{"id":"https://openalex.org/W2885921559","doi":"https://doi.org/10.1155/2018/3917827","title":"An Efficient Stream Data Processing Model for Multiuser Cryptographic Service","display_name":"An Efficient Stream Data Processing Model for Multiuser Cryptographic Service","publication_year":2018,"publication_date":"2018-07-31","ids":{"openalex":"https://openalex.org/W2885921559","doi":"https://doi.org/10.1155/2018/3917827","mag":"2885921559"},"language":"en","primary_location":{"id":"doi:10.1155/2018/3917827","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2018/3917827","pdf_url":"https://downloads.hindawi.com/journals/jece/2018/3917827.pdf","source":{"id":"https://openalex.org/S174662166","display_name":"Journal of Electrical and Computer Engineering","issn_l":"2090-0147","issn":["2090-0147","2090-0155"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Electrical and Computer Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://downloads.hindawi.com/journals/jece/2018/3917827.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100361083","display_name":"Li Li","orcid":"https://orcid.org/0000-0002-0237-2671"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Li","raw_affiliation_strings":["College of Communication Engineering, Xidian University, Xi\u2019an 710071, China","Department of Electronic and Information Engineering, Beijing Electronics Science and Technology Institute, Beijing 100070, China","College of Communication Engineering, Xidian University, Xi'an 710071, China"],"raw_orcid":"https://orcid.org/0000-0002-0237-2671","affiliations":[{"raw_affiliation_string":"College of Communication Engineering, Xidian University, Xi\u2019an 710071, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Department of Electronic and Information Engineering, Beijing Electronics Science and Technology Institute, Beijing 100070, China","institution_ids":["https://openalex.org/I202334528"]},{"raw_affiliation_string":"College of Communication Engineering, Xidian University, Xi'an 710071, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100325259","display_name":"Fenghua Li","orcid":"https://orcid.org/0000-0003-0638-5610"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fenghua Li","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China","State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing 100093, China"],"raw_orcid":"https://orcid.org/0000-0003-0638-5610","affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing 100093, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101710266","display_name":"Guozhen Shi","orcid":"https://orcid.org/0000-0003-4044-6210"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guozhen Shi","raw_affiliation_strings":["Department of Information Security, Beijing Electronic Science and Technology Institute, Beijing 100070, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Security, Beijing Electronic Science and Technology Institute, Beijing 100070, China","institution_ids":["https://openalex.org/I202334528"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027331734","display_name":"Kui Geng","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kui Geng","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing 100093, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing 100093, China","institution_ids":["https://openalex.org/I4210156404"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100325259"],"corresponding_institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":{"value":1400,"currency":"USD","value_usd":1400},"apc_paid":{"value":1400,"currency":"USD","value_usd":1400},"fwci":0.0,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.08428816,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"2018","issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7679893970489502},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6675128936767578},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5603666305541992},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.5280084609985352},{"id":"https://openalex.org/keywords/scheduling","display_name":"Scheduling (production processes)","score":0.45157474279403687},{"id":"https://openalex.org/keywords/data-flow-diagram","display_name":"Data flow diagram","score":0.4372977614402771},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.43620920181274414},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.34649401903152466},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.30709660053253174},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.19292545318603516},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1565420925617218},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11310848593711853},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10984432697296143}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7679893970489502},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6675128936767578},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5603666305541992},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.5280084609985352},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.45157474279403687},{"id":"https://openalex.org/C489000","wikidata":"https://www.wikidata.org/wiki/Q747385","display_name":"Data