Advances in the Verification of Communication Protocols. Australia's economy is becoming increasingly dependent on many complex distributed systems. Some important examples are the Internet, electronic commerce, financial networks, transportation systems, health care networks, telecommunication networks, defence systems, intelligent manufacturing systems and organisational workflow management systems. Failure in these systems can result in serious financial loss (in banking applications) and los ....Advances in the Verification of Communication Protocols. Australia's economy is becoming increasingly dependent on many complex distributed systems. Some important examples are the Internet, electronic commerce, financial networks, transportation systems, health care networks, telecommunication networks, defence systems, intelligent manufacturing systems and organisational workflow management systems. Failure in these systems can result in serious financial loss (in banking applications) and loss of life or serious accidents in safety critical areas (medical, transport and defence applications). It is thus of utmost importance that distributed systems are designed correctly. This project aims to advance the state of the art in verifying that distributed systems will work correctly.Read moreRead less
RNS Hardware for Public-Key Cryptography and E-security. In a world where electronic communication is ever-present, the security of electronic information, e-security, is an issue of the utmost concern for government, business and individuals alike. Public-key cryptography is a powerful tool in the e-security toolkit. Using this technology it is possible to confirm the identity of individuals, maintain the privacy of personal data and guarantee the authenticity of transactions.
The aim of this ....RNS Hardware for Public-Key Cryptography and E-security. In a world where electronic communication is ever-present, the security of electronic information, e-security, is an issue of the utmost concern for government, business and individuals alike. Public-key cryptography is a powerful tool in the e-security toolkit. Using this technology it is possible to confirm the identity of individuals, maintain the privacy of personal data and guarantee the authenticity of transactions.
The aim of this project is to design new public-key cryptography hardware to provide faster, more secure communications for computers, networks and smart cards. Achieving this will require innovations in the way computers perform arithmetic and how this arithmetic is realised as an integrated circuit.Read moreRead less