1 % This file was created with JabRef 2.7.2.
4 @INPROCEEDINGS{AdelsbachKS06,
5 author = {Andr{\'e} Adelsbach and Stefan Katzenbeisser and Ahmad-Reza Sadeghi},
6 title = {A Computational Model for Watermark Robustness},
7 booktitle = {Information Hiding},
10 bibsource = {DBLP, http://dblp.uni-trier.de},
11 crossref = {DBLP:conf/ih/2006},
12 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_10},
14 timestamp = {2009.06.29}
18 @INCOLLECTION{gb11:bc,
19 author = {Guyeux, Christophe and Bahi, Jacques},
20 title = {A Topological Study of Chaotic Iterations. Application to Hash Functions},
21 booktitle = {CIPS, Computational Intelligence for Privacy and Security},
22 publisher = {Springer},
25 series = {Studies in Computational Intelligence},
27 note = {Revised and extended journal version of an IJCNN best paper},
29 doi = {10.1007/978-3-642-25237-2_5},
30 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
33 url = {http://dx.doi.org/10.1007/978-3-642-25237-2_5}
36 @INPROCEEDINGS{BattiatoCGG99,
37 author = {Sebastiano Battiato and Dario Catalano and Giovanni Gallo and Rosario
39 title = {Robust Watermarking for Images Based on Color Manipulation},
40 booktitle = {Information Hiding},
43 bibsource = {DBLP, http://dblp.uni-trier.de},
44 crossref = {DBLP:conf/ih/1999},
46 timestamp = {2009.06.29}
49 @INPROCEEDINGS{ComesanaPP05,
50 author = {Pedro Comesa{\~n}a and Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez},
51 title = {The Return of the Sensitivity Attack},
55 bibsource = {DBLP, http://dblp.uni-trier.de},
56 crossref = {DBLP:conf/iwdw/2005},
57 ee = {http://dx.doi.org/10.1007/11551492_20},
59 timestamp = {2009.06.29}
62 @INPROCEEDINGS{ComesanaPP05bis,
63 author = {Pedro Comesa{\~n}a and Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez},
64 title = {Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum
66 booktitle = {IH'05: Information Hiding Workshop},
69 publisher = {Lectures Notes in Computer Science, Springer-Verlag},
70 bibsource = {DBLP, http://dblp.uni-trier.de},
71 crossref = {DBLP:conf/ih/2005},
72 ee = {http://dx.doi.org/10.1007/11558859_12},
74 timestamp = {2009.06.30}
77 @INPROCEEDINGS{CongJQZ06,
78 author = {Jin Cong and Yan Jiang and Zhiguo Qu and Zhongmei Zhang},
79 title = {A Wavelet Packets Watermarking Algorithm Based on Chaos Encryption},
80 booktitle = {ICCSA (1)},
83 bibsource = {DBLP, http://dblp.uni-trier.de},
84 crossref = {DBLP:conf/iccsa/2006-1},
85 ee = {http://dx.doi.org/10.1007/11751540_100}
88 @INPROCEEDINGS{DBLP:conf/focs/DziembowskiP08,
89 author = {Stefan Dziembowski and Krzysztof Pietrzak},
90 title = {Leakage-Resilient Cryptography},
94 bibsource = {DBLP, http://dblp.uni-trier.de},
95 crossref = {DBLP:conf/focs/2008},
96 ee = {http://dx.doi.org/10.1109/FOCS.2008.56}
99 @INCOLLECTION{Filiol10,
100 author = {Eric Filiol},
101 title = {Viruses and Malware},
102 booktitle = {Handbook of Information and Communication Security},
105 bibsource = {DBLP, http://dblp.uni-trier.de},
106 crossref = {DBLP:reference/icsec/2010},
107 ee = {http://dx.doi.org/10.1007/978-3-642-04117-4_34}
110 @INPROCEEDINGS{Filiol00,
111 author = {Eric Filiol},
112 title = {Decimation Attack of Stream Ciphers},
113 booktitle = {INDOCRYPT},
116 bibsource = {DBLP, http://dblp.uni-trier.de},
117 crossref = {DBLP:conf/indocrypt/2000},
118 ee = {http://link.springer.de/link/service/series/0558/bibs/1977/19770031.htm}
121 @INPROCEEDINGS{Furon05,
122 author = {Teddy Furon},
123 title = {A Survey of Watermarking Security},
127 bibsource = {DBLP, http://dblp.uni-trier.de},
128 crossref = {DBLP:conf/iwdw/2005},
129 ee = {http://dx.doi.org/10.1007/11551492_16},
131 timestamp = {2009.06.29}
134 @INPROCEEDINGS{DBLP:conf/cec/HiggsSHS10,
135 author = {Trent Higgs and Bela Stantic and Tamjidul Hoque and Abdul Sattar},
136 title = {Genetic algorithm feature-based resampling for protein structure
138 booktitle = {IEEE Congress on Evolutionary Computation},
141 bibsource = {DBLP, http://dblp.uni-trier.de},
142 crossref = {DBLP:conf/cec/2010},
143 ee = {http://dx.doi.org/10.1109/CEC.2010.5586149}
146 @INPROCEEDINGS{Higgs2010,
147 author = {Trent Higgs and Bela Stantic and Tamjidul Hoque and Abdul Sattar},
148 title = {Genetic algorithm feature-based resampling for protein structure
150 booktitle = {IEEE Congress on Evolutionary Computation},
153 bibsource = {DBLP, http://dblp.uni-trier.de},
154 crossref = {DBLP:conf/cec/2010},
155 ee = {http://dx.doi.org/10.1109/CEC.2010.5586149}
158 @INPROCEEDINGS{DBLP:conf/cec/HorvathC10,
159 author = {Dragos Horvath and Camelia Chira},
160 title = {Simplified chain folding models as metaheuristic benchmark for tuning
161 real protein folding algorithms?},
162 booktitle = {IEEE Congress on Evolutionary Computation},
165 bibsource = {DBLP, http://dblp.uni-trier.de},
166 crossref = {DBLP:conf/cec/2010},
167 ee = {http://dx.doi.org/10.1109/CEC.2010.5585932}
170 @INPROCEEDINGS{DBLP:conf/cec/IslamC10,
171 author = {Md. Kamrul Islam and Madhu Chetty},
172 title = {Clustered memetic algorithm for protein structure prediction},
173 booktitle = {IEEE Congress on Evolutionary Computation},
176 bibsource = {DBLP, http://dblp.uni-trier.de},
177 crossref = {DBLP:conf/cec/2010},
178 ee = {http://dx.doi.org/10.1109/CEC.2010.5586187}
181 @INPROCEEDINGS{Ker06,
182 author = {Andrew D. Ker},
183 title = {Batch Steganography and Pooled Steganalysis},
184 booktitle = {Information Hiding},
187 bibsource = {DBLP, http://dblp.uni-trier.de},
188 crossref = {DBLP:conf/ih/2006},
189 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_18},
191 timestamp = {2009.06.29}
194 @INPROCEEDINGS{Lin2009,
195 author = {H.-Y. Lin and T.-C. Chiang},
196 title = {Cooperative Secure Data Aggregation in Sensor Networks Using Elliptic
197 Curve Based Cryptosystems},
201 bibsource = {DBLP, http://dblp.uni-trier.de},
202 crossref = {DBLP:conf/cdve/2009},
203 ee = {http://dx.doi.org/10.1007/978-3-642-04265-2_58}
206 @INPROCEEDINGS{DBLP:conf/cse/MaimourPH09,
207 author = {Moufida Maimour and CongDuc Pham and Doan B. Hoang},
208 title = {A Congestion Control Framework for Handling Video Surveillance Traffics
210 booktitle = {CSE (2)},
213 bibsource = {DBLP, http://dblp.uni-trier.de},
214 crossref = {DBLP:conf/cse/2009},
215 ee = {http://dx.doi.org/10.1109/CSE.2009.200}
218 @INPROCEEDINGS{DBLP:conf/icumt/MakhoulSP09,
219 author = {Abdallah Makhoul and Rachid Saadi and CongDuc Pham},
220 title = {Coverage and adaptive scheduling algorithms for criticality management
221 on video wireless sensor networks},
225 bibsource = {DBLP, http://dblp.uni-trier.de},
226 crossref = {DBLP:conf/icumt/2009},
227 ee = {http://dx.doi.org/10.1109/ICUMT.2009.5345630}
230 @INPROCEEDINGS{Mittelholzer99,
231 author = {Thomas Mittelholzer},
232 title = {An Information-Theoretic Approach to Steganography and Watermarking},
233 booktitle = {Information Hiding},
236 bibsource = {DBLP, http://dblp.uni-trier.de},
237 crossref = {DBLP:conf/ih/1999},
239 timestamp = {2009.06.29}
242 @INPROCEEDINGS{PellegriniBA10,
243 author = {Andrea Pellegrini and Valeria Bertacco and Todd M. Austin},
244 title = {Fault-based attack of RSA authentication},
248 bibsource = {DBLP, http://dblp.uni-trier.de},
249 crossref = {DBLP:conf/date/2010},
250 ee = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5456933}
253 @INPROCEEDINGS{DBLP:conf/cec/Perez-HernandezRG10,
254 author = {Luis Germ{\'a}n P{\'e}rez-Hern{\'a}ndez and Katya Rodr\'{\i}guez-V{\'a}zquez
255 and Ram{\'o}n Gardu{\~n}o-Ju{\'a}rez},
256 title = {Estimation of 3D Protein Structure by means of parallel Particle
258 booktitle = {IEEE Congress on Evolutionary Computation},
261 bibsource = {DBLP, http://dblp.uni-trier.de},
262 crossref = {DBLP:conf/cec/2010},
263 ee = {http://dx.doi.org/10.1109/CEC.2010.5586549}
266 @INPROCEEDINGS{WangNHZH07,
267 author = {Chuntao Wang and Jiangqun Ni and Jiwu Huang and Rongyue Zhang and
269 title = {Robust and High Capacity Image Watermarking Based on Jointly Coding
270 and Embedding Optimization},
271 booktitle = {Information Hiding},
274 bibsource = {DBLP, http://dblp.uni-trier.de},
275 crossref = {DBLP:conf/ih/2007},
276 ee = {http://dx.doi.org/10.1007/978-3-540-77370-2_5},
278 timestamp = {2009.06.29}
281 @INPROCEEDINGS{Zhao04,
282 author = {Jian Zhao and Mingquan Zhou and Hongmei Xie and Jinye Peng and Xin
284 title = {A Novel Wavelet Image Watermarking Scheme Combined with Chaos Sequence
286 booktitle = {ISNN (2)},
289 bibsource = {DBLP, http://dblp.uni-trier.de},
290 crossref = {DBLP:conf/isnn/2004-2},
291 ee = {http://springerlink.metapress.com/openurl.asp?genre=article{\&}issn=0302-9743{\&}volume=3174{\&}spage=663}
294 @INPROCEEDINGS{Acharya05securecomparison,
295 author = {Acharya, Mithun and Girao, Joao and Westhoff, Dirk},
296 title = {Secure Comparison of Encrypted Data in Wireless Sensor Networks},
297 booktitle = {WIOPT '05: Proceedings of the Third International Symposium on Modeling
298 and Optimization in Mobile, Ad Hoc, and Wireless Networks},
301 address = {Washington, DC, USA},
302 publisher = {IEEE Computer Society},
303 doi = {http://dx.doi.org/10.1109/WIOPT.2005.44},
304 isbn = {0-7695-2267-X}
307 @INPROCEEDINGS{Acimez07onthe,
308 author = {Onur Acıi\c{c}mez and \c{C}etin Kaya Ko\c{c} and Jean-Pierre Seifert},
309 title = {On the power of simple branch prediction analysis },
310 booktitle = {2007 ACM Symposium on Information, Computer and Communications Security
314 publisher = {ACM Press}
318 author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},
319 title = {Topological entropy},
320 journal = {Trans. Amer. Math. Soc.},
325 timestamp = {2008.05.29}
328 @INPROCEEDINGS{Agrawal04,
329 author = {Agrawal, Rakesh and Kiernan, Jerry and Srikant, Ramakrishnan and
331 title = {Order preserving encryption for numeric data},
332 booktitle = {SIGMOD '04: Proceedings of the 2004 ACM SIGMOD international conference
333 on Management of data},
336 address = {New York, NY, USA},
338 doi = {http://doi.acm.org/10.1145/1007568.1007632},
339 isbn = {1-58113-859-8},
340 location = {Paris, France}
343 @ARTICLE{Anfinsen20071973,
344 author = {Anfinsen, Christian B.},
345 title = {Principles that Govern the Folding of Protein Chains},
351 doi = {10.1126/science.181.4096.223},
352 eprint = {http://www.sciencemag.org/content/181/4096/223.full.pdf},
353 url = {http://www.sciencemag.org/content/181/4096/223.short}
357 author = {D. G. Arqu\`{e}s and J. P. Fallot and C. J. Michel},
358 title = {An evolutionary analytical model of a complementary circular code
359 simulating the protein coding genes, the 5' and 3' regions.},
360 journal = {Bull Math Biol},
366 abstract = {The self-complementary subset T0 = X0 [symbol: see text] ¿AAA, TTT¿
367 with X0 = ¿AAC, AAT, ACC, ATC, ATT, CAG, CTC, CTG, GAA, GAC, GAG,
368 GAT, GCC, GGC, GGT, GTA, GTC, GTT, TAC, TTC¿ of 22 trinucleotides
369 has a preferential occurrence in the frame 0 (reading frame established
370 by the ATG start trinucleotide) of protein (coding) genes of both
371 prokaryotes and eukaryotes. The subsets T1 = X1 [symbol: see text]
372 ¿CCC¿ and T2 = X2 [symbol: see text] ¿GGG¿ of 21 trinucleotides have
373 a preferential occurrence in the shifted frames 1 and 2 respectively
374 (frame 0 shifted by one and two nucleotides respectively in the 5'-3'
375 direction). T1 and T2 are complementary to each other. The subset
376 T0 contains the subset X0 which has the rarity property (6 x 10(-8)
377 to be a complementary maximal circular code with two permutated maximal
378 circular codes X1 and X2 in the frames 1 and 2 respectively. X0 is
379 called a C3 code. A quantitative study of these three subsets T0,
380 T1, T2 in the three frames 0, 1, 2 of protein genes, and the 5' and
381 3' regions of eukaryotes, shows that their occurrence frequencies
382 are constant functions of the trinucleotide positions in the sequences.
383 The frequencies of T0, T1, T2 in the frame 0 of protein genes are
384 49, 28.5 and 22.5\% respectively. In contrast, the frequencies of
385 T0, T1, T2 in the 5' and 3' regions of eukaryotes, are independent
386 of the frame. Indeed, the frequency of T0 in the three frames of
387 5' (respectively 3') regions is equal to 35.5\% (respectively 38\%)
388 and is greater than the frequencies T1 and T2, both equal to 32.25\%
389 (respectively 31\%) in the three frames. Several frequency asymmetries
390 unexpectedly observed (e.g. the frequency difference between T1 and
391 T2 in the frame 0), are related to a new property of the subset T0
392 involving substitutions. An evolutionary analytical model at three
393 parameters (p, q, t) based on an independent mixing of the 22 codons
394 (trinucleotides in frame 0) of T0 with equiprobability (1/22) followed
395 by t approximately 4 substitutions per codon according to the proportions
396 p approximately 0.1, q approximately 0.1 and r = 1 - p - q approximately
397 0.8 in the three codon sites respectively, retrieves the frequencies
398 of T0, T1, T2 observed in the three frames of protein genes and explains
399 these asymmetries. Furthermore, the same model (0.1, 0.1, t) after
400 t approximately 22 substitutions per codon, retrieves the statistical
401 properties observed in the three frames of the 5' and 3' regions.
402 The complex behaviour of these analytical curves is totally unexpected
403 and a priori difficult to imagine.},
404 doi = {10.1006/bulm.1997.0033},
405 institution = {Equipe de Biologie Théorique, Université de Marne la Vallée, Institut
406 Gaspard Monge, Noisy Le Grand, France. Arqu\`{e}s@univ-mlv.fr},
407 keywords = {Animals; Biological Evolution; Codon, genetics; Genetic Code; Humans;
408 Mammals; Models, Genetic; Probability; Proteins, genetics; Rodentia;
411 medline-pst = {ppublish},
413 pii = {S0092-8240(97)90033-1},
415 timestamp = {2011.05.05},
416 url = {http://dx.doi.org/10.1006/bulm.1997.0033}
420 author = {D. G. Arqu\`{e}s and C. J. Michel},
421 title = {Analytical expression of the purine/pyrimidine autocorrelation function
422 after and before random mutations.},
423 journal = {Math Biosci},
429 abstract = {The mutation process is a classical evolutionary genetic process.
430 The type of mutations studied here is the random substitutions of
431 a purine base R (adenine or guanine) by a pyrimidine base Y (cytosine
432 or thymine) and reciprocally (transversions). The analytical expressions
433 derived allow us to analyze in genes the occurrence probabilities
434 of motifs and d-motifs (two motifs separated by any d bases) on the
435 R/Y alphabet under transversions. These motif probabilities can be
436 obtained after transversions (in the evolutionary sense; from the
437 past to the present) and, unexpectedly, also before transversions
438 (after back transversions, in the inverse evolutionary sense, from
439 the present to the past). This theoretical part in Section 2 is a
440 first generalization of a particular formula recently derived. The
441 application in Section 3 is based on the analytical expression giving
442 the autocorrelation function (the d-motif probabilities) before transversions.
443 It allows us to study primitive genes from actual genes. This approach
444 solves a biological problem. The protein coding genes of chloroplasts
445 and mitochondria have a preferential occurrence of the 6-motif YRY(N)6YRY
446 (maximum of the autocorrelation function for d = 6, N = R or Y) with
447 a periodicity modulo 3. The YRY(N)6YRY preferential occurrence without
448 the periodicity modulo 3 is also observed in the RNA coding genes
449 (ribosomal, transfer, and small nuclear RNA genes) and in the noncoding
450 genes (introns and 5' regions of eukaryotic nuclei). However, there
451 are two exceptions to this YRY(N)6YRY rule: the protein coding genes
452 of eukaryotic nuclei, and prokaryotes, where YRY(N)6YRY has the second
453 highest value after YRY(N)0YRY (YRYYRY) with a periodicity modulo
454 3. When we go backward in time with the analytical expression, the
455 protein coding genes of both eukaryotic nuclei and prokaryotes retrieve
456 the YRY(N)6YRY preferential occurrence with a periodicity modulo
457 3 after 0.2 back transversions per base. In other words, the actual
458 protein coding genes of chloroplasts and mitochondria are similar
459 to the primitive protein coding genes of eukaryotic nuclei and prokaryotes.
