Visible to the public Biblio

Filters: Author is Li, Zhiru  [Clear All Filters]
2022-02-04
Cui, Ajun, Zhao, Hong, Zhang, Xu, Zhao, Bo, Li, Zhiru.  2021.  Power system real time data encryption system based on DES algorithm. 2021 13th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA). :220–228.
To ensure the safe operation of power system, this paper studies two technologies of data encryption and digital signature, and designs a real-time data encryption system based on DES algorithm, which improves the security of data network communication. The real-time data encryption system of power system is optimized by the hybrid encryption system based on DES algorithm. The real-time data encryption of power system adopts triple DES algorithm, and double DES encryption algorithm of RSA algorithm to ensure the security of triple DES encryption key, which solves the problem of real-time data encryption management of power system. Java security packages are used to implement digital signatures that guarantee data integrity and non-repudiation. Experimental results show that the data encryption system is safe and effective.
2020-09-28
Zhang, Xun, Zhao, Jinxiong, Yang, Fan, Zhang, Qin, Li, Zhiru, Gong, Bo, Zhi, Yong, Zhang, Xuejun.  2019.  An Automated Composite Scanning Tool with Multiple Vulnerabilities. 2019 IEEE 3rd Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC). :1060–1064.
In order to effectively do network security protection, detecting system vulnerabilities becomes an indispensable process. Here, the vulnerability detection module with three functions is assembled into a device, and a composite detection tool with multiple functions is proposed to deal with some frequent vulnerabilities. The tool includes a total of three types of vulnerability detection, including cross-site scripting attacks, SQL injection, and directory traversal. First, let's first introduce the principle of each type of vulnerability; then, introduce the detection method of each type of vulnerability; finally, detail the defenses of each type of vulnerability. The benefits are: first, the cost of manual testing is eliminated; second, the work efficiency is greatly improved; and third, the network is safely operated in the first time.