S. Qiu and M. Long},
3387 title = {One way Hash function construction based on two-dimensional hyperchaotic
3389 journal = {Acta Phys. Sinici.},
3394 timestamp = {2009.01.16}
3397 @INPROCEEDINGS{Perez06,
3398 author = {Luis Perez-Freire and F. Pérez-gonzalez and Pedro Comesaña},
3399 title = {Secret Dither Estimation in Lattice-Quantization Data Hiding: A Set-Membership
3401 booktitle = {Security, Steganography, and Watermarking of Multimedia Contents},
3403 editor = {Edward J. Delp and Ping W. Wong},
3404 address = {San Jose, California, USA},
3406 organization = {SPIE},
3408 timestamp = {2009.06.30}
3411 @INPROCEEDINGS{Perez-Freire06,
3412 author = {Luis Perez-Freire and Pedro Comesana and Juan Ramon Troncoso-Pastoriza
3413 and Fernando Perez-Gonzalez},
3414 title = {Watermarking Security: a Survey},
3415 booktitle = {LNCS Transactions on Data Hiding and Multimedia Security},
3418 timestamp = {2009.06.29}
3421 @PROCEEDINGS{Peter07,
3422 title = {On Concealed Data Aggregation for WSNs},
3424 author = {Peter, Steffen and Piotrowski, Krzysztof and Langendoerfer, Peter},
3425 booktitle = {Consumer Communications and Networking Conference, 2007. CCNC 2007.
3427 citeulike-article-id = {2281643},
3428 citeulike-linkout-0 = {http://dx.doi.org/10.1109/CCNC.2007.45},
3429 citeulike-linkout-1 = {http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=4199133},
3430 doi = {10.1109/CCNC.2007.45},
3431 journal = {Consumer Communications and Networking Conference, 2007. CCNC 2007.
3435 posted-at = {2008-01-23 19:36:19},
3437 url = {http://dx.doi.org/10.1109/CCNC.2007.45}
3441 author = {Pham, Congduc and Makhoul, Abdallah and Saadi, Rachid},
3442 title = {Risk-based Adaptive Scheduling in Randomly Deployed Video Sensor
3443 Networks for Critical Surveillance Applications},
3444 journal = {Journal of Network and Computer Applications},
3449 note = {Accepted manuscript. To appear},
3450 classement = {ACLI},
3452 impact-factor = {1.111},
3454 isi-acro = {J NETW COMPU APPL},
3455 publisher = {Springer}
3459 author = {Edgar Alan Poe},
3460 title = {The Raven},
3463 note = {American Museum (Baltimore)},
3464 owner = {christophe},
3465 timestamp = {2010.11.23}
3468 @INPROCEEDINGS{Przydatek03sia:secure,
3469 author = {Bartosz Przydatek and Dawn Song and Adrian Perrig},
3470 title = {SIA: Secure Information Aggregation in Sensor Networks},
3473 publisher = {ACM Press}
3476 @ARTICLE{Perez-Freire2006:Security,
3477 author = {L. P{\'e}rez-Freire and F. P{\'e}rez-González and T. Furon and P.
3479 title = {Security of lattice-based data hiding against the known message attack},
3480 journal = {IEEE Trans. on Information Forensics and Security},
3487 timestamp = {2009.12.06}
3490 @MISC{Quisquater02sidechannel,
3491 author = {J-J. Quisquater and D. Samyde and Université Catholique De Louvain
3493 title = {Side Channel Cryptanalysis},
3497 @ARTICLE{Raynal2001,
3498 author = {Frédéric Raynal and Fabien A. P. Petitcolas and Caroline Fontaine},
3499 title = {Evaluation automatique des méthodes de tatouage},
3500 journal = {Traitement du signal},
3505 timestamp = {2008.05.21}
3509 author = {Vincent Rijmen and Elisabeth Oswald},
3510 title = {Update on SHA-1},
3511 howpublished = {Cryptology ePrint Archive, Report 2005/010},
3513 note = {\url{http://eprint.iacr.org/}}
3517 title = {Discrete Iterations, a Metric Study},
3518 publisher = {Springer-Verlag},
3520 editor = {Berlin Heidelberg New-York},
3521 author = {François Robert},
3523 series = {Series in Computational Mathematics}
3527 title = {Discrete Iterations: A Metric Study},
3529 editor = {Springer-Verlag},
3530 author = {F. Robert},
3532 series = {Springer Series in Computational Mathematics},
3534 timestamp = {17/02/2008}
3538 author = {Rudenko, O. and Snytkin, M.},
3539 title = {Image compression based on the neural network art},
3540 journal = {Cybernetics and Systems Analysis},
3544 affiliation = {Kharkov National University of Radio Electronics Kharkov Ukraine},
3547 keyword = {Computer Science},
3548 publisher = {Springer New York}
3551 @PHDTHESIS{Ruette2001,
3552 author = {Sylvie Ruette},
3553 title = {Chaos en dynamique topologique, en particulier sur l'intervalle,
3554 mesures d'entropie maximale},
