Optimization of Integrity Measurement Algorithm Based on Multi-thread Pipeline Paralleling Article Swipe
Ke Wang
,
Zheng Shan
,
Chao Fan
,
Fei Xue
·
YOU?
·
· 2015
· Open Access
·
· DOI: https://doi.org/10.22323/1.259.0011
YOU?
·
· 2015
· Open Access
·
· DOI: https://doi.org/10.22323/1.259.0011
With the continuous development of trusted computing, the integrity measurement has gradually been practical; but the popularization and application of the existing measurement tools are still restricted by their own measurement algorithm’s performance. Considering the insufficient of existing measurement tools’ performance, we propose an optimization method of integrity measurement algorithm based on multi-thread and pipeline paralleling. We analyze shortage of the existing measurement tools and provide an optimized method based on multi-thread technology and pipeline paralleling technology. Experiments show that this method can significantly improve the performance of SHA-1 and is also applicable to a variety of hash algorithms.
Related Topics
Concepts
Metadata
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.22323/1.259.0011
- https://pos.sissa.it/259/011/pdf
- OA Status
- gold
- References
- 8
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W2739792930
All OpenAlex metadata
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W2739792930Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.22323/1.259.0011Digital Object Identifier
- Title
-
Optimization of Integrity Measurement Algorithm Based on Multi-thread Pipeline ParallelingWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2015Year of publication
- Publication date
-
2015-10-01Full publication date if available
- Authors
-
Ke Wang, Zheng Shan, Chao Fan, Fei XueList of authors in order
- Landing page
-
https://doi.org/10.22323/1.259.0011Publisher landing page
- PDF URL
-
https://pos.sissa.it/259/011/pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://pos.sissa.it/259/011/pdfDirect OA link when available
- Concepts
-
Computer science, Thread (computing), Pipeline (software), Algorithm, Parallel computing, Programming languageTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
8Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W2739792930 |
|---|---|
| doi | https://doi.org/10.22323/1.259.0011 |
| ids.doi | https://doi.org/10.22323/1.259.0011 |
| ids.mag | 2739792930 |
| ids.openalex | https://openalex.org/W2739792930 |
| fwci | 0.0 |
| type | article |
| title | Optimization of Integrity Measurement Algorithm Based on Multi-thread Pipeline Paralleling |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | 011 |
| biblio.first_page | 011 |
| topics[0].id | https://openalex.org/T11241 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9950000047683716 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1711 |
| topics[0].subfield.display_name | Signal Processing |
| topics[0].display_name | Advanced Malware Detection Techniques |
| topics[1].id | https://openalex.org/T11424 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9908000230789185 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Security and Verification in Computing |
| topics[2].id | https://openalex.org/T14347 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9623000025749207 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1710 |
| topics[2].subfield.display_name | Information Systems |
| topics[2].display_name | Big Data and Digital Economy |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.755457878112793 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C138101251 |
| concepts[1].level | 2 |
| concepts[1].score | 0.7481507062911987 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q213092 |
| concepts[1].display_name | Thread (computing) |
| concepts[2].id | https://openalex.org/C43521106 |
| concepts[2].level | 2 |
| concepts[2].score | 0.45251160860061646 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q2165493 |
| concepts[2].display_name | Pipeline (software) |
| concepts[3].id | https://openalex.org/C11413529 |
| concepts[3].level | 1 |
| concepts[3].score | 0.4254017174243927 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q8366 |
| concepts[3].display_name | Algorithm |
| concepts[4].id | https://openalex.org/C173608175 |
| concepts[4].level | 1 |
| concepts[4].score | 0.41851356625556946 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q232661 |
| concepts[4].display_name | Parallel computing |
| concepts[5].id | https://openalex.org/C199360897 |
| concepts[5].level | 1 |
| concepts[5].score | 0.13549768924713135 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q9143 |
| concepts[5].display_name | Programming language |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.755457878112793 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/thread |
| keywords[1].score | 0.7481507062911987 |
| keywords[1].display_name | Thread (computing) |
| keywords[2].id | https://openalex.org/keywords/pipeline |
| keywords[2].score | 0.45251160860061646 |
| keywords[2].display_name | Pipeline (software) |
| keywords[3].id | https://openalex.org/keywords/algorithm |
| keywords[3].score | 0.4254017174243927 |
| keywords[3].display_name | Algorithm |
| keywords[4].id | https://openalex.org/keywords/parallel-computing |
| keywords[4].score | 0.41851356625556946 |
| keywords[4].display_name | Parallel computing |
| keywords[5].id | https://openalex.org/keywords/programming-language |
| keywords[5].score | 0.13549768924713135 |
| keywords[5].display_name | Programming language |
| language | en |
| locations[0].id | doi:10.22323/1.259.0011 |
| locations[0].is_oa | True |
| locations[0].source | |
| locations[0].license | cc-by-nc-nd |
| locations[0].pdf_url | https://pos.sissa.it/259/011/pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | proceedings-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by-nc-nd |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Proceedings of The 5th International Conference on Computer Engineering and Networks — PoS(CENet2015) |
| locations[0].landing_page_url | https://doi.org/10.22323/1.259.0011 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5101969342 |
| authorships[0].author.orcid | https://orcid.org/0009-0003-0877-9282 |
