Learn More
Sensor nodes are resource-constrained, such as low battery life, computation, bandwidth and memory, so traditional public key schemes are impractical in wireless sensor networks. In the previous schemes, symmetric cryptography is the most common method used in sensor nodes. How to distribute keys into every sensor node is an important issue in many(More)
This study used the US Patent Application Database to identify who files provisional applications in the United States. Preference ratios, use ratios, and provisional application to nonprovisional application ratios were used to evaluate the filing behavior of applicants in filing provisional applications with respect to nonprovisional applications. Factors(More)
  • 1