Have a personal or library account? Click to login
Application of the Source Encryption Algorithm Model in the Power Industry Cover

Application of the Source Encryption Algorithm Model in the Power Industry

By: Jiao Longbing  
Open Access
|Jan 2020

References

  1. Song Lei, Luo Qiliang, Luo Yi, Tu Guangyu. Encryption scheme of real-time data communication in power system [J]. Power system automation, 2004 (07)
  2. Liu Gang, Liang Ye et al. Realization and application of digital certificate technology in power secondary system [J]. Power grid technology, 2006, 10
  3. Xingyuan Wang, Hongyu Zhao, Le Feng, Xiaolin Ye, Hao Zhang. High-sensitivity image encryption algorithm with random diffusion based on dynamic-coupled map lattices[J]. Optics and Lasers in Engineering, 2019, 122.
  4. Chen changqing. Research on computer network communication intrusion prevention method based on data encryption technology [J]. Information and computer (theoretical edition), 2019(14):171-172.
  5. DOE/Oak Ridge National Laboratory; ORNL to take on nine power grid modernization projects as part of DOE award[J]. NewsRx Health & Science, 2019.
  6. Chen Zhiguang. Analysis and design of power project management system of state grid fuzhou power supply company [D]. Yunnan university, 2016.
Language: English
Page range: 68 - 73
Published on: Jan 27, 2020
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2020 Jiao Longbing, published by Xi’an Technological University
This work is licensed under the Creative Commons Attribution 4.0 License.