Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Wei Cen is active.

Publication


Featured researches published by Wei Cen.


international conference on information science and control engineering | 2017

Research on the Cryptographic Application Technology for Power Information System Based on DL/T 1527-2016 Technology Standard

Wei Cen; Feng Zhai; Yilun Fu; Tao-Yong Li; Xiao-Bing Liang

In order to enhance the security protection level of power information system, this paper has analyzed the logic structure of power information system, further studied the DL/T 1527-2016 technology specification of electric power utilization information security protection. On the basis of interpretation standards, it has researched the overall security strategy for the power information system, developed such security encryption devices as cipher machine, security encryption module, special encryption isolation gateway, etc, designed the double-deck security communication protocol which can applied for the power information system. The security performance of the security strategy, security encryption devices and the double-deck security communication protocol can meet the requirements of DL/T 1527-2016, and also can meet the security protection requirements for the current power information system.


2016 10th International Conference on Software, Knowledge, Information Management & Applications (SKIMA) | 2016

A user peak load staggering potential assessment method based on three-demarcation analytic hierarchy process

Feng Zhai; Wei Cen; Jia Zhao; Peng Xu; Yi Sun

In the process of assigning peak-peak tasks to users, there are some problems such as uncertainty of assignment standard, mismatch of task and actual response. In order to provide more accurate distribution, so as to provide suggestion of implementing staggering power consumption to power grid enterprises, this paper uses the AHP method to evaluate the user peak load staggering potential. It selects the indicators related to the peak load staggering potential, constructs the potential evaluation system, allocates the peak load staggering resources according to the evaluation results, and judges the accuracy of the evaluation according to the task completion and so on. The validity of the potential evaluation method proposed in this paper is evaluated by experiment simulation.


2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing | 2014

A RFID Mutual Authentication Security Protocol Design and Analysis

Xiaobing Liang; Yingjie Lv; Bing Zhao; Ying Liu; Zhiqiang Sun; Wei Cen

For RFID mutual authentication security protocols which need back-end server have poor mobile performance, it cannot be applied to environments which have poor wireless network. The RFID mutual authentication security protocol based on key dispersion algorithm is designed in this paper, which proposes a new method for managing and distributing keys for a large number of tags. This protocol which does not need the back-end database can be achieved security mutual authentication between the reader and the tag, the reader only need to store a pair of root keys, the key dispersal algorithms can disperse the corresponding mutual authentication keys with the tag identification number. Compared with the other of the same type RFID mutual authentication security protocols, results indicate that the proposed protocol in this paper has higher efficiency and security.


Applied Mechanics and Materials | 2013

Design of a Secure Electric Vehicle Charging Pile Control Device

Feng Zhai; Ying Liu; Yi Lun Fu; Wei Cen; Zhi Qiang Sun

This paper has designed a secure electric vehicle charging pile control device according to such security problems as the traditional electric vehicle charging pile control devices transmission data can be illegally intercepted easily in electrical communication process. The electric vehicle charging pile control device has used advanced data encryption technology, increased secure storage unit, which can prevent transmission data being intercepted or falsified illegally in electrical communication process effectively, so as to ensure datas integrity and confidentiality. Therefore, it has great practical value.


Applied Mechanics and Materials | 2013

Design and Application of a Secure Chip Key Issuing System

Bing Zhao; Feng Zhai; Wei Cen; Ying Lv; Xiao Bing Liang

According to chip key’s security problem, this paper has designed a secure chip key issuing system and its application method. The chip key issuing system mainly include chip key issuing machine, key issuing host computer, key management server and cryptographic machine. Every key is protected to transmit and write into chip by conversational key which is agreed between chip key issuing machine and the cryptographic machine beside key management server when chip key is issuing. This chip key issuing system and method can provide effective guarantee to chip key’s security.


Advanced Materials Research | 2012

Design of a Handheld Terminal which Has Encryption and Decryption Function

Bao Feng Li; Hui Juan Hou; Wei Cen; Ying Lv

In this paper, a handheld terminal is designed which has encryption and decryption function to solve the problems of relatively lower security level of the traditional terminal equipment’s transmission data in electrical communication. This handheld terminal not only can implement the screct key update and recovery, load switch controlling, charge adding, parameter setting, data reading function and so on , but also through introducing advanced encryption and decryption techniques and using security unit,, , can ensure that the transmission data was not altered in the communication and transmission data’s integrity and confidentiality was not destroyed. This handheld terminal has great practical value.


Low Voltage Apparatus | 2012

Electric automobile charging pile control device with safety protection function

Feng Zhai; Bing Zhao; Ying Liu; Yingjie Lv; Yilun Fu; Baofeng Li; Wei Cen; Hua Li


Archive | 2012

Hand-held device used for on-site maintenance for intelligent electric energy meter

Bing Zhao; Ying Liu; Baofeng Li; Feng Zhai; Yingjie Lv; Yilun Fu; Zhancheng Feng; Chunliang Wu; Wei Cen; Quan Yuan


international conference on software engineering | 2017

Operation and maintenance management system based on intelligent fault diagnosis and intelligent grab work orders

Yongfeng Cao; Yingjie Lv; Bing Zhao; Wei Cen; Haoyang Li; Yi Sun; Bin Li


international conference on software engineering | 2016

The Application of Advanced Clock Synchronization Technology in Intelligent Substation System

Feng Zhai; Yongfeng Cao; Wei Cen; Z. Q. Sun; X. B. Liang

Collaboration


Dive into the Wei Cen's collaboration.

Top Co-Authors

Avatar

Feng Zhai

Electric Power Research Institute

View shared research outputs
Top Co-Authors

Avatar

Bing Zhao

Electric Power Research Institute

View shared research outputs
Top Co-Authors

Avatar

Yingjie Lv

Electric Power Research Institute

View shared research outputs
Top Co-Authors

Avatar

Yilun Fu

Electric Power Research Institute

View shared research outputs
Top Co-Authors

Avatar

Zhi Qiang Sun

Electric Power Research Institute

View shared research outputs
Top Co-Authors

Avatar

Ying Lv

Electric Power Research Institute

View shared research outputs
Top Co-Authors

Avatar

Bao Feng Li

Electric Power Research Institute

View shared research outputs
Top Co-Authors

Avatar

Xiao Bing Liang

Electric Power Research Institute

View shared research outputs
Top Co-Authors

Avatar

Yi Lun Fu

Electric Power Research Institute

View shared research outputs
Top Co-Authors

Avatar

Ying Liu

Electric Power Research Institute

View shared research outputs
Researchain Logo
Decentralizing Knowledge