Yingjie Lv
Electric Power Research Institute
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Yingjie Lv.
international conference on information science and control engineering | 2017
Wenjing Xu; Baofeng Li; Bao-Ling He; Yingjie Lv
Based on fresh random challenge response authentication and key agreement, access control, priority control mechanisms, this paper puts forward a security protection communication protocol to guarantee the data transmission security of electricity acquisition terminal and the acquisition host. From the angle of attack detection, this proposed protocol was proved that can resists replay attack, counterfeit attack and information intercepted attack, and can ensure the safety of the electricity power acquisition system overall.
international conference on software engineering | 2016
Yingjie Lv; Wei Cen; Yilun Fu; Chao Lu; Bin Li
In this paper, we have studied the application of P-cycle in OpenADR communication network. The notions of OpenADR and P-cycle are presented in section I . Then section II put forward a set of algorithms to create P-cycles to protect specific tree network, and simulation results of the algorithm is illustrated in section III. Results show that the algorithm is efficient to calculate P-cycle of high quality for OpenADR communication network.
2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing | 2014
Xiaobing Liang; Yingjie Lv; Bing Zhao; Ying Liu; Zhiqiang Sun; Wei Cen
For RFID mutual authentication security protocols which need back-end server have poor mobile performance, it cannot be applied to environments which have poor wireless network. The RFID mutual authentication security protocol based on key dispersion algorithm is designed in this paper, which proposes a new method for managing and distributing keys for a large number of tags. This protocol which does not need the back-end database can be achieved security mutual authentication between the reader and the tag, the reader only need to store a pair of root keys, the key dispersal algorithms can disperse the corresponding mutual authentication keys with the tag identification number. Compared with the other of the same type RFID mutual authentication security protocols, results indicate that the proposed protocol in this paper has higher efficiency and security.
Archive | 2012
Ying Liu; Bing Zhao; Baofeng Li; Feng Zhai; Yingjie Lv; Yilun Fu; Zhancheng Feng; Chunliang Wu
Archive | 2011
Yingjie Lv; Bing Zhao; Ying Liu; Feng Zhai; Yilun Fu; Zhancheng Feng; Chunliang Wu
Low Voltage Apparatus | 2012
Feng Zhai; Bing Zhao; Ying Liu; Yingjie Lv; Yilun Fu; Baofeng Li; Wei Cen; Hua Li
Archive | 2012
Bing Zhao; Ying Liu; Baofeng Li; Feng Zhai; Yingjie Lv; Yilun Fu; Zhancheng Feng; Chunliang Wu; Wei Cen; Quan Yuan
Archive | 2011
Bing Zhao; Feng Zhai; Ying Liu; Yingjie Lv; Yilun Fu; Zhancheng Feng; Chunliang Wu
international conference on software engineering | 2017
Yongfeng Cao; Yingjie Lv; Bing Zhao; Wei Cen; Haoyang Li; Yi Sun; Bin Li
IEEE Conference Proceedings | 2016
Yingjie Lv; Wei Cen; Yilun Fu; Chao Lu; Bin Li