Computer Science ›› 2024, Vol. 51 ›› Issue (11A): 231100178-8.doi: 10.11896/jsjkx.231100178
• Interdiscipline & Application • Previous Articles Next Articles
MA Junwei1, PAN Xiukui2, WANG Yuqi2, WU Jian1, DU Feng1
CLC Number:
[1]ZHANG Y,WANG A H,ZHANG H.Overview of smart grid development in China[J].Power System Protection and Control,2021,49(5):180-187. [2]CHEN J,LI X D,LU B.Point To Point Power Market Modeand Behavior Evolution from the Perspective of Cooperative Alliance[J].Power System Technology,2023,47(8):3227-3238. [3]ZHANG Y,WANG L Z,WU J,et al.Blockchain and Integrated Energy System:Appl- ication and Prospect[J].Fundamental Research Science Foundation in China,2020,34(1):31-37. [4]WANG H R,FU J,LIU J R.Encryption and sharing of power grid comprehensive operation and maintenance information under multi-level access security[J],Information Technology,2023(8):88-93. [5]LIANG Y L,LING J.Encrypted Data Sharing Scheme in Cloud Storage Based on Blockchain[J].Computer Engineering and Applications,2020,56(17):41-47. [6]GAO Z X,FAN Z Y.The application research of electrical engineering technology in the construction of smart grids[J].China Plant Engineering,2023(18):26-28. [7]ZHAOW,QI Q,ZHOU J,et al.Blockchain-Based Applications for Smart Grids:An Umbrella Review[J].Energies,2023,16(17). [8]YU X B,ZHENG D D.Application and exploration of blockchain technology in energy and electricity[J].Huadian Techno-logy,2020,42(8):17-23. [9]WEN Y D.Analysis on Distributed Energy Trading Mechanism in West Inner MongoliaPower Market Under Background of New Power System[J].Inner Mongolia Electric Power,2023,41(3):78-85. [10]LIU C,WANG S J,ZHAO Y L,et al.Review of the Application of Blockchain Technology in Virtual Power Plant Transactions[J].Electric Power Construction,2023,44(4):130-144. [11]ZHANGG Y,SUN R H,MA C G,et al.Survey of Sensor Networks Management and Authentication[J].Computer Science,2010,37(2):1-6,11. [12]LUO X,XUE K,XU J,et al.Blockchain Based Secure Data Aggregation and Distributed Power Dispatching for Microgrids[J].IEEE Transactions on Smart Grid,2021,PP(99):1-1. [13]XU Y,LIU Z,ZHANG C,et al.Blockchain-based trustworthyenergy dispatching approach for high renewable energy penetrated power systems[J].IEEE Internet of Things Journal,2022,9(12):10036-10047. [14]LI X,WU F,KUMARI S,et al.A Provably Secure and Anonymous Message Authentication Scheme for Smart Grids[J].Journal of Parallel and Distributed Computing,2019,132(OCT.):242-249. [15]LI X.A Provably Secure and Anonymous Message Authentication Scheme for Smart Grids[J].Journal of Parallel and Distri-buted Computing,2019,132(OCT.):242-249. [16]FIRDAUS A,AB RAZAK M F,FEIZOLLAH A,et al.The rise of “blockchain”:bibliometric analysis of blockchain study[J].Scientometrics,2019,120(3):1289-1331. [17]LIU C,WANG S J,ZHAO Y L,et al.Review of the Application of Blockchain Technology in Virtual Power Plant Transactions[J].Electric Power Construction,2023,44(4):130-144. [18]ZHAO T J,KAN T,HE B,et al.Smart Grid Security Analysis under Blockchain[J].Electronic Components and Information Technology,2023,7(2):6-9. [19]SHUAI W,YONG Y,WANG X,et al.An Overview of Smart Contract:Architecture,Applications,and Future Trends[C]// 2018 IEEE Intelligent Vehicles Symposium(IV).IEEE,2018. [20]ZHOU J,YE L P,NI Y Y,et al.Review of Intelligent Contract[J].China New Telecommunications,2021,23(3):37-39. [21]NEUMANN J V.Theory of games and economic behavior[M].Princeton University Press,1944. [22]JIANG M J,WANG W T.Risk quantification and security bene-fit assessment of clean energygrid connected to power system considering energy storage power stations [J].Power Demand Side Management,2021,23(2):52-57. [23]WU X.Trust management technology in cloud computing environments[M].Beijing:Beijing University of Posts and Telecommunications Press,2015:202. [24]GARBIS J,CHAPMAN J