3555 school = {Université d'Aix-Marseille II},
3557 optmonth = {Novembre},
3559 timestamp = {2008.01.02}
3562 @MASTERSTHESIS{Saulnier02,
3563 author = {Boris Saulnier},
3564 title = {Entropie topologique},
3565 school = {DEA Sémantique, Preuves et Langages, Paris 7},
3567 owner = {christophe},
3568 timestamp = {2010.08.12}
3571 @ARTICLE{Schmitz2001,
3572 author = {Roland Schmitz},
3573 title = {Use of chaotic dynamical systems in cryptography},
3574 journal = {Journal of Franklin Institute},
3579 timestamp = {17/02/2008}
3583 title = {Analyse: topologie g\'{e}n\'{e}rale et analyse fonctionnelle},
3584 publisher = {Hermann},
3587 author = {Laurent Schwartz},
3588 owner = {christophe},
3589 timestamp = {2010.09.15}
3593 author = {Shannon, Claude E.},
3594 title = {Communication Theory of Secrecy Systems},
3595 journal = {Bell Systems Technical Journal},
3599 citeulike-article-id = {507362},
3600 keywords = {master, secrecy\_systems, teoria-informacao, theory\_communication,
3601 theory\_cryptography},
3603 posted-at = {2006-02-16 23:24:09},
3605 timestamp = {2009.06.29}
3608 @ARTICLE{Shmygelska05,
3609 author = {Shmygelska, Alena and Hoos, Holger},
3610 title = {An ant colony optimisation algorithm for the 2D and 3D hydrophobic
3611 polar protein folding problem},
3612 journal = {BMC Bioinformatics},
3617 abstract = {BACKGROUND:The protein folding problem is a fundamental problems in
3618 computational molecular biology and biochemical physics. Various
3619 optimisation methods have been applied to formulations of the ab-initio
3620 folding problem that are based on reduced models of protein structure,
3621 including Monte Carlo methods, Evolutionary Algorithms, Tabu Search
3622 and hybrid approaches. In our work, we have introduced an ant colony
3623 optimisation (ACO) algorithm to address the non-deterministic polynomial-time
3624 hard (NP-hard) combinatorial problem of predicting a protein's conformation
3625 from its amino acid sequence under a widely studied, conceptually
3626 simple model - the 2-dimensional (2D) and 3-dimensional (3D) hydrophobic-polar
3627 (HP) model.RESULTS:We present an improvement of our previous ACO
3628 algorithm for the 2D HP model and its extension to the 3D HP model.
3629 We show that this new algorithm, dubbed ACO-HPPFP-3, performs better
3630 than previous state-of-the-art algorithms on sequences whose native
3631 conformations do not contain structural nuclei (parts of the native
3632 fold that predominantly consist of local interactions) at the ends,
3633 but rather in the middle of the sequence, and that it generally finds
3634 a more diverse set of native conformations.CONCLUSIONS:The application
3635 of ACO to this bioinformatics problem compares favourably with specialised,
3636 state-of-the-art methods for the 2D and 3D HP protein folding problem;
3637 our empirical results indicate that our rather simple ACO algorithm
3638 scales worse with sequence length but usually finds a more diverse
3639 ensemble of native states. Therefore the development of ACO algorithms
3640 for more complex and realistic models of protein structure holds
3641 significant promise.},
3642 doi = {10.1186/1471-2105-6-30},
3644 pubmedid = {15710037}
3647 @OTHER{Shmygelska2005Feb,
3648 __markedentry = {[christophe]},
3649 abstract = {Abstract Background The protein folding problem is a fundamental problems
3650 in computational molecular biology and biochemical physics. Various
3651 optimisation methods have been applied to formulations of the ab-initio
3652 folding problem that are based on reduced models of protein structure,
3653 including Monte Carlo methods, Evolutionary Algorithms, Tabu Search
3654 and hybrid approaches. In our work, we have introduced an ant colony
3655 optimisation (ACO) algorithm to address the non-deterministic polynomial-time
3656 hard (NP-hard) combinatorial problem of predicting a protein's conformation
3657 from its amino acid sequence under a widely studied, conceptually
3658 simple model – the 2-dimensional (2D) and 3-dimensional (3D) hydrophobic-polar
3659 (HP) model. Results We present an improvement of our previous ACO
3660 algorithm for the 2D HP model and its extension to the 3D HP model.
