scispace - formally typeset
S

Shi Junping

Researcher at Xidian University

Publications -  4
Citations -  37

Shi Junping is an academic researcher from Xidian University. The author has contributed to research in topics: Electricity & Smart grid. The author has an hindex of 4, co-authored 4 publications receiving 37 citations.

Papers
More filters
Patent

Privacy protection type real-time electric charge collecting method for intelligent power grid

TL;DR: In this paper, a privacy protection type real-time electric charge collecting method of an intelligent power grid is proposed, which comprises the following steps: 1, initializing a system; 2, registering through a user before logging in the network; 3, releasing network access permit for an intelligent ammeter through a local aggregator; 4, obtaining a safety parameter through the intelligent ammmeter; 5, transferring the network access permit through building gateway; 6, blinding the user electricity consumption data through the Intelligent ammeter; 7, signing the blinded massage through the building gateway,
Patent

Power counting and charging method with private protection function in intelligent power grid

TL;DR: In this paper, a power counting and charging method with a private protection function in an intelligent power grid is proposed to solve the problem that in the prior art, a power grid was complex in maintenance and expenses are large due to the fact that users enable identities to be anonymous through anonyms.
Patent

Method for authenticating anonymity groups of power-driven automobiles by charging station

TL;DR: In this paper, a method for authenticating anonymity groups of power-driven automobiles by a charging station is presented, which relates to the technical field of information safety and relates to our work.
Journal ArticleDOI

EPPDC: an efficient privacy-preserving scheme for data collection in smart grid

TL;DR: The security analysis indicates that EPPDC scheme not only can resist replay attack, but also has source authentication and data integrity, confidentiality, unforgeability, nonrepudiation, and evolution of shared keys.