Chi-Tung Chen

Learn More
Sensor nodes are resource-constrained, such as low battery life, computation, bandwidth and memory, so traditional public key schemes are impractical in wireless sensor networks. In the previous schemes, symmetric cryptography is the most common method used in sensor nodes. How to distribute keys into every sensor node is an important issue in many(More)
  • Hsing-Chung Chen, Chi-Tung Chen, Sheg-Hao Fang, Jai-Zong Sun, Kanoksak Wattanachote
  • 2011
In recent years, on the researches in various routing protocols, applications to digital home wireless heterogeneous networks become more and more important. In this paper, we propose a routing protocol based on event-oriented applied for digital home wireless heterogeneous networks, and a knowledge discovery agent will dynamically maintain an n-bits map(More)
This study used the US Patent Application Database to identify who files provisional applications in the United States. Preference ratios, use ratios, and provisional application to nonprovisional application ratios were used to evaluate the filing behavior of applicants in filing provisional applications with respect to nonprovisional applications. Factors(More)
A number of user authentication schemes have been proposed to provide roaming services in the global mobility network (GLOMONET). However, most of these schemes are based on an asymmetric cryptosystem, which has a higher computational cost. To achieve computational efficiency, Chang et al. proposed an authentication scheme using simple hash functions for(More)