<?xml version="1.0" encoding="utf-8"?><!DOCTYPE article  PUBLIC '-//OASIS//DTD DocBook XML V4.4//EN'  'http://www.docbook.org/xml/4.4/docbookx.dtd'><article><articleinfo><title>Doc</title><revhistory><revision><revnumber>12</revnumber><date>2010-03-07 08:44:02</date><authorinitials>bny92-5-82-232-56-37.fbx.proxad.net</authorinitials></revision><revision><revnumber>11</revnumber><date>2010-03-07 07:36:48</date><authorinitials>bny92-5-82-232-56-37.fbx.proxad.net</authorinitials></revision><revision><revnumber>10</revnumber><date>2010-03-07 07:35:59</date><authorinitials>bny92-5-82-232-56-37.fbx.proxad.net</authorinitials></revision><revision><revnumber>9</revnumber><date>2010-03-07 07:35:47</date><authorinitials>bny92-5-82-232-56-37.fbx.proxad.net</authorinitials></revision><revision><revnumber>8</revnumber><date>2009-05-06 19:24:03</date><authorinitials>cha92-10-82-240-229-233.fbx.proxad.net</authorinitials></revision><revision><revnumber>7</revnumber><date>2009-05-06 19:23:39</date><authorinitials>cha92-10-82-240-229-233.fbx.proxad.net</authorinitials></revision><revision><revnumber>6</revnumber><date>2009-05-06 19:20:55</date><authorinitials>cha92-10-82-240-229-233.fbx.proxad.net</authorinitials></revision><revision><revnumber>5</revnumber><date>2009-05-06 14:45:44</date><authorinitials>cha92-10-82-240-229-233.fbx.proxad.net</authorinitials></revision><revision><revnumber>4</revnumber><date>2009-05-06 14:18:56</date><authorinitials>elfe.enst.fr</authorinitials></revision><revision><revnumber>3</revnumber><date>2009-03-31 09:49:22</date><authorinitials>elfe.enst.fr</authorinitials></revision><revision><revnumber>2</revnumber><date>2009-03-31 09:48:49</date><authorinitials>elfe.enst.fr</authorinitials></revision><revision><revnumber>1</revnumber><date>2009-03-31 09:10:23</date><authorinitials>elfe.enst.fr</authorinitials></revision></revhistory></articleinfo><section><title>DOCUMENTATION</title><para><ulink url="https://secalgo.telecom-paristech.fr/Doc/Biblio%20-%20Mod%C3%A9lisation%20de%20la%20fuite%20physique#">Modélisation de la fuite physique</ulink> </para><para><ulink url="https://secalgo.telecom-paristech.fr/Doc/Biblio%20-%20Analyses%20th%C3%A9oriques#">Analyses théoriques</ulink> </para><para><ulink url="https://secalgo.telecom-paristech.fr/Doc/Biblio%20-%20Masquages%20sp%C3%A9cifique%20%C3%A0%20l%27AES#">Masquages spécifique à l'AES</ulink> </para></section></article>