460 On the other hand, this application represents the first result concerning
461 the mutation process in the model of DNA sequence evolution we recently
462 proposed. According to this model, the actual genes on the R/Y alphabet
463 derive from two successive evolutionary genetic processes: an independent
464 mixing of a few nonrandom types of oligonucleotides leading to genes
465 called primitive followed by a mutation process in these primitive
466 genes.(ABSTRACT TRUNCATED AT 400 WORDS)},
467 institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon,
469 keywords = {Base Sequence; Biological Evolution; DNA, genetics; Mathematics; Models,
470 Genetic; Mutation; Probability; Proteins, genetics; Purines; Pyrimidines},
472 medline-pst = {ppublish},
474 pii = {0025-5564(94)90020-5},
476 timestamp = {2011.05.05}
480 author = {D. G. Arqu\`{e}s and C. J. Michel},
481 title = {Analytical expression of the purine/pyrimidine codon probability
482 after and before random mutations.},
483 journal = {Bull Math Biol},
486 pages = {1025--1038},
489 abstract = {Recently, we proposed a new model of DNA sequence evolution (Arqu\`{e}s
490 and Michel. 1990b. Bull. math. Biol. 52, 741-772) according to which
491 actual genes on the purine/pyrimidine (R/Y) alphabet (R = purine
492 = adenine or guanine, Y = pyrimidine = cytosine or thymine) are the
493 result of two successive evolutionary genetic processes: (i) a mixing
494 (independent) process of non-random oligonucleotides (words of base
495 length less than 10: YRY(N)6, YRYRYR and YRYYRY are so far identified;
496 N = R or Y) leading to primitive genes (words of several hundreds
497 of base length) and followed by (ii) a random mutation process, i.e.,
498 transformations of a base R (respectively Y) into the base Y (respectively
499 R) at random sites in these primitive genes. Following this model
500 the problem investigated here is the study of the variation of the
501 8 R/Y codon probabilities RRR, ..., YYY under random mutations. Two
502 analytical expressions solved here allow analysis of this variation
503 in the classical evolutionary sense (from the past to the present,
504 i.e., after random mutations), but also in the inverted evolutionary
505 sense (from the present to the past, i.e., before random mutations).
506 Different properties are also derived from these formulae. Finally,
507 a few applications of these formulae are presented. They prove the
508 proposition in Arqu\`{e}s and Michel (1990b. Bull. math. Biol. 52,
509 741-772), Section 3.3.2, with the existence of a maximal mean number
510 of random mutations per base of the order 0.3 in the protein coding
511 genes. They also confirm the mixing process of oligonucleotides by
512 excluding the purine/pyrimidine contiguous and alternating tracts
513 from the formation process of primitive genes.},
514 institution = {Université de Franche-Comté, Besançon, France.},
515 keywords = {Base Sequence; Codon; DNA, chemistry/genetics; Mathematics; Models,
516 Genetic; Mutation; Probability; Purines; Pyrimidines},
518 medline-pst = {ppublish},
521 timestamp = {2011.05.05}
524 @ARTICLE{Arques1993b,
525 author = {D. G. Arqu\`{e}s and C. J. Michel},
526 title = {Identification and simulation of new non-random statistical properties
527 common to different eukaryotic gene subpopulations.},
528 journal = {Biochimie},
533 abstract = {The nucleotide distribution in protein coding genes, introns and transfer
534 RNA genes of eukaryotic subpopulations (primates, rodent and mammals)
535 is studied by autocorrelation functions. The autocorrelation function
536 analysing the occurrence probability of the i-motif YRY(N)iYRY (YRY-function)
537 in protein coding genes and transfer RNA genes of these three eukaryotic
538 subpopulations retrieves the preferential occurrence of YRY(N)6YRY
539 (R = purine = adenine or guanine, Y = pyrimidine = cytosine or thymine,
540 N = R or Y). The autocorrelation functions analysing the occurrence
541 probability of the i-motifs RRR(N)iRRR (RRR-function) and YYY(N)iYYY
542 (YYY-function) identify new non-random genetic statistical properties
543 in these three eukaryotic subpopulations, mainly: i) in their protein
544 coding genes: local maxima for i identical to 6 [12] (peaks for i
545 = 6, 18, 30, 42) with the RRR-function and local maxima for i identical
546 to 8 [10] (peaks for i = 8, 18, 28) with the YYY-function; and ii)
547 in their introns: local maxima for i identical to 3 [6] (peaks for
548 i = 3, 9, 15) and a short linear decrease followed by a large exponential
549 decrease both with the RRR- and YYY-functions. The non-random properties
550 identified in eukaryotic intron subpopulations are modelised with
551 a process of random insertions and deletions of nucleotides simulating
553 institution = {Equipe de Biologie Théorique, Université de Franche-Comté, Laboratoire
554 d'Informatique de Besançon, France.},
555 keywords = {Animals; Base Sequence; Data Interpretation, Statistical; Genes; Introns;
556 Mammals; Models, Genetic; Primates; Probability; Proteins, genetics;
557 RNA Editing; RNA, Transfer, genetics; Rodentia; Sequence Analysis,
560 medline-pst = {ppublish},
562 pii = {0300-9084(93)90173-P},
564 timestamp = {2011.05.05}
568 author = {D. G. Arqu\`{e}s and C. J. Michel},
569 title = {A simulation of the genetic periodicities modulo 2 and 3 with processes
570 of nucleotide insertions and deletions.},
571 journal = {J Theor Biol},
577 abstract = {Recently, a new genetic process termed RNA editing has been identified
578 showing insertions and deletions of nucleotides in particular RNA
579 molecules. On the other hand, there are a few non-random statistical
580 properties in genes: in particular, the periodicity modulo 3 (P3)
581 associated with an open reading frame, the periodicity modulo 2 (P2)
582 associated with alternating purine/pyrimidine stretches, the YRY(N)6YRY
583 preferential occurrence (R = purine = adenine or guanine, Y = pyrimidine
584 = cytosine or thymine, N = R or Y) representing a "code" of the DNA
585 helix pitch, etc. The problem investigated here is whether a process
586 of the type RNA editing can lead to the non-random statistical properties
587 commonly observed in genes. This paper will show in particular that:
588 The process of insertions and deletions of mononucleotides in the
589 initial sequence [YRY(N)3]* [series of YRY(N)3] can lead to the periodicity
590 modulo 2 (P2). The process of insertions and deletions of trinucleotides
591 in the initial sequence [YRY(N)6]* [series of YRY(N)6] can lead to
592 the periodicity modulo 3 (P3) and the YRY(N)6YRY preferential occurrence.
593 Furthermore, these two processes lead to a strong correlation with
594 the reality, namely the mononucleotide insertion/deletion process,
595 with the 5' eukaryotic regions and the trinucleotide insertion/deletion
596 process, with the eukaryotic protein coding genes.},
597 institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon,
598 Unité Associée CNRS No 822, France.},
599 keywords = {Chromosome Deletion; Computer Simulation; Humans; Models, Genetic;
600 Mutagenesis, genetics; RNA, genetics},
602 medline-pst = {ppublish},
605 timestamp = {2011.05.05}
609 author = {D. G. Arqu\`{e}s and C. J. Michel},
610 title = {Periodicities in coding and noncoding regions of the genes.},
611 journal = {J Theor Biol},
617 abstract = {Gene population statistical studies of protein coding genes and introns
618 have identified two types of periodicities on the purine/pyrimidine
619 alphabet: (i) the modulo 3 periodicity or coding periodicity (periodicity
620 P3) in protein coding genes of eukaryotes, prokaryotes, viruses,
621 chloroplasts, mitochondria, plasmids and in introns of viruses and
622 mitochondria, and (ii) the modulo 2 periodicity (periodicity P2)
623 in the eukaryotic introns. The periodicity study is herein extended
624 to the 5' and 3' regions of eukaryotes, prokaryotes and viruses and
625 shows: (i) the periodicity P3 in the 5' and 3' regions of eukaryotes.
626 Therefore, these observations suggest a unitary and dynamic concept
627 for the genes as for a given genome, the 5' and 3' regions have the
628 genetic information for protein coding genes and for introns: (1)
629 In the eukaryotic genome, the 5' (P2 and P3) and 3' (P2 and P3) regions
630 have the information for protein coding genes (P3) and for introns
631 (P2). The intensity of P3 is high in 5' regions and weak in 3' regions,
632 while the intensity of P2 is weak in 5' regions and high in 3' regions.
633 (2) In the prokaryotic genome, the 5' (P3) and 3' (P3) regions have
634 the information for protein coding genes (P3). (3) In the viral genome,
635 the 5' (P3) and 3' (P3) regions have the information for protein
636 coding genes (P3) and for introns (P3). The absence of P2 in viral
637 introns (in opposition to eukaryotic introns) may be related to the
638 absence of P2 in 5' and 3' regions of viruses.},
639 institution = {Université de Franche-Comté, Unité Associée CNRS No. 822, Besançon,
641 keywords = {Animals; Base Sequence; Eukaryotic Cells; Genes; Introns; Prokaryotic
642 Cells; Purine Nucleotides; Pyrimidine Nucleotides; Repetitive Sequences,
643 Nucleic Acid; Viruses, genetics},
645 medline-pst = {ppublish},
648 timestamp = {2011.05.05}
651 @ARTICLE{Arques1990a,
652 author = {D. G. Arqu\`{e}s and C. J. Michel},
653 title = {A model of DNA sequence evolution.},
654 journal = {Bull Math Biol},
659 abstract = {Statistical studies of gene populations on the purine/pyrimidine alphabet
660 have shown that the mean occurrence probability of the i-motif YRY(N)iYRY
661 (R = purine, Y = pyrimidine, N = R or Y) is not uniform by varying
662 i in the range, but presents a maximum at i = 6 in the following
663 populations: protein coding genes of eukaryotes, prokaryotes, chloroplasts
664 and mitochondria, and also viral introns, ribosomal RNA genes and
665 transfer RNA genes (Arqu\`{e}s and Michel, 1987b, J. theor. Biol.
666 128, 457-461). From the "universality" of this observation, we suggested
667 that the oligonucleotide YRY(N)6 is a primitive one and that it has
668 a central function in DNA sequence evolution (Arqu\`{e}s and Michel,
669 1987b, J. theor. Biol. 128, 457-461). Following this idea, we introduce
670 a concept of a model of DNA sequence evolution which will be validated
671 according to a schema presented in three parts. In the first part,
672 using the last version of the gene database, the YRY(N)6YRY preferential
673 occurrence (maximum at i = 6) is confirmed for the populations mentioned
674 above and is extended to some newly analysed populations: chloroplast
675 introns, chloroplast 5' regions, mitochondrial 5' regions and small
676 nuclear RNA genes. On the other hand, the YRY(N)6YRY preferential
677 occurrence and periodicities are used in order to classify 18 gene
678 populations. In the second part, we will demonstrate that several
679 statistical features characterizing different gene populations (in
680 particular the YRY(N)6YRY preferential occurrence and the periodicities)
681 can be retrieved from a simple Markov model based on the mixing of
682 the two oligonucleotides YRY(N)6 and YRY(N)3 and based on the percentages
683 of RYR and YRY in the unspecified trinucleotides (N)3 of YRY(N)6
684 and YRY(N)3. Several properties are identified and prove in particular
685 that the oligonucleotide mixing is an independent process and that
686 several different features are functions of a unique parameter. In
687 the third part, the return of the model to the reality shows a strong
688 correlation between reality and simulation concerning the presence
689 of a large alternating purine/pyrimidine stretches and of periodicities.
690 It also contributes to a greater understanding of biological reality,
691 e.g. the presence or the absence of large alternating purine/pyrimidine
692 stretches can be explained as being a simple consequence of the mixing
693 of two particular oligonucleotides. Finally, we believe that such
694 an approach is the first step toward a unified model of DNA sequence
695 evolution allowing the molecular understanding of both the origin
696 of life and the actual biological reality.},
697 institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon,
698 Unité Associée CNRS No 822, France.},
699 keywords = {Base Sequence; Biological Evolution; DNA, genetics; Genetics, Population;
702 medline-pst = {ppublish},
705 timestamp = {2011.05.05}
708 @ARTICLE{Arques1993a,
709 author = {D. G. Arqu\`{e}s and C. J. Michel and K. Orieux},
710 title = {Identification and simulation of new non-random statistical properties
711 common to different populations of eukaryotic non-coding genes.},
712 journal = {J Theor Biol},
718 abstract = {The autocorrelation function analysing the occurrence probability
719 of the i-motif YRY(N)iYRY in genes allows the identification of mainly
720 two periodicities modulo 2, 3 and the preferential occurrence of
721 the motif YRY(N)6YRY (R = purine = adenine or guanine, Y = pyrimidine
722 = cytosine or thymine, N = R or Y). These non-random genetic statistical
723 properties can be simulated by an independent mixing of the three
724 oligonucleotides YRYRYR, YRYYRY and YRY(N)6 (Arqu\`{e}s & Michel,
725 1990b). The problem investigated in this study is whether new properties
726 can be identified in genes with other autocorrelation functions and
727 also simulated with an oligonucleotide mixing model. The two autocorrelation
728 functions analysing the occurrence probability of the i-motifs RRR(N)iRRR
729 and YYY(N)iYYY simultaneously identify three new non-random genetic
730 statistical properties: a short linear decrease, local maxima for
731 i identical to 3[6] (i = 3, 9, etc) and a large exponential decrease.
732 Furthermore, these properties are common to three different populations
733 of eukaryotic non-coding genes: 5' regions, introns and 3' regions
734 (see section 2). These three non-random properties can also be simulated
735 by an independent mixing of the four oligonucleotides R8, Y8, RRRYRYRRR,
736 YYYRYRYYY and large alternating R/Y series. The short linear decrease
737 is a result of R8 and Y8, the local maxima for i identical to 3[6],
738 of RRRYRYRRR and YYYRYRYYY, and the large exponential decrease, of
739 large alternating R/Y series (section 3). The biological meaning
740 of these results and their relation to the previous oligonucleotide
741 mixing model are presented in the Discussion.},
742 doi = {10.1006/jtbi.1993.1059},
743 institution = {Equipe de Biologie Théorique, Université de Franche-Comté, Laboratoire
744 d'Informatique de Besançon, France.},
745 keywords = {Animals; Biological Evolution; Genes, genetics; Models, Genetic; Models,
746 Statistical; Mutation, genetics; Oligonucleotides, genetics; Probability},
748 medline-pst = {ppublish},
750 pii = {S0022-5193(83)71059-3},
752 timestamp = {2011.05.05},
753 url = {http://dx.doi.org/10.1006/jtbi.1993.1059}
757 author = {David Arroyo and Gonzalo Alvarez and Veronica Fernandez},
758 title = {On the inadequacy of the logistic map for cryptographic applications},
759 journal = {X Reunión Española sobre Criptología y Seguridad de la Información
764 owner = {christophe},
765 timestamp = {2010.03.01}
768 @MISC{Backofen99algorithmicapproach,
769 author = {R. Backofen and S. Will and P. Clote},
770 title = {Algorithmic Approach To Quantifying The Hydrophobic Force Contribution
775 @INPROCEEDINGS{bgc11:ip,
776 author = {Bahi, Jacques and C\^ot\'e, Nathalie and Guyeux, Christophe},
777 title = {Chaos of Protein Folding},
778 booktitle = {IJCNN 2011, Int. Joint Conf. on Neural Networks},
780 pages = {1948--1954},
781 address = {San Jose, California, United States},
784 doi = {10.1109/IJCNN.2011.6033463},
785 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
788 url = {http://dx.doi.org/10.1109/IJCNN.2011.6033463}
792 author = {Bahi, Jacques and C\^ot\'e, Nathalie and Guyeux, Christophe and Salomon,
794 title = {Protein Folding in the {2D} Hydrophobic-Hydrophilic {(HP)} Square
795 Lattice Model is Chaotic},
796 journal = {Cognitive Computation},
799 note = {Published online. Paper version to appear},
801 doi = {10.1007/s12559-011-9118-z},
802 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
807 publisher = {Springer},
808 url = {http://dx.doi.org/10.1007/s12559-011-9118-z}
811 @INPROCEEDINGS{bcgr11:ip,
812 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe
813 and Richard, Adrien},
814 title = {On the Link Between Strongly Connected Iteration Graphs and Chaotic
815 Boolean Discrete-Time Dynamical Systems},
816 booktitle = {FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory},
821 address = {Oslo, Norway},
825 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
831 author = {Bahi, Jacques and Guyeux, Christophe},
832 title = {Hash Functions Using Chaotic Iterations},
833 journal = {Journal of Algorithms \& Computational Technology},
839 doi = {10.1260/1748-3018.4.2.167},
840 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
845 url = {http://dx.doi.org/10.1260/1748-3018.4.2.167}
848 @INPROCEEDINGS{guyeux10ter,
849 author = {Bahi, Jacques and Guyeux, Christophe},
850 title = {A new chaos-based watermarking algorithm},
851 booktitle = {SECRYPT'10, Int. conf. on security and cryptography},
854 address = {Athens, Greece},
856 publisher = {SciTePress},
858 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
864 author = {Bahi, Jacques and Guyeux, Christophe and Makhoul, Abdallah},
865 title = {Two Security Layers for Hierarchical Data Aggregation in Sensor Networks},
866 journal = {IJAACS, International Journal of Autonomous and Adaptive Communications
872 note = {Accepted manuscript. To appear},
874 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
881 @INPROCEEDINGS{guyeux10bis,
882 author = {Bahi, Jacques and Guyeux, Christophe and Makhoul, Abdallah},
883 title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor
885 booktitle = {SENSORCOMM'10, 4-th Int. Conf. on Sensor Technologies and Applications},
888 address = {Venice-Mestre, Italy},
891 doi = {10.1109/SENSORCOMM.2010.76},
892 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
895 url = {http://dx.doi.org/10.1109/SENSORCOMM.2010.76}
898 @INPROCEEDINGS{guyeuxVictoria,
899 author = {Bahi, Jacques and Guyeux, Christophe and Makhoul, Abdallah},
900 title = {Secure Data Aggregation in Wireless Sensor Networks. Homomorphism
901 versus Watermarking Approach},
902 booktitle = {ADHOCNETS 2010, 2nd Int. Conf. on Ad Hoc Networks},
905 series = {Lecture Notes in ICST},
907 address = {Victoria, Canada},
910 doi = {10.1007/978-3-642-17994-5_23},
911 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
914 url = {http://dx.doi.org/10.1007/978-3-642-17994-5_23}
917 @INPROCEEDINGS{bgmp11:ip,
918 author = {Bahi, Jacques and Guyeux, Christophe and Makhoul, Abdallah and Pham,
920 title = {Secure scheduling of wireless video sensor nodes for surveillance
922 booktitle = {ADHOCNETS 11, 3rd Int. ICST Conference on Ad Hoc Networks},
927 address = {Paris, France},
929 publisher = {Springer},
932 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
937 @INPROCEEDINGS{bgs11:ip,
938 author = {Bahi, Jacques and Guyeux, Christophe and Salomon, Michel},
939 title = {Building a Chaotic Proven Neural Network},
940 booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network
944 address = {Maldives, Maldives},
947 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
952 @INPROCEEDINGS{bgw10:ip,
953 author = {Bahi, Jacques and Guyeux, Christophe and Wang, Qianxue},
954 title = {A Pseudo Random Numbers Generator Based on Chaotic Iterations. Application
956 booktitle = {WISM 2010, Int. Conf. on Web Information Systems and Mining},
961 address = {Sanya, China},
964 doi = {10.1007/978-3-642-16515-3_26},
965 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
968 url = {http://dx.doi.org/10.1007/978-3-642-16515-3_26}
971 @INPROCEEDINGS{bgw09:ip,
972 author = {Bahi, Jacques and Guyeux, Christophe and Wang, Qianxue},
973 title = {A novel pseudo-random generator based on discrete chaotic iterations},
974 booktitle = {INTERNET'09, 1-st Int. Conf. on Evolving Internet},
977 address = {Cannes, France},
980 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
985 @INPROCEEDINGS{bmg10:onp,
986 author = {Bahi, Jacques and Makhoul, Abdallah and Guyeux, Christophe},
987 title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor
988 Networks for critical applications},
989 booktitle = {RESSACS, Journ\'ee th\'ematique PHC/ResCom sur RESeaux de capteurS
990 et Applications Critiques de Surveillance},
992 address = {Bayonne, France},
994 note = {Communication orale},
996 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1001 @INPROCEEDINGS{guyeuxBayonne,
1002 author = {Bahi, Jacques and Makhoul, Abdallah and Guyeux, Christophe},
1003 title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor
1004 Networks for critical applications},
1005 booktitle = {RESSACS, Journ\'ee th\'ematique PHC/ResCom sur RESeaux de capteurS
1006 et Applications Critiques de Surveillance},
1008 address = {Bayonne, France},
1010 note = {Communication orale},
1017 author = {Bahi, Jacques and Salomon, Michel},
1018 title = {A Decentralized Energy-based Diffusion Algorithm to Increase the
1019 Lifetime of {MANETs}},
1020 journal = {Computer Networks Journal},
1023 note = {Accepted manuscript. To appear},
1024 classement = {ACLI},
1026 impact-factor = {1.201},
1029 publisher = {Elsevier}
1033 author = {J. M. Bahi},
1034 title = {Boolean totally asynchronous iterations},
1035 journal = {Int. Journal of Mathematical Algorithms},
1040 timestamp = {17/02/2008}
1043 @ARTICLE{Bahi2000bis,
1044 author = {Jacques M. Bahi},
1045 title = {Asynchronous iterative algorithms for nonexpansive linear systems},
1046 journal = {Journal of Parallel and Distributed Computing},
1051 timestamp = {2009.01.10}
1055 author = {J. M. Bahi},
1056 title = {Parallel synchronous chaotic iterations for singular linear systems},
1057 journal = {Parallel Algorithms and Applications},
1062 timestamp = {17/02/2008}
1066 author = {Jacques M. Bahi},
1067 title = {Algorithmes paralleles asynchrones pour les systemes singuliers},
1068 journal = {Comptes Rendus de l'Academie des Sciences},
1070 volume = {t. 326, serie 1},
1071 pages = {1421--1425},
1073 timestamp = {2009.01.18}
1077 author = {Jacques M. Bahi},
1078 title = {Méthodes itératives dans des espaces produits. Application au calcul
1080 school = {Université de Franche-Comté},
1082 type = {Habilitation à diriger des recherches},
1083 owner = {christophe},
1084 timestamp = {2010.08.24}
1088 author = {Jacques M. Bahi},
1089 title = {Algorithmes asynchrones pour des syst\`{e}mes différentiels-algébriques.
