| [1] |
AKBAR H, ZUBAIR M, MALIK M S. Security issues and challenges in cloud computing [J]. International Journal for Electronic Crime Investigation, 2023, 7(1): 9-28.
|
| [2] |
KUMAR A, TIWARI G, MALVIYA A. Emerging security challenges in advanced cloud computing environment [C]// Proceedings of the 2nd International Conference on Advancements and Key Challenges in Green Energy and Computing. Piscataway: IEEE, 2024: 1-7.
|
| [3] |
TOULAS B. Data breach at Japanese telecom giant NTT hits 18,000 companies [EB/OL]. [2025-03-15]. .
|
| [4] |
RAO P M, DEEBAK B D. Security and privacy issues in smart cities/industries: technologies, applications, and challenges [J]. Journal of Ambient Intelligence and Humanized Computing, 2023, 14(8): 10517-10553.
|
| [5] |
MIRYALA N K, GUPTA D. Data security challenges and industry trends [J]. International Journal of Advanced Research in Computer and Communication Engineering, 2022, 11(11): 300-309.
|
| [6] |
LIN Y C, ZHANG B, PRASANNA V K. HitGNN: high-throughput GNN training framework on CPU+ multi-FPGA heterogeneous platform [J]. IEEE Transactions on Parallel and Distributed Systems, 2024, 35(5): 707-719.
|
| [7] |
ZHUANG J, LAU J, YE H, et al. CHARM 2.0: composing heterogeneous accelerators for deep learning on Versal ACAP architecture [J]. ACM Transactions on Reconfigurable Technology and Systems, 2024, 17(3): No.51.
|
| [8] |
FARRELLY S, MANUMACHU R R, LASTOVETSKY A. OpenH: a novel programming model and API for developing portable parallel programs on heterogeneous hybrid servers [J]. IEEE Access, 2024, 12: 23666-23694.
|
| [9] |
DURGE R S, DESHMUKH V M. Securing cloud data: a hybrid encryption approach with RSA and AES for enhanced security and performance [J]. Journal of Integrated Science and Technology, 2025, 13(3): No.1060.
|
| [10] |
LAI J F, HENG S H. Secure file storage on cloud using hybrid cryptography [J]. Journal of Informatics and Web Engineering, 2022, 1(2): 1-18.
|
| [11] |
LI Z, ZHANG Y, DING A, et al. Efficient algorithms for task mapping on heterogeneous CPU/GPU platforms for fast completion time [J]. Journal of Systems Architecture, 2021, 114: No.101936.
|
| [12] |
XU H, LIU Y, LAU W C. Optimal job scheduling with resource packing for heterogeneous servers [J]. IEEE/ACM Transactions on Networking, 2021, 29(4): 1553-1566.
|
| [13] |
LIN Z, LI C, TIAN L, et al. A scheduling algorithm based on reinforcement learning for heterogeneous environments [J]. Applied Soft Computing, 2022, 130: No.109707.
|
| [14] |
SULAIMAN M, HALIM Z, LEBBAH M, et al. An evolutionary computing-based efficient hybrid task scheduling approach for heterogeneous computing environment [J]. Journal of Grid Computing, 2021, 19(1): No.11.
|
| [15] |
KRISHNASAMY K G, PERIASAMY S, PERIASAMY K, et al. A pair-task heuristic for scheduling tasks in heterogeneous multi-cloud environment [J]. Wireless Personal Communications, 2023, 131(2): 773-804.
|
| [16] |
左俊杰,肖锋,黄姝娟,等. 一种新的异构多核平台下多类型DAG调度方法[J]. 计算机应用研究, 2025, 42(2): 514-518.
|
|
ZUO J J, XIAO F, HUANG S J, et al. Novel scheduling method for multi-type DAG on heterogeneous multi-core platforms [J]. Application Research of Computers, 2025, 42(2): 514-518.
|
| [17] |
杨晨,肖晶,王密. 基于数据流分割和能耗感知的异构服务器系统任务调度[J]. 计算机科学, 2025, 52(2): 291-298.
|
|
YANG C, XIAO J, WANG M. Task scheduling in heterogeneous server systems based on data splitting and energy-aware strategies[J]. Computer Science, 2025, 52(2): 291-298.
|
| [18] |
关川江,李建鹏,史国振,等. 基于关联数据本地化的多密码作业流调度算法[J]. 计算机工程与科学, 2020, 42(11): 1988-1995.
