S
Shi Junping
Researcher at Xidian University
Publications - 4
Citations - 37
Shi Junping is an academic researcher from Xidian University. The author has contributed to research in topics: Electricity & Smart grid. The author has an hindex of 4, co-authored 4 publications receiving 37 citations.
Papers
More filters
Patent
Privacy protection type real-time electric charge collecting method for intelligent power grid
TL;DR: In this paper, a privacy protection type real-time electric charge collecting method of an intelligent power grid is proposed, which comprises the following steps: 1, initializing a system; 2, registering through a user before logging in the network; 3, releasing network access permit for an intelligent ammeter through a local aggregator; 4, obtaining a safety parameter through the intelligent ammmeter; 5, transferring the network access permit through building gateway; 6, blinding the user electricity consumption data through the Intelligent ammeter; 7, signing the blinded massage through the building gateway,
Patent
Power counting and charging method with private protection function in intelligent power grid
TL;DR: In this paper, a power counting and charging method with a private protection function in an intelligent power grid is proposed to solve the problem that in the prior art, a power grid was complex in maintenance and expenses are large due to the fact that users enable identities to be anonymous through anonyms.
Patent
Method for authenticating anonymity groups of power-driven automobiles by charging station
TL;DR: In this paper, a method for authenticating anonymity groups of power-driven automobiles by a charging station is presented, which relates to the technical field of information safety and relates to our work.
Journal ArticleDOI
EPPDC: an efficient privacy-preserving scheme for data collection in smart grid
Jie Chen,Shi Junping,Yueyu Zhang +2 more
TL;DR: The security analysis indicates that EPPDC scheme not only can resist replay attack, but also has source authentication and data integrity, confidentiality, unforgeability, nonrepudiation, and evolution of shared keys.