[1] 梅生伟,王莹莹,陈来军,等. 从复杂网络视角评述智能电网信息安全研究现状及若干展望[J]. 高电压技术,2011,37(3):672-679. MEI Shengwei, WANG Yingying, CHEN Laijun, et al. Overviews and prospects of the cyber security of smart grid from the view of complex network theory[J]. High Voltage Engineering, 2011, 37(3): 672-679. [2] 徐震,刘韧,于爱民,等. 智能电网中的移动应用安全技术[J].电力系统自动化,2012,36(16):82-87. XU Zhen, LIU Ren, YU Aimin, et al. Mobile application security technology for smart grid[J]. Automation of Electric Power Systems, 2012, 36(16): 82-87. [3] 王宇飞,徐志博,王婧,等. 层次化电力信息网络威胁态势评估方法[J]. 中国电力,2013,46(7):121-125. WANG Yufei, XU Zhibo, WANG Jing. Hierarchical cyber-threat situation evaluation method for electric power information network[J]. Electric Power, 2013, 46(7): 121-125. [4] 秦超,张涛,林为民,等. 电力移动作业PDA安全接入系统设计与实现[J]. 电力系统自动化,2012,36(11):82-85. QIN Chao, ZHANG Tao, LIN Weimin. Design and implementation of safe access system for electric mobile operation based on PDA[J]. Automation of Electric Power Systems, 2012, 36(11): 82-85. [5] 陆凌蓉,文福拴,薛禹胜,等. 电动汽车智能网络控制系统及其通信机制设计[J]. 电力系统自动化,2012,36(20):44-49. LU Lingrong, WEN Fushuan, XUE Yusheng, et al. An intelligent network control system for plug-in electric vehicles and the associate communication mechanism[J]. Automation of Electric Power Systems, 2012, 36(20): 44-49. [6] 罗拥军. 移动数据库技术在电力抄表系统中的应用[J]. 中国电力,2007,40(11):102-105. LUO Yongjun. Application of mobile database technology in system of electric power meter reading[J]. Electric Power, 2007,40(11): 102-105. [7] BRANDNER R, van der Haak M, HARTMANN M, et al. Electronic signature for medical documents-integration and evaluation of a public key infrastructure in hospitals [J]. Methods of Information in Medicine, 2002, 41(4): 321-330. [8] 郝文江,武捷,王巍,等. 关键基础设施安全威胁及对策分析[J]. 信息网络安全,2013,(10):11-13. HAO Wenjiang, WU Jie, WANG Wei, et al. The. Security threats and the countermeasures analysis of the key infrastructures [J]. Netinfo Security, 2013, (10): 11-13. [9] RSA被指收美政府千万美元在加密算法中安后门[EB/OL]. 2013-12-21. http://tech.sina.com.cn/i/2013-12-21/13499028417.shtml. [10] 国家密码管理局. SM2椭圆曲线公钥密码算法[DB/OL]. 2010-12-17/2011-12-08. http://www.oscca.gov.cn/UpFile/201012221 4822692.pdf. [11] 张险峰,秦志光,刘锦德,等. 椭圆曲线加密系统的性能分析[J].电子科技大学学报,2001,30(2):144-147. ZHANG Xianfeng, QIN Zhiguang, LIU Jinde, et al. Analysis of security and efficiency on elliptic curves cryptosystems [J]. Journal of University of Electronic Science and Technology of China, 2001, 30(2): 144-147. [12] 骆钊,谢吉华,顾伟,等. 基于SM2密码体系的电网信息安全支撑平台开发[J]. 电力系统自动化,2014,38(6):68-74. LUO Zhao, XIE Jihua, GU Wei, et al. SM2-cryptosystem based information security supporting platform in power grid automation of electric power systems[J]. Automation of Electric Power Systems, 2014, 38(6): 68-74. [13] 王勇,岑荣伟,郭红,等. 国家电子政务外网电子认证系统SM2国密算法升级改造方案研究[J]. 信息网络安全,2012,(10):83-85. [14] 赵铖. 基于智能加密SD卡的电力巡检终端安全技术研究[D].东南大学,2011. [15] 杨松. 基于linux的透明代理的研究与实现[D]. 成都:电子科技大学,2006. [16] KYUCHANG Kang, DONGOH Kang. Android phone as wireless USB storage device through USB/IP connection[C]//2011 IEEE International Conference on Consumer Electronics, 2011: 289-290. |