Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic ....Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic properties and later we derive a design methodology for provably secure stream ciphers. The project leads to new secure and efficient designs for stream ciphers that are the preferred cryptographic tools used in Australian industry.Read moreRead less
Algebraic Properties of Cryptographic Components and their Cryptanalysis. The outcomes will enhance information and communication security, which is absolutely crucial for the rapidly growing e-commerce and e-government services in Australia. International collaboration will be strengthened by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. Our project will help to maintain a high profile of Australian researchers, to i ....Algebraic Properties of Cryptographic Components and their Cryptanalysis. The outcomes will enhance information and communication security, which is absolutely crucial for the rapidly growing e-commerce and e-government services in Australia. International collaboration will be strengthened by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. Our project will help to maintain a high profile of Australian researchers, to increase the capacity for consultancy and contract work, and provide a cutting-edge information technology for the Australian telecommunications industry, business and government.Read moreRead less
Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach ....Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach can be applied to design new and more powerful factoring algorithms. The project has an explosive potential to redefine the theory and practice of modern cryptography.Read moreRead less
Fundamental Limits of Wireless Data Transmission over Interference Channels. This project aims to develop interference-resilient wireless data transmission techniques that can significantly improve the reliability and data rate of wireless communications. The expected outcomes of the research include new space-time coding techniques and interference coordination techniques. It is anticipated that the research will support the improvement of high-speed wireless communications and influence the de ....Fundamental Limits of Wireless Data Transmission over Interference Channels. This project aims to develop interference-resilient wireless data transmission techniques that can significantly improve the reliability and data rate of wireless communications. The expected outcomes of the research include new space-time coding techniques and interference coordination techniques. It is anticipated that the research will support the improvement of high-speed wireless communications and influence the development of broadband wireless access solutions.Read moreRead less
Interactive and scalable media over software defined networks. A novel API and associated algorithms will be developed to exploit the emerging technology of software defined networks (SDN) for improving the efficiency and responsiveness of interactive media browsing applications. The approach applies to conventional streaming video as well as more interactive services based on scalable media compression and communication technology, notably JPIP (IS15444-9) video. Recent advances in motion codin ....Interactive and scalable media over software defined networks. A novel API and associated algorithms will be developed to exploit the emerging technology of software defined networks (SDN) for improving the efficiency and responsiveness of interactive media browsing applications. The approach applies to conventional streaming video as well as more interactive services based on scalable media compression and communication technology, notably JPIP (IS15444-9) video. Recent advances in motion coding will be combined with new spatio-temporal transforms to develop an efficient inter-frame extension to the JPEG 2000 standard that is fully compatible with JPIP. Each of these innovations is important in its own right, but together they will facilitate a highly compelling interactive media browsing experience.Read moreRead less
Secure Crowdsourcing Classification with Privacy Protection against Servers. This project aims to enable comprehensive quality data classification via secure crowdsourcing. The quality of a data-intensive process, such as a Machine Learning algorithm, depends on the input data quality. By using a crowdsourcing classification, the project expects to overcome the painstaking and costly process of humans correctly annotating extensive input data from diverse real information. The expected outcomes ....Secure Crowdsourcing Classification with Privacy Protection against Servers. This project aims to enable comprehensive quality data classification via secure crowdsourcing. The quality of a data-intensive process, such as a Machine Learning algorithm, depends on the input data quality. By using a crowdsourcing classification, the project expects to overcome the painstaking and costly process of humans correctly annotating extensive input data from diverse real information. The expected outcomes are innovative technologies, guaranteeing accuracy and confidentiality of annotation results whilst protecting the privacy of data classification results. It enhances data-intensive outputs quality, which will benefit large data-intensive applications, such as cybersecurity protections via intrusion detection.Read moreRead less
Non-Parametric Modelling of Motion and Depth fields with Boundary Geometry for Scalable Compression and Dissemination. Applications for large format video surveillance are about to grow rapidly, starting with military applications and then moving into the civilian arena, highlighting the importance of compression for interactive dissemination, so as to make best use of limited communication channels. This project will develop an innovative representation for motion and depth/elevation maps, whi ....Non-Parametric Modelling of Motion and Depth fields with Boundary Geometry for Scalable Compression and Dissemination. Applications for large format video surveillance are about to grow rapidly, starting with military applications and then moving into the civilian arena, highlighting the importance of compression for interactive dissemination, so as to make best use of limited communication channels. This project will develop an innovative representation for motion and depth/elevation maps, which addresses a key obstacle in the deployment of technology for efficient interactive access to large format video and geospatial imagery. These applications are relevant to Australia's defence and infrastructure for smart information use. Moreover, this is a strategic proposal to strengthen Australia's existing lead in aspects of interactive media dissemination.Read moreRead less
Security for Mobile Agent Based Systems. Mobile agents are emerging to be a significant technology in networked computing and pose fundamental challenges in security, for which no suitable solutions exist today. This research project addresses the theory, architecture and design of secure mobile agent systems. It achieves key conceptual advances by proposing a comprehensive security mode and a novel computational trust model for mobile agents. It develops new schemes for dynamic privilege man ....Security for Mobile Agent Based Systems. Mobile agents are emerging to be a significant technology in networked computing and pose fundamental challenges in security, for which no suitable solutions exist today. This research project addresses the theory, architecture and design of secure mobile agent systems. It achieves key conceptual advances by proposing a comprehensive security mode and a novel computational trust model for mobile agents. It develops new schemes for dynamic privilege management and offers new insights into the open research problem of protection against malicious hosts. It considers a novel calculus to formally reason about security properties and demonstrates practical secure agent based Internet applications.Read moreRead less
Enhancing Privacy for Digital Communication. Protecting one's privacy in cyber world is a challenging task. Every contact to a Web server leaves a digital footprint that can be linked with other publicly available information to compile a profile of one's activities. Anonymous communication is a powerful tool for enhancing individuals' privacy and providing services such as electronic election where a person's vote must be unlinkable to him/her. However, anonymity may be misused by criminals to ....Enhancing Privacy for Digital Communication. Protecting one's privacy in cyber world is a challenging task. Every contact to a Web server leaves a digital footprint that can be linked with other publicly available information to compile a profile of one's activities. Anonymous communication is a powerful tool for enhancing individuals' privacy and providing services such as electronic election where a person's vote must be unlinkable to him/her. However, anonymity may be misused by criminals to hide their identities and engage in illegal activities. The aim of this project is to design and analyse privacy enhancing communication systems that balance individuals' privacy and accountability, and develop criteria and metrics to compare performance of these systems.Read moreRead less