Application of edge computing technology in smart grid data security
Absrtact: In order to solve the problem that the two-way flow of power and information between user nodes and service nodes in the smart grid poses a huge threat to the privacy and security of user data, and at the same time, the limitation of the power bureau's computing resources also brings...
Saved in:
Main Authors: | Zhuo Cheng, Jiangxin Li, Jianjun Zhang, Chen Wang, Hui Wang, Juyin Wu |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2025-02-01
|
Series: | Measurement: Sensors |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S266591742400388X |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Forward secure proxy signature scheme
by: WANG Xiao-ming, et al.
Published: (2005-01-01) -
Provably secure certificate less blind proxy re-signatures
by: Tao FENG, et al.
Published: (2012-09-01) -
Edge computing smart grid resource scheduling algorithm based on reinforcement learning
by: Jinghang YU, et al.
Published: (2024-01-01) -
Partially blind proxy re-signature scheme with proven security
by: Xiaodong YANG, et al.
Published: (2018-02-01) -
Orthogonal Latin square theory based group and batch verification for digital signatures
by: Hong WANG, et al.
Published: (2022-02-01)