Weiwei Liu

ORCID: 0000-0002-3986-8347
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Thermal Analysis in Power Transmission
  • Railway Systems and Energy Efficiency
  • Internet Traffic Analysis and Secure E-voting
  • Blockchain Technology Applications and Security
  • Advanced Authentication Protocols Security
  • High-Voltage Power Transmission Systems
  • Technology and Security Systems
  • Geoscience and Mining Technology
  • RFID technology advancements
  • HVDC Systems and Fault Protection
  • Geophysical and Geoelectrical Methods
  • Geophysical Methods and Applications
  • User Authentication and Security Systems
  • Power Systems Fault Detection
  • Coding theory and cryptography
  • Chaos-based Image/Signal Encryption
  • Cloud Data Security Solutions
  • Power Systems and Technologies

China Southern Power Grid (China)
2023-2024

North China University of Water Resources and Electric Power
2018-2021

Second Hospital of Yichang
2019

University of Wollongong
2013-2016

10.1007/s11235-016-0201-3 article EN Telecommunication Systems 2016-07-19

Proxy signature is a useful cryptographic primitive that has been widely used in many applications. It attracted lot of attention since it was introduced. There have lots works constructing efficient and secure proxy schemes. In this paper, we identify new attack neglected by existing proven We demonstrate launching against an identity‐based scheme which secure. then propose one method can effectively prevent attack. The weakness some other schemes also be fixed applying the same method.

10.1155/2018/6925019 article EN cc-by Wireless Communications and Mobile Computing 2018-01-01

Abstract With the comprehensive acceleration of construction ubiquitous power Internet Things by companies, can improve depth and breadth information monitoring in all aspects system, monitor control operating parameters important equipment aspects, system. The monitoring, analysis prevention capabilities; sensors are most critical link to in-depth mastery Things. As one components country, company plays a fundamental role supporting development entire national economy. companies continue...

10.1088/1755-1315/300/4/042077 article EN IOP Conference Series Earth and Environmental Science 2019-07-01

Designing a high-voltage cable layout is complex and requires numerous calculations. Manual calculation inefficient susceptible to inaccuracy. Therefore, this paper proposes method for determining the ideal using an optimal design. First, analyze impact of on its important indicators during operation determine optimization objective; Secondly, with analytical hierarchy approach, importance key operational from four areas that have power grid cables; once more, objective normalized weighted...

10.1109/acpee56931.2023.10135648 article EN 2022 7th Asia Conference on Power and Electrical Engineering (ACPEE) 2023-04-01

Tunnel laying cable is a transmission method with large capacity, multiple circuits, and high reliability, widely used in urban power grid other occasions. The layout of cables has significant impact on their loss characteristics, so it necessary to conduct calculation analysis under different arrangement. In this paper, finite element simulation models for 500kV arrangement schemes are established, the influence circuit numbers distribution losses calculated analyzed. results show that yhe...

10.1109/apet59977.2023.10489704 article EN 2023-12-28

In this article, we introduce a new concept of oblivious transfer with membership verification that allows any legitimate group users to obtain services from service provider in an manner. We present two schemes, differing design. the first scheme, trusted manager issues credentials for pre-determined so valid credential can provider, while choices made by remain provider. The second scheme avoids manager, which user be thus it is more suitable distributed systems. particular, prove schemes...

10.1177/1550147719875645 article EN cc-by International Journal of Distributed Sensor Networks 2019-09-01

Distance-bounding protocol is a useful primitive in resisting distance-based attacks. Currently, most of the existing distance-bounding protocols usually do not take reuse nonces designing into consideration. However, there have been some literature studies showing that nonce repetition may lead to leakage shared key between participants. Aikaterini et al. introduced countermeasure could serve as supplementary systems allowing repetition. their proposal only holds against passive attackers....

10.1155/2021/6644326 article EN Security and Communication Networks 2021-06-01
Coming Soon ...