1090 Simulation numérique sur des exemples de circuits électriques},
1091 school = {Université de Franche-Comté},
1093 owner = {christophe},
1094 timestamp = {2010.08.24}
1098 author = {Jacques M. Bahi and Sylvain Contassot-Vivier},
1099 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
1101 journal = {IEEE Transactions on Neural Networks},
1108 timestamp = {2009.12.04}
1112 author = {J.~M. Bahi and S. Contassot-Vivier},
1113 title = {Stability of fully asynchronous discrete-time discrete state dynamic
1115 journal = {IEEE Transactions on Neural Networks},
1118 pages = {1353-1363},
1120 timestamp = {2009.02.14}
1123 @TECHREPORT{bcgg10:ir,
1124 author = {Bahi, J. M. and Couchot, J.-F. and Grasset, O. and Guyeux, C.},
1125 title = {{D}iscrete {D}ynamical {S}ystems: {N}ecessary {D}ivergence {C}onditions
1126 for {S}ynchronous {I}terations},
1127 institution = {LIFC - Laboratoire d'{I}nformatique de l'{U}niversit\'{e} de {F}ranche
1130 type = {Research Report},
1131 number = {RR2010-04},
1133 pdf = {/~publis/papers/pub/2010/RR2010-04.pdf}
1137 author = {Bahi, Jacques M. and Guyeux, Christophe},
1138 title = {Hash Functions Using Chaotic Iterations},
1139 journal = {Journal of Algorithms \& Computational Technology},
1144 classement = {ACLNI},
1145 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1147 impact-factor = {#},
1152 @INPROCEEDINGS{guyeux10,
1153 author = {Bahi, Jacques M. and Guyeux, Christophe},
1154 title = {Topological chaos and chaotic iterations, application to Hash functions},
1155 booktitle = {WCCI'10, IEEE World Congress on Computational Intelligence},
1158 address = {Barcelona, Spain},
1160 note = {Best paper award},
1161 classement = {ACTI},
1162 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1168 author = {Jacques M. Bahi and Christophe Guyeux},
1169 title = {A chaos-based approach for information hiding security.},
1170 howpublished = {arXiv},
1173 institution = {Computer Science Laboratory LIFC, University of Franche-Comte, France}
1177 author = {Jacques M. Bahi and Christophe Guyeux},
1178 title = {A watermarking algorithm satisfying topological chaos properties},
1181 volume = {abs/0810.4713},
1182 bibsource = {DBLP, http://dblp.uni-trier.de},
1183 ee = {http://arxiv.org/abs/0810.4713}
1187 author = {Jacques M. Bahi and Christophe Guyeux},
1188 title = {Chaotic iterations and topological chaos},
1190 abstract = {Chaotic iterations have been introduced on the one hand by Chazan,
1191 Miranker [5] and Miellou [9] in a numerical analysis context, and
1192 on the other hand by Robert [11] and Pellegrin [10] in the discrete
1193 dynamical systems framework. In both cases, the objective was to
1194 derive conditions of convergence of such iterations to a fixed state.
1195 In this paper, a new point of view is presented, the goal here is
1196 to derive conditions under which chaotic iterations admit a chaotic
1197 behaviour in a rigorous mathematical sense. Contrary to what has
1198 been studied in the literature, convergence is not desired. More
1199 precisely, we establish in this paper a link between the concept
1200 of chaotic iterations on a finite set and the notion of topological
1201 chaos [8], [6], [7]. We are motivated by concrete applications of
1202 our approach, such as the use of chaotic boolean iterations in the
1203 computer security field. Indeed, the concept of chaos is used in
1204 many areas of data security without real rigorous theoretical foundations,
1205 and without using the fundamental properties that allow chaos. The
1206 wish of this paper is to bring a bit more mathematical rigour in
1208 citeseerurl = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}},
1210 comments = {6 pages},
1211 eprint = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}},
1212 oai2identifier = {0810.3154},
1214 timestamp = {2008.10.23},
1215 url = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}}
1218 @ARTICLE{arxivRNNchaos,
1219 author = {Jacques M. Bahi and Christophe Guyeux and Michel Salomon},
1220 title = {Building a Chaotic Proved Neural Network},
1223 volume = {abs/1101.4351},
1224 ee = {http://arxiv.org/abs/1101.4351}
1227 @INPROCEEDINGS{guyeuxTaiwan10,
1228 author = {Bahi, Jacques M. and Guyeux, Christophe and Wang, Qianxue},
1229 title = {Improving random number generators by chaotic iterations. Application
1231 booktitle = {ICCASM 2010, Int. Conf. on Computer Application and System Modeling},
1233 pages = {V13-643--V13-647},
1234 address = {Taiyuan, China},
1236 classement = {ACTI},
1237 doi = {10.1109/ICCASM.2010.5622199},
1238 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1241 url = {http://dx.doi.org/10.1109/ICCASM.2010.5622199}
1245 author = {Jacques M Bahi and Christian J Michel},
1246 title = {A stochastic model of gene evolution with time dependent pseudochaotic
1248 journal = {Bull Math Biol},
1254 abstract = {We develop here a new class of stochastic models of gene evolution
1255 in which a random subset of the 64 possible trinucleotides mutates
1256 at each evolutionary time t according to some time dependent substitution
1257 probabilities. Therefore, at each time t, the numbers and the types
1258 of mutable trinucleotides are unknown. Thus, the mutation matrix
1259 changes at each time t. This pseudochaotic model developed generalizes
1260 the standard model in which all the trinucleotides mutate at each
1261 time t. It determines the occurrence probabilities at time t of trinucleotides
1262 which pseudochaotically mutate according to 3 time dependent substitution
1263 parameters associated with the 3 trinucleotide sites. The main result
1264 proves that under suitable assumptions, this pseudochaotic model
1265 converges to a uniform probability vector identical to that of the
1266 standard model. Furthermore, an application of this pseudochaotic
1267 model allows an evolutionary study of the 3 circular codes identified
1268 in both eukaryotic and prokaryotic genes. A circular code is a particular
1269 set of trinucleotides whose main property is the retrieval of the
1270 frames in genes locally, i.e., anywhere in genes and particularly
1271 without start codons, and automatically with a window of a few nucleotides.
1272 After a certain evolutionary time and with particular time dependent
1273 functions for the 3 substitution parameters, precisely an exponential
1274 decrease in the 1st and 2nd trinucleotide sites and an exponential
1275 increase in the 3rd one, this pseudochaotic model retrieves the main
1276 statistical properties of the 3 circular codes observed in genes.
1277 Furthermore, it leads to a circular code asymmetry stronger than
1278 the standard model (nonpseudochaotic) and, therefore, to a better
1279 correlation with the genes.},
1280 doi = {10.1007/s11538-008-9376-4},
1281 institution = {LIFC-EA 4157, Université de Franche-Comté, IUT de Belfort, BP 527,
1282 90016, Belfort Cedex, France. jacques.bahi@univ-fcomte.fr},
1283 keywords = {Evolution, Molecular; Genes; Models, Genetic; Mutation; Stochastic
1286 medline-pst = {ppublish},
1289 timestamp = {2011.05.05},
1290 url = {http://dx.doi.org/10.1007/s11538-008-9376-4}
1294 author = {Jacques M Bahi and Christian J Michel},
1295 title = {A stochastic model of gene evolution with chaotic mutations.},
1296 journal = {J Theor Biol},
1302 abstract = {We develop here a new class of stochastic models of gene evolution
1303 in which the mutations are chaotic, i.e. a random subset of the 64
1304 possible trinucleotides mutates at each evolutionary time t according
1305 to some substitution probabilities. Therefore, at each time t, the
1306 numbers and the types of mutable trinucleotides are unknown. Thus,
1307 the mutation matrix changes at each time t. The chaotic model developed
1308 generalizes the standard model in which all the trinucleotides mutate
1309 at each time t. It determines the occurrence probabilities at time
1310 t of trinucleotides which chaotically mutate according to three substitution
1311 parameters associated with the three trinucleotide sites. Two theorems
1312 prove that this chaotic model has a probability vector at each time
1313 t and that it converges to a uniform probability vector identical
1314 to that of the standard model. Furthermore, four applications of
1315 this chaotic model (with a uniform random strategy for the 64 trinucleotides
1316 and with a particular strategy for the three stop codons) allow an
1317 evolutionary study of the three circular codes identified in both
1318 eukaryotic and prokaryotic genes. A circular code is a particular
1319 set of trinucleotides whose main property is the retrieval of the
1320 frames in genes locally, i.e. anywhere in genes and particularly
1321 without start codons, and automatically with a window of a few nucleotides.
1322 After a certain evolutionary time and with particular values for
1323 the three substitution parameters, the chaotic models retrieve the
1324 main statistical properties of the three circular codes observed
1325 in genes. These applications also allow an evolutionary comparison
1326 between the standard and chaotic models.},
1327 doi = {10.1016/j.jtbi.2008.07.028},
1328 institution = {LIFC-EA 4157, Université de Franche-Comté, IUT de Belfort, BP 527,
1329 90016 Belfort Cedex, France. jacques.bahi@univ-fcomte.fr},
1330 keywords = {Animals; Computer Simulation; DNA, Circular, genetics; Evolution,
1331 Molecular; Genetic Code; Models, Genetic; Mutation; Nonlinear Dynamics;
1332 Stochastic Processes; Time},
1334 medline-pst = {ppublish},
1336 pii = {S0022-5193(08)00395-0},
1338 timestamp = {2011.05.05},
1339 url = {http://dx.doi.org/10.1016/j.jtbi.2008.07.028}
1342 @ARTICLE{Bahi2008bis,
1343 author = {Bahi, J. M. and Michel, C. J.},
1344 title = {A stochastic model of gene evolution with chaotic mutations},
1345 journal = {Journal of Theoretical Biology},
1350 timestamp = {2009.01.10}
1354 author = {Jacques M Bahi and Christian J Michel},
1355 title = {A stochastic gene evolution model with time dependent mutations.},
1356 journal = {Bull Math Biol},
1362 abstract = {We develop here a new class of gene evolution models in which the
1363 nucleotide mutations are time dependent. These models allow to study
1364 nonlinear gene evolution by accelerating or decelerating the mutation
1365 rates at different evolutionary times. They generalize the previous
1366 ones which are based on constant mutation rates. The stochastic model
1367 developed in this class determines at some time t the occurrence
1368 probabilities of trinucleotides mutating according to 3 time dependent
1369 substitution parameters associated with the 3 trinucleotide sites.
1370 Therefore, it allows to simulate the evolution of the circular code
1371 recently observed in genes. By varying the class of function for
1372 the substitution parameters, 1 among 12 models retrieves after mutation
1373 the statistical properties of the observed circular code in the 3
1374 frames of actual genes. In this model, the mutation rate in the 3rd
1375 trinucleotide site increases during gene evolution while the mutation
1376 rates in the 1st and 2nd sites decrease. This property agrees with
1377 the actual degeneracy of the genetic code. This approach can easily
1378 be generalized to study evolution of motifs of various lengths, e.g.,
1379 dicodons, etc., with time dependent mutations.},
1380 doi = {10.1016/j.bulm.2003.10.004},
1381 institution = {LIFC - FRE CNRS 2661, IUT de Belfort, Université de Franche-Comté,
1382 BP 527, 90016 Belfort Cédex, France. bahi@iut-bm.univ-fcomte.fr},
1383 keywords = {Codon, genetics; Evolution, Molecular; Genes, genetics; Genetic Code,
1384 genetics; Models, Genetic; Mutation; Stochastic Processes},
1386 medline-pst = {ppublish},
1388 pii = {S0092824003001174},
1390 timestamp = {2011.05.05},
1391 url = {http://dx.doi.org/10.1016/j.bulm.2003.10.004}
1395 author = {J. Banks and J. Brooks and G. Cairns and P. Stacey},
1396 title = {On Devaney's Definition of Chaos},
1397 journal = {Amer. Math. Monthly},
1403 timestamp = {27/01/2008}
1407 author = {E. Barker and A. Roginsky},
1408 title = {DRAFT NIST Special Publication 800-131 Recommendation for the Transitioning
1409 of Cryptographic Algorithms and Key Sizes},
1411 owner = {christophe},
1412 timestamp = {2010.08.18}
1416 author = {Mauro Barni and Franco Bartolini and Teddy Furon},
1417 title = {A general framework for robust watermarking security},
1418 journal = {Signal Processing},
1421 pages = {2069-2084},
1423 note = {Special issue on Security of Data Hiding Technologies, invited paper},
1424 bibsource = {DBLP, http://dblp.uni-trier.de},
1425 ee = {http://dx.doi.org/10.1016/S0165-1684(03)00168-3},
1427 timestamp = {2009.06.30}
1431 author = {Baudet, G\'{e}rard M.},
1432 title = {Asynchronous Iterative Methods for Multiprocessors},
1438 address = {New York, NY, USA},
1439 doi = {http://doi.acm.org/10.1145/322063.322067},
1445 author = {Didier El Baz},
1446 title = {Contribution à l'algorithmique parall\`{e}le. Le concept d'asynchronisme
1447 : étude théorique, mise en œuvre, et application},
1448 school = {Institut national polytechnique de Toulouse},
1450 type = {Habilitation à diriger des recherches},
1451 owner = {christophe},
1452 timestamp = {2010.08.24}
1456 author = {Benoit, Anne and Hakem, Mourad and Robert, Yves},
1457 title = {Contention awareness and fault-tolerant scheduling for precedence
1458 constrained tasks in heterogeneous systems},
1459 journal = {Parallel Computing},
1465 doi = {10.1016/j.parco.2008.11.001},
1468 url = {http://dx.doi.org/10.1016/j.parco.2008.11.001}
1471 @INPROCEEDINGS{bhr08b:bl,
1472 author = {Benoit, Anne and Hakem, Mourad and Robert, Yves},
1473 title = {Fault tolerant scheduling of precedence task graphs on heterogeneous
1475 booktitle = {IPDPS'08},
1478 publisher = {IEEE Computer Society Press},
1484 @INPROCEEDINGS{Berger98,
1485 author = {Berger, Bonnie and Leighton, Tom},
1486 title = {Protein folding in the hydrophobic-hydrophilic (HP) is NP-complete},
1487 booktitle = {Proceedings of the second annual international conference on Computational
1490 series = {RECOMB '98},
1492 address = {New York, NY, USA},
1495 isbn = {0-89791-976-9},
1496 location = {New York, New York, United States},
1501 title = {Parallel and distributed computation: numerical methods},
1502 publisher = {Prentice-Hall, Inc.},
1504 author = {Bertsekas, Dimitri P. and Tsitsiklis, John N.},
1505 address = {Upper Saddle River, NJ, USA},
1506 isbn = {0-13-648700-9}
1509 @MISC{Bertsekas88paralleland,
1510 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
1511 title = {Parallel and distributed iterative algorithms: a selective survey},
1516 author = {F. Blanchard and E. Glasner and S. Kolyada and A.Maass},
1517 title = {On Li-Yorke pairs},
1521 timestamp = {2008.01.02}
1525 author = {F. Blanchard and B. Host and S. Ruette},
1526 title = {Asymptotic pairs in positive-entropy systems},
1528 optannote = {to appear in Ergod. Th. Dynam. Sys.},
1531 timestamp = {2008.01.02}
1534 @INPROCEEDINGS{Blum:1985:EPP:19478.19501,
1535 author = {Blum, Manuel and Goldwasser, Shafi},
1536 title = {An efficient probabilistic public key encryption scheme which hides
1537 all partial information},
1538 booktitle = {Proceedings of CRYPTO 84 on Advances in cryptology},
1541 address = {New York, NY, USA},
1542 publisher = {Springer-Verlag New York, Inc.},
1544 isbn = {0-387-15658-5},
1545 keywords = {chosen cyphertext attack, integer factorization, partial information,
1546 passive adversaries, probabilistic encryption},
1547 location = {Santa Barbara, California, United States},
1549 url = {http://dl.acm.org/citation.cfm?id=19478.19501}
1553 author = {Dan Boneh and Matt Franklin},
1554 title = {Identity-Based Encryption from the {Weil} Pairing},
1555 journal = {SIAM J. of Computing},
1560 note = {Extended abstract in Crypto'01}
1563 @INCOLLECTION{boneh,
1564 author = {Boneh, Dan and Goh, Eu-Jin and Nissim, Kobbi},
1565 title = {Evaluating 2-DNF Formulas on Ciphertexts},
1568 abstract = {Let ψ be a 2-DNF formula on boolean variables x 1,..., x n ∈ {0,1}.
1569 We present a homomorphic public key encryption scheme that allows
1570 the public evaluation of ψ given an encryption of the variables x
1571 1,..., x n. In other words, given the encryption of the bits x 1,...,
1572 x n, anyone can create the encryption of ψ( x 1,..., x n). More generally,
1573 we can evaluate quadratic multi-variate polynomials on ciphertexts
1574 provided the resulting value falls within a small set. We present
1575 a number of applications of the system: 1 In a database of size n,
1576 the total communication in the basic step of the Kushilevitz-Ostrovsky
1577 PIR protocol is reduced from to . 2 An efficient election system
1578 based on homomorphic encryption where voters do not need to include
1579 non-interactive zero knowledge proofs that their ballots are valid.
