{"title":"便携式电动汽车充电基础设施的加密方案:对称密钥加密方案","authors":"Chan-Kuk Jang, Jae-Hoon Lee, Okyeon Yi","doi":"10.1109/CAIPT.2017.8320674","DOIUrl":null,"url":null,"abstract":"In recent years, Electric Vehicles have developed rapidly around the world as a measure against depletion of fossil fuels. However, compared to the development of electric vehicles, electric vehicle charging infrastructure is slow to develop, and security services are not provided at all. This paper focuses on the encryption scheme for portable electric vehicle charging infrastructure.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Encryption scheme in portable electric vehicle charging infrastructure: Encryption scheme using symmetric key\",\"authors\":\"Chan-Kuk Jang, Jae-Hoon Lee, Okyeon Yi\",\"doi\":\"10.1109/CAIPT.2017.8320674\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years, Electric Vehicles have developed rapidly around the world as a measure against depletion of fossil fuels. However, compared to the development of electric vehicles, electric vehicle charging infrastructure is slow to develop, and security services are not provided at all. This paper focuses on the encryption scheme for portable electric vehicle charging infrastructure.\",\"PeriodicalId\":351075,\"journal\":{\"name\":\"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CAIPT.2017.8320674\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CAIPT.2017.8320674","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Encryption scheme in portable electric vehicle charging infrastructure: Encryption scheme using symmetric key
In recent years, Electric Vehicles have developed rapidly around the world as a measure against depletion of fossil fuels. However, compared to the development of electric vehicles, electric vehicle charging infrastructure is slow to develop, and security services are not provided at all. This paper focuses on the encryption scheme for portable electric vehicle charging infrastructure.