3661 We show that this new algorithm, dubbed ACO-HPPFP-3, performs better
3662 than previous state-of-the-art algorithms on sequences whose native
3663 conformations do not contain structural nuclei (parts of the native
3664 fold that predominantly consist of local interactions) at the ends,
3665 but rather in the middle of the sequence, and that it generally finds
3666 a more diverse set of native conformations. Conclusions The application
3667 of ACO to this bioinformatics problem compares favourably with specialised,
3668 state-of-the-art methods for the 2D and 3D HP protein folding problem;
3669 our empirical results indicate that our rather simple ACO algorithm
3670 scales worse with sequence length but usually finds a more diverse
3671 ensemble of native states. Therefore the development of ACO algorithms
3672 for more complex and realistic models of protein structure holds
3673 significant promise.},
3674 author = {Shmygelska, Alena and Hoos, Holger H},
3675 journal = {BMC Bioinformatics. 2005 Feb 14},
3677 owner = {christophe},
3679 timestamp = {2011.01.24},
3680 title = {An ant colony optimisation algorithm for the 2D and 3D hydrophobic
3681 polar protein folding problem},
3687 author = {Li Shujun and Li Qi and Li Wenmin and Mou Xuanqin and Cai Yuanlong},
3688 title = {Statistical Properties of Digital Piecewise Linear Chaotic Maps and
3689 Their Roles in Cryptography and Pseudo-Random Coding},
3690 journal = {Proceedings of the 8th IMA International Conference on Cryptography
3695 owner = {christophe},
3696 timestamp = {2010.03.06}
3699 @ARTICLE{Simard07testu01:a,
3700 author = {Richard Simard and Université De Montréal},
3701 title = {TestU01: A C library for empirical testing of random number generators},
3702 journal = {ACM Transactions on Mathematical Software},
3707 @INPROCEEDINGS{Simmons83,
3708 author = {Gustavus J. Simmons},
3709 title = {The Prisoners' Problem and the Subliminal Channel},
3710 booktitle = {Advances in Cryptology, Proc. CRYPTO'83},
3713 bibsource = {DBLP, http://dblp.uni-trier.de},
3715 timestamp = {2009.06.29}
3718 @ARTICLE{Solak2004389,
3719 author = {Ercan Solak},
3720 title = {On the security of a class of discrete-time chaotic cryptosystems},
3721 journal = {Physics Letters A},
3724 pages = {389 - 395},
3726 doi = {DOI: 10.1016/j.physleta.2003.11.008},
3728 keywords = {Communication using chaos},
3730 timestamp = {2009.12.12},
3731 url = {http://www.sciencedirect.com/science/article/B6TVM-4B22RC9-2/2/99a0af737c9b6ba8af47ae4d3c7a326d}
3734 @PHDTHESIS{Spiteri74,
3735 author = {Pierre Spitéri},
3736 title = {Contribution à l'étude de la stabilite au sens de liapounov de certains
3737 systemes differentiels non lineaires},
3738 school = {Université de Franche-Comté},
3740 owner = {christophe},
3741 timestamp = {2010.10.13}
3745 title = {Does God Play Dices ?: the mathematics of chaos},
3746 publisher = {Penguin},
3748 author = {Ian Stewart},
3750 timestamp = {2008.01.02}
3754 title = {Cryptography: Theory and Practice, Second Edition},
3755 publisher = {{Chapman \& Hall/CRC}},
3757 author = {Stinson, Douglas R.},
3759 abstract = {{Douglas R. Stinson's <I>Cryptography: Theory and Practice</I> is
3760 a mathematically intensive examination of cryptography, including
3761 ciphers, the Data Encryption Standard (DES), public key cryptography,
3762 one-way hash functions, and digital signatures. Stinson's explication
3763 of "zero-sum proofs"--a process by which one person lets another
3764 person know that he or she has a password without actually revealing
3765 any information--is especially good.<P> If you are new to the math
3766 behind cryptography but want to tackle it, the author covers all
3767 of the required background to understand the real mathematics here.
3768 <I>Cryptography</I> includes extensive exercises with each chapter
3769 and makes an ideal introduction for any math-literate person willing
3770 to get acquainted with this material.} {<P>Major advances over the
3771 last five years precipitated this major revision of the bestselling
3772 Cryptography: Theory and Practice. With more than 40 percent new
3773 or updated material, the second edition now provides an even more
3774 comprehensive treatment of modern cryptography. It focuses on the
3775 new Advanced Encryption Standards and features an entirely new chapter
3776 on that subject. Another new chapter explores the applications of
3777 secret sharing schemes, including ramp schemes, visual cryptography,
3778 threshold cryptography, and broadcast encryption. This is an ideal
3779 introductory text for both computer science and mathematics students
3780 and a valuable reference for professionals.</P>}},
3781 citeulike-article-id = {2401855},
3783 howpublished = {Hardcover},
3784 isbn = {1584882069},
3785 keywords = {security},
3786 posted-at = {2008-02-20 08:28:49},
3788 url = {http://www.amazon.com/exec/obidos/redirect?tag=citeulike07-20\&path=ASIN/1584882069}
3792 author = {Tamura, K},
