Computer Science ›› 2018, Vol. 45 ›› Issue (7): 158-161.doi: 10.11896/j.issn.1002-137X.2018.07.027
• Information Security • Previous Articles Next Articles
XU Yang ,YUAN Jin-sha, GAO Hui-sheng ,ZHAO Zhen-bing
CLC Number:
[1]YU Y X,LUAN W P.Smart Grid.Power System & Clean Energy,2009,127(9):251-253. [2]KHURANA H,HADLEY M,LU N,et al.Smart-Grid Security Issues.IEEE Security & Privacy,2010,8(1):81-85. [3]SHARMA K,SAINI L M.Performance analysis of smart metering for smart grid:An overview.Renewable & Sustainable Energy Reviews,2015,49:720-735. [4]ZHAO B,ZHAI F,LI T Y,et al.Secure Communication Protocol for Smart Meter Bidirectional Interaction System.Automation of Electric Power System,2016,47(17):93-98.(in Chinese) 赵兵,翟峰,李涛永,等.适用于智能电表双向互动系统的安全通信协议.电力系统自动化,2016,47(17):93-98. [5]DUAN J H,CUI A J,ZHANG X,et al,The Network Information Security of Smart Grid Architecture.Information Security and Technology,2015(11):52-54.(in Chinese) 段军红,崔阿军,张驯,等.面向智能电网的网络信息安全架构.信息安全与技术,2015(11):52-54. [6]LIU X Y,ZHANG Q,LI Z M.A Survey on Information Security for Smart Grid.Electric Power ICT,2014,12(4):56-60.(in Chinese) 刘雪艳,张强,李战明.智能电网信息安全研究综述.电力信息与通信技术,2014,12(4):56-60. [7]HAN Y N,LI F G.Research on combined public key cryptographic scheme for smart grid.Journal of Cryptologic Research,2016,3(4):340-351.(in Chinese) 韩亚楠,李发根.适用于智能电网的组合公钥密码体制研究.密码学报,2016,3(4):340-351. [8]HU Y,DONG M C.Strengthening the security of network applications with SSL protocol.Automation of Electiric Power Systems,2002,26(15):70-77.(in Chinese) 胡炎,董名垂.用SSL协议加强电力系统网络应用的安全性.电力系统自动化,2002,26(15):70-77. [9]GARCIA F D,JACOBS B.Privacy-friendly energy-metering via homomorphic encryption∥Security and Trust Management.Springer Berlin Heidelberg,2010:226-238. [10]XUE R.IK-CPA security implies IE-CCA security in the random oracle model.Science China(Information Sciences),2013,56(3):179-189. [11]HSIANG H C,KUO H C,SHIH W K.Security Enhancement for a Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems[C]∥Second International Confe-rence on Future Generation Communication and Networking,2008(FGCN’08).IEEE,2008:197-200. [12]XIAO H G,LI W,WU X R.A lightweight and efficient RFID authentication protocol based on synchronization code.Computer Engineering & Science,2016,38(4):673-678.(in Chinese) 肖红光,李为,巫小蓉.基于同步数的轻量级高效RFID身份认证协议.计算机工程与科学,2016,38(4):673-678. [13]ZHAO B,GAO X,GAO P P,et al.A lightweight authenticated protocol with key agreement for power utilization information collecting.Automation of Electric Power Systems,2013,37(12):81-86.(in Chinese) 赵兵,高欣,郜盼盼,等.适用于用电信息采集的轻量级认证密钥协商协议.电力系统自动化,2013,37(12):81-86. [14]XUAN X W,TENG J F,BAI Y.Enhanced RFID Authentication Protocol Based on Quardratic Residue.Computer Enginee-ring,2012,38(3):124-125,129.(in Chinese) 轩秀巍,滕建辅,白煜.基于二次剩余的增强型RFID认证协议.计算机工程,2012,38(3):124-125,129. [15]ROSEN K H.Elementary Number Theory and Its Applications.Beijing:China Machine Press,2004. [16]WANG Z C,XU D Y,WANG X F,et al.Reliability Analysis and Improvement of BAN Logic.Computer Engineering,2012,38(17):110-115.(in Chinese) 王正才,许道云,王晓峰,等.BAN逻辑的可靠性分析与改进.计算机工程,2012,38(17):110-115.BOYD C,MAO W.On a limitation of BAN logic[M]∥Advances in Cryptology-EUROCRYPT’93.Springer Berlin Heidelberg,1993:240-247. |
