{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:55Z","timestamp":1750221295973,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,27]],"date-time":"2018-08-27T00:00:00Z","timestamp":1535328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,27]]},"DOI":"10.1145\/3271553.3271605","type":"proceedings-article","created":{"date-parts":[[2018,11,8]],"date-time":"2018-11-08T13:00:23Z","timestamp":1541682023000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Research and Implementation on Key Information Security Algorithm Based on GOOSE Message"],"prefix":"10.1145","author":[{"given":"Wang","family":"Ning","sequence":"first","affiliation":[{"name":"School of Electrical Engineering, Dalian University of Technology, Dalian, China"}]},{"given":"Liu","family":"Guangxing","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering, Dalian University of Technology, Dalian, China"}]},{"given":"Wu","family":"Yanli","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering, Dalian University of Technology, Dalian, China"}]},{"given":"Chen","family":"Yong'an","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering, Dalian University of Technology, Dalian, China"}]},{"given":"Yao","family":"Ruize","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering, Dalian University of Technology, Dalian, China"}]},{"given":"Liu","family":"Yunhua","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering, Dalian University of Technology, Dalian, China"}]}],"member":"320","published-online":{"date-parts":[[2018,8,27]]},"reference":[{"volume-title":"USA: IEEE ICC 2016 SAC Communications for the Smart Grid","author":"Abdullah","key":"e_1_3_2_1_1_1","unstructured":"Abdullah A, Kemal A, Mehmet H. Software Defined Networking for Resilient Communications in Smart Grid Active Distribution Networks{C} . USA: IEEE ICC 2016 SAC Communications for the Smart Grid , 2016: 978--1001. Abdullah A, Kemal A, Mehmet H. Software Defined Networking for Resilient Communications in Smart Grid Active Distribution Networks{C}. USA: IEEE ICC 2016 SAC Communications for the Smart Grid, 2016: 978--1001."},{"key":"e_1_3_2_1_2_1","volume-title":"Part 9 specific communication service mapping: IEC 61850-90{S}","author":"Communication","year":"2008","unstructured":"Communication networks and systems in substations : Part 9 specific communication service mapping: IEC 61850-90{S} . 2008 . Communication networks and systems in substations: Part 9 specific communication service mapping: IEC 61850-90{S}. 2008."},{"volume-title":"USA: Proceedings of the Federated Conference on Computer Science and Information Systems","author":"Damiano","key":"e_1_3_2_1_3_1","unstructured":"Damiano B, Rafa\u0142 L, Micha\u0142 R. Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics{C}.San Francisco , USA: Proceedings of the Federated Conference on Computer Science and Information Systems , 2016: 743--749. Damiano B, Rafa\u0142 L, Micha\u0142 R. Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics{C}.San Francisco, USA: Proceedings of the Federated Conference on Computer Science and Information Systems, 2016: 743--749."},{"key":"e_1_3_2_1_4_1","volume-title":"A network simulator for IEC61850 architecture{C}.France: Copyright Material PCIC Europe","author":"Fanny","year":"2013","unstructured":"Fanny C, Eric S, Philippe A. A network simulator for IEC61850 architecture{C}.France: Copyright Material PCIC Europe , 2013 : 1--8. Fanny C, Eric S, Philippe A. A network simulator for IEC61850 architecture{C}.France: Copyright Material PCIC Europe, 2013: 1--8."},{"key":"e_1_3_2_1_5_1","volume-title":"Password bypass analysis principle and method{M}","author":"Shize Guo","year":"2014","unstructured":"Guo Shize . Password bypass analysis principle and method{M} . Beijing : Science Press , 2014 : 35--42. Guo Shize. Password bypass analysis principle and method{M}. Beijing: Science Press, 2014: 35--42."},{"key":"e_1_3_2_1_6_1","volume-title":"Getting Started with IEC 61850{M}","author":"Lei He","year":"2014","unstructured":"He Lei . Getting Started with IEC 61850{M} . Beijing : China Electric Power Press , 2014 : 260--313. He Lei. Getting Started with IEC 61850{M}. Beijing: China Electric Power Press, 2014: 260--313."},{"key":"e_1_3_2_1_7_1","volume-title":"Attack Methods and Examples of Block Ciphers{M}","author":"Chao Li","year":"2010","unstructured":"Li Chao . Attack Methods and Examples of Block Ciphers{M} . Beijing : Science Press , 2010 : 158--160. Li Chao. Attack Methods and Examples of Block Ciphers{M}. Beijing: Science Press, 2010: 158--160."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2053726"},{"key":"e_1_3_2_1_9_1","unstructured":"Li Peng Dou Pengchong Li Yuwei etc. Application of Microgrid Technology in Active Distribution Network{J}. Power automation equipment 2015 35(4): 8--16.  Li Peng Dou Pengchong Li Yuwei etc. Application of Microgrid Technology in Active Distribution Network{J}. Power automation equipment 2015 35(4): 8--16."