|
|
GUAN C J, LI J P, SHI G Z, et al. A cloud cipher job stream scheduling algorithm based on associated data localization[J]. Computer Engineering and Science, 2020, 42(11): 1988-1995.
|
| [19] |
李建鹏,史国振,李莉,等. 异构云环境中的实时密码服务调度策略[J]. 计算机工程, 2019, 45(10): 1-7.
|
|
LI J P, SHI G Z, LI L, et al. Scheduling strategy for real-time cipher service in heterogeneous cloud environment [J]. Computer Engineering, 2019, 45(10): 1-7.
|
| [20] |
寇文龙,张宇阳,李凤华,等. 密码服务资源按需高效调度方案[J]. 通信学报, 2022, 43(6): 108-118.
|
|
KOU W L, ZHANG Y Y, LI F H, et al. On-demand and efficient scheduling scheme for cryptographic service resource [J]. Journal on Communications, 2022, 43(6): 108-118.
|
| [21] |
曹晓刚,李凤华,耿魁,等. 云环境下协同作业的密码服务优化调度算法[J]. 通信学报, 2024, 45(7): 84-100.
|
|
CAO X G, LI F H, GENG K, et al. Cryptographic service optimization scheduling algorithm for collaborative jobs in cloud environment[J]. Journal on Communications, 2024, 45(7): 84-100.
|
| [22] |
李莉,史国振,耿魁,等. 密码芯片的多算法随机作业流调度方法[J]. 通信学报, 2016, 37(12): 86-94.
|
|
LI L, SHI G Z, GENG K, et al. Stochastic job stream scheduling method for cipher chip with multi-cryptography [J]. Journal on Communications, 2016, 37(12): 86-94.
|
| [23] |
AMJAD M K, BUTT S I, KOUSAR R, et al. Recent research trends in genetic algorithm based flexible job shop scheduling problems [J]. Mathematical Problems in Engineering, 2018, 2018: No.9270802.
|
| [24] |
郑佳乐,韩跃平,唐道光. FPGA平台SM3密码杂凑算法的优化设计[J]. 单片机与嵌入式系统应用, 2023, 23(5): 33-36, 39.
|
|
ZHENG J L, HAN Y P, TANG D G. Optimization design of SM3 cryptographic hash algorithm on FPGA platform [J]. Microcontrollers & Embedded Systems, 2023, 23(5): 33-36, 39.
|
| [25] |
DONG J, LU S, ZHANG P, et al. G-SM3: high-performance implementation of GPU-based SM3 hash function [C]// Proceedings of the IEEE 28th International Conference on Parallel and Distributed Systems. Piscataway: IEEE, 2023: 201-208.
|
| [26] |
OpenSSL. OpenSSL homepage [EB/OL]. [2025-03-11]..
|
| [27] |
SHAHBAZI K, KO S B. High throughput and area‐efficient FPGA implementation of AES for high-traffic applications [J]. IET Computers and Digital Techniques, 2020, 14(6): 344-352.
|
| [28] |
LI J, XIE W, LI L, et al. Parallel implementation and optimization of SM4 based on CUDA [C]// Proceedings of the 2021 EAI International Conference on Applied Cryptography in Computer and Communications, LNICST 386. Cham: Springer, 2021: 93-104.
|
| [29] |
WU T, YE J, LU J. Hardware implementation of SM2 ECC protocols on FPGAs [C]// Proceedings of the IEEE 5th Information Technology, Networking, Electronic and Automation Control Conference. Piscataway: IEEE, 2021: 33-37.
|
| [30] |
FADHIL H M, YOUNIS M I. Parallelizing RSA algorithm on multicore CPU and GPU [J]. International Journal of Computer Applications, 2014, 87(6): 15-22.
|
| [31] |
AL-SHARAEH S, WELLS B E. A comparison of heuristics for list schedules using the Box-method and P-method for random digraph generation [C]// Proceedings of 28th Southeastern Symposium on System Theory. Piscataway: IEEE, 1996: 467-471.
|
| [32] |
Optimization Gurobi. Gurobi homepage[EB/OL]. [2025-01-15]..
|
| [33] |
CAIDA. The CAIDA UCSD anonymized internet traces [DB/OL]. [2024-03-15]..
|