W.Zero Trust Security:An Enterprise Guide [M].Berkeley,USA:Apress,2021. [25]DU Z H.Research and Application of a Borderless Zero Trust Network under the “Internet Plus” Background[J].Modern Information Technology,2021,5(6):153-157. [26]KOU W Z,HE S Y.PKI technology-based network securityplatform design [J].Information Recording Materials,2022,23(9):102-105. [27]HAMMI B,MONTEUUIS J,PETIT J.PKIs in C-ITS:Security functions,architectures and projects:A survey[J].Vehicular Communications,2022,38. [28]WEN X B,ZHENG Y.Algorithm Simulation Applied to Cloud SecurityCredibility Detection of Internet of Things[J].Compu-ter Simulation,2022,39(5):225-228. [29]VERGNAUD D.Comment on efficient and secure outsourcing scheme for RSA decryption in internet of things[J].IEEE Internet of Things Journal,2020,7(11):11327-11329. [30]DESAIS S,NENE M J.Multihop trust evaluation using memory integrity in wireless sensor networks[J].IEEE Transactions on Information Forensics and Security,2021,16:4092-4100 [31]DESAIS S,NENE M J.Node-level trust evaluation in wireless sensor networks[J].IEEE Transactions on Information Forensics and Security,2019,14(8):2139-2152. |
[1] | WANG Dong, LI Xiaoruo, ZHU Bingnan. Transaction Granularity Modifiable Consortium Blockchain Scheme Based on Dual Merkel Trees Block Structure [J]. Computer Science, 2024, 51(9): 408-415. |
[2] | ZANG Wenyang, LYU Jinlai. Study on Time Rotation Notary Group Model Based on Threshold Signature [J]. Computer Science, 2024, 51(8): 403-411. |
[3] | XIANG Yanjie, HUANG Xiaofang, XIANG Kefeng, ZHENG Ji’nan. Blockchain Certificateless Encryption Mechanism Based on National Secret Algorithm [J]. Computer Science, 2024, 51(8): 440-446. |
[4] | SUN Li. Application,Challenge and New Strategy of Block Chain Technology in Metaverse [J]. Computer Science, 2024, 51(7): 373-379. |
[5] | LI Zhiyuan, XU Binglei, ZHOU Yingyi. Blockchain Anonymous Transaction Tracking Method Based on Node Influence [J]. Computer Science, 2024, 51(7): 422-429. |
[6] | ZHU Jun, ZHANG Guoyin, WAN Jingjing. Study on Data Security Framework Based on Identity and Blockchain Integration [J]. Computer Science, 2024, 51(6A): 230400056-5. |
[7] | LAN Yajie, MA Ziqiang, CHEN Jiali, MIAO Li, XU Xin. Survey on Application of Searchable Attribute-based Encryption Technology Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230800016-14. |
[8] | TAN Jingqi, XUE Lingyan, HUANG Haiping, CHEN Long, LI Yixuan. Data Security Management Scheme Based on Editable Medical Consortium Chain [J]. Computer Science, 2024, 51(6A): 240400056-8. |
[9] | KANG Zhong, WANG Maoning, MA Xiaowen, DUAN Meijiao. New Design of Redactable Consortium Blockchain Scheme Based on Multi-user Chameleon Hash [J]. Computer Science, 2024, 51(6A): 230600004-6. |
[10] | GENG Qian, CHUAI Ziang, JIN Jian. Operational Consistency Model Based on Consortium Blockchain for Inter-organizational Data Exchange [J]. Computer Science, 2024, 51(6A): 230800145-9. |
[11] | TIAN Hongliang, XIAN Mingjie, GE Ping. Fine Grained Security Access Control Mechanism Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230400080-7. |
[12] | ZANG Hongrui, YANG Tingting, LIU Hongbo, MA Kai. Study on Cryptographic Verification of Distributed Federated Learning for Internet of Things [J]. Computer Science, 2024, 51(6A): 230700217-5. |
[13] | ZHANG Ruirong, NIU Baoning, FAN Xing. Multi-attribute Blockchain Decentralization Degree Measurement Model [J]. Computer Science, 2024, 51(5): 382-389. |
[14] | LI Fengyun, CHEN Mingming, WANG Lin, LI Peng , JU Xianyin. Study on Trust Management Mechanism of Internet of Vehicles Based on Blockchain [J]. Computer Science, 2024, 51(4): 381-387. |
[15] | LIU Wei, LIU Yuzhao, TANG Congke, WANG Yuanyuan, SHE Wei, TIAN Zhao. Study on Blockchain Based Federated Distillation Data Sharing Model [J]. Computer Science, 2024, 51(3): 39-47. |
|