1580 The election system is proved secure without random oracles but still
1581 efficient. 3 A protocol for universally verifiable computation.},
1582 citeulike-article-id = {2719460},
1583 citeulike-linkout-0 = {http://www.springerlink.com/content/wtt5caxkr94laxkg},
1584 journal = {Theory of Cryptography},
1585 keywords = {homomorphic, pairings},
1586 posted-at = {2008-04-25 21:53:15},
1588 url = {http://www.springerlink.com/content/wtt5caxkr94laxkg}
1592 author = {Bonneau, Richard and Baker, David},
1593 title = {AB INITIO PROTEIN STRUCTURE PREDICTION: Progress and Prospects},
1594 journal = {Annual Review of Biophysics and Biomolecular Structure},
1599 doi = {10.1146/annurev.biophys.30.1.173}
1603 author = {R. Bowen},
1604 title = {Entropy for group endomorphisms and homogeneous spaces},
1605 journal = {Trans. Amer. Math. Soc.},
1610 timestamp = {15/02/2008}
1614 author = {R. Bowen},
1615 title = {Periodic points and measures for Axiom A diffeomorphisms},
1616 journal = {Trans. Amer. Math. Soc.},
1621 timestamp = {15/02/2008}
1624 @ARTICLE{Braxenthaler97,
1625 author = {Michael Braxenthaler and R. Ron Unger and Ditza Auerbach and John
1627 title = {Chaos in protein dynamics},
1628 journal = {Proteins-structure Function and Bioinformatics},
1632 doi = {10.1002/(SICI)1097-0134(199712)29:4<417::AID-PROT2>3.3.CO;2-O},
1637 author = {Brin, Sergey and Page, Larry},
1641 note = {\texttt{http://www.google.com}}
1645 author = {Brin, Sergey and Page, Larry},
1649 note = {\texttt{https://plus.google.com}}
1652 @INPROCEEDINGS{Brumley03remotetiming,
1653 author = {David Brumley and Dan Boneh},
1654 title = {Remote Timing Attacks are Practical},
1655 booktitle = {Proceedings of the 12th USENIX Security Symposium},
1660 @ARTICLE{Bohm1991375,
1661 author = {Gerald Böhm},
1662 title = {Protein folding and deterministic chaos: Limits of protein folding
1663 simulations and calculations},
1664 journal = {Chaos, Solitons \& Fractals},
1667 pages = {375 - 382},
1669 doi = {DOI: 10.1016/0960-0779(91)90028-8},
1671 url = {http://www.sciencedirect.com/science/article/B6TJ4-46CBXVT-1X/2/370489c218e4c2732cd9b620ef50c696}
1674 @INCOLLECTION{Cachin2004,
1675 author = {Cachin, Christian},
1676 title = {An Information-Theoretic Model for Steganography},
1677 booktitle = {Information Hiding},
1678 publisher = {Springer Berlin / Heidelberg},
1681 series = {Lecture Notes in Computer Science},
1683 affiliation = {MIT Laboratory for Computer Science 545 Technology Square Cambridge
1688 author = {H. Cam and S. Ozdemir and P. Nair and D. Muthuavinashinappan and
1690 title = {ESPDA: Energy-efficient secure pattern based data aggregation for
1691 wireless sensor networks.},
1692 journal = {Computer Communication journal (29)},
1697 @ARTICLE{CarletCZ98,
1698 author = {Claude Carlet and Pascale Charpin and Victor Zinoviev},
1699 title = {Codes, Bent Functions and Permutations Suitable For DES-like Cryptosystems},
1700 journal = {Des. Codes Cryptography},
1705 bibsource = {DBLP, http://dblp.uni-trier.de}
1708 @INPROCEEDINGS{Castelluccia05efficientaggregation,
1709 author = {Claude Castelluccia},
1710 title = {Efficient aggregation of encrypted data in wireless sensor networks},
1711 booktitle = {MobiQuitous},
1714 publisher = {IEEE Computer Society}
1718 author = {Cayre, F. and Bas, P.},
1719 title = {Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding},
1720 journal = {IEEE Transactions on Information Forensics and Security},
1725 doi = {10.1109/TIFS.2007.916006},
1727 keywords = {cryptography, random sequences, spread spectrum communication, telecommunication
1728 security, watermarking, Kerckhoffs-based embedding security classes,
1729 WOA Data Hiding, pseudorandom sequences, spread-spectrum techniques,
1730 steganography security, watermark-only-attack, watermarking, Security,
1731 spread-spectrum (SS) watermarking},
1733 timestamp = {2009.06.29}
1737 author = {Cayre, F. and Fontaine, C. and Furon, T.},
1738 title = {Watermarking security: theory and practice},
1739 journal = {IEEE Transactions on Signal Processing},
1742 pages = {3976--3987},
1744 doi = {10.1109/TSP.2005.855418},
1746 keywords = {blind source separation, cryptography, watermarking, Fisher information
1747 matrix, blind source separation, cryptanalysis, information theory,
1748 spread spectrum techniques, substitutive scheme, watermarking security,
1749 Blind source separation, Fisher information matrix, equivocation,
1750 security, watermarking},
1752 timestamp = {2009.06.29}
1755 @ARTICLE{Chajakis91,
1756 author = {Chajakis, Emmanuel D. and Zenios, Stavros A.},
1757 title = {Synchronous and asynchronous implementations of relaxation algorithms
1758 for nonlinear network optimization},
1759 journal = {Parallel Comput.},
1764 address = {Amsterdam, The Netherlands, The Netherlands},
1765 doi = {http://dx.doi.org/10.1016/S0167-8191(05)80072-9},
1767 publisher = {Elsevier Science Publishers B. V.}
1771 author = {Chan, Haowen and Perrig, Adrian and Przydatek, Bartosz and Song,
1773 title = {SIA: Secure information aggregation in sensor networks},
1774 journal = {J. Comput. Secur.},
1779 address = {Amsterdam, The Netherlands, The Netherlands},
1781 publisher = {IOS Press}
1784 @ARTICLE{Chandramouli06,
1785 author = {R. Chandramouli and S. Bapatla and K.P. Subbalakshmi},
1786 title = {Battery power-aware encryption},
1787 journal = {ACM transactions on information and system security},
1790 owner = {christophe},
1791 timestamp = {2010.07.31}
1795 author = {Pascale Charpin},
1796 title = {A description of some extended cyclic codes with application to Reed-Solomon
1798 journal = {Discrete Mathematics},
1803 bibsource = {DBLP, http://dblp.uni-trier.de},
1804 ee = {http://dx.doi.org/10.1016/0012-365X(85)90019-6}
1808 author = {D. Chazan and W. Miranker},
1809 title = {Chaotic relaxation},
1810 journal = {Linear algebra and its applications},
1814 timestamp = {2008.05.22}
1818 author = {Cheon, Jung Hee and Kim, Woo-Hwan and Nam, Hyun Soo},
1819 title = {Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy
1820 homomorphism scheme},
1821 journal = {Inf. Process. Lett.},
1826 address = {Amsterdam, The Netherlands, The Netherlands},
1827 doi = {http://dx.doi.org/10.1016/j.ipl.2005.09.016},
1829 publisher = {Elsevier North-Holland, Inc.}
1832 @MISC{Cheon03acryptanalysis,
1833 author = {Jung Hee Cheon and Hyun Soo Nam},
1834 title = {A Cryptanalysis of the Original Domingo-Ferrer's Algebraic Privacy
1840 author = {R.C.C. Cheung and N.J. Telle and W. Luk and P.Y.K. Cheung},
1841 title = {Secure encrypted-data aggregation for wireless sensor networks},
1842 journal = {IEEE Trans. on Very Large Scale Integration Systems},
1845 pages = {1048-1059},
1849 @ARTICLE{Chivian2005,
1850 author = {Chivian, Dylan and Kim, David E. and Malmström, Lars and Schonbrun,
1851 Jack and Rohl, Carol A. and Baker, David},
1852 title = {Prediction of CASP6 structures using automated robetta protocols},
1853 journal = {Proteins},
1859 keywords = {Rosetta, fragment assembly, de novo modeling, homology modeling, parametric
1860 alignment ensemble},
1861 owner = {christophe},
1862 publisher = {Wiley Subscription Services, Inc., A Wiley Company},
1863 timestamp = {2011.01.22},
1864 url = {http://dx.doi.org/10.1002/prot.20733}
1868 author = {Congxu, Zhu and Xuefeng, Liao and Zhihua, Li},
1869 title = {Chaos-based multipurpose image watermarking algorithm},
1870 journal = {Wuhan University Journal of Natural Sciences},
1873 pages = {1675-1678},
1874 note = {10.1007/BF02831848},
1875 abstract = {To achieve the goal of image content authentication and copyright
1876 protection simultaneously, this paper presents a novel image dual
1877 watermarking method based on chaotic map. Firstly, the host image
1878 was split into many nonoverlapping small blocks, and the block-wise
1879 discrete cosine transform (DCT) is computed. Secondly, the robust
1880 watermarks, shuffled by the chaotic sequences, are embedded in the
1881 DC coefficients of blocks to achieve the goal of copyright protection.
1882 The semi-fragile watermarks, generated by chaotic map, are embedded
1883 in the AC coefficients of blocks to obtain the aim of image authentication.
1884 Both of them can be extracted without the original image. Simulation
1885 results demonstrate the effectiveness of our algorithm in terms of
1886 robustness and fragility.},
1887 affiliation = {Central South University School of Information Science and Engineering
1888 410083 Changsha, Hunan China},
1891 keyword = {Mathematics, general},
1892 publisher = {Wuhan University, co-published with Springer},
1893 url = {http://dx.doi.org/10.1007/BF02831848}
1896 @ARTICLE{Conley1978,
1897 author = {C. Conley},
1898 title = {Isolated invariant sets and the Morse index},
1899 journal = {CBMS Regional Conference. AMS.},
1903 timestamp = {2008.01.02}
1907 author = {Coppel,W. A.},
1908 title = {The solution of equations by iteration},
1909 journal = {Mathematical Proceedings of the Cambridge Philosophical Society},
1914 doi = {10.1017/S030500410002990X},
1915 eprint = {http://journals.cambridge.org/article_S030500410002990X},
1916 url = {http://dx.doi.org/10.1017/S030500410002990X}
1920 author = {Philippe Cornu and André Smolarz},
1921 title = {Image characterization by texture},
1922 journal = {Traitement du signal},
1926 file = {:/home/guyeux/Documents/Bibliotheque/These/Watermarking/Caractérisation d'images par textures associées.pdf:PDF},
1928 timestamp = {2008.05.12}
1931 @INPROCEEDINGS{Cox99,
1932 author = {Ingemar Cox and Matt L. Miller and Andrew L. Mckellips},
1933 title = {Watermarking as Communications With Side Information},
1934 booktitle = {Proceedings of the IEEE},
1936 pages = {1127--1141},
1937 owner = {christophe},
1938 timestamp = {2010.03.06}
1941 @ARTICLE{Cox97securespread,
1942 author = {Ingemar J. Cox and Senior Member and Joe Kilian and F. Thomson Leighton
1944 title = {Secure spread spectrum watermarking for multimedia},
1945 journal = {IEEE Transactions on Image Processing},
1948 pages = {1673--1687}
1952 author = {Christopher Cramer and Erol Gelenbe and Hakan Bakircioglu},
1953 title = {Video Compression with Random Neural Networks},
1954 journal = {Neural Networks for Identification, Control, and Robotics, International
1959 address = {Los Alamitos, CA, USA},
1960 isbn = {0-8186-7456-3},
1961 publisher = {IEEE Computer Society}
1964 @INPROCEEDINGS{Crescenzi98,
1965 author = {Crescenzi, Pierluigi and Goldman, Deborah and Papadimitriou, Christos
1966 and Piccolboni, Antonio and Yannakakis, Mihalis},
1967 title = {On the complexity of protein folding (extended abstract)},
1968 booktitle = {Proceedings of the thirtieth annual ACM symposium on Theory of computing},
1970 series = {STOC '98},
1972 address = {New York, NY, USA},
1975 isbn = {0-89791-962-9},
1976 location = {Dallas, Texas, United States},
1981 author = {Zhao Dawei and Chen Guanrong and Liu Wenbo},
1982 title = {A chaos-based robust wavelet-domain watermarking algorithm},
1983 journal = {Chaos, Solitons and Fractals},
1988 timestamp = {2008.10.07}
1992 author = {Anthony Desnos and Robert Erra and Eric Filiol},
1993 title = {Processor-Dependent Malware... and codes},
1995 comment = {arXiv:1011.1638},
1996 eprint = {arXiv:1011.1638}
2000 title = {An Introduction to Chaotic Dynamical Systems},
2001 publisher = {Addison-Wesley},
2003 author = {Devaney, Robert L.},
2004 address = {Redwood City, CA},
2009 author = {Whitfield Diffie and Martin E. Hellman},
2010 title = {New Directions in Cryptography},
2011 journal = {IEEE Transactions on Information Theory},
2016 date = {November 1976},
2018 timestamp = {2009.06.30},
2019 url = {citeseer.ist.psu.edu/diffie76new.html}
2022 @INCOLLECTION{Dijk10,
2023 author = {van Dijk, Marten and Gentry, Craig and Halevi, Shai and Vaikuntanathan,
2025 title = {Fully Homomorphic Encryption over the Integers},
2026 booktitle = {Advances in Cryptology – EUROCRYPT 2010},
2027 publisher = {Springer Berlin / Heidelberg},
2029 editor = {Gilbert, Henri},
2031 series = {Lecture Notes in Computer Science},
2033 abstract = {We construct a simple fully homomorphic encryption scheme, using only
2034 elementary modular arithmetic. We use Gentry’s technique to construct
2035 a fully homomorphic scheme from a bootstrappable somewhat homomorphic
2036 scheme. However, instead of using ideal lattices over a polynomial
2037 ring, our bootstrappable encryption scheme merely uses addition and
2038 multiplication over the integers. The main appeal of our scheme is
2039 the conceptual simplicity. We reduce the security of our scheme to
2040 finding an approximate integer gcd – i.e., given a list of integers
2041 that are near-multiples of a hidden integer, output that hidden integer.
2042 We investigate the hardness of this task, building on earlier work
2043 of Howgrave-Graham.},
2044 affiliation = {MIT CSAIL}
2048 author = {Dill, KA},
2049 title = {Theory for the folding and stability of globular proteins.},
2050 journal = {Biochemistry},
2056 abstract = {Using lattice statistical mechanics, we develop theory to account
2057 for the folding of a heteropolymer molecule such as a protein to
2058 the globular and soluble state. Folding is assumed to be driven by
2059 the association of solvophobic monomers to avoid solvent and opposed
2060 by the chain configurational entropy. Theory predicts a phase transition
2061 as a function of temperature or solvent character. Molecules that
2062 are too short or too long or that have too few solvophobic residues
2063 are predicted not to fold. Globular molecules should have a largely
2064 solvophobic core, but there is an entropic tendency for some residues
2065 to be "out of place", particularly in small molecules. For long chains,
2066 molecules comprised of globular domains are predicted to be thermodynamically
2067 more stable than spherical molecules. The number of accessible conformations
2068 in the globular state is calculated to be an exceedingly small fraction
2069 of the number available to the random coil. Previous estimates of
2070 this number, which have motivated kinetic theories of folding, err
2071 by many tens of orders of magnitude.},
2072 comment = {Research Support, Non-U.S. Gov't,Research Support, U.S. Gov't, P.H.S.,},
2073 keywords = {Mathematics, Models, Chemical, Polymers, Protein Conformation},
2074 owner = {christophe},
2075 timestamp = {2011.01.22},
2076 url = {http://ukpmc.ac.uk/abstract/MED/3986190}
2080 author = {Dill, KA and Bromberg, S and Yue, K and Fiebig, KM and Yee, DP and
2081 Thomas, PD and Chan, HS},
2082 title = {Principles of protein folding--a perspective from simple exact models.},
2083 journal = {Protein Sci},
2086 pages = {561-602--},
2089 abstract = {General principles of protein structure, stability, and folding kinetics
2090 have recently been explored in computer simulations of simple exact
2091 lattice models. These models represent protein chains at a rudimentary
2092 level, but they involve few parameters, approximations, or implicit
2093 biases, and they allow complete explorations of conformational and
2094 sequence spaces. Such simulations have resulted in testable predictions
2095 that are sometimes unanticipated: The folding code is mainly binary
2096 and delocalized throughout the amino acid sequence. The secondary
2097 and tertiary structures of a protein are specified mainly by the
2098 sequence of polar and nonpolar monomers. More specific interactions
2099 may refine the structure, rather than dominate the folding code.
2100 Simple exact models can account for the properties that characterize
2101 protein folding: two-state cooperativity, secondary and tertiary
2102 structures, and multistage folding kinetics--fast hydrophobic collapse
2103 followed by slower annealing. These studies suggest the possibility
2104 of creating "foldable" chain molecules other than proteins. The encoding
2105 of a unique compact chain conformation may not require amino acids;
2106 it may require only the ability to synthesize specific monomer sequences
2107 in which at least one monomer type is solvent-averse.},
2108 address = {Department of Pharmaceutical Chemistry, University of California,
2109 San Francisco 94143-1204, USA.},
2110 comment = {Review,Research Support, Non-U.S. Gov't,Research Support, U.S. Gov't,
2111 Non-P.H.S.,Research Support, U.S. Gov't, P.H.S.,},
2112 keywords = {Amino Acid Sequence, Biological Evolution, Hydrogen Bonding, Models,
2113 Molecular, Molecular Sequence Data, Mutation, Protein Conformation,
2114 Protein Denaturation, Protein Folding, Temperature, Thermodynamics},
2115 owner = {christophe},
2116 timestamp = {2011.01.22},
2117 url = {http://ukpmc.ac.uk/abstract/MED/7613459}
2120 @INPROCEEDINGS{Dobbertin96,
2121 author = {Dobbertin, Hans},
2122 title = {Cryptanalysis of MD4},
2123 booktitle = {Proceedings of the Third International Workshop on Fast Software
2127 address = {London, UK},
2128 publisher = {Springer-Verlag},
2129 isbn = {3-540-60865-6}
2132 @INPROCEEDINGS{DomingoFerrer2002,
2133 author = {Domingo-Ferrer, Josep},
2134 title = {A Provably Secure Additive and Multiplicative Privacy Homomorphism},
2135 booktitle = {ISC '02: Proceedings of the 5th International Conference on Information
2139 address = {London, UK},
2140 publisher = {Springer-Verlag},
2141 isbn = {3-540-44270-7}
2144 @ARTICLE{Dubchak1995,
2145 author = {I. Dubchak and I. Muchnik and S. R. Holbrook and S. H. Kim},
2146 title = {Prediction of protein folding class using global description of amino
2148 journal = {Proc Natl Acad Sci U S A},
2151 pages = {8700--8704},
2154 __markedentry = {[guyeux]},
2155 abstract = {We present a method for predicting protein folding class based on
2156 global protein chain description and a voting process. Selection
2157 of the best descriptors was achieved by a computer-simulated neural
2158 network trained on a data base consisting of 83 folding classes.
