Have a personal or library account? Click to login
Application of the Source Encryption Algorithm Model in the Power Industry Cover

Application of the Source Encryption Algorithm Model in the Power Industry

By: Jiao Longbing  
Open Access
|Jan 2020

Figures & Tables

Figure 1.

Symmetric encryption flow chart

Figure 2.

Asymmetric encryption flowchart

Figure 3.

Data conversion mode

Figure 4.

Rotation arrangement rule

Figure 5.

Data decryption model

Figure 6.

Data encryption model

LOCATION VARIABLES

4 southeast9 south2 southwest
3 east5 center7 west
8 northeast1 north6 northwest

TIME VARIOMETER

123456789101112
ABCDEFGHIJKL
1aAaBaCaDaEaFaGaHaIaJakaLa
2bAbBbCbDbEbFbGbHbIbJbkbLb
3cAcBcCcDcEcFcGcHcIcJckcLc
4dAdBdCdDdEdFdGdHdIdJdkdLd
5eAeBeCeDeEeFeGeHeIeJekeLe
6fAfBfCfDfEfFfGfHfIfJfkfLf
7gAgBgCgDgEgFgGgHgIgJgkgLg
8hAhBhChDhEhFhGhHhIhJhkhLh
9iAiBiCiDiEiFiGiHiIiJikiLi
10jAjBjCjDjEjFjGjHjIjJjkjLj
Language: English
Page range: 68 - 73
Published on: Jan 27, 2020
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2020 Jiao Longbing, published by Xi’an Technological University
This work is licensed under the Creative Commons Attribution 4.0 License.