{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T01:34:19Z","timestamp":1725845659004},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319276588"},{"type":"electronic","value":"9783319276595"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27659-5_27","type":"book-chapter","created":{"date-parts":[[2015,12,29]],"date-time":"2015-12-29T07:33:52Z","timestamp":1451374432000},"page":"378-390","source":"Crossref","is-referenced-by-count":4,"title":["Human Assisted Randomness Generation Using Video Games"],"prefix":"10.1007","author":[{"given":"Mohsen","family":"Alimomeni","sequence":"first","affiliation":[]},{"given":"Reihaneh","family":"Safavi-Naini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,30]]},"reference":[{"key":"27_CR1","unstructured":"Alimomeni, M.: Archery game 2013. \n                      http:\/\/pages.cpsc.ucalgary.ca\/~malimome\/game\/"},{"key":"27_CR2","unstructured":"Alimomeni, M., Safavi-Naini, R.: Human assisted randomness generation using video games. Cryptology ePrint Archive, Report 2014\/045 (2014). \n                      http:\/\/eprint.iacr.org\/"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Alimomeni, M., Safavi-Naini, R., Sharifian, S.: A true random generator using human gameplay. In: GameSec, pp. 10\u201328 (2014)","DOI":"10.1007\/978-3-319-02786-9_2"},{"key":"27_CR4","unstructured":"Barker, E., Kelsey, J.: Recommendation for the entropy sources used for random bit generation, August 2012. \n                      http:\/\/csrc.nist.gov\/publications\/drafts\/800-90\/draft-sp800-90b.pdf"},{"key":"27_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/978-3-540-45238-6_14","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"B Barak","year":"2003","unstructured":"Barak, B., Shaltiel, R., Tromer, E.: True random number generators secure in a changing environment. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 166\u2013180. Springer, Heidelberg (2003)"},{"key":"27_CR6","unstructured":"Walker, E.C.: DISPLAY DEVICE. Woodspeen, Forest Corner, Ringwood, Hampshire, England Filed Nov. 13, 1968, Ser. No. 775, 401 Claims priority, application Gr\/e6a7t Britain, Nov. 14, 1967, 1 Int. Cl. G09f 13\/24"},{"key":"27_CR7","unstructured":"Rukhin, A., et al.: A statistical test suite for the validation of random number generators and pseudo random number generators for cryptographic applications (2010). \n                      http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/rng\/documents\/SP800-22rev1a.pdf"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Gutterman, Z., Pinkas, B., Reinman, T.: Analysis of the linux random number generator. In: 2006 IEEE Symposium on Security and Privacy, p. 15. IEEE (2006)","DOI":"10.1109\/SP.2006.5"},{"issue":"1","key":"27_CR9","first-page":"66","volume":"21","author":"I Goldberg","year":"1996","unstructured":"Goldberg, I., Wagner, D.: Randomness and the netscape browser. Dr Dobb\u2019s J.-Softw. Tools Prof. Program. 21(1), 66\u201371 (1996)","journal-title":"Dr Dobb\u2019s J.-Softw. Tools Prof. Program."},{"key":"27_CR10","unstructured":"Heninger, N., Durumeric, Z., Wustrow, E., Halderman, J.A.: Mining your PS and QS: detection of widespread weak keys in network devices. In: Proceedings of the 21st USENIX Conference on Security Symposium, Security 2012, Berkeley, CA, USA, pp. 35\u201335. USENIX Association (2012)"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Halprin, R., Naor, M. Games for extracting randomness. In: Proceedings of the 5th Symposium on Usable Privacy and Security, p. 12. ACM (2009)","DOI":"10.1145\/1572532.1572548"},{"key":"27_CR12","unstructured":"Hotz Console hacking 2010-ps3 epic fail. In: 27th Chaos Communications Congress (2010)"},{"key":"27_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1007\/978-3-642-32009-5_37","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"AK Lenstra","year":"2012","unstructured":"Lenstra, A.K., Hughes, J.P., Augier, M., Bos, J.W., Kleinjung, T., Wachter, C.: Public keys. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 626\u2013642. Springer, Heidelberg (2012)"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"L\u2019Ecuyer, P., Simard, R.: Testu01, August 2007. \n                      http:\/\/www.iro.umontreal.ca\/~simardr\/testu01\/tu01.html","DOI":"10.1145\/1268776.1268777"},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"L\u2019Ecuyer, P., Simard, R.: Testu01: a C library for empirical testing of random number generators. ACM Trans. Math. Softw. 33(4) (2007)","DOI":"10.1145\/1268776.1268777"},{"key":"27_CR16","unstructured":"Marsaglia, G.: Diehard (1998). \n                      http:\/\/www.stat.fsu.edu\/pub\/diehard\/"},{"issue":"1","key":"27_CR17","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1006\/jcss.1996.0004","volume":"52","author":"N Nisan","year":"1996","unstructured":"Nisan, N., Zuckerman, D.: Randomness is linear in space. J. Comput. Syst. Sci. 52(1), 43\u201352 (1996)","journal-title":"J. Comput. Syst. Sci."},{"issue":"3","key":"27_CR18","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1037\/0096-3445.121.3.352","volume":"121","author":"A Rapoport","year":"1992","unstructured":"Rapoport, A., Budescu, D.V.: Generation of random series in two-person strictly competitive games. J. Exp. Psychol. Gen. 121(3), 352 (1992)","journal-title":"J. Exp. Psychol. Gen."},{"issue":"1","key":"27_CR19","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1037\/h0032060","volume":"77","author":"WA Wagenaar","year":"1972","unstructured":"Wagenaar, W.A.: Generation of random sequences by human subjects: a critical survey of literature. Psychol. Bull. 77(1), 65 (1972)","journal-title":"Psychol. Bull."},{"issue":"19","key":"27_CR20","doi-asserted-by":"publisher","first-page":"3442","DOI":"10.1016\/j.ins.2009.06.005","volume":"179","author":"Q Zhou","year":"2009","unstructured":"Zhou, Q., Liao, X., Wong, K.W., Hu, Y., Xiao, D.: True random number generator based on mouse movement and chaotic hash function. Inf. Sci. 179(19), 3442\u20133450 (2009)","journal-title":"Inf. Sci."}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27659-5_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T02:54:19Z","timestamp":1559357659000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27659-5_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319276588","9783319276595"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27659-5_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}