[1] | CAO Xiao-wen, LIANG Mei-yu, LU Kang-kang. Fine-grained Semantic Reasoning Based Cross-media Dual-way Adversarial Hashing Learning Model [J]. Computer Science, 2022, 49(9): 123-131. |
[2] | ZHU Cheng-zhang, HUANG Jia-er, XIAO Ya-long, WANG Han, ZOU Bei-ji. Deep Hash Retrieval Algorithm for Medical Images Based on Attention Mechanism [J]. Computer Science, 2022, 49(8): 113-119. |
[3] | SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295. |
[4] | LI Peng-yu, LIU Sheng-li, YIN Xiao-kang, LIU Hao-hui. Detection Method of ROP Attack for Cisco IOS [J]. Computer Science, 2022, 49(4): 369-375. |
[5] | LIU Feng, ZHANG Jia-hao, ZHOU Jun-jie, LI Mu, KONG De-li, YANG Jie, QI Jia-yin, ZHOU Ai-min. Novel Hash-time-lock-contract Based Cross-chain Token Swap Mechanism of Blockchain [J]. Computer Science, 2022, 49(1): 336-344. |
[6] | XIA Zhong, XIANG Min, HUANG Chun-mei. Hierarchical Management Mechanism of P2P Video Surveillance Network Based on CHBL [J]. Computer Science, 2021, 48(9): 278-285. |
[7] | LENG Feng, ZHANG Ming-kai, YAN Zhi-wei, ZHANG Cui-ling, ZENG Yu. Application of Chinese Cryptographic Algorithm in RPKI [J]. Computer Science, 2021, 48(11A): 678-681. |
[8] | ZOU Ao, HAO Wen-ning, JIN Da-wei, CHEN Gang, TIAN Yuan. Study on Text Retrieval Based on Pre-training and Deep Hash [J]. Computer Science, 2021, 48(11): 300-306. |
[9] | LI Rui-xiang, MAO Ying-chi, HAO Shuai. Cache Management Method in Mobile Edge Computing Based on Approximate Matching [J]. Computer Science, 2021, 48(1): 96-102. |
[10] | DENG Liang, XU Geng-lin, LI Meng-jie, CHEN Zhang-jin. Fast Face Recognition Based on Deep Learning and Multiple Hash Similarity Weighting [J]. Computer Science, 2020, 47(9): 163-168. |
[11] | SHANG Jin-yue, BI Xiu-li, XIAO Bin, LI Wei-sheng. Image Forgery Detection Based on DCT Coefficients Hashing [J]. Computer Science, 2020, 47(6): 310-315. |
[12] | DENG Yi-jiao, ZHANG Feng-li, CHEN Xue-qin, AI Qing, YU Su-zhe. Collaborative Attention Network Model for Cross-modal Retrieval [J]. Computer Science, 2020, 47(4): 54-59. |
[13] | PAN Ji-fei,HUANG De-cai. Blockchain Dynamic Sharding Model Based on Jump Hash and Asynchronous Consensus Group [J]. Computer Science, 2020, 47(3): 273-280. |
[14] | LI Shu-quan,LIU Lei,ZHU Da-yong,XIONG Chao,LI Rui. Protocol of Dynamic Provable Data Integrity for Cloud Storage [J]. Computer Science, 2020, 47(2): 256-261. |
[15] | ZHANG Xiang-yang,SUN Zi-wen. Automatic Error Correction CRO PUF Key Generation Scheme [J]. Computer Science, 2020, 47(1): 302-308. |
|