3793 title = {Estimation of the number of nucleotide substitutions when there are
3794 strong transition-transversion and G+C-content biases.},
3795 journal = {Molecular Biology and Evolution},
3800 abstract = {A simple mathematical method is developed to estimate the number of
3801 nucleotide substitutions per site between two DNA sequences, by extending
3802 Kimura's (1980) two-parameter method to the case where a G+C-content
3803 bias exists. This method will be useful when there are strong transition-transversion
3804 and G+C-content biases, as in the case of Drosophila mitochondrial
3806 eprint = {http://mbe.oxfordjournals.org/content/9/4/678.full.pdf+html},
3807 url = {http://mbe.oxfordjournals.org/content/9/4/678.abstract}
3811 author = {Tamura, K and Nei, M},
3812 title = {Estimation of the number of nucleotide substitutions in the control
3813 region of mitochondrial DNA in humans and chimpanzees.},
3814 journal = {Molecular Biology and Evolution},
3819 abstract = {Examining the pattern of nucleotide substitution for the control region
3820 of mitochondrial DNA (mtDNA) in humans and chimpanzees, we developed
3821 a new mathematical method for estimating the number of transitional
3822 and transversional substitutions per site, as well as the total number
3823 of nucleotide substitutions. In this method, excess transitions,
3824 unequal nucleotide frequencies, and variation of substitution rate
3825 among different sites are all taken into account. Application of
3826 this method to human and chimpanzee data suggested that the transition/transversion
3827 ratio for the entire control region was approximately 15 and nearly
3828 the same for the two species. The 95% confidence interval of the
3829 age of the common ancestral mtDNA was estimated to be 80,000-480,000
3830 years in humans and 0.57-2.72 Myr in common chimpanzees.},
3831 eprint = {http://mbe.oxfordjournals.org/content/10/3/512.full.pdf+html},
3832 url = {http://mbe.oxfordjournals.org/content/10/3/512.abstract}
3835 @INPROCEEDINGS{Takana90,
3836 author = {K. Tanaka and Y. Nakamura and K. Matsui},
3837 title = {Embedding Secret Information into a Dithered Multi-level Image},
3838 booktitle = {IEEE Military Communications Conference},
3840 owner = {christophe},
3841 timestamp = {2010.08.05}
3844 @PHDTHESIS{ElTarazi81,
3845 author = {M. N. El Tarazi},
3846 title = {Contraction et ordre partiel pour l'étude d'algorithmes synchrones
3847 et asynchrones en analyse numérique},
3848 school = {Faculté des Sciences et Techniques de l'Université de Franche-Comté,
3851 owner = {christophe},
3852 timestamp = {2010.08.17}
3855 @INPROCEEDINGS{Unger93,
3856 author = {Unger, Ron and Moult, John},
3857 title = {Genetic Algorithm for 3D Protein Folding Simulations},
3858 booktitle = {Proceedings of the 5th International Conference on Genetic Algorithms},
3861 address = {San Francisco, CA, USA},
3862 publisher = {Morgan Kaufmann Publishers Inc.},
3864 isbn = {1-55860-299-2},
3868 @MISC{Van93electronicwater,
3869 author = {Tirkel Rankin Van},
3870 title = {Electronic Water Mark},
3874 @ARTICLE{Venkatesan2007397,
3875 author = {R.C. Venkatesan},
3876 title = {Encryption of covert information into multiple statistical distributions},
3877 journal = {Physics Letters A},
3880 pages = {397 - 404},
3882 doi = {DOI: 10.1016/j.physleta.2007.05.117},
3884 keywords = {Statistical encryption/decryption},
3886 timestamp = {2009.12.12},
3887 url = {http://www.sciencedirect.com/science/article/B6TVM-4P4FV2M-1/2/cd11a2ec144526e3c4552d2a7e7906cc}
3891 author = {G. Voyatzis and I. Pitas},
3892 title = {Chaotic watermarks for embedding in the spatial digital image domain},
3893 journal = {Proceedings of IEEE ICIP},
3897 owner = {christophe},
3898 timestamp = {2010.03.06}
3901 @INCOLLECTION{Wagner03,
3902 author = {Wagner, David},
3903 title = {Cryptanalysis of an Algebraic Privacy Homomorphism},
3904 booktitle = {Information Security},
3905 publisher = {Springer Berlin, Heidelberg},
3908 series = {Lecture Notes in Computer Science},
3910 abstract = {We use linear algebra to show that an algebraic privacy homomorphism
3911 proposed by Domingo-Ferrer is insecure for some parameter settings.},
3912 affiliation = {University of California, Berkeley USA}
3915 @INPROCEEDINGS{Wagner03cryptanalysisof,
3916 author = {David Wagner},
3917 title = {Cryptanalysis of an Algebraic Privacy Homomorphism},
3918 booktitle = {Proc. Sixth Information Security Conf. (ISC03},
3923 @ARTICLE{Wang_ellipticcurve,
3924 author = {Haodong Wang and Bo Sheng and Qun Li},
3925 title = {Elliptic curve cryptography-based access control in sensor networks},
3926 journal = {Int. J. Security and Networks}
3929 @INPROCEEDINGS{wbg10:ip,
3930 author = {Wang, Qianxue and Bahi, Jacques and Guyeux, Christophe and Fang,
3932 title = {Randomness quality of {CI} chaotic generators. Application to Internet
3934 booktitle = {INTERNET'2010. The 2nd Int. Conf. on Evolving Internet},