2159 Protein-chain descriptors include overall composition, transition,
2160 and distribution of amino acid attributes, such as relative hydrophobicity,
2161 predicted secondary structure, and predicted solvent exposure. Cross-validation
2162 testing was performed on 15 of the largest classes. The test shows
2163 that proteins were assigned to the correct class (correct positive
2164 prediction) with an average accuracy of 71.7\%, whereas the inverse
2165 prediction of proteins as not belonging to a particular class (correct
2166 negative prediction) was 90-95\% accurate. When tested on 254 structures
2167 used in this study, the top two predictions contained the correct
2168 class in 91\% of the cases.},
2169 institution = {Department of Chemistry, University of California, Berkeley 94720,
2171 keywords = {Amino Acid Sequence; Amino Acids, chemistry; Computer Simulation;
2172 Databases, Factual; Models, Chemical; Neural Networks (Computer);
2173 Protein Folding; Protein Structure, Secondary; Proteins, chemistry/classification;
2174 Reproducibility of Results; Solvents},
2176 medline-pst = {ppublish},
2179 timestamp = {2011.07.18}
2183 title = {Real analysis and probability},
2184 publisher = {Cambridge University Press},
2185 author = {Richard M. Dudley},
2188 timestamp = {2008.01.02}
2192 author = {El Tarazi, Mouhamed Nabih},
2193 title = {Algorithmes mixtes asynchrones. Etude de convergence monotone},
2194 journal = {Numerische Mathematik},
2198 note = {10.1007/BF01405568},
2199 affiliation = {Department of Mathematics, Faculty of Science Kuwait University P.O.
2203 keyword = {Mathematics and Statistics},
2204 publisher = {Springer Berlin / Heidelberg},
2205 url = {http://dx.doi.org/10.1007/BF01405568}
2209 author = {El Tarazi, Mouhamed Nabih},
2210 title = {Some convergence results for asynchronous algorithms},
2211 journal = {Numerische Mathematik},
2215 note = {10.1007/BF01407866},
2216 affiliation = {Department of Mathematics, Faculty of Science Kuwait University P.O.
2217 Box 5969 Kuwait Kuwait},
2220 keyword = {Mathematics and Statistics},
2221 publisher = {Springer Berlin / Heidelberg},
2222 url = {http://dx.doi.org/10.1007/BF01407866}
2226 author = {Peng Fei and Qiu Shui-Sheng and Long Min},
2227 title = {A secure digital signature algorithm based on elliptic curve and
2229 journal = {Circuits Systems Signal Processing},
2231 volume = {24, No. 5},
2234 timestamp = {2009.01.16}
2237 @BOOK{Feigenbaum1908,
2238 title = {Universal behavior in nonlinear systems},
2239 publisher = {Los Alamos Science},
2241 author = {Feigenbaum},
2243 timestamp = {2008.01.02}
2246 @ARTICLE{Felsenstein1980,
2247 author = {J. Felsenstein},
2248 title = {A view of population genetics.},
2249 journal = {Science},
2255 doi = {10.1126/science.208.4449.1253},
2257 medline-pst = {ppublish},
2259 pii = {208/4449/1253},
2261 timestamp = {2011.05.05},
2262 url = {http://dx.doi.org/10.1126/science.208.4449.1253}
2266 title = {Les virus informatiques : techniques virales et antivirales avancées},
2268 editor = {Springer},
2269 author = {Eric Filiol},
2270 owner = {christophe},
2271 timestamp = {2010.10.13}
2274 @INPROCEEDINGS{FiliolBlackHat,
2275 author = {Eric Filiol},
2276 title = {Passive and Active Leakage of Secret Data from Non Networked Computer},
2277 booktitle = {Black Hat},
2279 owner = {christophe},
2280 timestamp = {2010.11.28}
2283 @INPROCEEDINGS{Fischlin,
2284 author = {Fischlin, R. and Schnorr, C. P.},
2285 title = {Stronger security proofs for RSA and rabin bits},
2286 booktitle = {Proceedings of the 16th annual international conference on Theory
2287 and application of cryptographic techniques},
2289 series = {EUROCRYPT'97},
2291 address = {Berlin, Heidelberg},
2292 publisher = {Springer-Verlag},
2294 isbn = {3-540-62975-0},
2295 location = {Konstanz, Germany},
2297 url = {http://dl.acm.org/citation.cfm?id=1754542.1754569}
2300 @PHDTHESIS{Formenti2003,
2301 author = {Enrico Formenti},
2302 title = {De l'algorithmique du chaos dans les syst\`{e}mes dynamiques discrets},
2303 school = {Université de Provence},
2306 timestamp = {2008.01.02}
2309 @PHDTHESIS{Formenti1998,
2310 author = {Enrico Formenti},
2311 title = {Automates cellulaires et chaos : de la vision topologique à la vision
2313 school = {\'Ecole Normale Supérieure de Lyon},
2315 optmonth = {Octobre},
2317 timestamp = {2008.01.02}
2321 author = {Gabriel Frey and Christian J Michel},
2322 title = {Identification of circular codes in bacterial genomes and their use
2323 in a factorization method for retrieving the reading frames of genes.},
2324 journal = {Comput Biol Chem},
2330 abstract = {We developed a statistical method that allows each trinucleotide to
2331 be associated with a unique frame among the three possible ones in
2332 a (protein coding) gene. An extensive gene study in 175 complete
2333 bacterial genomes based on this statistical approach resulted in
2334 identification of 72 new circular codes. Finding a circular code
2335 enables an immediate retrieval of the reading frame locally anywhere
2336 in a gene. No knowledge of location of the start codon is required
2337 and a short window of only a few nucleotides is sufficient for automatic
2338 retrieval. We have therefore developed a factorization method (that
2339 explores previously found circular codes) for retrieving the reading
2340 frames of bacterial genes. Its principle is new and easy to understand.
2341 Neither complex treatment nor specific information on the nucleotide
2342 sequences is necessary. Moreover, the method can be used for short
2343 regions in nucleotide sequences (less than 25 nucleotides in protein
2344 coding genes). Selected additional properties of circular codes and
2345 their possible biological consequences are also discussed.},
2346 doi = {10.1016/j.compbiolchem.2005.11.001},
2347 institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université
2348 Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant,
2349 67400 Illkirch, France. frey@dpt-info.u-strasbg.fr},
2350 keywords = {Base Sequence; Computational Biology; Genes, Bacterial; Genome, Bacterial;
2351 Genomics, statistics /&/ numerical data; Models, Genetic; Models,
2352 Statistical; Reading Frames},
2354 medline-pst = {ppublish},
2356 pii = {S1476-9271(05)00111-8},
2358 timestamp = {2011.05.05},
2359 url = {http://dx.doi.org/10.1016/j.compbiolchem.2005.11.001}
2363 author = {Gabriel Frey and Christian J Michel},
2364 title = {An analytical model of gene evolution with six mutation parameters:
2365 an application to archaeal circular codes.},
2366 journal = {Comput Biol Chem},
2372 abstract = {We develop here an analytical evolutionary model based on a trinucleotide
2373 mutation matrix 64 x 64 with six substitution parameters associated
2374 with the transitions and transversions in the three trinucleotide
2375 sites. It generalizes the previous models based on the nucleotide
2376 mutation matrices 4 x 4 and the trinucleotide mutation matrix 64
2377 x 64 with three parameters. It determines at some time t the exact
2378 occurrence probabilities of trinucleotides mutating randomly according
2379 to six substitution parameters. An application of this model allows
2380 an evolutionary study of the common circular code COM and the 15
2381 archaeal circular codes X which have been recently identified in
2382 several archaeal genomes. The main property of a circular code is
2383 the retrieval of the reading frames in genes, both locally, i.e.
2384 anywhere in genes and in particular without a start codon, and automatically
2385 with a window of a few nucleotides. In genes, the circular code is
2386 superimposed on the traditional genetic one. Very unexpectedly, the
2387 evolutionary model demonstrates that the archaeal circular codes
2388 can derive from the common circular code subjected to random substitutions
2389 with particular values for six substitutions parameters. It has a
2390 strong correlation with the statistical observations of three archaeal
2391 codes in actual genes. Furthermore, the properties of these substitution
2392 rates allow proposal of an evolutionary classification of the 15
2393 archaeal codes into three main classes according to this model. In
2394 almost all the cases, they agree with the actual degeneracy of the
2395 genetic code with substitutions more frequent in the third trinucleotide
2396 site and with transitions more frequent that transversions in any
2397 trinucleotide site.},
2398 doi = {10.1016/j.compbiolchem.2005.09.001},
2399 institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université
2400 Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant,
2401 67400 Illkirch, France. frey@dpt-info.u-strasbg.fr},
2402 keywords = {Archaea, genetics; DNA, Circular; Evolution, Molecular; Genetic Code;
2403 Genome, Archaeal; Models, Genetic; Mutation; Trinucleotide Repeats},
2405 medline-pst = {ppublish},
2407 pii = {S1476-9271(05)00083-6},
2409 timestamp = {2011.05.05},
2410 url = {http://dx.doi.org/10.1016/j.compbiolchem.2005.09.001}
2413 @INPROCEEDINGS{fgb11:ip,
2414 author = {Friot, Nicolas and Guyeux, Christophe and Bahi, Jacques},
2415 title = {Chaotic Iterations for Steganography - Stego-security and chaos-security},
2416 booktitle = {SECRYPT'2011, Int. Conf. on Security and Cryptography},
2419 address = {Sevilla, Spain},
2422 classement = {ACTI},
2423 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2429 author = {Alain Frisch},
2430 title = {Entropie topologique et définition du chaos},
2432 note = {Rapport de tipe},
2433 file = {Tipe_Entropie Topologique et Definition du Chaos (Alain Frisch).ps:Chaos/Tipe_Entropie Topologique et Definition du Chaos (Alain Frisch).ps:PDF},
2434 keywords = {Chaos, Entropie Topologique, Tipe},
2436 timestamp = {2008.01.02},
2437 url = {http://alain.frisch.fr/math.html}
2441 author = {Alain Frisch},
2442 title = {Entropie topologique et définition du chaos},
2444 note = {[En ligne; Page disponible le 12-août-2010]},
2445 url = {\url{http://alain.frisch.fr/math.html}}
2448 @ARTICLE{Frommer97asynchronousweighted,
2449 author = {Andreas Frommer and Hartmut Schwandt and Daniel and Daniel B. Szyld},
2450 title = {Asynchronous Weighted Additive Schwarz Methods},
2451 journal = {Electronic Transactions on Numerical Analysis},
2457 @MISC{Frommer94asynchronoustwo-stage,
2458 author = {Andreas Frommer and Daniel B. Szyld},
2459 title = {Asynchronous Two-Stage Iterative Methods},
2464 title = {Introduction to Chaos and Coherence},
2465 publisher = {IOP Publishing},
2467 author = {J. Frøyland},
2469 timestamp = {2008.01.02}
2473 author = {T. Furon},
2474 title = {Security analysis},
2476 note = {European Project IST-1999-10987 CERTIMARK, Deliverable D.5.5},
2478 timestamp = {2009.06.30}
2482 author = {Furon, Teddy and Bas, Patrick},
2483 title = {Broken arrows},
2484 journal = {EURASIP J. Inf. Secur.},
2488 address = {New York, NY, United States},
2489 doi = {http://dx.doi.org/10.1155/2008/597040},
2491 owner = {christophe},
2492 publisher = {Hindawi Publishing Corp.},
2493 timestamp = {2010.03.06}
2496 @ARTICLE{P1150442004,
2497 author = {G.S.El-Taweel and H.M. Onsi and M.Samy and M.G. Darwish},
2498 title = {Secure and Non-Blind Watermarking Scheme for Color Images Based on
2500 journal = {ICGST International Journal on Graphics, Vision and Image Processing},
2506 owner = {christophe},
2507 timestamp = {2010.03.07}
2510 @INPROCEEDINGS{Gentry09,
2511 author = {Gentry, Craig},
2512 title = {Fully homomorphic encryption using ideal lattices},
2513 booktitle = {STOC '09: Proceedings of the 41st annual ACM symposium on Theory
2517 address = {New York, NY, USA},
2519 doi = {http://doi.acm.org/10.1145/1536414.1536440},
2520 isbn = {978-1-60558-506-2},
2521 location = {Bethesda, MD, USA}
2524 @INPROCEEDINGS{Girao04,
2525 author = {J. Girao and M. Schneider and D. Westhoff},
2526 title = {CDA: Concealed data aggregation in wireless sensor networks},
2527 booktitle = {Proceedings of the ACM Workshop on Wireless Security},
2529 owner = {christophe},
2530 timestamp = {2010.07.31}
2533 @ARTICLE{Goldreich86,
2534 author = {Goldreich, Oded and Goldwasser, Shafi and Micali, Silvio},
2535 title = {How to construct random functions},
2542 address = {New York, NY, USA},
2543 doi = {http://doi.acm.org/10.1145/6490.6503},
2548 url = {http://doi.acm.org/10.1145/6490.6503}
2551 @CONFERENCE{Gotsman88,
2552 author = {C. Gotsman and D. Lehmann and E. Shamir},
2553 title = {Asynchronous Dynamics of Random Boolean Networks},
2554 booktitle = {San Diego '88 Neural Networks Conference},
2557 timestamp = {30/03/2008}
2560 @ARTICLE{Guckenheimer1979,
2561 author = {J. Guckenheimer},
2562 title = {Sensitive dependence to initial conditions for one-dimensional maps},
2563 journal = {Comm. Math. Phys.},
2565 optpages = {133-160},
2567 timestamp = {2008.01.02}
2571 title = {Nonlinear oscillations, dynamical systems, and bifurcations of vector
2573 publisher = {Springer Verlag},
2575 author = {J. Guckenheimer and P. Holmes},
2577 timestamp = {2008.01.02}
2580 @ARTICLE{Guo20093201,
2581 author = {Wei Guo and Xiaoming Wang and Dake He and Yang Cao},
2582 title = {Cryptanalysis on a parallel keyed hash function based on chaotic
2584 journal = {Physics Letters A},
2587 pages = {3201 - 3206},
2589 abstract = {This Letter analyzes the security of a novel parallel keyed hash function
2590 based on chaotic maps, proposed by Xiao et al. to improve the efficiency
2591 in parallel computing environment. We show how to devise forgery
2592 attacks on Xiao's scheme with differential cryptanalysis and give
2593 the experiment results of two kinds of forgery attacks firstly. Furthermore,
2594 we discuss the problem of weak keys in the scheme and demonstrate
2595 how to utilize weak keys to construct collision.},
2597 keywords = {Cryptanalysis}
2600 @PHDTHESIS{GuyeuxThese10,
2601 author = {Christophe Guyeux},
2602 title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}
2603 en s\'{e}curit\'{e} informatique},
2604 school = {Universit\'{e} de Franche-Comt\'{e}},
2606 owner = {christophe},
2607 timestamp = {2010.12.21}
2611 author = {Guyeux, Christophe and Bahi, Jacques},
2612 title = {\'Etude topologique de l'\'etalement de spectre},
2613 howpublished = {Journ\'ees Codes et St\'eganographie, \'Ecoles Militaires de Saint-Cyr,
2618 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2623 @INPROCEEDINGS{bg10:ip,
2624 author = {Guyeux, Christophe and Bahi, Jacques},
2625 title = {An improved watermarking algorithm for Internet applications},
2626 booktitle = {INTERNET'2010. The 2nd Int. Conf. on Evolving Internet},
2629 address = {Valencia, Spain},
2631 classement = {ACTI},
2632 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2637 @INPROCEEDINGS{gfb10:ip,
2638 author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques},
2639 title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},
2640 booktitle = {IIH-MSP'10, 6-th Int. Conf. on Intelligent Information Hiding and
2641 Multimedia Signal Processing},
2644 address = {Darmstadt, Germany},
2646 classement = {ACTI},
2647 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2653 author = {Christophe Guyeux and Nicolas Friot and Jacques M. Bahi},
2654 title = {A more secure information hiding scheme than spread-spectrum obtained
2656 journal = {arXiv 0032565},
2659 timestamp = {2010.04.30}
2663 title = {Guide to Elliptic Curve Cryptography},
2664 publisher = {Springer Professional Computing},
2666 editor = {Springer},
2667 author = {D. Hankerson and A. Menezes and S. Vanstone},
2668 owner = {christophe},
2669 timestamp = {2010.07.31}
2672 @ARTICLE{Hasegawa1985,
2673 author = {M. Hasegawa and H. Kishino and T. Yano},
2674 title = {Dating of the human-ape splitting by a molecular clock of mitochondrial
2676 journal = {J Mol Evol},
2681 abstract = {A new statistical method for estimating divergence dates of species
2682 from DNA sequence data by a molecular clock approach is developed.
2683 This method takes into account effectively the information contained
2684 in a set of DNA sequence data. The molecular clock of mitochondrial
2685 DNA (mtDNA) was calibrated by setting the date of divergence between
2686 primates and ungulates at the Cretaceous-Tertiary boundary (65 million
2687 years ago), when the extinction of dinosaurs occurred. A generalized
2688 least-squares method was applied in fitting a model to mtDNA sequence
2689 data, and the clock gave dates of 92.3 +/- 11.7, 13.3 +/- 1.5, 10.9
2690 +/- 1.2, 3.7 +/- 0.6, and 2.7 +/- 0.6 million years ago (where the
2691 second of each pair of numbers is the standard deviation) for the
2692 separation of mouse, gibbon, orangutan, gorilla, and chimpanzee,
2693 respectively, from the line leading to humans. Although there is
2694 some uncertainty in the clock, this dating may pose a problem for
2695 the widely believed hypothesis that the pipedal creature Australopithecus
2696 afarensis, which lived some 3.7 million years ago at Laetoli in Tanzania
2697 and at Hadar in Ethiopia, was ancestral to man and evolved after
2698 the human-ape splitting. Another likelier possibility is that mtDNA
2699 was transferred through hybridization between a proto-human and a
2700 proto-chimpanzee after the former had developed bipedalism.},
2701 keywords = {Animals; Biological Evolution; DNA, Mitochondrial, genetics; Genes;
2702 Haplorhini, genetics; Humans; Mathematics; Models, Genetic; Nucleic
2703 Acid Hybridization; Primates, genetics; Proteins, genetics; Species
2706 medline-pst = {ppublish},
2709 timestamp = {2011.05.05}
2713 title = {A First Course in Discrete Dynamical Systems},
2714 publisher = {Springer-Verlag},
2716 author = {R. Homlgren},
2719 timestamp = {2008.01.02}
2722 @INCOLLECTION{Hoque09,
2723 author = {Hoque, Md. and Chetty, Madhu and Sattar, Abdul},
2724 title = {Genetic Algorithm in Ab Initio Protein Structure Prediction Using
2725 Low Resolution Model: A Review},
2726 booktitle = {Biomedical Data and Applications},
2727 publisher = {Springer Berlin Heidelberg},
2729 editor = {Sidhu, Amandeep and Dillon, Tharam},
2731 series = {Studies in Computational Intelligence},
2733 affiliation = {IIIS, Griffith University, Nathan, QLD-4111 Australia}
2736 @CONFERENCE{Houmansadr09,
2737 author = {A. Houmansadr and N. Kiyavash and N. Borisov},
2738 title = {Rainbow: A robust and invisible non-blind watermark for network flows},
2739 booktitle = {NDSS’09: 16th Annual Network and Distributed System Security Symposium},
2741 owner = {christophe},
2742 timestamp = {2010.03.07}
2746 author = {Huang, Shih-I and Shieh, Shiuhpyng and Tygar, J.},
2747 title = {Secure encrypted-data aggregation for wireless sensor networks},
2748 journal = {Wireless Networks},
2749 abstract = {Abstract\ \ This paper proposes a secure encrypted-data
2750 aggregation scheme for wireless sensor networks. Our design for data
2751 aggregation eliminates redundant sensor readings without using encryption
2752 and maintains data secrecy and privacy during transmission. Conventional
2753 aggregation functions operate when readings are received in plaintext.
2754 If readings are encrypted, aggregation requires decryption creating
2755 extra overhead and key management issues. In contrast to conventional
2756 schemes, our proposed scheme provides security and privacy, and duplicate
2757 instances of original readings will be aggregated into a single packet.
