{"id":8223,"date":"2004-02-08T09:58:00","date_gmt":"2004-02-08T09:58:00","guid":{"rendered":"http:\/\/cio.edu.umh.es\/?p=8223"},"modified":"2004-02-08T09:58:00","modified_gmt":"2004-02-08T09:58:00","slug":"szczepanski-j-wajnryb-e-amigo-j-m-sanchez-vives-m-v-slater-m-2004-biometric-random-number-generators-computers-security-vol-23-pp-77-84","status":"publish","type":"post","link":"https:\/\/cio.umh.es\/en\/2004\/02\/08\/szczepanski-j-wajnryb-e-amigo-j-m-sanchez-vives-m-v-slater-m-2004-biometric-random-number-generators-computers-security-vol-23-pp-77-84\/","title":{"rendered":"Szczepanski, J., Wajnryb, E., Amig\u00f3, J.M., Sanchez-Vives, M.V., Slater, M., (2004) \u201cBiometric Random Number Generators\u201d, Computers and Security,  23 (1) : 77-84"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":5675,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_links_to":"","_links_to_target":""},"categories":[75,7834],"tags":[372931],"_links":{"self":[{"href":"https:\/\/cio.umh.es\/en\/wp-json\/wp\/v2\/posts\/8223"}],"collection":[{"href":"https:\/\/cio.umh.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cio.umh.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cio.umh.es\/en\/wp-json\/wp\/v2\/users\/5675"}],"replies":[{"embeddable":true,"href":"https:\/\/cio.umh.es\/en\/wp-json\/wp\/v2\/comments?post=8223"}],"version-history":[{"count":0,"href":"https:\/\/cio.umh.es\/en\/wp-json\/wp\/v2\/posts\/8223\/revisions"}],"wp:attachment":[{"href":"https:\/\/cio.umh.es\/en\/wp-json\/wp\/v2\/media?parent=8223"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cio.umh.es\/en\/wp-json\/wp\/v2\/categories?post=8223"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cio.umh.es\/en\/wp-json\/wp\/v2\/tags?post=8223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}