Design of Secure Electronic Voting Systems. It is inevitable that electronic voting will eventually replace current paper based voting schemes. The main outcome of the research will be the fundamental knowledge required to develop secure electronic voting schemes. The security aspects of the design will be thoroughly analysed to ensure that the integrity of the ballot is maintained without compromising user privacy. The practical aspects of implementing such a system will also be investigated ....Design of Secure Electronic Voting Systems. It is inevitable that electronic voting will eventually replace current paper based voting schemes. The main outcome of the research will be the fundamental knowledge required to develop secure electronic voting schemes. The security aspects of the design will be thoroughly analysed to ensure that the integrity of the ballot is maintained without compromising user privacy. The practical aspects of implementing such a system will also be investigated and a prototype implementation provided. The project will combine the expertise in electronic voting schemes at QUT with that of Dr Lee.Read moreRead less
Secure Electronic Voting with Flexible Ballot Structure. It is inevitable that electronic voting will eventually replace current paper based voting schemes. Despite considerable research no secure solution is available for an electronic voting scheme allowing complex election rules, such as preferential voting used in Australia. The main outcome of the research will be the fundamental knowledge required to develop general secure and flexible electronic voting schemes. The security aspects of the ....Secure Electronic Voting with Flexible Ballot Structure. It is inevitable that electronic voting will eventually replace current paper based voting schemes. Despite considerable research no secure solution is available for an electronic voting scheme allowing complex election rules, such as preferential voting used in Australia. The main outcome of the research will be the fundamental knowledge required to develop general secure and flexible electronic voting schemes. The security aspects of the design will be thoroughly analysed to ensure that the integrity of the ballot is maintained without compromising user privacy. The practical aspects of implementing such a system will also be investigated and a prototype implementaion provided.Read moreRead less
Secure and Efficient Electronic Auctions. For the first time in history electronic commerce promises the possibility of auctions to decide the correct market price for a widespread variety of everyday goods and services. Security and efficiency are critical factors in making this a reality, but almost all the many protocols for secure auctions proposed to date suffer from extreme computational requirements. This project will develop efficient and secure auction protocols using innovative approac ....Secure and Efficient Electronic Auctions. For the first time in history electronic commerce promises the possibility of auctions to decide the correct market price for a widespread variety of everyday goods and services. Security and efficiency are critical factors in making this a reality, but almost all the many protocols for secure auctions proposed to date suffer from extreme computational requirements. This project will develop efficient and secure auction protocols using innovative approaches based on advanced cryptographic techniques. In particular we will pioneer the exploration of secure microauctions suitable for negotiating the price of small value goods and utilities in almost real time.Read moreRead less
Security for Wireless Mobile Ad hoc Networks. Mobile ad hoc networks, a new emerging wireless networking paradigm, poses challenging problems in security, due to its dynamic nature and lack of centralised infrastructure, for which no adequate solutions exist today. This research addresses theory and design of secure mobile ad hoc networks. It achieves conceptual advances in terms of new security models for distributed location management, mobile authentication and multicasting; it proposes nove ....Security for Wireless Mobile Ad hoc Networks. Mobile ad hoc networks, a new emerging wireless networking paradigm, poses challenging problems in security, due to its dynamic nature and lack of centralised infrastructure, for which no adequate solutions exist today. This research addresses theory and design of secure mobile ad hoc networks. It achieves conceptual advances in terms of new security models for distributed location management, mobile authentication and multicasting; it proposes novel dynamic group key management and denial of service protection schemes, develops new security mechanisms for ad hoc routing, provides new insights into formal reasoning of security and demonstrates and evaluates practical secure wireless mobile applications.Read moreRead less
Technical and Legal Models for Virtual Info-Sharing Networks (VISN) for Critical Infrastructure Protection (CIP). This project has substantial national benefit because it will result in the design of a virtual information sharing network (VISN) that will better protect Australia's critical infrastructure. It will provide a comprehensive legal/technical analysis of the requirements/characteristics necessary for the development of a VISN. The development of a secure environment for a VISN will i ....Technical and Legal Models for Virtual Info-Sharing Networks (VISN) for Critical Infrastructure Protection (CIP). This project has substantial national benefit because it will result in the design of a virtual information sharing network (VISN) that will better protect Australia's critical infrastructure. It will provide a comprehensive legal/technical analysis of the requirements/characteristics necessary for the development of a VISN. The development of a secure environment for a VISN will improve industry trust and confidence in participating in the sharing of sensitive information; especially the disclosure of potential vulnerabilities or ascertained potential threats. The project will improve information dissemination speeds and assist post information disclosure controls. Read moreRead less