3937 address = {Valencia, Spain},
3939 publisher = {IEEE Computer Society Press},
3940 note = {Best Paper award},
3941 classement = {ACTI},
3942 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
3948 author = {X. M. Wang and J. S. Zhang and W. F. Zhang},
3949 title = {One-way hash function construction based on the extended chaotic
3951 journal = {Acta Phys. Sinici.},
3953 volume = {52, No. 11},
3954 pages = {2737--2742},
3956 timestamp = {2009.01.16}
3960 author = {Westhoff, Dirk and Girao, Joao and Acharya, Mithun},
3961 title = {Concealed Data Aggregation for Reverse Multicast Traffic in Sensor
3962 Networks: Encryption, Key Distribution, and Routing Adaptation},
3963 journal = {IEEE Transactions on Mobile Computing},
3966 pages = {1417--1431},
3968 address = {Piscataway, NJ, USA},
3969 doi = {http://dx.doi.org/10.1109/TMC.2006.144},
3971 publisher = {IEEE Educational Activities Department}
3975 author = {Wikipédia},
3976 title = {Exposant de Lyapunov -- Site web d'André Lévesque},
3978 note = {[En ligne; Page disponible le 9-septembre-2010]},
3979 url = {\url{http://math.cmaisonneuve.qc.ca/alevesque/chaos_fract/Lyapunov/Exposant.html}}
3983 author = {Wikipédia},
3984 title = {Espace complet --- Wikipédia{,} l'encyclopédie libre},
3986 note = {[En ligne; Page disponible le 9-août-2010]},
3987 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Espace_complet&oldid=52734266}}
3991 author = {Wikipédia},
3992 title = {Densité (mathématiques) --- Wikipédia{,} l'encyclopédie libre},
3994 note = {[En ligne; Page disponible le 8-août-2010]},
3995 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Densit%C3%A9_(math%C3%A9matiques)&oldid=53938121}}
3999 author = {Wikipédia},
4000 title = {Information de Fisher --- Wikipédia{,} l'encyclopédie libre},
4002 note = {[En ligne; Page disponible le 5-août-2010]},
4003 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Information_de_Fisher&oldid=52877871}}
4006 @MISC{wiki:Kerkhoffs,
4007 author = {Wikipédia},
4008 title = {Principe de Kerckhoffs --- Wikipédia{,} l'encyclopédie libre},
4010 note = {[En ligne; Page disponible le 20-août-2010]},
4011 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Principe_de_Kerckhoffs&oldid=52133114}}
4014 @MISC{wiki:sarkovskii,
4015 author = {Wikipédia},
4016 title = {Théor\`{e}me de Sarkovskii --- Wikipédia{,} l'encyclopédie libre},
4018 note = {[En ligne; Page disponible le 8-août-2010]},
4019 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Th%C3%A9or%C3%A8me_de_Sarkovskii&oldid=54196167}}
4022 @MISC{wiki:steganographie,
4023 author = {Wikipédia},
4024 title = {Stéganographie --- Wikipédia{,} l'encyclopédie libre},
4026 note = {[En ligne; Page disponible le 5-août-2010]},
4027 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=St%C3%A9ganographie&oldid=54724435}}
4030 @MISC{wiki:tatouage,
4031 author = {Wikipédia},
4032 title = {Tatouage numérique --- Wikipédia{,} l'encyclopédie libre},
4034 note = {[En ligne; Page disponible le 5-août-2010]},
4035 url = {https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Tatouage_num%C3%A9rique&oldid=55484940}
4038 @MISC{wiki:testsHypothese,
4039 author = {Wikipédia},
4040 title = {Test d'hypoth\`{e}se --- Wikipédia{,} l'encyclopédie libre},
4042 note = {[En ligne; Page disponible le 5-août-2010]},
4043 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Test_d%27hypoth%C3%A8se&oldid=55344108}}
4047 author = {Williams, Josh and Raymond, Scott},
4051 note = {\texttt{http://gowalla.com}}
4055 author = {Xianyong Wu and Zhi-Hong Guan},
4056 title = {A novel digital watermark algorithm based on chaotic maps},
4057 journal = {Physics Letters A},
4060 pages = {403 - 406},
4062 doi = {DOI: 10.1016/j.physleta.2007.01.034},
4064 keywords = {Watermarking},
4065 url = {http://www.sciencedirect.com/science/article/B6TVM-4MY0MF3-8/2/0b4d1298fa84337d2e59b3fefe26f583}
4068 @INPROCEEDINGS{Wu2007,
4069 author = {Wu, Xianyong and Guan, Zhi-Hong and Wu, Zhengping},
4070 title = {A Chaos Based Robust Spatial Domain Watermarking Algorithm},
4071 booktitle = {ISNN '07: Proceedings of the 4th international symposium on Neural
4075 address = {Berlin, Heidelberg},
4076 publisher = {Springer-Verlag},
4077 doi = {http://dx.doi.org/10.1007/978-3-540-72393-6_15},
4078 isbn = {978-3-540-72392-9},
4079 location = {Nanjing, China}
4082 @ARTICLE{Xiao20092288,
4083 author = {Di Xiao and Xiaofeng Liao and Yong Wang},
4084 title = {Parallel keyed hash function construction based on chaotic neural
4086 journal = {Neurocomputing},
4089 pages = {2288 - 2296},
4091 note = {Lattice Computing and Natural Computing (JCIS 2007) / Neural Networks
4092 in Intelligent Systems Designn (ISDA 2007)},
4093 abstract = {Recently, various hash functions based on chaos or neural networks
4094 were proposed. Nevertheless, none of them works efficiently in parallel
4095 computing environment. In this paper, an algorithm for parallel keyed
4096 hash function construction based on chaotic neural network is proposed.
