id author title date pages extension mime words sentences flesch summary cache txt work_raz6yc35h5exrkxeaaitdt322e Jiao Longbing Application of the Source Encryption Algorithm Model in the Power Industry 2019 6 .pdf application/pdf 2329 249 65 Application of the Source Encryption Algorithm Model in a model of the information source data encryption algorithm, data security of power system. Keywords-Data Communication; Encryption Algorithm power Internet of things will be a key point of China's source encryption algorithm model, hoping to provide As an important part of network security, data Key is the key of data encryption, which controls the encryption algorithms usually require two keys: public the partial key format of data information source, as 3) The source data is rearranged and encrypted The data format conversion of an encryption Determine the starting time of the data encryption obtain the key encryption variables of time, solar term 5) Data decryption process model of the data format according to the time variable and Data encryption model Internet of things, the security of data connection is above data encryption model, the source information real-time data communication in power system [J]. ./cache/work_raz6yc35h5exrkxeaaitdt322e.pdf ./txt/work_raz6yc35h5exrkxeaaitdt322e.txt