Enhancing Privacy for Digital Communication. Protecting one's privacy in cyber world is a challenging task. Every contact to a Web server leaves a digital footprint that can be linked with other publicly available information to compile a profile of one's activities. Anonymous communication is a powerful tool for enhancing individuals' privacy and providing services such as electronic election where a person's vote must be unlinkable to him/her. However, anonymity may be misused by criminals to ....Enhancing Privacy for Digital Communication. Protecting one's privacy in cyber world is a challenging task. Every contact to a Web server leaves a digital footprint that can be linked with other publicly available information to compile a profile of one's activities. Anonymous communication is a powerful tool for enhancing individuals' privacy and providing services such as electronic election where a person's vote must be unlinkable to him/her. However, anonymity may be misused by criminals to hide their identities and engage in illegal activities. The aim of this project is to design and analyse privacy enhancing communication systems that balance individuals' privacy and accountability, and develop criteria and metrics to compare performance of these systems.Read moreRead less
Mathematics of Cryptography. The Australian economy and society requires fast, reliable, and secure communication. Current first-generation security solutions are not capable of supporting the efficiency and scalability requirements of mass-market adoption of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined. Thus developing new mathematically solid tools in this area is an important and urgent tasks. In addition, t ....Mathematics of Cryptography. The Australian economy and society requires fast, reliable, and secure communication. Current first-generation security solutions are not capable of supporting the efficiency and scalability requirements of mass-market adoption of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined. Thus developing new mathematically solid tools in this area is an important and urgent tasks. In addition, the intended work advances our knowledge of the theory and the quality of our culture. As such, it will promote the Australian science and will also have many practical applications in Cryptography, Computer Security and E-Commerce.Read moreRead less
Approximate authentication systems for digital information. Assurance about the origin and integrity of digital content is crucial not only in high security applications but also in everyday life scenarios such as providing proof that an X-ray image presented as part of an insurance claim is authentic, or a news clip is not tampered with. The outcomes of this project will significantly enhance trustworthiness of multimedia information systems which are increasingly used in areas such as surveil ....Approximate authentication systems for digital information. Assurance about the origin and integrity of digital content is crucial not only in high security applications but also in everyday life scenarios such as providing proof that an X-ray image presented as part of an insurance claim is authentic, or a news clip is not tampered with. The outcomes of this project will significantly enhance trustworthiness of multimedia information systems which are increasingly used in areas such as surveillance (traffic control), health, digital content production and distribution, tourism and journalism. It will also result in the development of secure biometric authentication systems which are critical in securing cyber space.Read moreRead less
Geometric representation of small-rank totally disconnected groups. Mathematics research creates and develops new concepts for understanding the world. Group theory is a branch of mathematics based on our innate sense of of symmetry. It was invented 200 hundred years ago and has grown into a language for analysing and classifying things ranging from wallpaper patterns to crystals, the fundamental particles of physics and Rubik's cube. The chief investigators have significant breakthroughs in the ....Geometric representation of small-rank totally disconnected groups. Mathematics research creates and develops new concepts for understanding the world. Group theory is a branch of mathematics based on our innate sense of of symmetry. It was invented 200 hundred years ago and has grown into a language for analysing and classifying things ranging from wallpaper patterns to crystals, the fundamental particles of physics and Rubik's cube. The chief investigators have significant breakthroughs in the study of symmetry groups of networks, giving Australia an international lead in this research. The project will develop the insights gained to make Australia a centre of expertise on these symmetry groups, which have applications to information and communication technology, among many others.Read moreRead less
Credential Systems and Their Applications in Securing Electronic Health Records. The expected result of this project will be frontier technologies that are essential in applications and services, whose acceptance and take-up will depend on users' assurance of their security in the cyber world. In particular, a service such as the EHR system, which is known to be a complex system, requires the use of new and innovative credential-based systems. The result will also contribute to maintaining Austr ....Credential Systems and Their Applications in Securing Electronic Health Records. The expected result of this project will be frontier technologies that are essential in applications and services, whose acceptance and take-up will depend on users' assurance of their security in the cyber world. In particular, a service such as the EHR system, which is known to be a complex system, requires the use of new and innovative credential-based systems. The result will also contribute to maintaining Australia's leading position in the telecommunication and information technology industries, which has been recognised by increased government funding levels. The resulting applications of this project will place Australia as the first country able to design and implement a secure EHR system.Read moreRead less
Reflection groups. The study of symmetry in geometrical and abstract contexts is a central issue in such diverse areas as mathematical physics, singularity theory, algebraic geometry, quantum groups and the study of knots and braids. Group theory provides the mathematical framework for the analysis of symmetry. Reflection groups, simple examples of which are the symmetry groups of the five platonic solids, play a key role in all of the areas mentioned above. Thus an improved understanding of ref ....Reflection groups. The study of symmetry in geometrical and abstract contexts is a central issue in such diverse areas as mathematical physics, singularity theory, algebraic geometry, quantum groups and the study of knots and braids. Group theory provides the mathematical framework for the analysis of symmetry. Reflection groups, simple examples of which are the symmetry groups of the five platonic solids, play a key role in all of the areas mentioned above. Thus an improved understanding of reflection groups will significantly enhance the development of several important theories.
