{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T09:59:24Z","timestamp":1725789564157},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/aiccsa.2014.7073279","type":"proceedings-article","created":{"date-parts":[[2015,4,3]],"date-time":"2015-04-03T11:21:03Z","timestamp":1428060063000},"page":"773-780","source":"Crossref","is-referenced-by-count":4,"title":["Smartphone sensors as random bit generators"],"prefix":"10.1109","author":[{"given":"Joseph","family":"Loutfi","sequence":"first","affiliation":[]},{"given":"Ali","family":"Chehab","sequence":"additional","affiliation":[]},{"given":"Imad H.","family":"Elhajj","sequence":"additional","affiliation":[]},{"given":"Ayman","family":"Kayssi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998433"},{"key":"ref3","first-page":"800","article-title":"A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications","author":"bassham","year":"2010","journal-title":"NIST Special Publication"},{"journal-title":"Android Developers","year":"0","key":"ref10"},{"key":"ref6","first-page":"800","article-title":"Recommendation for Random Number Generation Using Deterministic Random Bit Generators","author":"barker","year":"2012","journal-title":"NIST DRAFT Special Publication"},{"journal-title":"Apple's iPhone Password Security Broken In 24 Seconds (Forbes)","year":"2013","author":"worstall","key":"ref11"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WIOPT.2007.4480051"},{"key":"ref8","article-title":"Online Entropy Estimation for Non-Binary Sources and Applications on iPhone","author":"lauradoux","year":"2011","journal-title":"Rapport de recherch&#x00E9; RR-7663 INRIA"},{"journal-title":"Secure Hash Standard (SHS) FIPS PUB","first-page":"180","year":"2012","key":"ref7"},{"key":"ref2","first-page":"800","article-title":"Recommendation for the Entropy Sources Used for Random Bit Generation","author":"barker","year":"2012","journal-title":"NIST DRAFT Special Publication"},{"journal-title":"Samsung [online]","year":"0","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462122"}],"event":{"name":"2014 IEEE\/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","start":{"date-parts":[[2014,11,10]]},"location":"Doha, Qatar","end":{"date-parts":[[2014,11,13]]}},"container-title":["2014 IEEE\/ACS 11th International Conference on Computer Systems and Applications (AICCSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7066213\/7073167\/07073279.pdf?arnumber=7073279","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T23:43:38Z","timestamp":1490312618000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7073279\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/aiccsa.2014.7073279","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}