4097 The mechanism of changeable-parameter and self-synchronization establishes
4098 a close relation between the hash value bit and message, and the
4099 algorithm structure ensures the uniform sensitivity of the hash value
4100 to the message blocks at different positions. The proposed algorithm
4101 can satisfy the performance requirements of hash function. These
4102 properties make it a promising choice for hashing on parallel computing
4105 keywords = {Chaotic neural network}
4108 @ARTICLE{Xiao20094346,
4109 author = {Di Xiao and Xiaofeng Liao and Yong Wang},
4110 title = {Improving the security of a parallel keyed hash function based on
4112 journal = {Physics Letters A},
4115 pages = {4346 - 4353},
4118 keywords = {Hash function},
4120 timestamp = {2009.12.12}
4123 @ARTICLE{Xiao20102254,
4124 author = {Di Xiao and Frank Y. Shih and Xiaofeng Liao},
4125 title = {A chaos-based hash function with both modification detection and
4126 localization capabilities},
4127 journal = {Communications in Nonlinear Science and Numerical Simulation},
4130 pages = {2254 - 2261},
4132 abstract = {Recently, a variety of chaos-based hash functions have been proposed.
4133 Nevertheless, none of them can realize modification localization.
4134 In this paper, a hash function with both modification detection and
4135 localization capabilities is proposed, which can also support the
4136 parallel processing mode. By using the mechanism of changeable-parameter
4137 and self-synchronization, the keystream can establish a close relation
4138 with the algorithm key, the content, and the order of each message
4139 unit. Theoretical analysis and computer simulation indicate that
4140 the proposed algorithm can satisfy the performance requirements of
4143 keywords = {Hash function}
4147 author = {Yang, Z.},
4148 title = {Estimating the pattern of nucleotide substitution},
4149 journal = {Journal of Molecular Evolution},
4153 added-at = {2009-01-22T02:55:58.000+0100},
4154 biburl = {http://www.bibsonomy.org/bibtex/27da68ebb5221b9e97c5f9567cbd72bb5/stephane.guindon},
4155 interhash = {951d2d6b98320cb775fd695a0c058092},
4156 intrahash = {7da68ebb5221b9e97c5f9567cbd72bb5},
4157 keywords = {imported},
4158 timestamp = {2009-01-22T02:55:58.000+0100}
4161 @INPROCEEDINGS{Yao82,
4162 author = {Yao, Andrew C.},
4163 title = {Theory and application of trapdoor functions},
4164 booktitle = {Proceedings of the 23rd Annual Symposium on Foundations of Computer
4167 series = {SFCS '82},
4169 address = {Washington, DC, USA},
4170 publisher = {IEEE Computer Society},
4172 doi = {http://dx.doi.org/10.1109/SFCS.1982.95},
4174 url = {http://dx.doi.org/10.1109/SFCS.1982.95}
4177 @INPROCEEDINGS{Yu06,
4178 author = {Yu, Yu and Leiwo, Jussipekka and Premkumar, Benjamin},
4179 title = {A Study on the Security of Privacy Homomorphism},
4180 booktitle = {ITNG '06: Proceedings of the Third International Conference on Information
4181 Technology: New Generations},
4184 address = {Washington, DC, USA},
4185 publisher = {IEEE Computer Society},
4186 doi = {http://dx.doi.org/10.1109/ITNG.2006.19},
4187 isbn = {0-7695-2497-4}
4190 @ARTICLE{Zhang2008658,
4191 author = {Wei Zhang and Yonghe Liu and Sajal K. Das and Pradip De},
4192 title = {Secure data aggregation in wireless sensor networks: A watermark
4193 based authentication supportive approach},
4194 journal = {Pervasive and Mobile Computing},
4197 pages = {658 - 680},
4199 doi = {DOI: 10.1016/j.pmcj.2008.05.005},
4201 keywords = {Wireless sensor networks},
4202 url = {http://www.sciencedirect.com/science/article/B7MF1-4SKB3MD-1/2/b73948dcaa3eb63a2c21d09041882625}
4206 author = {Zhang, Yang and Arakaki, Adrian K. and Skolnick, Jeffrey},
4207 title = {TASSER: An automated method for the prediction of protein tertiary
4208 structures in CASP6},
4209 journal = {Proteins},
4215 keywords = {comparative modeling, threading, ab initio prediction, TASSER, PROSPECTOR_3},
