{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:25Z","timestamp":1750306105918,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,19]],"date-time":"2017-05-19T00:00:00Z","timestamp":1495152000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,19]]},"DOI":"10.1145\/3093241.3093285","type":"proceedings-article","created":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T18:49:04Z","timestamp":1504291744000},"page":"289-292","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Designing a Random Number Generator for Secure Communication with WISP"],"prefix":"10.1145","author":[{"given":"Cem","family":"K\u00f6semen","sequence":"first","affiliation":[{"name":"Dokuz Eylul University, Computer Engineering Department, \u0130zmir, Turkey"}]},{"given":"G\u00f6khan","family":"Dalkili\u00e7","sequence":"additional","affiliation":[{"name":"Dokuz Eylul University, Computer Engineering Department, \u0130zmir, Turkey"}]}],"member":"320","published-online":{"date-parts":[[2017,5,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11853565_29"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-0105-3.ch001"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2013.06.017"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71817-0_4"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10683-0_12"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Rukhin A. Soto J. Nechvatal J. Smid M. and Barker E. 2001. A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST Special Publication 800--22.  Rukhin A. Soto J. Nechvatal J. Smid M. and Barker E. 2001. A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST Special Publication 800--22.","DOI":"10.6028\/NIST.SP.800-22"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998433"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2432140"},{"key":"e_1_3_2_1_9_1","unstructured":"Yildirim K. S. Aantjes H. Majid A. Y. Pawe\u0142czak P. 2016. On the synchronization of intermittently powered wireless embedded systems. arXiv preprint (June 2016). arXiv:1606.01719.  Yildirim K. S. Aantjes H. Majid A. Y. Pawe\u0142czak P. 2016. On the synchronization of intermittently powered wireless embedded systems. arXiv preprint (June 2016). arXiv:1606.01719."},{"key":"e_1_3_2_1_10_1","first-page":"36","article-title":"Various techniques used in connection with random digits","volume":"12","author":"Von Neumann J.","year":"1961","journal-title":"Applied Math Series"},{"volume-title":"Ko\u00e7 and C. Paar Eds. Cryptographic Hardware and Embedded Systems - CHES '02","year":"2002","author":"Tkacik T. E.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74619-5_9"},{"key":"e_1_3_2_1_13_1","unstructured":"Barker E. and Kelsey J. 2016. Recommendation for the entropy sources used for random bit generation. Draft NIST Special Publication.  Barker E. and Kelsey J. 2016. Recommendation for the entropy sources used for random bit generation. Draft NIST Special Publication."}],"event":{"name":"ICCDA '17: 2017 International Conference on Compute and Data Analysis","sponsor":["University of Florida University of Florida"],"location":"Lakeland FL USA","acronym":"ICCDA '17"},"container-title":["Proceedings of the International Conference on Compute and Data Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3093241.3093285","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3093241.3093285","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:39Z","timestamp":1750217439000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3093241.3093285"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,19]]},"references-count":13,"alternative-id":["10.1145\/3093241.3093285","10.1145\/3093241"],"URL":"https:\/\/doi.org\/10.1145\/3093241.3093285","relation":{},"subject":[],"published":{"date-parts":[[2017,5,19]]},"assertion":[{"value":"2017-05-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}