Read moreRead less
Secure and Practical Anonymous Electronic Payment and Applications. The expected results of this project will be frontier technologies that are essential in applications and services whose acceptance and take-up will depend on users' assurance about their security in the cyber world. The project will contribute to the economic and social advancement of Australia by allowing effective usage of advanced IT technologies. This development will also maintain Australia's leading position in the teleco ....Secure and Practical Anonymous Electronic Payment and Applications. The expected results of this project will be frontier technologies that are essential in applications and services whose acceptance and take-up will depend on users' assurance about their security in the cyber world. The project will contribute to the economic and social advancement of Australia by allowing effective usage of advanced IT technologies. This development will also maintain Australia's leading position in the telecommunication and IT industries, which is well recognised by increasing levels of government. The resulting application will place Australia as the first country able to design and implement a provably secure and practical e-payment system.Read moreRead less
Quantized representation theory. The representation theory of quantized algebras, or deformation algebras, is a rapidly expanding and exciting field. It has wide ranging applications from within mathematics, to knot theory and statistical mechanics. This project addresses several important open problems in the area with an emphasis on structural innovations and computing explicit numerical invariants.
Algorithmics for Interactive 2.5D Graph Drawing. Technological advances have provided a data deluge over the past few years, and consequently have led to many large and complex network models in many domains. This includes terrorrist networks and biological networks, software engineering structures, and webgraphs. Visualisation is an effective tool in helping humans to understand such networks. This project aims to provide a new direction in network visualisation, using 2.5 dimensions. The algor ....Algorithmics for Interactive 2.5D Graph Drawing. Technological advances have provided a data deluge over the past few years, and consequently have led to many large and complex network models in many domains. This includes terrorrist networks and biological networks, software engineering structures, and webgraphs. Visualisation is an effective tool in helping humans to understand such networks. This project aims to provide a new direction in network visualisation, using 2.5 dimensions. The algorithms developed in the project will help security analysts to detect abnormal behavious such as money laundering, help biologists understand protein-protein interaction networks, and help engineers to understand large software systems.Read moreRead less
Short Signatures: Tools for Securing Digital Transactions, and Their Applications. The expected result of this project will be frontier technologies that are essential in applications and services, eg. transactions over mobile devices, whose acceptance will be dependent on users' assurance about their security in the Cyber world. The result will also contribute to maintaining Australia's leading position in the telecommunication and information technology industries, which is well recognised by ....Short Signatures: Tools for Securing Digital Transactions, and Their Applications. The expected result of this project will be frontier technologies that are essential in applications and services, eg. transactions over mobile devices, whose acceptance will be dependent on users' assurance about their security in the Cyber world. The result will also contribute to maintaining Australia's leading position in the telecommunication and information technology industries, which is well recognised by the government increasing funding levels. Using provably secure short signature schemes in the Internet world will ultimately contribute to lowering costs, increasing productivity and therefore, a more competitive economy. The project will produce high quality graduates by generating research opportunities for students.Read moreRead less