4216 owner = {christophe},
4217 publisher = {Wiley Subscription Services, Inc., A Wiley Company},
4218 timestamp = {2011.01.22},
4219 url = {http://dx.doi.org/10.1002/prot.20724}
4222 @ARTICLE{Zhou1997429,
4223 author = {Chang-song Zhou and Tian-lun Chen},
4224 title = {Extracting information masked by chaos and contaminated with noise:
4225 Some considerations on the security of communication approaches using
4227 journal = {Physics Letters A},
4230 pages = {429 - 435},
4233 keywords = {Communication},
4235 timestamp = {2009.12.12}
4239 author = {Zhou, Huai-bei and Wang, Lu},
4240 title = {Chaos in Biomolecular Dynamics},
4241 journal = {The Journal of Physical Chemistry},
4244 pages = {8101-8105},
4246 doi = {10.1021/jp953409x}
4249 @PROCEEDINGS{DBLP:conf/iwdw/2005,
4250 title = {IWDW'05: 4th International Workshop on Digital Watermarking},
4252 editor = {Mauro Barni and Ingemar J. Cox and Ton Kalker and Hyoung Joong Kim},
4254 series = {Lecture Notes in Computer Science},
4255 address = {Siena, Italy},
4256 publisher = {Springer},
4257 month = {September 15-17},
4258 bibsource = {DBLP, http://dblp.uni-trier.de},
4260 isbn = {3-540-28768-X},
4262 timestamp = {2009.06.29}
4265 @PROCEEDINGS{DBLP:conf/ih/2006,
4266 title = {IH 2006: Information Hiding, 8th International Workshop},
4268 editor = {Jan Camenisch and Christian S. Collberg and Neil F. Johnson and Phil
4271 series = {Lecture Notes in Computer Science},
4272 address = {Alexandria, VA, USA},
4273 publisher = {Springer},
4275 bibsource = {DBLP, http://dblp.uni-trier.de},
4276 booktitle = {Information Hiding},
4277 isbn = {978-3-540-74123-7},
4279 timestamp = {2009.06.29}
4282 @PROCEEDINGS{DBLP:conf/ih/2007,
4283 title = {Information Hiding, 9th International Workshop, IH 2007, Saint Malo,
4284 France, June 11-13, 2007, Revised Selected Papers},
4286 editor = {Teddy Furon and Fran\c{c}ois Cayre and Gwena{\"e}l J. Do{\"e}rr and
4289 series = {Lecture Notes in Computer Science},
4290 publisher = {Springer},
4291 bibsource = {DBLP, http://dblp.uni-trier.de},
4292 booktitle = {Information Hiding},
4293 isbn = {978-3-540-77369-6},
4295 timestamp = {2009.06.29}
4298 @PROCEEDINGS{DBLP:conf/iccsa/2006-1,
4299 title = {Computational Science and Its Applications - ICCSA 2006, International
4300 Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part I},
4302 editor = {Marina L. Gavrilova and Osvaldo Gervasi and Vipin Kumar and Chih
4303 Jeng Kenneth Tan and David Taniar and Antonio Lagan{\`a} and Youngsong
4304 Mun and Hyunseung Choo},
4306 series = {Lecture Notes in Computer Science},
4307 publisher = {Springer},
4308 bibsource = {DBLP, http://dblp.uni-trier.de},
4309 booktitle = {ICCSA (1)},
4310 isbn = {3-540-34070-X}
4313 @PROCEEDINGS{DBLP:conf/secrypt/2010,
4314 title = {SECRYPT 2010 - Proceedings of the International Conference on Security
4315 and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part
4316 of ICETE - The International Joint Conference on e-Business and Telecommunications},
4318 editor = {Sokratis K. Katsikas and Pierangela Samarati},
4319 publisher = {SciTePress},
4320 bibsource = {DBLP, http://dblp.uni-trier.de},
4321 booktitle = {SECRYPT},
4322 isbn = {978-989-8425-18-8}
4325 @BOOK{Katzenbeisser00,
4326 title = {Information Hiding Techniques for Steganography and Digital Watermarking},
4327 publisher = {Artech House, Inc.},
4329 editor = {Katzenbeisser, Stefan and Petitcolas, Fabien A.},
4330 address = {Norwood, MA, USA},
4334 @PROCEEDINGS{DBLP:conf/ih/1999,
4335 title = {IH'99: 3rd International Workshop on Information Hiding},
4337 editor = {Andreas Pfitzmann},
4339 series = {Lecture Notes in Computer Science},
4340 address = {Dresden, Germany},
4341 publisher = {Springer},
4342 month = {September 29 - October 1.},
4343 bibsource = {DBLP, http://dblp.uni-trier.de},
4344 booktitle = {Information Hiding},
