{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T17:18:53Z","timestamp":1740158333027,"version":"3.37.3"},"reference-count":7,"publisher":"Wiley","license":[{"start":{"date-parts":[[2018,7,31]],"date-time":"2018-07-31T00:00:00Z","timestamp":1532995200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key R&D Program of China","award":["2017YFB0802705","61672515"],"award-info":[{"award-number":["2017YFB0802705","61672515"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2017YFB0802705","61672515"],"award-info":[{"award-number":["2017YFB0802705","61672515"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Electrical and Computer Engineering"],"published-print":{"date-parts":[[2018,7,31]]},"abstract":"<jats:p>In view of the demand for high-concurrency massive data encryption and decryption application services in the security field, this paper proposes a dual-channel pipeline parallel data processing model (DPP) according to the characteristics of cryptographic operations and realized cryptographic operations of cross-data streams with different service requirements in a multiuser environment. By encapsulating cryptographic operation requirements in job packages, the input data flow is divided by the dual-channel mechanism and job packages parallel scheduling, which ensures the synchronization between the processing of the dependent job packages and parallel packages and hides the processing of the independent job package in the processing of the dependent job package. Prototyping experiments prove that this model can realize the correct and rapid processing of multiservice cross-data streams. Increasing the pipeline depth and improving the processing performance in each stage of the pipeline are the key to improving the system performance.<\/jats:p>","DOI":"10.1155\/2018\/3917827","type":"journal-article","created":{"date-parts":[[2018,7,31]],"date-time":"2018-07-31T19:43:19Z","timestamp":1533066199000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Stream Data Processing Model for Multiuser Cryptographic Service"],"prefix":"10.1155","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0237-2671","authenticated-orcid":true,"given":"Li","family":"Li","sequence":"first","affiliation":[{"name":"College of Communication Engineering, Xidian University, Xi\u2019an 710071, China"},{"name":"Department of Electronic and Information Engineering, Beijing Electronics Science and Technology Institute, Beijing 100070, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0638-5610","authenticated-orcid":true,"given":"Fenghua","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing 100093, China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China"}]},{"given":"Guozhen","family":"Shi","sequence":"additional","affiliation":[{"name":"Department of Information Security, Beijing Electronic Science and Technology Institute, Beijing 100070, China"}]},{"given":"Kui","family":"Geng","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing 100093, China"}]}],"member":"311","reference":[{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/12.795218"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2015.2393870"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/tc.2016.2529618"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/jssc.2009.2022219"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/tc.2003.1159755"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.3724\/sp.j.1001.2013.04339"},{"year":"2011","key":"29"}],"container-title":["Journal of Electrical and Computer Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/jece\/2018\/3917827.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jece\/2018\/3917827.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jece\/2018\/3917827.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,31]],"date-time":"2018-07-31T19:43:23Z","timestamp":1533066203000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/jece\/2018\/3917827\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,31]]},"references-count":7,"alternative-id":["3917827","3917827"],"URL":"https:\/\/doi.org\/10.1155\/2018\/3917827","relation":{},"ISSN":["2090-0147","2090-0155"],"issn-type":[{"type":"print","value":"2090-0147"},{"type":"electronic","value":"2090-0155"}],"subject":[],"published":{"date-parts":[[2018,7,31]]}}}