2758 Our scheme is resilient to known-plaintext attacks, chosen-plaintext
2759 attacks, ciphertext-only attacks and man-in-the-middle attacks. Our
2760 experiments show that our proposed aggregation method significantly
2761 reduces communication overhead and can be practically implemented
2762 in on-the-shelf sensor platforms.},
2763 citeulike-article-id = {4499496},
2764 citeulike-linkout-0 = {http://dx.doi.org/10.1007/s11276-009-0177-y},
2765 citeulike-linkout-1 = {http://www.springerlink.com/content/g573138072642u63},
2766 doi = {10.1007/s11276-009-0177-y},
2767 posted-at = {2009-05-10 09:55:44},
2768 url = {http://dx.doi.org/10.1007/s11276-009-0177-y}
2772 author = {W. Huang and X. Ye},
2773 title = {Homeomorphisms with the whole compacta being scrambled sets},
2774 journal = {Ergod. Th. Dynam. Systems},
2780 timestamp = {2008.01.02}
2783 @ARTICLE{Hurley1982,
2784 author = {M. Hurley},
2785 title = {Attractors, persistence and density of their bassin},
2786 journal = {Transactions of AMS},
2788 optpages = {247-271},
2791 timestamp = {2008.01.02}
2794 @INPROCEEDINGS{Islam:2009:NMA:1695134.1695181,
2795 author = {Islam, Md. Kamrul and Chetty, Madhu},
2796 title = {Novel Memetic Algorithm for Protein Structure Prediction},
2797 booktitle = {Proceedings of the 22nd Australasian Joint Conference on Advances
2798 in Artificial Intelligence},
2802 address = {Berlin, Heidelberg},
2803 publisher = {Springer-Verlag},
2805 isbn = {978-3-642-10438-1},
2806 keywords = {Guided search space, Memetic Algorithm, Modified fitness function,
2807 Pair-wise-interchange, Schema preservation, Tabu Search},
2808 location = {Melbourne, Australia},
2812 @PHDTHESIS{Jacquemard77,
2813 author = {C. Jacquemard},
2814 title = {Contribution à l'étude d'algorithmes à convergence monotone},
2815 school = {Université de Franche-Comté},
2817 owner = {christophe},
2818 timestamp = {2010.08.25}
2822 title = {{Evolution of Protein Molecules}},
2823 publisher = {Academy Press},
2825 editor = {Munro, H. N.},
2826 author = {Jukes, T. H. and Cantor, C. R.},
2827 booktitle = {Evolution of Protein Molecules},
2828 citeulike-article-id = {1673661},
2829 keywords = {compbio, fresco},
2830 posted-at = {2007-09-19 06:23:18},
2834 @INPROCEEDINGS{Kalker2001,
2835 author = {Kalker, T.},
2836 title = {Considerations on watermarking security},
2839 abstract = {In this paper we address the usually implicit assumption that digital
2840 watermarking has as its main target copyright and copy protection
2841 applications. From these target applications a great many conclusions
2842 are drawn about the required security of a watermarking system, and
2843 in fact, a considerably percentage of the watermarking literature
2844 has this very topic as its main focus of attention. In this paper
2845 we take a step back, and try to do a more careful analysis of the
2846 'watermarking-is-for-security-applications' paradigm. The intention
2847 of this paper is to discuss the meaning of the concept security in
2848 the context of watermarking, and try to show that one has to be careful
2849 in using analogies from the related field of cryptography},
2850 citeulike-article-id = {1226513},
2851 journal = {2001 IEEE Fourth Workshop on Multimedia Signal Processing},
2852 keywords = {security, wateramarking},
2854 posted-at = {2007-04-14 14:30:06},
2856 timestamp = {2009.06.30}
2859 @ARTICLE{Kerckhoffs83,
2860 author = {Kerckhoffs, Auguste},
2861 title = {La cryptographie militaire},
2862 journal = {Journal des sciences militaires},
2867 abstract = {pp. 161–191, Feb. 1883.},
2868 citeulike-article-id = {505508},
2869 keywords = {cryptography, master},
2871 posted-at = {2006-02-15 04:49:15},
2873 timestamp = {2009.06.30}
2877 author = {Kimura, Motoo},
2878 title = {A simple method for estimating evolutionary rates of base substitutions
2879 through comparative studies of nucleotide sequences},
2880 journal = {Journal of Molecular Evolution},
2884 note = {10.1007/BF01731581},
2885 affiliation = {National Institute of Genetics 411 Mishima Japan},
2888 keyword = {Biomedical and Life Sciences},
2889 publisher = {Springer New York},
2890 url = {http://dx.doi.org/10.1007/BF01731581}
2895 title = {Chaos Without Nonperiodicity},
2896 journal = {Amer. Math. Monthly},
2900 timestamp = {27/01/2008}
2903 @PHDTHESIS{Knudsen1994a,
2904 author = {C. Knudsen},
2905 title = {Aspects of noninvertible dynamics and chaos},
2906 school = {Technical University of Denmark},
2909 timestamp = {2008.01.02}
2913 title = {Seminumerical Algorithms},
2914 publisher = {Addison-Wesley, Reading, MA, USA},
2916 author = {D. E. Knuth},
2918 edition = {Third Edition},
2920 timestamp = {2012.02.15}
2924 author = {L. Kocarev and J. Szczepanski and J.M. Amigo and I. Tomovski},
2925 title = {Discrete Chaos - I: Theory},
2926 journal = {IEEE Trans. on Circuits Systems},
2929 pages = {1300-1309},
2930 owner = {christophe},
2931 timestamp = {2010.10.10}
2934 @INPROCEEDINGS{Kocher95cryptanalysisof,
2935 author = {Paul C. Kocher},
2936 title = {Cryptanalysis of Diffie-Hellman, RSA, DSS, and Other Systems Using
2937 Timing Attacks (Extended Abstract)},
2938 booktitle = {Advances in Cryptology, CRYPTO '95: 15th Annual International Cryptology
2942 publisher = {Springer-Verlag}
2945 @ARTICLE{Kullback1951,
2946 author = {Kullback, Solomon and Leibler, Richard A.},
2947 title = {On Information and Sufficiency},
2948 journal = {The Annals of Mathematical Statistics},
2953 citeulike-article-id = {3245942},
2954 keywords = {file-import-08-09-12},
2956 posted-at = {2008-09-12 14:30:37},
2958 timestamp = {2009.06.29}
2962 author = {Lang, Gregory I. and Murray, Andrew W.},
2963 title = {Estimating the Per-Base-Pair Mutation Rate in the Yeast Saccharomyces
2965 journal = {Genetics},
2966 year = {January 2008},
2970 abstract = {Although mutation rates are a key determinant of the rate of evolution
2971 they are difficult to measure precisely and global mutations rates
2972 (mutations per genome per generation) are often extrapolated from
2973 the per-base-pair mutation rate assuming that mutation rate is uniform
2974 across the genome. Using budding yeast, we describe an improved method
2975 for the accurate calculation of mutation rates based on the fluctuation
2976 assay. Our analysis suggests that the per-base-pair mutation rates
2977 at two genes differ significantly (3.80 × 10−10 at URA3 and 6.44
2978 × 10−10 at CAN1) and we propose a definition for the effective target
2979 size of genes (the probability that a mutation inactivates the gene)
2980 that acknowledges that the mutation rate is nonuniform across the
2982 doi = {10.1534/genetics.107.071506},
2983 eprint = {http://www.genetics.org/content/178/1/67.full.pdf+html},
2984 url = {http://www.genetics.org/content/178/1/67.abstract}
2988 author = {Eshter Ledoux},
2989 title = {Introduction à la théorie du chaos},
2991 note = {[En ligne; Page disponible le 12-août-2010]},
2992 url = {\url{http://www.nux.be/eledoux/mem/node1.html}}
2996 title = {Analyse en dimension finie},
2997 publisher = {Masson},
3003 timestamp = {2008.01.02}
3007 author = {A.K. Lenstra and E.R. Verheul},
3008 title = {Selecting Cryptographic Key Sizes},
3009 journal = {Jour. of the International Association for Cryptologic Research},
3017 author = {Lettvin, J.Y. and Maturana, H.R. and McCulloch, W.S. and Pitts, W.H.},
3018 title = {What the Frog's Eye Tells the Frog's Brain},
3019 journal = {Proceedings of the IRE},
3024 owner = {christophe},
3025 timestamp = {2010.12.21}
3030 title = {User-Centric Security and Privacy Mechanisms in Untrusted Networking
3031 and Computing Environments},
3032 school = {Worcester Polytechnic Institute},
3035 timestamp = {2012.05.04}
3039 author = {T. Y. Li and J. A. Yorke},
3040 title = {Period three implies chaos},
3041 journal = {Amer. Math. Monthly},
3047 timestamp = {27/01/2008}
3051 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
3052 title = {A novel Hash algorithm construction based on chaotic neural network},
3053 journal = {Neural Computing and Applications},
3056 affiliation = {Chongqing University College of Computer Science 400044 Chongqing
3059 keyword = {Computer Science},
3060 publisher = {Springer London}
3063 @INPROCEEDINGS{Lin09,
3064 author = {Lin, Hua-Yi and Chiang, Tzu-Chiang},
3065 title = {Cooperative secure data aggregation in sensor networks using elliptic
3066 curve based cryptosystems},
3067 booktitle = {CDVE'09: Proceedings of the 6th international conference on Cooperative
3068 design, visualization, and engineering},
3071 address = {Berlin, Heidelberg},
3072 publisher = {Springer-Verlag},
3073 isbn = {3-642-04264-3, 978-3-642-04264-5},
3074 location = {Luxembourg, Luxembourg}
3077 @INPROCEEDINGS{Liu2008,
3078 author = {Liu, An and Ning, Peng},
3079 title = {TinyECC: A Configurable Library for Elliptic Curve Cryptography in
3080 Wireless Sensor Networks},
3081 booktitle = {7th International Conference on Information Processing in Sensor
3082 Networks (IPSN 2008)},
3086 citeulike-article-id = {3041699},
3087 howpublished = {SPOTS Track},
3089 posted-at = {2008-07-25 05:25:05},
3093 @ARTICLE{Liu2007bis,
3094 author = {Shao-Hui Liu and Hong-Xun Yao and Wen Gao and Yong-Liang Liu},
3095 title = {An image fragile watermark scheme based on chaotic image pattern
3097 journal = {Applied Mathematics and Computation},
3102 timestamp = {2008.10.07}
3105 @INPROCEEDINGS{Liu07,
3106 author = {Liu, Zhen and Xi, Lifeng},
3107 title = {Image Information Hiding Encryption Using Chaotic Sequence},
3108 booktitle = {KES '07: Knowledge-Based Intelligent Information and Engineering
3109 Systems and the XVII Italian Workshop on Neural Networks on Proceedings
3110 of the 11th International Conference},
3113 address = {Berlin, Heidelberg},
3114 publisher = {Springer-Verlag},
3115 doi = {http://dx.doi.org/10.1007/978-3-540-74827-4_26},
3116 isbn = {978-3-540-74826-7},
3117 location = {Vietri sul Mare, Italy}
3121 author = {Zhen Liu and Lifeng Xi},
3122 title = {Image Information Hiding Encryption Using Chaotic Sequence},
3128 timestamp = {11/04/2008}
3131 @ARTICLE{Lubachevsky86,
3132 author = {Lubachevsky, Boris and Mitra, Debasis},
3133 title = {A chaotic asynchronous algorithm for computing the fixed point of
3134 a nonnegative matrix of unit spectral radius},
3140 address = {New York, NY, USA},
3141 doi = {http://doi.acm.org/10.1145/4904.4801},
3147 author = {{L}arger, {L}. and {D}udley, {J}.{M}.},
3148 title = { {N}onlinear dynamics {O}ptoelectronic chaos},
3149 journal = {{N}ature },
3155 abstract = {{O}ptoelectronic circuits with delayed feedback provide a convenient
3156 bench-top platform to study a wide range of nonlinear dynamic systems,
3157 from ultrastable clocks to complex chaotic devices.},
3158 affiliation = {{F}ranche-{C}omt{\'e} {\'E}lectronique {M}{\'e}canique, {T}hermique
3159 et {O}ptique - {S}ciences et {T}echnologies - {FEMTO}-{ST} - {CNRS}
3160 : {UMR}6174 - {U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {U}niversit{\'e}
3161 de {T}echnologie de {B}elfort-{M}ontbeliard - {E}cole {N}ationale
3162 {S}up{\'e}rieure de {M}{\'e}canique et des {M}icrotechniques },
3163 audience = {internationale },
3165 doi = {10.1038/465041a },
3166 hal_id = {hal-00517696},
3167 language = {{A}nglais},
3168 url = {http://hal.archives-ouvertes.fr/hal-00517696/en/}
3171 @INPROCEEDINGS{Mahoney00,
3172 author = {Mahoney, Matthew V.},
3173 title = {Fast Text Compression with Neural Networks},
3174 booktitle = {Proceedings of the Thirteenth International Florida Artificial Intelligence
3175 Research Society Conference},
3178 publisher = {AAAI Press},
3180 isbn = {1-57735-113-4},
3184 @INPROCEEDINGS{msp10:bl,
3185 author = {Makhoul, Abdallah and Saadi, Rachid and Pham, Congduc},
3186 title = {Risk Management in Intrusion Detection Applications with Wireless
3187 Video Sensor Networks},
3188 booktitle = {WCNC'10 IEEE Int. Conf.},
3191 address = {Sydney, Australia},
3200 author = {H.S. Malvar and D. Florêncio},
3201 title = {Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking},
3202 journal = {IEEE Trans. Signal Proceeding},
3206 owner = {christophe},
3207 timestamp = {2010.03.07}
3210 @ARTICLE{Marsaglia2003,
3211 author = {G. Marsaglia},
3212 title = {Xorshift RNGs},
3213 journal = {Journal of Statistical Software},
3218 timestamp = {2009.10.28}
3221 @ARTICLE{Marsaglia1996,
3222 author = {G. Marsaglia},
3223 title = {DIEHARD: a battery of tests of randomness.},
3224 journal = {http://stat.fsu.edu/~geo/diehard.html},
3227 timestamp = {2009.11.09}
3230 @ARTICLE{DefiningChaos,
3231 author = {M. Martelli and M. Dang and T. Seph},
3232 title = {Defining chaos},
3233 journal = {Mathematics Magazine},
3237 owner = {christophe},
3238 timestamp = {2010.08.11}
3241 @ARTICLE{Michel2007c,
3242 author = {Christian J Michel},
3243 title = {An analytical model of gene evolution with 9 mutation parameters:
3244 an application to the amino acids coded by the common circular code.},
3245 journal = {Bull Math Biol},
3251 abstract = {We develop here an analytical evolutionary model based on a trinucleotide
3252 mutation matrix 64 x 64 with nine substitution parameters associated
3253 with the three types of substitutions in the three trinucleotide
3254 sites. It generalizes the previous models based on the nucleotide
3255 mutation matrices 4 x 4 and the trinucleotide mutation matrix 64
3256 x 64 with three and six parameters. It determines at some time t
3257 the exact occurrence probabilities of trinucleotides mutating randomly
3258 according to these nine substitution parameters. An application of
3259 this model allows an evolutionary study of the common circular code
3260 [Formula: see text] of eukaryotes and prokaryotes and its 12 coded
3261 amino acids. The main property of this code [Formula: see text] is
3262 the retrieval of the reading frames in genes, both locally, i.e.
3263 anywhere in genes and in particular without a start codon, and automatically
3264 with a window of a few nucleotides. However, since its identification
3265 in 1996, amino acid information coded by [Formula: see text] has
3266 never been studied. Very unexpectedly, this evolutionary model demonstrates
3267 that random substitutions in this code [Formula: see text] and with
3268 particular values for the nine substitutions parameters retrieve
3269 after a certain time of evolution a frequency distribution of these
3270 12 amino acids very close to the one coded by the actual genes.},
3271 doi = {10.1007/s11538-006-9147-z},
3272 institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université
3273 Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant,
3274 67400 Illkirch, France. michel@dpt-info.u-strasbg.fr},
3275 keywords = {Amino Acids, genetics; Codon, genetics; Eukaryotic Cells; Evolution,
3276 Molecular; Models, Genetic; Prokaryotic Cells},
3278 medline-pst = {ppublish},
3281 timestamp = {2011.05.05},
3282 url = {http://dx.doi.org/10.1007/s11538-006-9147-z}
3286 author = {J.-C. Miellou},
3287 title = {Algorithmes de relaxation chaotique \`{a} retards},
3293 timestamp = {2008.05.22}
3296 @ARTICLE{Miellou75b,
3297 author = {Miellou, J.-C.},
3298 title = {Itérations chaotiques à retards, étude de la convergence dans le
3299 cas d'espaces partiellement ordonnés},
3300 journal = {C.R.A.S. Paris},
3304 owner = {christophe},
3305 timestamp = {2010.08.17}
3309 author = {Jean-Claude Miellou and Pierre Spitéri},
3310 title = {Un crit\`{e}re de convergence pour des méthodes générales de point
3312 journal = {Rairo -- Modélisation mathématique et analyse numérique},
3317 owner = {christophe},
3318 timestamp = {2010.10.13}
3322 author = {Aidan Mooney and John G. Keating and Ioannis Pitas},
3323 title = {A comparative study of chaotic and white noise signals in digital
3325 journal = {Chaos, Solitons and Fractals},
3329 owner = {christophe},
3330 timestamp = {2010.03.01}
3333 @ARTICLE{Nakashima2003,
3334 author = {Nakashima, Y. and Tachibana, R. and Babaguchi, N.},
3335 title = {Watermarked Movie Soundtrack Finds the Position of the Camcorder
3337 journal = {IEEE Transactions on Multimedia},
3339 note = {Accepted for future publication Multimedia}
3342 @INCOLLECTION{springerlink:10.1007/978-3-642-04431-1_16,
3343 author = {Nelson, Michael and Nahapetian, Ani and Koushanfar, Farinaz and Potkonjak,
3345 title = {SVD-Based Ghost Circuitry Detection},
3346 booktitle = {Information Hiding},
3347 publisher = {Springer Berlin / Heidelberg},
3349 editor = {Katzenbeisser, Stefan and Sadeghi, Ahmad-Reza},
3351 series = {Lecture Notes in Computer Science},
3353 note = {10.1007/978-3-642-04431-1_16},
3354 affiliation = {Computer Science Department, UCLA, Los Angeles, CA 90095, USA},
3355 url = {http://dx.doi.org/10.1007/978-3-642-04431-1_16}
3358 @INPROCEEDINGS{Perez-Hernandez09,
3359 author = {P\'{e}rez-Hern\'{a}ndez, Luis Germ\'{a}n and Rodr\'{\i}guez-V\'{a}zquez,
3360 Katya and Gardu\~{n}o-Ju\'{a}rez, Ram\'{o}n},
3361 title = {Parallel particle swarm optimization applied to the protein folding
3363 booktitle = {Proceedings of the 11th Annual conference on Genetic and evolutionary
3366 series = {GECCO '09},
3367 pages = {1791--1792},
3368 address = {New York, NY, USA},
3371 isbn = {978-1-60558-325-9},
3372 keywords = {bioinformatics, biology and chemistry, combinatorial optimization,
3373 parallelization, swarm intelligence},
3374 location = {Montreal, Qu\&\#233;bec, Canada},
3378 @INPROCEEDINGS{Paillier99,
3379 author = {Paillier, Pascal},
3380 title = {Public-key cryptosystems based on composite degree residuosity classes},
3381 booktitle = {Proceedings of the 17th international conference on Theory and application
3382 of cryptographic techniques},
3384 series = {EUROCRYPT'99},
3386 address = {Berlin, Heidelberg},
3387 publisher = {Springer-Verlag},
3389 isbn = {3-540-65889-0},
3390 location = {Prague, Czech Republic},
3392 url = {http://dl.acm.org/citation.cfm?id=1756123.1756146}
3395 @PHDTHESIS{Pellegrin1986,
3396 author = {D. Pellegrin},
3397 title = {Algorithmique discr\`{e}te et r\'{e}seaux d'automates},
3398 school = {Grenoble},
3401 timestamp = {2008.05.22}
3405 author = {F. Peng and S.-S. Qiu and M. Long},
3406 title = {One way Hash function construction based on two-dimensional hyperchaotic
3408 journal = {Acta Phys. Sinici.},
3413 timestamp = {2009.01.16}
3416 @INPROCEEDINGS{Perez06,
3417 author = {Luis Perez-Freire and F. Pérez-gonzalez and Pedro Comesaña},
3418 title = {Secret Dither Estimation in Lattice-Quantization Data Hiding: A Set-Membership
3420 booktitle = {Security, Steganography, and Watermarking of Multimedia Contents},
3422 editor = {Edward J. Delp and Ping W. Wong},
3423 address = {San Jose, California, USA},
3425 organization = {SPIE},
3427 timestamp = {2009.06.30}
3430 @INPROCEEDINGS{Perez-Freire06,
3431 author = {Luis Perez-Freire and Pedro Comesana and Juan Ramon Troncoso-Pastoriza
3432 and Fernando Perez-Gonzalez},
3433 title = {Watermarking Security: a Survey},
3434 booktitle = {LNCS Transactions on Data Hiding and Multimedia Security},
3437 timestamp = {2009.06.29}
3440 @PROCEEDINGS{Peter07,
3441 title = {On Concealed Data Aggregation for WSNs},
3443 author = {Peter, Steffen and Piotrowski, Krzysztof and Langendoerfer, Peter},
3444 booktitle = {Consumer Communications and Networking Conference, 2007. CCNC 2007.
