Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yingjie Lv is active.

Publication


Featured researches published by Yingjie Lv.


international conference on information science and control engineering | 2017

Design on Security Communication Protocol of Electricity Acquisition Terminal Based on the Password Techniques

Wenjing Xu; Baofeng Li; Bao-Ling He; Yingjie Lv

Based on fresh random challenge response authentication and key agreement, access control, priority control mechanisms, this paper puts forward a security protection communication protocol to guarantee the data transmission security of electricity acquisition terminal and the acquisition host. From the angle of attack detection, this proposed protocol was proved that can resists replay attack, counterfeit attack and information intercepted attack, and can ensure the safety of the electricity power acquisition system overall.


international conference on software engineering | 2016

Application of P-cycle in OpenADR communication network protection

Yingjie Lv; Wei Cen; Yilun Fu; Chao Lu; Bin Li

In this paper, we have studied the application of P-cycle in OpenADR communication network. The notions of OpenADR and P-cycle are presented in section I . Then section II put forward a set of algorithms to create P-cycles to protect specific tree network, and simulation results of the algorithm is illustrated in section III. Results show that the algorithm is efficient to calculate P-cycle of high quality for OpenADR communication network.


2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing | 2014

A RFID Mutual Authentication Security Protocol Design and Analysis

Xiaobing Liang; Yingjie Lv; Bing Zhao; Ying Liu; Zhiqiang Sun; Wei Cen

For RFID mutual authentication security protocols which need back-end server have poor mobile performance, it cannot be applied to environments which have poor wireless network. The RFID mutual authentication security protocol based on key dispersion algorithm is designed in this paper, which proposes a new method for managing and distributing keys for a large number of tags. This protocol which does not need the back-end database can be achieved security mutual authentication between the reader and the tag, the reader only need to store a pair of root keys, the key dispersal algorithms can disperse the corresponding mutual authentication keys with the tag identification number. Compared with the other of the same type RFID mutual authentication security protocols, results indicate that the proposed protocol in this paper has higher efficiency and security.


Archive | 2012

Encryption and decryption functions based field service terminal and application method thereof

Ying Liu; Bing Zhao; Baofeng Li; Feng Zhai; Yingjie Lv; Yilun Fu; Zhancheng Feng; Chunliang Wu


Archive | 2011

Method for encrypting embedded secure access module (ESAM) of power system acquisition terminal

Yingjie Lv; Bing Zhao; Ying Liu; Feng Zhai; Yilun Fu; Zhancheng Feng; Chunliang Wu


Low Voltage Apparatus | 2012

Electric automobile charging pile control device with safety protection function

Feng Zhai; Bing Zhao; Ying Liu; Yingjie Lv; Yilun Fu; Baofeng Li; Wei Cen; Hua Li


Archive | 2012

Hand-held device used for on-site maintenance for intelligent electric energy meter

Bing Zhao; Ying Liu; Baofeng Li; Feng Zhai; Yingjie Lv; Yilun Fu; Zhancheng Feng; Chunliang Wu; Wei Cen; Quan Yuan


Archive | 2011

Root key generating method

Bing Zhao; Feng Zhai; Ying Liu; Yingjie Lv; Yilun Fu; Zhancheng Feng; Chunliang Wu


international conference on software engineering | 2017

Operation and maintenance management system based on intelligent fault diagnosis and intelligent grab work orders

Yongfeng Cao; Yingjie Lv; Bing Zhao; Wei Cen; Haoyang Li; Yi Sun; Bin Li


IEEE Conference Proceedings | 2016

OpenADR通信網保護におけるPサイクルの適用【Powered by NICT】

Yingjie Lv; Wei Cen; Yilun Fu; Chao Lu; Bin Li

Collaboration


Dive into the Yingjie Lv's collaboration.

Top Co-Authors

Avatar

Bing Zhao

Electric Power Research Institute

View shared research outputs
Top Co-Authors

Avatar

Yilun Fu

Electric Power Research Institute

View shared research outputs
Top Co-Authors

Avatar

Feng Zhai

Electric Power Research Institute

View shared research outputs
Top Co-Authors

Avatar

Wei Cen

Electric Power Research Institute

View shared research outputs
Top Co-Authors

Avatar

Bin Li

North China Electric Power University

View shared research outputs
Top Co-Authors

Avatar

Chao Lu

North China Electric Power University

View shared research outputs
Top Co-Authors

Avatar

Yongfeng Cao

Electric Power Research Institute

View shared research outputs
Top Co-Authors

Avatar

Haoyang Li

North China Electric Power University

View shared research outputs
Top Co-Authors

Avatar

Yi Sun

North China Electric Power University

View shared research outputs
Researchain Logo
Decentralizing Knowledge