Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the c ....Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the complexity of an algorithm that solves the appropriate system of equations. This project leads to new techniques for the design and analysis of stream ciphers.Read moreRead less
Audit Security Models for Multiparty Internet Transactions. The aim of this project is to conduct the study for a secure, low overhead means of auditing secure transactions between two parties over the Internet, especially where some doubt surrounds the trustfulness of the other party.
A study will be conducted in this project by investigating security models for multiparty secure transactions in order to identify a number of likely applications for the technology, to develop a high level arch ....Audit Security Models for Multiparty Internet Transactions. The aim of this project is to conduct the study for a secure, low overhead means of auditing secure transactions between two parties over the Internet, especially where some doubt surrounds the trustfulness of the other party.
A study will be conducted in this project by investigating security models for multiparty secure transactions in order to identify a number of likely applications for the technology, to develop a high level architecture of the solution.Read moreRead less
Security for Web Services. Web services, an emerging distributed computing paradigm, poses challenging problems in security, due to their dynamic decentralised scalable nature, operating over an untrusted Internet, for which no adequate solutions exist today. This research addresses the model, architecture and design of secure authorisation for web services. It achieves conceptual advances in terms of a flexible authorisation model, proposes a new XML based policy language, develops a comprehens ....Security for Web Services. Web services, an emerging distributed computing paradigm, poses challenging problems in security, due to their dynamic decentralised scalable nature, operating over an untrusted Internet, for which no adequate solutions exist today. This research addresses the model, architecture and design of secure authorisation for web services. It achieves conceptual advances in terms of a flexible authorisation model, proposes a new XML based policy language, develops a comprehensive security policy management framework, designs a distributed authorisation service and demonstrates a practical secure web service system in .NET.It presents a new approach to formally reasoning about conflict resolution policies with dynamic delegation.Read moreRead less
Integrated Financial Fraud Detection in Enterprise Applications. Fraud costs the Australian economy at least $3 billion per year. The incidence of fraud within the Australian economy is increasing. Australian entities are ill-prepared to detect and prevent fraud against their businesses with very few developing or implementing any form of fraud control strategy (AS 8001-2003). The growing use of the Internet by organisations for electronic commerce increases their exposure to fraudulent activiti ....Integrated Financial Fraud Detection in Enterprise Applications. Fraud costs the Australian economy at least $3 billion per year. The incidence of fraud within the Australian economy is increasing. Australian entities are ill-prepared to detect and prevent fraud against their businesses with very few developing or implementing any form of fraud control strategy (AS 8001-2003). The growing use of the Internet by organisations for electronic commerce increases their exposure to fraudulent activities. Inevitably much of the cost of fraud is passed on to the customers and the community at large. By providing large organisations with an approach to assist in detecting fraudulent behaviour in accounting systems, it is envisaged that this research will assist in reducing the impact of fraud on society.Read moreRead less
Defence Against Phishing Attacks. Australian businesses and citizens are losing millions of dollars in cybercrimes every year. Rural and regional businesses depend on the integrity of their Internet banking service, and yet, cybercriminals are working hard to defraud these users. This project aims to build a reliable defence against phishing attacks which rely on social engineering to steal online identities, using intelligence gathered from the brazen trade of credentials in the public domain.
Security Techniques against Denial of Service Attacks in Networked Systems. As more and more business opportunities are created over the Internet, dealing with network-based intrusions and denial of service (DoS) attacks is becoming increasingly critical (as witnessed recently last year). The proposed research addresses systematically the theory and analysis of DoS attacks and develops new techniques and practical solutions to counteract them. We will investigate a hybrid method to counteract Do ....Security Techniques against Denial of Service Attacks in Networked Systems. As more and more business opportunities are created over the Internet, dealing with network-based intrusions and denial of service (DoS) attacks is becoming increasingly critical (as witnessed recently last year). The proposed research addresses systematically the theory and analysis of DoS attacks and develops new techniques and practical solutions to counteract them. We will investigate a hybrid method to counteract DoS, propose a new technique to identify malicious packets in the Internet to handle distributed DoS, consider a new approach using smart packets and develop enhancements to intrusion detection systems using data mining. Proposed techniques are analysed in practical situations.Read moreRead less
Secure and Dynamic Single Identification Systems. The expected results of the project will be frontier technologies that are essential in applications and services whose acceptance and take-up will be dependent on users' assurance of their privacy. Services, such as medical information or bank information, require a secure identification scheme. Securing such services will encourage new forms of collaboration among a wider range of users with the likely impact of a more productive global economy ....Secure and Dynamic Single Identification Systems. The expected results of the project will be frontier technologies that are essential in applications and services whose acceptance and take-up will be dependent on users' assurance of their privacy. Services, such as medical information or bank information, require a secure identification scheme. Securing such services will encourage new forms of collaboration among a wider range of users with the likely impact of a more productive global economy. This impact will be particularly emphasised in Australia with its geographically disperse population. Securing vital electronic transactions will ultimately contribute to lowering costs and increasing productivity and so creating a more competitive economy.Read moreRead less
Semantic Authentication of Visual Data. Data authentication systems can detect the smallest modification to a message. Authentication systems for media objects such as images, and audio and video clips have a different requirement they must ensure authenticity of the content without needing all the changes to be detectable. The aims of this project are to develop a framework for design and analysis of image and video authentication systems, and construct secure and flexible systems that can be ....Semantic Authentication of Visual Data. Data authentication systems can detect the smallest modification to a message. Authentication systems for media objects such as images, and audio and video clips have a different requirement they must ensure authenticity of the content without needing all the changes to be detectable. The aims of this project are to develop a framework for design and analysis of image and video authentication systems, and construct secure and flexible systems that can be used in practice. This research addresses the urgent need of providing security for multimedia objects in electronic commerce and is of high importance to the acceptance of advanced communication and information services.Read moreRead less
A Novel Optical Network Security and Encryption Device. The project falls within two of the desginated National Research Priorities, namely Frontier Technologies for Building and Transforming Australian Industries and Safeguarding Australia. The project will generate high quality graduates and will result in a novel photonic device. The outcome of this project would be an optical encryption device that will safeguard Australia through superior secure data communications. It will also create lucr ....A Novel Optical Network Security and Encryption Device. The project falls within two of the desginated National Research Priorities, namely Frontier Technologies for Building and Transforming Australian Industries and Safeguarding Australia. The project will generate high quality graduates and will result in a novel photonic device. The outcome of this project would be an optical encryption device that will safeguard Australia through superior secure data communications. It will also create lucrative opportunity for expanding the export capabilities of Australian ICT industry.Read moreRead less