},{"issue":"19","key":"e_1_3_2_1_10_1","first-page":"127","volume":"40","author":"Zhao Luo","year":"2016","unstructured":"Luo Zhao , Yan Tong , Xie Jihua , etc. Application of SM2 Encryption System in Telecontrol Communication of Smart Substation{J}. Automation of Electric Power Systems , 2016 , 40 ( 19 ): 127 -- 132 . Luo Zhao, Yan Tong, Xie Jihua, etc. Application of SM2 Encryption System in Telecontrol Communication of Smart Substation{J}. Automation of Electric Power Systems, 2016, 40(19): 127--132.","journal-title":"Automation of Electric Power Systems"},{"key":"e_1_3_2_1_11_1","volume-title":"Certification Theory and Application{M}","author":"Xiaohang Li","year":"2009","unstructured":"Li Xiaohang . Certification Theory and Application{M} . Beijing : Tsinghua University Press , 2009 : 19--33. Li Xiaohang. Certification Theory and Application{M}. Beijing: Tsinghua University Press, 2009: 19--33."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.496"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mejo.2014.05.004"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MELE.2014.2380051"},{"issue":"7","key":"e_1_3_2_1_15_1","first-page":"144","volume":"40","author":"Xiaoyang Tong","year":"2016","unstructured":"Tong Xiaoyang , Wang Xiaoru . Thoughts on Network Attacks and Grid Information Security Prevention Caused by U.S. Power Outages{J}. Automation of Electric Power Systems , 2016 , 40 ( 7 ): 144 -- 148 . Tong Xiaoyang, Wang Xiaoru. Thoughts on Network Attacks and Grid Information Security Prevention Caused by U.S. Power Outages{J}. Automation of Electric Power Systems, 2016, 40(7): 144--148.","journal-title":"Automation of Electric Power Systems"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2013.115"},{"key":"e_1_3_2_1_17_1","volume-title":"Research on Digital Substation Communication Security Method{D}","author":"Min'an Wang","year":"2011","unstructured":"Wang Min'an . Research on Digital Substation Communication Security Method{D} . Beijing : North China Electric Power University , 2011 : 9--12. Wang Min'an. Research on Digital Substation Communication Security Method{D}. Beijing: North China Electric Power University, 2011: 9--12."},{"key":"e_1_3_2_1_18_1","volume-title":"Research on Key Technologies of IEC 61850 Message Security{D}","author":"Zhidong Wang","year":"2015","unstructured":"Wang Zhidong . Research on Key Technologies of IEC 61850 Message Security{D} . Guangzhou : South China University of Technology , 2015 . 24--36. Wang Zhidong. Research on Key Technologies of IEC 61850 Message Security{D}. Guangzhou: South China University of Technology, 2015. 24--36."},{"key":"e_1_3_2_1_19_1","volume-title":"Automation of Electric Power Systems","author":"Zhidong Wang","year":"2016","unstructured":"Wang Zhidong , Wang Gang , Li Yongcang , etc. IEC 61850-9-2LE encryption method based on micro-encryption algorithm{J} . Automation of Electric Power Systems , 2016 , 40(4): 121--127. Wang Zhidong, Wang Gang, Li Yongcang, etc. IEC 61850-9-2LE encryption method based on micro-encryption algorithm{J}. Automation of Electric Power Systems, 2016, 40(4): 121--127."},{"volume-title":"USA: 65th Annual Conference for Protection Relay Engineers","author":"Wen","key":"e_1_3_2_1_20_1","unstructured":"Wen J, Hammond C, Udren E. Wide-area Ethernet net work configuration for system protection messaging{C} . USA: 65th Annual Conference for Protection Relay Engineers , 2012: 52--72. Wen J, Hammond C, Udren E. Wide-area Ethernet net work configuration for system protection messaging{C}. USA: 65th Annual Conference for Protection Relay Engineers, 2012: 52--72."},{"issue":"13","key":"e_1_3_2_1_21_1","first-page":"77","volume":"35","author":"Yang Yang","year":"2011","unstructured":"Yang Yang , Huang Xiaoqing , Cao Jia , etc. Substation Communication Message Security Authentication and Real-time Simulation{J}. Automation of Electric Power Systems , 2011 , 35 ( 13 ): 77 -- 82 . Yang Yang, Huang Xiaoqing, Cao Jia, etc. Substation Communication Message Security Authentication and Real-time Simulation{J}. Automation of Electric Power Systems, 2011, 35(13): 77--82.","journal-title":"Automation of Electric Power Systems"}],"event":{"name":"ICVISP 2018: The 2nd International Conference on Vision, Image and Signal Processing","acronym":"ICVISP 2018","location":"Las Vegas NV USA"},"container-title":["Proceedings of the 2nd International Conference on Vision, Image and Signal Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3271553.3271605","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3271553.3271605","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:10Z","timestamp":1750212790000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3271553.3271605"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,27]]},"references-count":21,"alternative-id":["10.1145\/3271553.3271605","10.1145\/3271553"],"URL":"https:\/\/doi.org\/10.1145\/3271553.3271605","relation":{},"subject":[],"published":{"date-parts":[[2018,8,27]]},"assertion":[{"value":"2018-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}