ARDC Research Link Australia Research Link Australia   BETA Research
Link
Australia
  • ARDC Newsletter Subscribe
  • Contact Us
  • Home
  • About
  • Feedback
  • Explore Collaborations
  • Researcher
  • Funded Activity
  • Organisation
  • Researcher
  • Funded Activity
  • Organisation
  • Researcher
  • Funded Activity
  • Organisation

Need help searching? View our Search Guide.

Advanced Search

Current Selection
Field of Research : Data Encryption
Field of Research : Applied Discrete Mathematics
Clear All
Filter by Field of Research
Applied Discrete Mathematics (2)
Data Encryption (2)
Computer Software (1)
Computer System Security (1)
Computer-Human Interaction (1)
Data Format (1)
Filter by Socio-Economic Objective
Expanding Knowledge in the Information and Computing Sciences (2)
Expanding Knowledge in the Mathematical Sciences (1)
Information and Communication Services not elsewhere classified (1)
Filter by Funding Provider
Australian Research Council (2)
Filter by Status
Active (1)
Closed (1)
Filter by Scheme
ARC Future Fellowships (1)
Discovery Projects (1)
Filter by Country
Australia (2)
Filter by Australian State/Territory
NSW (1)
QLD (1)
VIC (1)
  • Researchers (3)
  • Funded Activities (2)
  • Organisations (3)
  • Active Funded Activity

    ARC Future Fellowships - Grant ID: FT140101145

    Funder
    Australian Research Council
    Funding Amount
    $796,552.00
    Summary
    Ultimately Trusted Security through Human-Powered Cryptography. Cryptography offers wonderful tools for unbreakable data security, but only between computer nodes, leaving their human owners helpless. Encrypted tunnels terminate not at humans but at mobile phones and personal computers, exposing users' secrets to spyware from search-engine keyloggers to full-bore malware planted by crooks, hackers, and foreign spy agencies. This project aims to create a simple and strong cryptography, so that hu .... Ultimately Trusted Security through Human-Powered Cryptography. Cryptography offers wonderful tools for unbreakable data security, but only between computer nodes, leaving their human owners helpless. Encrypted tunnels terminate not at humans but at mobile phones and personal computers, exposing users' secrets to spyware from search-engine keyloggers to full-bore malware planted by crooks, hackers, and foreign spy agencies. This project aims to create a simple and strong cryptography, so that humans can, for the first time, take front seat in real security protocols. The technical challenge is to build public-key ciphers, operable manually from a mental key in seconds, and from there remake human-powered versions of many useful information security protocols.
    Read more Read less
    More information
    Funded Activity

    Discovery Projects - Grant ID: DP160100913

    Funder
    Australian Research Council
    Funding Amount
    $435,000.00
    Summary
    Security and Privacy of Individual Data Used to Extract Public Information. The project aims to contribute to the development of techniques to allow the harvesting of useful information without compromising personal privacy. Intelligent analysis of personal data can reveal valuable knowledge about a population but at a risk of invading an individual's privacy. This project aims to provide at least partial solutions to some of the problems associated with the protection of private data. In partic .... Security and Privacy of Individual Data Used to Extract Public Information. The project aims to contribute to the development of techniques to allow the harvesting of useful information without compromising personal privacy. Intelligent analysis of personal data can reveal valuable knowledge about a population but at a risk of invading an individual's privacy. This project aims to provide at least partial solutions to some of the problems associated with the protection of private data. In particular, it plans to work on the problem of security of statistical databases and privacy of streaming data. This would be underpinned by a study of anonymisation and homomorphic encryption. The expected outcomes are new theoretical results, new algorithms and protocols applicable to at least some of the current significant problems in information security.
    Read more Read less
    More information

    Showing 1-2 of 2 Funded Activites

    Advanced Search

    Advanced search on the Researcher index.

    Advanced search on the Funded Activity index.

    Advanced search on the Organisation index.

    National Collaborative Research Infrastructure Strategy

    The Australian Research Data Commons is enabled by NCRIS.

    ARDC CONNECT NEWSLETTER

    Subscribe to the ARDC Connect Newsletter to keep up-to-date with the latest digital research news, events, resources, career opportunities and more.

    Subscribe

    Quick Links

    • Home
    • About Research Link Australia
    • Product Roadmap
    • Documentation
    • Disclaimer
    • Contact ARDC

    We acknowledge and celebrate the First Australians on whose traditional lands we live and work, and we pay our respects to Elders past, present and emerging.

    Copyright © ARDC. ACN 633 798 857 Terms and Conditions Privacy Policy Accessibility Statement
    Top
    Quick Feedback