scispace - formally typeset
W

Wang Yimin

Publications -  19
Citations -  10

Wang Yimin is an academic researcher. The author has contributed to research in topics: Data transmission & Interface (computing). The author has an hindex of 2, co-authored 19 publications receiving 10 citations.

Papers
More filters
Patent

Security encryption method and system for railway signals

TL;DR: In this paper, a security encryption method and a system for railway signals is presented, where different encryption algorithms can be selected according to different types of equipment and applications, and the communication security is improved.
Patent

Data processing method and device and computer equipment

TL;DR: In this article, the authors provide a data processing method and device and computer equipment to improve the security of a secure computer system using data synchronous comparison operation (SOCO) and logic operation.
Patent

RSSP-I secure communication method based on two-system synchronization

TL;DR: In this paper, an RSSP-I secure communication method based on two-system synchronization is presented. But the main and standby systems are not distinguished, the standby system uses data of the main system for transmission, data of two systems can be kept identically, the utilization rate of a channel bandwidth of the standby systems is improved, and data transmission reliability and the data transmission security are improved.
Patent

Safe computer system based on redundant ethernet

TL;DR: In this paper, a safe computer system based on the redundant ethernet was proposed, in which a double-CPU symmetric redundant structure is adopted by the first logic processing unit module and the second logic unit module, and the first communication unit module is used for achieving the functions of data transmission and data analysis.
Patent

Rssp-i security protocol separate deployment method

TL;DR: In this paper, an RSSP-II security protocol separate deployment method is presented, which comprises the steps of adding different adaptation layers to a protocol stack; and compiling all RSSP II function modules of the protocol stack into library files through utilization of corresponding adaptation layers and deploying the library files to A, B and C machines.