flow diagram","level":2,"score":0.4372977614402771},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.43620920181274414},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.34649401903152466},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.30709660053253174},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.19292545318603516},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1565420925617218},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11310848593711853},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10984432697296143},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1155/2018/3917827","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2018/3917827","pdf_url":"https://downloads.hindawi.com/journals/jece/2018/3917827.pdf","source":{"id":"https://openalex.org/S174662166","display_name":"Journal of Electrical and Computer Engineering","issn_l":"2090-0147","issn":["2090-0147","2090-0155"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Electrical and Computer Engineering","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:4556dc35cb9a4527b33c0660163a0ba7","is_oa":true,"landing_page_url":"https://doaj.org/article/4556dc35cb9a4527b33c0660163a0ba7","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Electrical and Computer Engineering, Vol 2018 (2018)","raw_type":"article"},{"id":"pmh:oai:hindawi.com:10.1155/2018/3917827","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/3917827","pdf_url":null,"source":{"id":"https://openalex.org/S4306400340","display_name":"Hindawi Journal of Chemistry (Hindawi)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210126990","host_organization_name":"Hindawi (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210126990"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Research Article"}],"best_oa_location":{"id":"doi:10.1155/2018/3917827","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2018/3917827","pdf_url":"https://downloads.hindawi.com/journals/jece/2018/3917827.pdf","source":{"id":"https://openalex.org/S174662166","display_name":"Journal of Electrical and Computer Engineering","issn_l":"2090-0147","issn":["2090-0147","2090-0155"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Electrical and Computer Engineering","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5199999809265137,"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth"}],"awards":[{"id":"https://openalex.org/G1399298930","display_name":null,"funder_award_id":"61672515","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1511737794","display_name":null,"funder_award_id":"2017YFB0802705","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2885921559.pdf","grobid_xml":"https://content.openalex.org/works/W2885921559.grobid-xml"},"referenced_works_count":6,"referenced_works":["https://openalex.org/W2029479717","https://openalex.org/W2077208126","https://openalex.org/W2132652565","https://openalex.org/W2161040887","https://openalex.org/W2325686415","https://openalex.org/W2343000917"],"related_works":["https://openalex.org/W3037187668","https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2385965183","https://openalex.org/W4289281780","https://openalex.org/W2013342653","https://openalex.org/W2901818815","https://openalex.org/W4237598585","https://openalex.org/W2359552542","https://openalex.org/W4234772502"],"abstract_inverted_index":{"In":[0],"view":[1],"of":[2,33,40,81,93,101,119,135],"the":[3,15,31,59,66,76,79,82,91,94,99,102,114,124,129,136,139,143],"demand":[4],"for":[5],"high-concurrency":[6],"massive":[7],"data":[8,25,61],"encryption":[9],"and":[10,36,69,86,89,116,127],"decryption":[11],"application":[12],"services":[13],"in":[14,47,56,98,132],"security":[16],"field,":[17],"this":[18,110],"paper":[19],"proposes":[20],"a":[21,48],"dual-channel":[22,67],"pipeline":[23,125,137],"parallel":[24,72,87],"processing":[26,80,92,100,118,130],"model":[27,111],"(DPP)":[28],"according":[29],"to":[30,141],"characteristics":[32],"cryptographic":[34,38,53],"operations":[35,39],"realized":[37],"cross-data":[41,121],"streams":[42],"with":[43],"different":[44],"service":[45],"requirements":[46,55],"multiuser":[49],"environment.":[50],"By":[51],"encapsulating":[52],"operation":[54],"job":[57,70,84,96,104],"packages,":[58],"input":[60],"flow":[62],"is":[63],"divided":[64],"by":[65],"mechanism":[68],"packages":[71,85,88],"scheduling,":[73],"which":[74],"ensures":[75],"synchronization":[77],"between":[78],"dependent":[83,103],"hides":[90],"independent":[95],"package":[97],"package.":[105],"Prototyping":[106],"experiments":[107],"prove":[108],"that":[109],"can":[112],"realize":[113],"correct":[115],"rapid":[117],"multiservice":[120],"streams.":[122],"Increasing":[123],"depth":[126],"improving":[128,142],"performance":[131],"each":[133],"stage":[134],"are":[138],"key":[140],"system":[144],"performance.":[145]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