4345 isbn = {3-540-67182-X},
4347 timestamp = {2009.06.29}
4350 @PROCEEDINGS{DBLP:conf/indocrypt/2000,
4351 title = {Progress in Cryptology - INDOCRYPT 2000, First International Conference
4352 in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings},
4354 editor = {Bimal K. Roy and Eiji Okamoto},
4356 series = {Lecture Notes in Computer Science},
4357 publisher = {Springer},
4358 bibsource = {DBLP, http://dblp.uni-trier.de},
4359 booktitle = {INDOCRYPT},
4360 isbn = {3-540-41452-5}
4363 @BOOK{DBLP:reference/icsec/2010,
4364 title = {Handbook of Information and Communication Security},
4365 publisher = {Springer},
4367 editor = {Peter P. Stavroulakis and Mark Stamp},
4368 bibsource = {DBLP, http://dblp.uni-trier.de},
4369 booktitle = {Handbook of Information and Communication Security},
4370 ee = {http://dx.doi.org/10.1007/978-3-642-04117-4},
4371 isbn = {978-3-642-04116-7}
4374 @PROCEEDINGS{DBLP:conf/isnn/2004-2,
4375 title = {Advances in Neural Networks - ISNN 2004, International Symposium
4376 on Neural Networks, Dalian, China, August 19-21, 2004, Proceedings,
4379 editor = {Fuliang Yin and Jun Wang and Chengan Guo},
4381 series = {Lecture Notes in Computer Science},
4382 publisher = {Springer},
4383 bibsource = {DBLP, http://dblp.uni-trier.de},
4384 booktitle = {ISNN (2)},
4385 isbn = {3-540-22843-8}
4388 @PROCEEDINGS{DBLP:conf/adhocnets/2010,
4389 title = {Ad Hoc Networks - Second International Conference, ADHOCNETS 2010,
4390 Victoria, BC, Canada, August 18-20, 2010, Revised Selected Papers},
4392 editor = {Jun Zheng and David Simplot-Ryl and Victor C. M. Leung},
4394 series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
4395 and Telecommunications Engineering},
4396 publisher = {Springer},
4397 bibsource = {DBLP, http://dblp.uni-trier.de},
4398 booktitle = {ADHOCNETS},
4399 ee = {http://dx.doi.org/10.1007/978-3-642-17994-5},
4400 isbn = {978-3-642-17993-8}
4404 title = {Delicious social bookmarking, http://delicious.com/},
4405 comment = {http://delicious.com/},
4407 url = {http://delicious.com/}
4411 title = {The Frick Collection, http://www.frick.org/},
4412 comment = {http://www.frick.org/},
4414 url = {http://www.frick.org/}
4418 title = {Proceedings of the IEEE Congress on Evolutionary Computation, CEC
4419 2010, Barcelona, Spain, 18-23 July 2010},
4422 bibsource = {DBLP, http://dblp.uni-trier.de},
4423 booktitle = {IEEE Congress on Evolutionary Computation}
4426 @PROCEEDINGS{DBLP:conf/cec/2010,
4427 title = {Proceedings of the IEEE Congress on Evolutionary Computation, CEC
4428 2010, Barcelona, Spain, 18-23 July 2010},
4431 bibsource = {DBLP, http://dblp.uni-trier.de},
4432 booktitle = {IEEE Congress on Evolutionary Computation}
4435 @PROCEEDINGS{DBLP:conf/date/2010,
4436 title = {Design, Automation and Test in Europe, DATE 2010, Dresden, Germany,
4440 bibsource = {DBLP, http://dblp.uni-trier.de},
4444 @PROCEEDINGS{DBLP:conf/cse/2009,
4445 title = {Proceedings IEEE CSE'09, 12th IEEE International Conference on Computational
4446 Science and Engineering, August 29-31, 2009, Vancouver, BC, Canada},
4448 publisher = {IEEE Computer Society},
4449 bibsource = {DBLP, http://dblp.uni-trier.de},
4453 @PROCEEDINGS{DBLP:conf/icumt/2009,
4454 title = {Proceedings of the International Conference on Ultra Modern Telecommunications,
4455 ICUMT 2009, 12-14 October 2009, St. Petersburg, Russia},
4458 bibsource = {DBLP, http://dblp.uni-trier.de},
4462 @PROCEEDINGS{DBLP:conf/focs/2008,
4463 title = {49th Annual IEEE Symposium on Foundations of Computer Science, FOCS
4464 2008, October 25-28, 2008, Philadelphia, PA, USA},
4466 publisher = {IEEE Computer Society},
4467 bibsource = {DBLP, http://dblp.uni-trier.de},
4471 @comment{jabref-meta: selector_publisher:}
4473 @comment{jabref-meta: selector_author:}
4475 @comment{jabref-meta: selector_journal:}
4477 @comment{jabref-meta: selector_keywords:Chaos;Entropie Topologique;Tip