{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T09:49:08Z","timestamp":1768297748999,"version":"3.49.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/eucnc.2014.6882689","type":"proceedings-article","created":{"date-parts":[[2014,9,2]],"date-time":"2014-09-02T17:32:47Z","timestamp":1409679167000},"page":"1-5","source":"Crossref","is-referenced-by-count":7,"title":["The entropy of wireless statistics"],"prefix":"10.1109","author":[{"given":"Christine","family":"Hennebert","sequence":"first","affiliation":[]},{"given":"Hicham","family":"Hossayni","sequence":"additional","affiliation":[]},{"given":"Cedric","family":"Lauradoux","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2007.358712"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998433"},{"key":"10","first-page":"203","article-title":"A model and architecture for pseudo random generation with applications to\/dev\/random","author":"barak","year":"2005","journal-title":"ACM Conference on Computer and Communications Security-CCS 2005"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.5"},{"key":"7","author":"barker","year":"2012","journal-title":"Recommendation for Random Bit Generator (RBG) Constructions"},{"key":"6","year":"2009","journal-title":"CC2500 low-cost low-power 2 4 GHz RF transceiver"},{"key":"5","doi-asserted-by":"crossref","first-page":"732","DOI":"10.1007\/978-3-642-02617-1_74","article-title":"Hardware-based random number generation in Wireless Sensor Networks (WSNs)","author":"latif","year":"2009","journal-title":"Advances in Information Security and Assurance"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1109\/WIOPT.2007.4480051","article-title":"TinyRNG, A cryptographic random number generator for wireless sensor network nodes","author":"francillon","year":"2007","journal-title":"Symposium on Modeling and Optimization in Mobile Ad Hoc and Wireless Networks IEEE WiOpt 2007"},{"key":"9","author":"barker","year":"2012","journal-title":"Recommendation for the Entropy Sources Used for Random Bit Generation"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-90a","author":"barker","year":"2012","journal-title":"Recommendation for random number generation using deterministic random bit generators"},{"key":"11","first-page":"168","article-title":"Cryptanalytic attacks on pseudorandom number generators","volume":"1372","author":"kelsey","year":"1998","journal-title":"Fast Software Encryption-FSE'98 Ser Lecture Notes in Computer Science"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2012.19"}],"event":{"name":"2014 European Conference on Networks and Communications (EuCNC)","location":"Bologna, Italy","start":{"date-parts":[[2014,6,23]]},"end":{"date-parts":[[2014,6,26]]}},"container-title":["2014 European Conference on Networks and Communications (EuCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6878978\/6882614\/06882689.pdf?arnumber=6882689","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T15:46:18Z","timestamp":1498146378000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6882689\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/eucnc.2014.6882689","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}