Secure and Efficient Cryptographic Hashing. This project will enhance information security, which is absolutely crucial for rapidly growing e-commerce, e-government services and for national security (Priority 4 -Safeguarding Australia - Protection against Terrorism and Crime). The project will strengthen international collaboration by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. At the same time, the project will he ....Secure and Efficient Cryptographic Hashing. This project will enhance information security, which is absolutely crucial for rapidly growing e-commerce, e-government services and for national security (Priority 4 -Safeguarding Australia - Protection against Terrorism and Crime). The project will strengthen international collaboration by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. At the same time, the project will help to maintain high research profile of Australian researchers, to increase the capacity for consultancy and contract work, and provide a cutting-edge information technology for the Australian telecommunications industry, business and government (Priority 3 - Frontier Technologies). Read moreRead less
Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic ....Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic properties and later we derive a design methodology for provably secure stream ciphers. The project leads to new secure and efficient designs for stream ciphers that are the preferred cryptographic tools used in Australian industry.Read moreRead less
Algebraic Properties of Cryptographic Components and their Cryptanalysis. The outcomes will enhance information and communication security, which is absolutely crucial for the rapidly growing e-commerce and e-government services in Australia. International collaboration will be strengthened by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. Our project will help to maintain a high profile of Australian researchers, to i ....Algebraic Properties of Cryptographic Components and their Cryptanalysis. The outcomes will enhance information and communication security, which is absolutely crucial for the rapidly growing e-commerce and e-government services in Australia. International collaboration will be strengthened by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. Our project will help to maintain a high profile of Australian researchers, to increase the capacity for consultancy and contract work, and provide a cutting-edge information technology for the Australian telecommunications industry, business and government.Read moreRead less
Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach ....Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach can be applied to design new and more powerful factoring algorithms. The project has an explosive potential to redefine the theory and practice of modern cryptography.Read moreRead less
Expressiveness Comparison and Interchange Facilitation between Business Process Execution Languages. Developments in the area of business process management are currently hindered by the plethora of diverse business process execution languages. This project will develop techniques for dealing with interoperability issues induced by this language heterogeneity. The project combines theoretical research, grounded in concurrency theory and workflow patterns, with pragmatic research focusing on lang ....Expressiveness Comparison and Interchange Facilitation between Business Process Execution Languages. Developments in the area of business process management are currently hindered by the plethora of diverse business process execution languages. This project will develop techniques for dealing with interoperability issues induced by this language heterogeneity. The project combines theoretical research, grounded in concurrency theory and workflow patterns, with pragmatic research focusing on languages supported by commercial tools. The outcome will be a framework for comparing the expressiveness of process execution languages and defining mappings between them. This will place Australia at the forefront of developments in business process management systems: a crucial technology in today's global, dynamic, and heterogeneous environments.
Read moreRead less
Taming media for the masses: Computational frameworks for intelligent digital media capture, management, and sharing. The core issues tackled in this project are learning, recognition and application of semantics in multimedia data and the context of its creation and use - a foundational issue in pattern recognition with many applications. The project is part of the Institute for Multi-sensor Processing and Content Analysis whose aim is to tackle technical issues in large scale pattern recogniti ....Taming media for the masses: Computational frameworks for intelligent digital media capture, management, and sharing. The core issues tackled in this project are learning, recognition and application of semantics in multimedia data and the context of its creation and use - a foundational issue in pattern recognition with many applications. The project is part of the Institute for Multi-sensor Processing and Content Analysis whose aim is to tackle technical issues in large scale pattern recognition. By developing scalable and robust techniques to extract information from large scale multi-modal data, the applications include large scale surveillance systems from multi-modal data (e.g. airport security, smart homes for the aged), context-aware devices, and the next generation of media creation and repurposing tools - a fast-growing sector of the economy.Read moreRead less
Learning Semi-Naive Bayesian Classifiers from Numeric Data. This project addresses research priority 3, offering frontier technologies. It will deliver better and faster classification technologies that greatly help accomplish many real-world tasks including medical diagnosis, fraud detection, spam filtering and webpage search, where accurate and fast classification is critical to save life, increase efficiency, reduce crime and conserve resources. Hence this project addresses priority 4 as well ....Learning Semi-Naive Bayesian Classifiers from Numeric Data. This project addresses research priority 3, offering frontier technologies. It will deliver better and faster classification technologies that greatly help accomplish many real-world tasks including medical diagnosis, fraud detection, spam filtering and webpage search, where accurate and fast classification is critical to save life, increase efficiency, reduce crime and conserve resources. Hence this project addresses priority 4 as well, better safeguarding Australia from disease and crime. This project will also support a young research group of international standing. It will train the involved researchers to attain a high level of proficiency and excellence in machine learning research and development.Read moreRead less
Rapidly Locating Items in Distribution Networks with Process-Driven Nodes. Safety-critical product recalls are a major public health issue in Australia. Recent extortion attempts involving poisoning of chocolate bars, paracetamol tablets and biscuits have demonstrated the urgent need for improved ways of locating commercial products that have been released into the community. Existing product recall tools are effective only within regulated manufacturing and warehousing facilities. This project ....Rapidly Locating Items in Distribution Networks with Process-Driven Nodes. Safety-critical product recalls are a major public health issue in Australia. Recent extortion attempts involving poisoning of chocolate bars, paracetamol tablets and biscuits have demonstrated the urgent need for improved ways of locating commercial products that have been released into the community. Existing product recall tools are effective only within regulated manufacturing and warehousing facilities. This project will develop novel techniques for locating items in large-scale distribution networks driven by complex logistic processes. The outcomes of the project will make it easier to rapidly and accurately pinpoint product locations outside controlled facilities, thus contributing to both cost savings and public safety.Read moreRead less
Development of methods to address internet crime. If this research accomplishes successfully, it will be a big step forward in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crimes more effectively and efficiently. It will also limit the damage caused by Internet crimes quickly. For example, if we can quickly identify the origins of a fast spreading virus, we will be able to prevent its propagation as fast as possible. I ....Development of methods to address internet crime. If this research accomplishes successfully, it will be a big step forward in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crimes more effectively and efficiently. It will also limit the damage caused by Internet crimes quickly. For example, if we can quickly identify the origins of a fast spreading virus, we will be able to prevent its propagation as fast as possible. If we can quickly identify and block a harmful phishing site, then less innocent people will be deceived into disclosing their credit card numbers, bank account information, passwords or other sensitive information.Read moreRead less
Quality of Service-based Scheduling of e-Research Application Workflows on Global Grids. e-Research has the potential to offer Australia significant economic and social benefits as it enables researchers from different disciplines and organisations to engage in collaborative scientific investigation. In e-Research environments, users need to have secure access to remote resources owned by different organisations. Since these resources are not directly under the control of e-Research applications ....Quality of Service-based Scheduling of e-Research Application Workflows on Global Grids. e-Research has the potential to offer Australia significant economic and social benefits as it enables researchers from different disciplines and organisations to engage in collaborative scientific investigation. In e-Research environments, users need to have secure access to remote resources owned by different organisations. Since these resources are not directly under the control of e-Research applications, they need to negotiate with resource providers for access time, duration, and the level of quality of service expected to make sure that the interlinked operations are performed as required. This project develops information and communications technologies that enable the creation of such e-Research environments.Read moreRead less