3446 citeulike-article-id = {2281643},
3447 citeulike-linkout-0 = {http://dx.doi.org/10.1109/CCNC.2007.45},
3448 citeulike-linkout-1 = {http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=4199133},
3449 doi = {10.1109/CCNC.2007.45},
3450 journal = {Consumer Communications and Networking Conference, 2007. CCNC 2007.
3454 posted-at = {2008-01-23 19:36:19},
3456 url = {http://dx.doi.org/10.1109/CCNC.2007.45}
3460 author = {Pham, Congduc and Makhoul, Abdallah and Saadi, Rachid},
3461 title = {Risk-based Adaptive Scheduling in Randomly Deployed Video Sensor
3462 Networks for Critical Surveillance Applications},
3463 journal = {Journal of Network and Computer Applications},
3468 note = {Accepted manuscript. To appear},
3469 classement = {ACLI},
3471 impact-factor = {1.111},
3473 isi-acro = {J NETW COMPU APPL},
3474 publisher = {Springer}
3478 author = {Edgar Alan Poe},
3479 title = {The Raven},
3482 note = {American Museum (Baltimore)},
3483 owner = {christophe},
3484 timestamp = {2010.11.23}
3487 @INPROCEEDINGS{Przydatek03sia:secure,
3488 author = {Bartosz Przydatek and Dawn Song and Adrian Perrig},
3489 title = {SIA: Secure Information Aggregation in Sensor Networks},
3492 publisher = {ACM Press}
3495 @ARTICLE{Perez-Freire2006:Security,
3496 author = {L. P{\'e}rez-Freire and F. P{\'e}rez-González and T. Furon and P.
3498 title = {Security of lattice-based data hiding against the known message attack},
3499 journal = {IEEE Trans. on Information Forensics and Security},
3506 timestamp = {2009.12.06}
3509 @MISC{Quisquater02sidechannel,
3510 author = {J-J. Quisquater and D. Samyde and Université Catholique De Louvain
3512 title = {Side Channel Cryptanalysis},
3516 @ARTICLE{Raynal2001,
3517 author = {Frédéric Raynal and Fabien A. P. Petitcolas and Caroline Fontaine},
3518 title = {Evaluation automatique des méthodes de tatouage},
3519 journal = {Traitement du signal},
3524 timestamp = {2008.05.21}
3528 author = {Vincent Rijmen and Elisabeth Oswald},
3529 title = {Update on SHA-1},
3530 howpublished = {Cryptology ePrint Archive, Report 2005/010},
3532 note = {\url{http://eprint.iacr.org/}}
3536 title = {Discrete Iterations, a Metric Study},
3537 publisher = {Springer-Verlag},
3539 editor = {Berlin Heidelberg New-York},
3540 author = {François Robert},
3542 series = {Series in Computational Mathematics}
3546 title = {Discrete Iterations: A Metric Study},
3548 editor = {Springer-Verlag},
3549 author = {F. Robert},
3551 series = {Springer Series in Computational Mathematics},
3553 timestamp = {17/02/2008}
3557 author = {Rudenko, O. and Snytkin, M.},
3558 title = {Image compression based on the neural network art},
3559 journal = {Cybernetics and Systems Analysis},
3563 affiliation = {Kharkov National University of Radio Electronics Kharkov Ukraine},
3566 keyword = {Computer Science},
3567 publisher = {Springer New York}
3570 @PHDTHESIS{Ruette2001,
3571 author = {Sylvie Ruette},
3572 title = {Chaos en dynamique topologique, en particulier sur l'intervalle,
3573 mesures d'entropie maximale},
3574 school = {Université d'Aix-Marseille II},
3576 optmonth = {Novembre},
3578 timestamp = {2008.01.02}
3581 @MASTERSTHESIS{Saulnier02,
3582 author = {Boris Saulnier},
3583 title = {Entropie topologique},
3584 school = {DEA Sémantique, Preuves et Langages, Paris 7},
3586 owner = {christophe},
3587 timestamp = {2010.08.12}
3590 @ARTICLE{Schmitz2001,
3591 author = {Roland Schmitz},
3592 title = {Use of chaotic dynamical systems in cryptography},
3593 journal = {Journal of Franklin Institute},
3598 timestamp = {17/02/2008}
3602 title = {Analyse: topologie g\'{e}n\'{e}rale et analyse fonctionnelle},
3603 publisher = {Hermann},
3606 author = {Laurent Schwartz},
3607 owner = {christophe},
3608 timestamp = {2010.09.15}
3612 author = {Shannon, Claude E.},
3613 title = {Communication Theory of Secrecy Systems},
3614 journal = {Bell Systems Technical Journal},
3618 citeulike-article-id = {507362},
3619 keywords = {master, secrecy\_systems, teoria-informacao, theory\_communication,
3620 theory\_cryptography},
3622 posted-at = {2006-02-16 23:24:09},
3624 timestamp = {2009.06.29}
3627 @ARTICLE{Shmygelska05,
3628 author = {Shmygelska, Alena and Hoos, Holger},
3629 title = {An ant colony optimisation algorithm for the 2D and 3D hydrophobic
3630 polar protein folding problem},
3631 journal = {BMC Bioinformatics},
3636 abstract = {BACKGROUND:The protein folding problem is a fundamental problems in
3637 computational molecular biology and biochemical physics. Various
3638 optimisation methods have been applied to formulations of the ab-initio
3639 folding problem that are based on reduced models of protein structure,
3640 including Monte Carlo methods, Evolutionary Algorithms, Tabu Search
3641 and hybrid approaches. In our work, we have introduced an ant colony
3642 optimisation (ACO) algorithm to address the non-deterministic polynomial-time
3643 hard (NP-hard) combinatorial problem of predicting a protein's conformation
3644 from its amino acid sequence under a widely studied, conceptually
3645 simple model - the 2-dimensional (2D) and 3-dimensional (3D) hydrophobic-polar
3646 (HP) model.RESULTS:We present an improvement of our previous ACO
3647 algorithm for the 2D HP model and its extension to the 3D HP model.
3648 We show that this new algorithm, dubbed ACO-HPPFP-3, performs better
3649 than previous state-of-the-art algorithms on sequences whose native
3650 conformations do not contain structural nuclei (parts of the native
3651 fold that predominantly consist of local interactions) at the ends,
3652 but rather in the middle of the sequence, and that it generally finds
3653 a more diverse set of native conformations.CONCLUSIONS:The application
3654 of ACO to this bioinformatics problem compares favourably with specialised,
3655 state-of-the-art methods for the 2D and 3D HP protein folding problem;
3656 our empirical results indicate that our rather simple ACO algorithm
3657 scales worse with sequence length but usually finds a more diverse
3658 ensemble of native states. Therefore the development of ACO algorithms
3659 for more complex and realistic models of protein structure holds
3660 significant promise.},
3661 doi = {10.1186/1471-2105-6-30},
3663 pubmedid = {15710037}
3666 @OTHER{Shmygelska2005Feb,
3667 __markedentry = {[christophe]},
3668 abstract = {Abstract Background The protein folding problem is a fundamental problems
3669 in computational molecular biology and biochemical physics. Various
3670 optimisation methods have been applied to formulations of the ab-initio
3671 folding problem that are based on reduced models of protein structure,
3672 including Monte Carlo methods, Evolutionary Algorithms, Tabu Search
3673 and hybrid approaches. In our work, we have introduced an ant colony
3674 optimisation (ACO) algorithm to address the non-deterministic polynomial-time
3675 hard (NP-hard) combinatorial problem of predicting a protein's conformation
3676 from its amino acid sequence under a widely studied, conceptually
3677 simple model – the 2-dimensional (2D) and 3-dimensional (3D) hydrophobic-polar
3678 (HP) model. Results We present an improvement of our previous ACO
3679 algorithm for the 2D HP model and its extension to the 3D HP model.
3680 We show that this new algorithm, dubbed ACO-HPPFP-3, performs better
3681 than previous state-of-the-art algorithms on sequences whose native
3682 conformations do not contain structural nuclei (parts of the native
3683 fold that predominantly consist of local interactions) at the ends,
3684 but rather in the middle of the sequence, and that it generally finds
3685 a more diverse set of native conformations. Conclusions The application
3686 of ACO to this bioinformatics problem compares favourably with specialised,
3687 state-of-the-art methods for the 2D and 3D HP protein folding problem;
3688 our empirical results indicate that our rather simple ACO algorithm
3689 scales worse with sequence length but usually finds a more diverse
3690 ensemble of native states. Therefore the development of ACO algorithms
3691 for more complex and realistic models of protein structure holds
3692 significant promise.},
3693 author = {Shmygelska, Alena and Hoos, Holger H},
3694 journal = {BMC Bioinformatics. 2005 Feb 14},
3696 owner = {christophe},
3698 timestamp = {2011.01.24},
3699 title = {An ant colony optimisation algorithm for the 2D and 3D hydrophobic
3700 polar protein folding problem},
3706 author = {Li Shujun and Li Qi and Li Wenmin and Mou Xuanqin and Cai Yuanlong},
3707 title = {Statistical Properties of Digital Piecewise Linear Chaotic Maps and
3708 Their Roles in Cryptography and Pseudo-Random Coding},
3709 journal = {Proceedings of the 8th IMA International Conference on Cryptography
3714 owner = {christophe},
3715 timestamp = {2010.03.06}
3718 @ARTICLE{Simard07testu01:a,
3719 author = {Richard Simard and Université De Montréal},
3720 title = {TestU01: A C library for empirical testing of random number generators},
3721 journal = {ACM Transactions on Mathematical Software},
3726 @INPROCEEDINGS{Simmons83,
3727 author = {Gustavus J. Simmons},
3728 title = {The Prisoners' Problem and the Subliminal Channel},
3729 booktitle = {Advances in Cryptology, Proc. CRYPTO'83},
3732 bibsource = {DBLP, http://dblp.uni-trier.de},
3734 timestamp = {2009.06.29}
3737 @ARTICLE{Solak2004389,
3738 author = {Ercan Solak},
3739 title = {On the security of a class of discrete-time chaotic cryptosystems},
3740 journal = {Physics Letters A},
3743 pages = {389 - 395},
3745 doi = {DOI: 10.1016/j.physleta.2003.11.008},
3747 keywords = {Communication using chaos},
3749 timestamp = {2009.12.12},
3750 url = {http://www.sciencedirect.com/science/article/B6TVM-4B22RC9-2/2/99a0af737c9b6ba8af47ae4d3c7a326d}
3753 @PHDTHESIS{Spiteri74,
3754 author = {Pierre Spitéri},
3755 title = {Contribution à l'étude de la stabilite au sens de liapounov de certains
3756 systemes differentiels non lineaires},
3757 school = {Université de Franche-Comté},
3759 owner = {christophe},
3760 timestamp = {2010.10.13}
3764 title = {Does God Play Dices ?: the mathematics of chaos},
3765 publisher = {Penguin},
3767 author = {Ian Stewart},
3769 timestamp = {2008.01.02}
3773 title = {Cryptography: Theory and Practice, Second Edition},
3774 publisher = {{Chapman \& Hall/CRC}},
3776 author = {Stinson, Douglas R.},
3778 abstract = {{Douglas R. Stinson's <I>Cryptography: Theory and Practice</I> is
3779 a mathematically intensive examination of cryptography, including
3780 ciphers, the Data Encryption Standard (DES), public key cryptography,
3781 one-way hash functions, and digital signatures. Stinson's explication
3782 of "zero-sum proofs"--a process by which one person lets another
3783 person know that he or she has a password without actually revealing
3784 any information--is especially good.<P> If you are new to the math
3785 behind cryptography but want to tackle it, the author covers all
3786 of the required background to understand the real mathematics here.
3787 <I>Cryptography</I> includes extensive exercises with each chapter
3788 and makes an ideal introduction for any math-literate person willing
3789 to get acquainted with this material.} {<P>Major advances over the
3790 last five years precipitated this major revision of the bestselling
3791 Cryptography: Theory and Practice. With more than 40 percent new
3792 or updated material, the second edition now provides an even more
3793 comprehensive treatment of modern cryptography. It focuses on the
3794 new Advanced Encryption Standards and features an entirely new chapter
3795 on that subject. Another new chapter explores the applications of
3796 secret sharing schemes, including ramp schemes, visual cryptography,
3797 threshold cryptography, and broadcast encryption. This is an ideal
3798 introductory text for both computer science and mathematics students
3799 and a valuable reference for professionals.</P>}},
3800 citeulike-article-id = {2401855},
3802 howpublished = {Hardcover},
3803 isbn = {1584882069},
3804 keywords = {security},
3805 posted-at = {2008-02-20 08:28:49},
3807 url = {http://www.amazon.com/exec/obidos/redirect?tag=citeulike07-20\&path=ASIN/1584882069}
3811 author = {Tamura, K},
3812 title = {Estimation of the number of nucleotide substitutions when there are
3813 strong transition-transversion and G+C-content biases.},
3814 journal = {Molecular Biology and Evolution},
3819 abstract = {A simple mathematical method is developed to estimate the number of
3820 nucleotide substitutions per site between two DNA sequences, by extending
3821 Kimura's (1980) two-parameter method to the case where a G+C-content
3822 bias exists. This method will be useful when there are strong transition-transversion
3823 and G+C-content biases, as in the case of Drosophila mitochondrial
3825 eprint = {http://mbe.oxfordjournals.org/content/9/4/678.full.pdf+html},
3826 url = {http://mbe.oxfordjournals.org/content/9/4/678.abstract}
3830 author = {Tamura, K and Nei, M},
3831 title = {Estimation of the number of nucleotide substitutions in the control
3832 region of mitochondrial DNA in humans and chimpanzees.},
3833 journal = {Molecular Biology and Evolution},
3838 abstract = {Examining the pattern of nucleotide substitution for the control region
3839 of mitochondrial DNA (mtDNA) in humans and chimpanzees, we developed
3840 a new mathematical method for estimating the number of transitional
3841 and transversional substitutions per site, as well as the total number
3842 of nucleotide substitutions. In this method, excess transitions,
3843 unequal nucleotide frequencies, and variation of substitution rate
3844 among different sites are all taken into account. Application of
3845 this method to human and chimpanzee data suggested that the transition/transversion
3846 ratio for the entire control region was approximately 15 and nearly
3847 the same for the two species. The 95% confidence interval of the
3848 age of the common ancestral mtDNA was estimated to be 80,000-480,000
3849 years in humans and 0.57-2.72 Myr in common chimpanzees.},
3850 eprint = {http://mbe.oxfordjournals.org/content/10/3/512.full.pdf+html},
3851 url = {http://mbe.oxfordjournals.org/content/10/3/512.abstract}
3854 @INPROCEEDINGS{Takana90,
3855 author = {K. Tanaka and Y. Nakamura and K. Matsui},
3856 title = {Embedding Secret Information into a Dithered Multi-level Image},
3857 booktitle = {IEEE Military Communications Conference},
3859 owner = {christophe},
3860 timestamp = {2010.08.05}
3863 @PHDTHESIS{ElTarazi81,
3864 author = {M. N. El Tarazi},
3865 title = {Contraction et ordre partiel pour l'étude d'algorithmes synchrones
3866 et asynchrones en analyse numérique},
3867 school = {Faculté des Sciences et Techniques de l'Université de Franche-Comté,
3870 owner = {christophe},
3871 timestamp = {2010.08.17}
3874 @INPROCEEDINGS{Unger93,
3875 author = {Unger, Ron and Moult, John},
3876 title = {Genetic Algorithm for 3D Protein Folding Simulations},
3877 booktitle = {Proceedings of the 5th International Conference on Genetic Algorithms},
3880 address = {San Francisco, CA, USA},
3881 publisher = {Morgan Kaufmann Publishers Inc.},
3883 isbn = {1-55860-299-2},
3887 @MISC{Van93electronicwater,
3888 author = {Tirkel Rankin Van},
3889 title = {Electronic Water Mark},
3893 @ARTICLE{Venkatesan2007397,
3894 author = {R.C. Venkatesan},
3895 title = {Encryption of covert information into multiple statistical distributions},
3896 journal = {Physics Letters A},
3899 pages = {397 - 404},
3901 doi = {DOI: 10.1016/j.physleta.2007.05.117},
3903 keywords = {Statistical encryption/decryption},
3905 timestamp = {2009.12.12},
3906 url = {http://www.sciencedirect.com/science/article/B6TVM-4P4FV2M-1/2/cd11a2ec144526e3c4552d2a7e7906cc}
3910 author = {G. Voyatzis and I. Pitas},
3911 title = {Chaotic watermarks for embedding in the spatial digital image domain},
3912 journal = {Proceedings of IEEE ICIP},
3916 owner = {christophe},
3917 timestamp = {2010.03.06}
3920 @INCOLLECTION{Wagner03,
3921 author = {Wagner, David},
3922 title = {Cryptanalysis of an Algebraic Privacy Homomorphism},
3923 booktitle = {Information Security},
3924 publisher = {Springer Berlin, Heidelberg},
3927 series = {Lecture Notes in Computer Science},
3929 abstract = {We use linear algebra to show that an algebraic privacy homomorphism
3930 proposed by Domingo-Ferrer is insecure for some parameter settings.},
3931 affiliation = {University of California, Berkeley USA}
3934 @INPROCEEDINGS{Wagner03cryptanalysisof,
3935 author = {David Wagner},
3936 title = {Cryptanalysis of an Algebraic Privacy Homomorphism},
3937 booktitle = {Proc. Sixth Information Security Conf. (ISC03},
3942 @ARTICLE{Wang_ellipticcurve,
3943 author = {Haodong Wang and Bo Sheng and Qun Li},
3944 title = {Elliptic curve cryptography-based access control in sensor networks},
3945 journal = {Int. J. Security and Networks}