| authorships[0].author.display_name | Ke Wang |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Yinhao Wang |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5089050704 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Zheng Shan |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Zheng Shan |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5043121078 |
| authorships[2].author.orcid | https://orcid.org/0000-0003-2216-7576 |
| authorships[2].author.display_name | Chao Fan |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Chao Fan |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5089710591 |
| authorships[3].author.orcid | https://orcid.org/0000-0001-7047-8497 |
| authorships[3].author.display_name | Fei Xue |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | Fei Xue |
| authorships[3].is_corresponding | False |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://pos.sissa.it/259/011/pdf |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Optimization of Integrity Measurement Algorithm Based on Multi-thread Pipeline Paralleling |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11241 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9950000047683716 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1711 |
| primary_topic.subfield.display_name | Signal Processing |
| primary_topic.display_name | Advanced Malware Detection Techniques |
| related_works | https://openalex.org/W2899084033, https://openalex.org/W2748952813, https://openalex.org/W2051487156, https://openalex.org/W2073681303, https://openalex.org/W2390279801, https://openalex.org/W2358668433, https://openalex.org/W2317200988, https://openalex.org/W2376932109, https://openalex.org/W2023832055, https://openalex.org/W2082485924 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.22323/1.259.0011 |
| best_oa_location.is_oa | True |
| best_oa_location.source | |
| best_oa_location.license | cc-by-nc-nd |
| best_oa_location.pdf_url | https://pos.sissa.it/259/011/pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | proceedings-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Proceedings of The 5th International Conference on Computer Engineering and Networks — PoS(CENet2015) |
| best_oa_location.landing_page_url | https://doi.org/10.22323/1.259.0011 |
| primary_location.id | doi:10.22323/1.259.0011 |
| primary_location.is_oa | True |
| primary_location.source | |
| primary_location.license | cc-by-nc-nd |
| primary_location.pdf_url | https://pos.sissa.it/259/011/pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | proceedings-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Proceedings of The 5th International Conference on Computer Engineering and Networks — PoS(CENet2015) |
| primary_location.landing_page_url | https://doi.org/10.22323/1.259.0011 |
| publication_date | 2015-10-01 |
| publication_year | 2015 |
| referenced_works | https://openalex.org/W2380130248, https://openalex.org/W1594148356, https://openalex.org/W2090136685, https://openalex.org/W2335155415, https://openalex.org/W2352002425, https://openalex.org/W1554398046, https://openalex.org/W3005551449, https://openalex.org/W2364494728 |
| referenced_works_count | 8 |
| abstract_inverted_index.a | 94 |
| abstract_inverted_index.We | 56 |
| abstract_inverted_index.an | 43, 66 |
| abstract_inverted_index.by | 27 |
| abstract_inverted_index.is | 90 |
| abstract_inverted_index.of | 4, 19, 36, 46, 59, 87, 96 |
| abstract_inverted_index.on | 51, 70 |
| abstract_inverted_index.to | 93 |
| abstract_inverted_index.we | 41 |
| abstract_inverted_index.and | 17, 53, 64, 73, 89 |
| abstract_inverted_index.are | 24 |
| abstract_inverted_index.but | 14 |
| abstract_inverted_index.can | 82 |
| abstract_inverted_index.has | 10 |
| abstract_inverted_index.own | 29 |
| abstract_inverted_index.the | 1, 7, 15, 20, 34, 60, 85 |
| abstract_inverted_index.With | 0 |
| abstract_inverted_index.also | 91 |
| abstract_inverted_index.been | 12 |
| abstract_inverted_index.hash | 97 |
| abstract_inverted_index.show | 78 |
| abstract_inverted_index.that | 79 |
| abstract_inverted_index.this | 80 |
| abstract_inverted_index.SHA-1 | 88 |
| abstract_inverted_index.based | 50, 69 |
| abstract_inverted_index.still | 25 |
| abstract_inverted_index.their | 28 |
| abstract_inverted_index.tools | 23, 63 |
| abstract_inverted_index.method | 45, 68, 81 |
| abstract_inverted_index.analyze | 57 |
| abstract_inverted_index.improve | 84 |
| abstract_inverted_index.propose | 42 |
| abstract_inverted_index.provide | 65 |
| abstract_inverted_index.trusted | 5 |
| abstract_inverted_index.variety | 95 |
| abstract_inverted_index.existing | 21, 37, 61 |
| abstract_inverted_index.pipeline | 54, 74 |
| abstract_inverted_index.shortage | 58 |
| abstract_inverted_index.tools’ | 39 |
| abstract_inverted_index.algorithm | 49 |
| abstract_inverted_index.gradually | 11 |
| abstract_inverted_index.integrity | 8, 47 |
| abstract_inverted_index.optimized | 67 |
| abstract_inverted_index.applicable | 92 |
| abstract_inverted_index.computing, | 6 |
| abstract_inverted_index.continuous | 2 |
| abstract_inverted_index.practical; | 13 |
| abstract_inverted_index.restricted | 26 |
| abstract_inverted_index.technology | 72 |
| abstract_inverted_index.Considering | 33 |
| abstract_inverted_index.Experiments | 77 |
| abstract_inverted_index.algorithms. | 98 |
| abstract_inverted_index.application | 18 |
| abstract_inverted_index.development | 3 |
| abstract_inverted_index.measurement | 9, 22, 30, 38, 48, 62 |
| abstract_inverted_index.paralleling | 75 |
| abstract_inverted_index.performance | 86 |
| abstract_inverted_index.technology. | 76 |
| abstract_inverted_index.insufficient | 35 |
| abstract_inverted_index.multi-thread | 52, 71 |
| abstract_inverted_index.optimization | 44 |
| abstract_inverted_index.paralleling. | 55 |
| abstract_inverted_index.performance, | 40 |
| abstract_inverted_index.performance. | 32 |
| abstract_inverted_index.algorithm’s | 31 |
| abstract_inverted_index.significantly | 83 |
| abstract_inverted_index.popularization | 16 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 4 |
| citation_normalized_percentile.value | 0.28038415 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |