Wenbo Shi

Learn More
—The vehicle-to-grid (V2G) system enables energy flow from the electric vehicles (EVs) to the grid. The distributed power of the EVs can either be sold to the grid or be used to provide frequency regulation service when V2G is implemented. A V2G control algorithm is necessary to decide whether the EV should be charged, discharged, or provide frequency(More)
—Demand response (DR) enables customers to adjust their electricity usage to balance supply and demand. Most previous works on DR consider the supply–demand matching in an abstract way without taking into account the underlying power distribution network and the associated power flow and system operational constraints. As a result, the schemes proposed by(More)
In this paper, we present an improved biometric identity based encryption scheme which is based on Baek et al's scheme. By using fuzzy extractor to construct the public key of a user, we reduce the number of exponentiations of encryption algorithm, the number of MaptoPoint hash function and the length of ciphertext from O(n) to O(1). Furthermore, we proved(More)
—Energy management in microgrids is typically formulated as a non-linear optimization problem. Solving it in a centralized manner does not only require high computational capabilities at the microgrid central controller (MGCC) but may also infringe customer privacy. Existing distributed approaches, on the other hand, assume that all generations and loads(More)
With rapid development of computer technology and wide use of mobile devices, the telecare medicine information system has become universal in the field of medical care. To protect patients’ privacy and medial data’s security, many authentication schemes for the telecare medicine information system have been proposed. Due to its better performance, chaotic(More)
—Energy management in microgrids is typically formulated as a non-linear optimization problem. Solving it in a centralized manner not only requires high computational capabilities at the microgrid central controller (MGCC) but may also infringe customer privacy. Existing distributed approaches, on the other hand, assume that all the generations and loads(More)
—A microgrid can be characterized by its integration of distributed energy resources and controllable loads. Such integration brings unique challenges to the microgrid management and control which can be significantly different from conventional power systems. Therefore, a conventional energy management system (EMS) needs to be redesigned with consideration(More)
Recently, the certificateless public key cryptography (CLPKC) has been studied widely since it could solve both of the certificate management problem in traditional public key cryptography (TPKC) and the key escrow problem in the identity-based public key cryptography (ID-based PKC). To satisfy requirements of different applications, many certificateless(More)