{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T14:56:50Z","timestamp":1768316210059,"version":"3.49.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/ssic.2018.8556816","type":"proceedings-article","created":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T20:08:55Z","timestamp":1544126935000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["Energy-Aware Distribution of Data Fragments in Unattended Wireless Sensor Networks"],"prefix":"10.1109","author":[{"given":"Hong-Beom","family":"Choi","sequence":"first","affiliation":[]},{"given":"Young-Bae","family":"Ko","sequence":"additional","affiliation":[]},{"given":"Keun-Woo","family":"Lim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.MOBIQUITOUS2009.6824"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.09.008"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.09.011"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEA.2014.6931528"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5683089"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.4304\/jcm.4.11.894-901"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-8890-2_22"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2017.2770119"},{"key":"ref18","article-title":"Crosslevel sensor network simulation with cooja","author":"osterlind","year":"2006","journal-title":"In Proceedings of the 7th IEEE International Workshop on Practical Issues in Building Sensor Network Applications (SenseApp 2006)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.38"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2009.4804335"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2008.31"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/62044.62050"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CSNET.2017.8241998"},{"key":"ref8","first-page":"710","article-title":"Avoiding energy holes in wireless sensor networks with nonuniform node distribution","volume":"19","author":"wu","year":"2007","journal-title":"IEEE Transactions on Parallel & Distributed Systems"},{"key":"ref7","first-page":"136","article-title":"Secret sharing made short","author":"krawczyk","year":"1993","journal-title":"Proc Annu Int Cryptology Conf Advances in Cryptology"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.100113.00293"},{"key":"ref1","year":"0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.18"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IWSSIP.2008.4604427"},{"key":"ref21","year":"0"}],"event":{"name":"2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)","location":"Shanghai, China","start":{"date-parts":[[2018,10,18]]},"end":{"date-parts":[[2018,10,19]]}},"container-title":["2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8537784\/8556633\/08556816.pdf?arnumber=8556816","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T22:31:19Z","timestamp":1643236279000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8556816\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/ssic.2018.8556816","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}