3948 @INPROCEEDINGS{wbg10:ip,
3949 author = {Wang, Qianxue and Bahi, Jacques and Guyeux, Christophe and Fang,
3951 title = {Randomness quality of {CI} chaotic generators. Application to Internet
3953 booktitle = {INTERNET'2010. The 2nd Int. Conf. on Evolving Internet},
3956 address = {Valencia, Spain},
3958 publisher = {IEEE Computer Society Press},
3959 note = {Best Paper award},
3960 classement = {ACTI},
3961 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
3967 author = {X. M. Wang and J. S. Zhang and W. F. Zhang},
3968 title = {One-way hash function construction based on the extended chaotic
3970 journal = {Acta Phys. Sinici.},
3972 volume = {52, No. 11},
3973 pages = {2737--2742},
3975 timestamp = {2009.01.16}
3979 author = {Westhoff, Dirk and Girao, Joao and Acharya, Mithun},
3980 title = {Concealed Data Aggregation for Reverse Multicast Traffic in Sensor
3981 Networks: Encryption, Key Distribution, and Routing Adaptation},
3982 journal = {IEEE Transactions on Mobile Computing},
3985 pages = {1417--1431},
3987 address = {Piscataway, NJ, USA},
3988 doi = {http://dx.doi.org/10.1109/TMC.2006.144},
3990 publisher = {IEEE Educational Activities Department}
3994 author = {Wikipédia},
3995 title = {Exposant de Lyapunov -- Site web d'André Lévesque},
3997 note = {[En ligne; Page disponible le 9-septembre-2010]},
3998 url = {\url{http://math.cmaisonneuve.qc.ca/alevesque/chaos_fract/Lyapunov/Exposant.html}}
4002 author = {Wikipédia},
4003 title = {Espace complet --- Wikipédia{,} l'encyclopédie libre},
4005 note = {[En ligne; Page disponible le 9-août-2010]},
4006 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Espace_complet&oldid=52734266}}
4010 author = {Wikipédia},
4011 title = {Densité (mathématiques) --- Wikipédia{,} l'encyclopédie libre},
4013 note = {[En ligne; Page disponible le 8-août-2010]},
4014 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Densit%C3%A9_(math%C3%A9matiques)&oldid=53938121}}
4018 author = {Wikipédia},
4019 title = {Information de Fisher --- Wikipédia{,} l'encyclopédie libre},
4021 note = {[En ligne; Page disponible le 5-août-2010]},
4022 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Information_de_Fisher&oldid=52877871}}
4025 @MISC{wiki:Kerkhoffs,
4026 author = {Wikipédia},
4027 title = {Principe de Kerckhoffs --- Wikipédia{,} l'encyclopédie libre},
4029 note = {[En ligne; Page disponible le 20-août-2010]},
4030 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Principe_de_Kerckhoffs&oldid=52133114}}
4033 @MISC{wiki:sarkovskii,
4034 author = {Wikipédia},
4035 title = {Théor\`{e}me de Sarkovskii --- Wikipédia{,} l'encyclopédie libre},
4037 note = {[En ligne; Page disponible le 8-août-2010]},
4038 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Th%C3%A9or%C3%A8me_de_Sarkovskii&oldid=54196167}}
4041 @MISC{wiki:steganographie,
4042 author = {Wikipédia},
4043 title = {Stéganographie --- Wikipédia{,} l'encyclopédie libre},
4045 note = {[En ligne; Page disponible le 5-août-2010]},
4046 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=St%C3%A9ganographie&oldid=54724435}}
4049 @MISC{wiki:tatouage,
4050 author = {Wikipédia},
4051 title = {Tatouage numérique --- Wikipédia{,} l'encyclopédie libre},
4053 note = {[En ligne; Page disponible le 5-août-2010]},
4054 url = {https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Tatouage_num%C3%A9rique&oldid=55484940}
4057 @MISC{wiki:testsHypothese,
4058 author = {Wikipédia},
4059 title = {Test d'hypoth\`{e}se --- Wikipédia{,} l'encyclopédie libre},
4061 note = {[En ligne; Page disponible le 5-août-2010]},
4062 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Test_d%27hypoth%C3%A8se&oldid=55344108}}
4066 author = {Williams, Josh and Raymond, Scott},
4070 note = {\texttt{http://gowalla.com}}
4074 author = {Xianyong Wu and Zhi-Hong Guan},
4075 title = {A novel digital watermark algorithm based on chaotic maps},
4076 journal = {Physics Letters A},
4079 pages = {403 - 406},
4081 doi = {DOI: 10.1016/j.physleta.2007.01.034},
4083 keywords = {Watermarking},
4084 url = {http://www.sciencedirect.com/science/article/B6TVM-4MY0MF3-8/2/0b4d1298fa84337d2e59b3fefe26f583}
4087 @INPROCEEDINGS{Wu2007,
4088 author = {Wu, Xianyong and Guan, Zhi-Hong and Wu, Zhengping},
4089 title = {A Chaos Based Robust Spatial Domain Watermarking Algorithm},
4090 booktitle = {ISNN '07: Proceedings of the 4th international symposium on Neural
4094 address = {Berlin, Heidelberg},
4095 publisher = {Springer-Verlag},
4096 doi = {http://dx.doi.org/10.1007/978-3-540-72393-6_15},
4097 isbn = {978-3-540-72392-9},
4098 location = {Nanjing, China}
4101 @ARTICLE{Xiao20092288,
4102 author = {Di Xiao and Xiaofeng Liao and Yong Wang},
4103 title = {Parallel keyed hash function construction based on chaotic neural
4105 journal = {Neurocomputing},
4108 pages = {2288 - 2296},
4110 note = {Lattice Computing and Natural Computing (JCIS 2007) / Neural Networks
4111 in Intelligent Systems Designn (ISDA 2007)},
4112 abstract = {Recently, various hash functions based on chaos or neural networks
4113 were proposed. Nevertheless, none of them works efficiently in parallel
4114 computing environment. In this paper, an algorithm for parallel keyed
4115 hash function construction based on chaotic neural network is proposed.
4116 The mechanism of changeable-parameter and self-synchronization establishes
4117 a close relation between the hash value bit and message, and the
4118 algorithm structure ensures the uniform sensitivity of the hash value
4119 to the message blocks at different positions. The proposed algorithm
4120 can satisfy the performance requirements of hash function. These
4121 properties make it a promising choice for hashing on parallel computing
4124 keywords = {Chaotic neural network}
4127 @ARTICLE{Xiao20094346,
4128 author = {Di Xiao and Xiaofeng Liao and Yong Wang},
4129 title = {Improving the security of a parallel keyed hash function based on
4131 journal = {Physics Letters A},
4134 pages = {4346 - 4353},
4137 keywords = {Hash function},
4139 timestamp = {2009.12.12}
4142 @ARTICLE{Xiao20102254,
4143 author = {Di Xiao and Frank Y. Shih and Xiaofeng Liao},
4144 title = {A chaos-based hash function with both modification detection and
4145 localization capabilities},
4146 journal = {Communications in Nonlinear Science and Numerical Simulation},
4149 pages = {2254 - 2261},
4151 abstract = {Recently, a variety of chaos-based hash functions have been proposed.
4152 Nevertheless, none of them can realize modification localization.
4153 In this paper, a hash function with both modification detection and
4154 localization capabilities is proposed, which can also support the
4155 parallel processing mode. By using the mechanism of changeable-parameter
4156 and self-synchronization, the keystream can establish a close relation
4157 with the algorithm key, the content, and the order of each message
4158 unit. Theoretical analysis and computer simulation indicate that
4159 the proposed algorithm can satisfy the performance requirements of
4162 keywords = {Hash function}
4166 author = {Yang, Z.},
4167 title = {Estimating the pattern of nucleotide substitution},
4168 journal = {Journal of Molecular Evolution},
4172 added-at = {2009-01-22T02:55:58.000+0100},
4173 biburl = {http://www.bibsonomy.org/bibtex/27da68ebb5221b9e97c5f9567cbd72bb5/stephane.guindon},
4174 interhash = {951d2d6b98320cb775fd695a0c058092},
4175 intrahash = {7da68ebb5221b9e97c5f9567cbd72bb5},
4176 keywords = {imported},
4177 timestamp = {2009-01-22T02:55:58.000+0100}
4180 @INPROCEEDINGS{Yao82,
4181 author = {Yao, Andrew C.},
4182 title = {Theory and application of trapdoor functions},
4183 booktitle = {Proceedings of the 23rd Annual Symposium on Foundations of Computer
4186 series = {SFCS '82},
4188 address = {Washington, DC, USA},
4189 publisher = {IEEE Computer Society},
4191 doi = {http://dx.doi.org/10.1109/SFCS.1982.95},
4193 url = {http://dx.doi.org/10.1109/SFCS.1982.95}
4196 @INPROCEEDINGS{Yu06,
4197 author = {Yu, Yu and Leiwo, Jussipekka and Premkumar, Benjamin},
4198 title = {A Study on the Security of Privacy Homomorphism},
4199 booktitle = {ITNG '06: Proceedings of the Third International Conference on Information
4200 Technology: New Generations},
4203 address = {Washington, DC, USA},
4204 publisher = {IEEE Computer Society},
4205 doi = {http://dx.doi.org/10.1109/ITNG.2006.19},
4206 isbn = {0-7695-2497-4}
4209 @ARTICLE{Zhang2008658,
4210 author = {Wei Zhang and Yonghe Liu and Sajal K. Das and Pradip De},
4211 title = {Secure data aggregation in wireless sensor networks: A watermark
4212 based authentication supportive approach},
4213 journal = {Pervasive and Mobile Computing},
4216 pages = {658 - 680},
4218 doi = {DOI: 10.1016/j.pmcj.2008.05.005},
4220 keywords = {Wireless sensor networks},
4221 url = {http://www.sciencedirect.com/science/article/B7MF1-4SKB3MD-1/2/b73948dcaa3eb63a2c21d09041882625}
4225 author = {Zhang, Yang and Arakaki, Adrian K. and Skolnick, Jeffrey},
4226 title = {TASSER: An automated method for the prediction of protein tertiary
4227 structures in CASP6},
4228 journal = {Proteins},
4234 keywords = {comparative modeling, threading, ab initio prediction, TASSER, PROSPECTOR_3},
4235 owner = {christophe},
4236 publisher = {Wiley Subscription Services, Inc., A Wiley Company},
4237 timestamp = {2011.01.22},
4238 url = {http://dx.doi.org/10.1002/prot.20724}
4241 @ARTICLE{Zhou1997429,
4242 author = {Chang-song Zhou and Tian-lun Chen},
4243 title = {Extracting information masked by chaos and contaminated with noise:
4244 Some considerations on the security of communication approaches using
4246 journal = {Physics Letters A},
4249 pages = {429 - 435},
4252 keywords = {Communication},
4254 timestamp = {2009.12.12}
4258 author = {Zhou, Huai-bei and Wang, Lu},
4259 title = {Chaos in Biomolecular Dynamics},
4260 journal = {The Journal of Physical Chemistry},
4263 pages = {8101-8105},
4265 doi = {10.1021/jp953409x}
4268 @PROCEEDINGS{DBLP:conf/iwdw/2005,
4269 title = {IWDW'05: 4th International Workshop on Digital Watermarking},
4271 editor = {Mauro Barni and Ingemar J. Cox and Ton Kalker and Hyoung Joong Kim},
4273 series = {Lecture Notes in Computer Science},
4274 address = {Siena, Italy},
4275 publisher = {Springer},
4276 month = {September 15-17},
4277 bibsource = {DBLP, http://dblp.uni-trier.de},
4279 isbn = {3-540-28768-X},
4281 timestamp = {2009.06.29}
4284 @PROCEEDINGS{DBLP:conf/ih/2006,
4285 title = {IH 2006: Information Hiding, 8th International Workshop},
4287 editor = {Jan Camenisch and Christian S. Collberg and Neil F. Johnson and Phil
4290 series = {Lecture Notes in Computer Science},
4291 address = {Alexandria, VA, USA},
4292 publisher = {Springer},
4294 bibsource = {DBLP, http://dblp.uni-trier.de},
4295 booktitle = {Information Hiding},
4296 isbn = {978-3-540-74123-7},
4298 timestamp = {2009.06.29}
4301 @PROCEEDINGS{DBLP:conf/ih/2007,
4302 title = {Information Hiding, 9th International Workshop, IH 2007, Saint Malo,
4303 France, June 11-13, 2007, Revised Selected Papers},
4305 editor = {Teddy Furon and Fran\c{c}ois Cayre and Gwena{\"e}l J. Do{\"e}rr and
4308 series = {Lecture Notes in Computer Science},
4309 publisher = {Springer},
4310 bibsource = {DBLP, http://dblp.uni-trier.de},
4311 booktitle = {Information Hiding},
4312 isbn = {978-3-540-77369-6},
4314 timestamp = {2009.06.29}
4317 @PROCEEDINGS{DBLP:conf/iccsa/2006-1,
4318 title = {Computational Science and Its Applications - ICCSA 2006, International
4319 Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part I},
4321 editor = {Marina L. Gavrilova and Osvaldo Gervasi and Vipin Kumar and Chih
4322 Jeng Kenneth Tan and David Taniar and Antonio Lagan{\`a} and Youngsong
4323 Mun and Hyunseung Choo},
4325 series = {Lecture Notes in Computer Science},
4326 publisher = {Springer},
4327 bibsource = {DBLP, http://dblp.uni-trier.de},
4328 booktitle = {ICCSA (1)},
4329 isbn = {3-540-34070-X}
4332 @PROCEEDINGS{DBLP:conf/secrypt/2010,
4333 title = {SECRYPT 2010 - Proceedings of the International Conference on Security
4334 and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part
4335 of ICETE - The International Joint Conference on e-Business and Telecommunications},
4337 editor = {Sokratis K. Katsikas and Pierangela Samarati},
4338 publisher = {SciTePress},
4339 bibsource = {DBLP, http://dblp.uni-trier.de},
4340 booktitle = {SECRYPT},
4341 isbn = {978-989-8425-18-8}
4344 @BOOK{Katzenbeisser00,
4345 title = {Information Hiding Techniques for Steganography and Digital Watermarking},
4346 publisher = {Artech House, Inc.},
4348 editor = {Katzenbeisser, Stefan and Petitcolas, Fabien A.},
4349 address = {Norwood, MA, USA},
4353 @PROCEEDINGS{DBLP:conf/ih/1999,
4354 title = {IH'99: 3rd International Workshop on Information Hiding},
4356 editor = {Andreas Pfitzmann},
4358 series = {Lecture Notes in Computer Science},
4359 address = {Dresden, Germany},
4360 publisher = {Springer},
4361 month = {September 29 - October 1.},
4362 bibsource = {DBLP, http://dblp.uni-trier.de},
4363 booktitle = {Information Hiding},
4364 isbn = {3-540-67182-X},
4366 timestamp = {2009.06.29}
4369 @PROCEEDINGS{DBLP:conf/indocrypt/2000,
4370 title = {Progress in Cryptology - INDOCRYPT 2000, First International Conference
4371 in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings},
4373 editor = {Bimal K. Roy and Eiji Okamoto},
4375 series = {Lecture Notes in Computer Science},
4376 publisher = {Springer},
4377 bibsource = {DBLP, http://dblp.uni-trier.de},
4378 booktitle = {INDOCRYPT},
4379 isbn = {3-540-41452-5}
4382 @BOOK{DBLP:reference/icsec/2010,
4383 title = {Handbook of Information and Communication Security},
4384 publisher = {Springer},
4386 editor = {Peter P. Stavroulakis and Mark Stamp},
4387 bibsource = {DBLP, http://dblp.uni-trier.de},
4388 booktitle = {Handbook of Information and Communication Security},
4389 ee = {http://dx.doi.org/10.1007/978-3-642-04117-4},
4390 isbn = {978-3-642-04116-7}
4393 @PROCEEDINGS{DBLP:conf/isnn/2004-2,
4394 title = {Advances in Neural Networks - ISNN 2004, International Symposium
4395 on Neural Networks, Dalian, China, August 19-21, 2004, Proceedings,
4398 editor = {Fuliang Yin and Jun Wang and Chengan Guo},
4400 series = {Lecture Notes in Computer Science},
4401 publisher = {Springer},
4402 bibsource = {DBLP, http://dblp.uni-trier.de},
4403 booktitle = {ISNN (2)},
4404 isbn = {3-540-22843-8}
4407 @PROCEEDINGS{DBLP:conf/adhocnets/2010,
4408 title = {Ad Hoc Networks - Second International Conference, ADHOCNETS 2010,
4409 Victoria, BC, Canada, August 18-20, 2010, Revised Selected Papers},
4411 editor = {Jun Zheng and David Simplot-Ryl and Victor C. M. Leung},
4413 series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
4414 and Telecommunications Engineering},
4415 publisher = {Springer},
4416 bibsource = {DBLP, http://dblp.uni-trier.de},
4417 booktitle = {ADHOCNETS},
4418 ee = {http://dx.doi.org/10.1007/978-3-642-17994-5},
4419 isbn = {978-3-642-17993-8}
4423 title = {Delicious social bookmarking, http://delicious.com/},
4424 comment = {http://delicious.com/},
4426 url = {http://delicious.com/}
4430 title = {The Frick Collection, http://www.frick.org/},
4431 comment = {http://www.frick.org/},
4433 url = {http://www.frick.org/}
4437 title = {Proceedings of the IEEE Congress on Evolutionary Computation, CEC
4438 2010, Barcelona, Spain, 18-23 July 2010},
4441 bibsource = {DBLP, http://dblp.uni-trier.de},
4442 booktitle = {IEEE Congress on Evolutionary Computation}
4445 @PROCEEDINGS{DBLP:conf/cec/2010,
4446 title = {Proceedings of the IEEE Congress on Evolutionary Computation, CEC
4447 2010, Barcelona, Spain, 18-23 July 2010},
4450 bibsource = {DBLP, http://dblp.uni-trier.de},
4451 booktitle = {IEEE Congress on Evolutionary Computation}
4454 @PROCEEDINGS{DBLP:conf/date/2010,
4455 title = {Design, Automation and Test in Europe, DATE 2010, Dresden, Germany,
4459 bibsource = {DBLP, http://dblp.uni-trier.de},
4463 @PROCEEDINGS{DBLP:conf/cse/2009,
4464 title = {Proceedings IEEE CSE'09, 12th IEEE International Conference on Computational
4465 Science and Engineering, August 29-31, 2009, Vancouver, BC, Canada},
4467 publisher = {IEEE Computer Society},
4468 bibsource = {DBLP, http://dblp.uni-trier.de},
4472 @PROCEEDINGS{DBLP:conf/icumt/2009,
4473 title = {Proceedings of the International Conference on Ultra Modern Telecommunications,
4474 ICUMT 2009, 12-14 October 2009, St. Petersburg, Russia},
4477 bibsource = {DBLP, http://dblp.uni-trier.de},
4481 @PROCEEDINGS{DBLP:conf/focs/2008,
4482 title = {49th Annual IEEE Symposium on Foundations of Computer Science, FOCS
4483 2008, October 25-28, 2008, Philadelphia, PA, USA},
4485 publisher = {IEEE Computer Society},
4486 bibsource = {DBLP, http://dblp.uni-trier.de},
4490 @comment{jabref-meta: selector_publisher:}
4492 @comment{jabref-meta: selector_author:}
4494 @comment{jabref-meta: selector_journal:}
4496 @comment{jabref-meta: selector_keywords:Chaos;Entropie Topologique;Tip