Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of el ....Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users.Read moreRead less
Cryptographic Protocols from Pairings: Proofs and Designs. Modern society has become critically dependent on information and communications infrastructures. At the same time, the development of e-commerce is being slowed by lack of confidence in its security. By providing increased assurance and enhanced cryptographic security protocols this research will improve the dependability of the nation's information and communications infrastructure, as well as encourage the growth of e-commerce. Throu ....Cryptographic Protocols from Pairings: Proofs and Designs. Modern society has become critically dependent on information and communications infrastructures. At the same time, the development of e-commerce is being slowed by lack of confidence in its security. By providing increased assurance and enhanced cryptographic security protocols this research will improve the dependability of the nation's information and communications infrastructure, as well as encourage the growth of e-commerce. Through the expertise and experience gained with this project, Australia's excellence in information security research will be reinforced. The training of PhD and Honours students will provide a much needed source of highly trained information security professionals.Read moreRead less
Inequality of opportunity in Australia. This project aims to develop econometric approaches for identifying opportunity gaps in Australia and other developed countries. Inequality of opportunity arises when the birth lottery or external factors in later life, rather than personal efforts, determine a person’s chances of economic success. A high level of inequality of opportunity holds people back from realising their potential and from contributing productively to society. The project will focus ....Inequality of opportunity in Australia. This project aims to develop econometric approaches for identifying opportunity gaps in Australia and other developed countries. Inequality of opportunity arises when the birth lottery or external factors in later life, rather than personal efforts, determine a person’s chances of economic success. A high level of inequality of opportunity holds people back from realising their potential and from contributing productively to society. The project will focus on the effect of inequality of opportunity on income, health and education with special emphasis placed on Indigenous and migrant populations. The findings should help formulate cost-efficient policy interventions aimed at levelling the economic playing field.Read moreRead less
Secure and Efficient Cryptographic Hashing. This project will enhance information security, which is absolutely crucial for rapidly growing e-commerce, e-government services and for national security (Priority 4 -Safeguarding Australia - Protection against Terrorism and Crime). The project will strengthen international collaboration by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. At the same time, the project will he ....Secure and Efficient Cryptographic Hashing. This project will enhance information security, which is absolutely crucial for rapidly growing e-commerce, e-government services and for national security (Priority 4 -Safeguarding Australia - Protection against Terrorism and Crime). The project will strengthen international collaboration by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. At the same time, the project will help to maintain high research profile of Australian researchers, to increase the capacity for consultancy and contract work, and provide a cutting-edge information technology for the Australian telecommunications industry, business and government (Priority 3 - Frontier Technologies). Read moreRead less
Congestion control of networks: a unified stochastic framework. Systems such as the internet, wireless networks and the power grid require efficient allocation of shared resources. This research will develop ways to reduce delays in the internet and allow for growth in the power grid, without requiring additional infrastructure.
Understanding Dynamic Aspects of Economic Inequality. This project aims to study dynamic aspects of inequality in Australia by exploring the changes in labour and housing market conditions and their relation to the changes in the distribution of income and wealth over the last decade. The project also aims to develop new econometric techniques to examine the factors that are responsible for the changes in the distribution of income and wealth and a range of labour and housing market outcomes. Pa ....Understanding Dynamic Aspects of Economic Inequality. This project aims to study dynamic aspects of inequality in Australia by exploring the changes in labour and housing market conditions and their relation to the changes in the distribution of income and wealth over the last decade. The project also aims to develop new econometric techniques to examine the factors that are responsible for the changes in the distribution of income and wealth and a range of labour and housing market outcomes. Particular attention will be paid to the role of the changes in individual-specific characteristics (such as education, age, employment status, and occupation) and neighbourhood-specific characteristics (such as house prices and population ageing) in producing inequality.Read moreRead less
Embracing Changes for Responsive Video-sharing Services. Video-sharing platforms are a critical information channel for the public. Increasing scale and shifts in user base, with Generation Z now as the dominant user, have resulted in an unprecedented amount of ubiquitous changes in the content and users of these platforms which greatly challenges the responsiveness and quality of the services provided. This project aims to design innovative algorithms to effectively predict and leverage changes ....Embracing Changes for Responsive Video-sharing Services. Video-sharing platforms are a critical information channel for the public. Increasing scale and shifts in user base, with Generation Z now as the dominant user, have resulted in an unprecedented amount of ubiquitous changes in the content and users of these platforms which greatly challenges the responsiveness and quality of the services provided. This project aims to design innovative algorithms to effectively predict and leverage changes, optimise the value of changes, and extract insights from changes for diverse downstream applications of video-sharing platforms. The expected outcomes will create new-generation representation learning techniques, and provide practical tools to amplify the socioeconomic values of video-sharing platforms.Read moreRead less
Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applic ....Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applications of pairings. The results will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users. It will also support many new product opportunities aligned with Motorola's business markets.Read moreRead less
Efficient and Secure Word-Based Stream Ciphers for Wireless Communications. Wireless networks are increasingly being used for communication, and to manage and control Australia's critical infrastructure. However, current methods of securing wireless networks are flawed, putting the country's economy, environment, and citizens at risk. The most reliable method for protecting wireless communications requires secure and efficient encryption algorithms. However, flaws have been found in most algo ....Efficient and Secure Word-Based Stream Ciphers for Wireless Communications. Wireless networks are increasingly being used for communication, and to manage and control Australia's critical infrastructure. However, current methods of securing wireless networks are flawed, putting the country's economy, environment, and citizens at risk. The most reliable method for protecting wireless communications requires secure and efficient encryption algorithms. However, flaws have been found in most algorithms proposed to date. This project will examine existing algorithms and attacks to determine design criteria for secure encryption algorithms for use in a wireless environment. An algorithm which meets these criteria and can be implemented efficiently in hardware and software will be proposed.Read moreRead less
Secure and Efficient Electronic Auctions. For the first time in history electronic commerce promises the possibility of auctions to decide the correct market price for a widespread variety of everyday goods and services. Security and efficiency are critical factors in making this a reality, but almost all the many protocols for secure auctions proposed to date suffer from extreme computational requirements. This project will develop efficient and secure auction protocols using innovative approac ....Secure and Efficient Electronic Auctions. For the first time in history electronic commerce promises the possibility of auctions to decide the correct market price for a widespread variety of everyday goods and services. Security and efficiency are critical factors in making this a reality, but almost all the many protocols for secure auctions proposed to date suffer from extreme computational requirements. This project will develop efficient and secure auction protocols using innovative approaches based on advanced cryptographic techniques. In particular we will pioneer the exploration of secure microauctions suitable for negotiating the price of small value goods and utilities in almost real time.Read moreRead less