Information Security Evaluation of Embedded Computer Software. Safeguarding classified electronic communications is of major national importance. This research, into security evaluation of computer software, is supported by the Defence Signals Directorate, which verifies the security of communications devices used by Australia's government and armed forces. As such devices become increasingly sophisticated, traditional security evaluation techniques have become unacceptably difficult and costl ....Information Security Evaluation of Embedded Computer Software. Safeguarding classified electronic communications is of major national importance. This research, into security evaluation of computer software, is supported by the Defence Signals Directorate, which verifies the security of communications devices used by Australia's government and armed forces. As such devices become increasingly sophisticated, traditional security evaluation techniques have become unacceptably difficult and costly. Hardware evaluation techniques, based on tracing paths through circuitry diagrams, have proven unsuitable for software evaluations. Consequently, devising new tools and techniques for information security evaluation of embedded computer software is essential for preserving Australia's national security.Read moreRead less
Specifications, Proofs and Animations for Cryptographic Protocols. Cryptographic protocols are fundamental security tools for electronic communications. Despite years of intensive research it remains difficult to obtain high confidence in the security of almost any new protocol. Research in the computer security community has emphasised formal specifications and state based searching, while the cryptographic community has concentrated instead on complexity theoretic proofs. This project will un ....Specifications, Proofs and Animations for Cryptographic Protocols. Cryptographic protocols are fundamental security tools for electronic communications. Despite years of intensive research it remains difficult to obtain high confidence in the security of almost any new protocol. Research in the computer security community has emphasised formal specifications and state based searching, while the cryptographic community has concentrated instead on complexity theoretic proofs. This project will unify these two approaches for the first time by formally specifying and animating the very models used in cryptographic proofs. The result will be proofs that are uniquely accessible to practioners combined with increased confidence that the proofs are both correct and relevant.Read moreRead less
Security Services for Stream-Oriented and Multicast-Based Communication. Multicast communication over lossy networks is becoming the basic for a growing number of aplications. It is therefore critical to provide sound security mechanisms for multicast communication. Yet, existing security protocols for multicast offer only partial solutions. This project is concerned with two major security problems of multicast communications: authentication and secrecy. The goal of this project is to: (1) deve ....Security Services for Stream-Oriented and Multicast-Based Communication. Multicast communication over lossy networks is becoming the basic for a growing number of aplications. It is therefore critical to provide sound security mechanisms for multicast communication. Yet, existing security protocols for multicast offer only partial solutions. This project is concerned with two major security problems of multicast communications: authentication and secrecy. The goal of this project is to: (1) develop a framework for analysis and evaluation of security services for multicast communication; (2) design efficient algorithms and protocols for securing emerging applications that are multicast-based and/or stream-oriented.
Read moreRead less
Special Research Initiatives - Grant ID: SR0354476
Funder
Australian Research Council
Funding Amount
$20,000.00
Summary
Intelligent Applications Through The Semantic Web. The primary aim of the proposed bid is to build a network of Australian researchers and their international peers for condresearch into the fundamental as well as applied aspects of the Semantic Web. By incorporating meaning of web-content in a form that can be accessed and processed by intelligent software agents, the Semantic Web will allow computers and humans to work in cooperation. This research will address the needs of both the Australian ....Intelligent Applications Through The Semantic Web. The primary aim of the proposed bid is to build a network of Australian researchers and their international peers for condresearch into the fundamental as well as applied aspects of the Semantic Web. By incorporating meaning of web-content in a form that can be accessed and processed by intelligent software agents, the Semantic Web will allow computers and humans to work in cooperation. This research will address the needs of both the Australian government and industry that provide and make smart use of information available on the Web. It will ensure Australian preparedness for the next-generation web technology.Read moreRead less
Formally-Based Security Evaluation Procedures. Guaranteeing information security is of critical national importance, especially in the current political climate. Devices intended to safeguard Australia's electronic communications must be proven secure using leading-edge techniques. Currently, evaluation of such devices relies on informal procedures and the experience of individuals. This project will introduce more rigour into security evaluations by adapting techniques from the fields of saf ....Formally-Based Security Evaluation Procedures. Guaranteeing information security is of critical national importance, especially in the current political climate. Devices intended to safeguard Australia's electronic communications must be proven secure using leading-edge techniques. Currently, evaluation of such devices relies on informal procedures and the experience of individuals. This project will introduce more rigour into security evaluations by adapting techniques from the fields of safety analysis and formal methods. In particular, mathematical concepts will be introduced using notations suitable for use by security personnel with no prior formal methods experience. The outcomes of this project will enable more efficient and effective information security evaluations.Read moreRead less