Design of Secure Electronic Voting Systems. It is inevitable that electronic voting will eventually replace current paper based voting schemes. The main outcome of the research will be the fundamental knowledge required to develop secure electronic voting schemes. The security aspects of the design will be thoroughly analysed to ensure that the integrity of the ballot is maintained without compromising user privacy. The practical aspects of implementing such a system will also be investigated ....Design of Secure Electronic Voting Systems. It is inevitable that electronic voting will eventually replace current paper based voting schemes. The main outcome of the research will be the fundamental knowledge required to develop secure electronic voting schemes. The security aspects of the design will be thoroughly analysed to ensure that the integrity of the ballot is maintained without compromising user privacy. The practical aspects of implementing such a system will also be investigated and a prototype implementation provided. The project will combine the expertise in electronic voting schemes at QUT with that of Dr Lee.Read moreRead less
Secure Electronic Voting with Flexible Ballot Structure. It is inevitable that electronic voting will eventually replace current paper based voting schemes. Despite considerable research no secure solution is available for an electronic voting scheme allowing complex election rules, such as preferential voting used in Australia. The main outcome of the research will be the fundamental knowledge required to develop general secure and flexible electronic voting schemes. The security aspects of the ....Secure Electronic Voting with Flexible Ballot Structure. It is inevitable that electronic voting will eventually replace current paper based voting schemes. Despite considerable research no secure solution is available for an electronic voting scheme allowing complex election rules, such as preferential voting used in Australia. The main outcome of the research will be the fundamental knowledge required to develop general secure and flexible electronic voting schemes. The security aspects of the design will be thoroughly analysed to ensure that the integrity of the ballot is maintained without compromising user privacy. The practical aspects of implementing such a system will also be investigated and a prototype implementaion provided.Read moreRead less
Innovative Decoding Methods for Increased Error Correction of Reed-Solomon Codes and Related Ring Codes. The project addresses the holy grail in the area of Reed-Solomon/BCH decoding, namely the derivation of algebraic soft-decision decoding algorithms. These codes are the most frequently used error-correcting block codes and their performance does not fulfill its full potential due to the lack of algebraic soft-decision decoding methods. In the project the system-theoretic behavioural view is e ....Innovative Decoding Methods for Increased Error Correction of Reed-Solomon Codes and Related Ring Codes. The project addresses the holy grail in the area of Reed-Solomon/BCH decoding, namely the derivation of algebraic soft-decision decoding algorithms. These codes are the most frequently used error-correcting block codes and their performance does not fulfill its full potential due to the lack of algebraic soft-decision decoding methods. In the project the system-theoretic behavioural view is employed, which has proved itself successful in this area in recent years. The project aims to connect soft-decision decoding methods with the decoding of ring codes. Outcomes are decoding methods and algorithms for the australian telecommunications industry that enable increased error correction for Reed-Solomon/BCH codes and related ring codes.Read moreRead less
Secure and Efficient Electronic Auctions. For the first time in history electronic commerce promises the possibility of auctions to decide the correct market price for a widespread variety of everyday goods and services. Security and efficiency are critical factors in making this a reality, but almost all the many protocols for secure auctions proposed to date suffer from extreme computational requirements. This project will develop efficient and secure auction protocols using innovative approac ....Secure and Efficient Electronic Auctions. For the first time in history electronic commerce promises the possibility of auctions to decide the correct market price for a widespread variety of everyday goods and services. Security and efficiency are critical factors in making this a reality, but almost all the many protocols for secure auctions proposed to date suffer from extreme computational requirements. This project will develop efficient and secure auction protocols using innovative approaches based on advanced cryptographic techniques. In particular we will pioneer the exploration of secure microauctions suitable for negotiating the price of small value goods and utilities in almost real time.Read moreRead less
Advanced error control coding techniques for scalable blockchains. The project aims to investigate the application of error-control coding theory in blockchains, focusing on reducing the storage, computation, and communication overheads, as well as increasing the throughput of blockchain networks. The ambition is to develop coding theory in a completely new territory: decentralised, untrusted, and peer-to-peer networks. The intended outcome is to greatly extend the current state of the art of th ....Advanced error control coding techniques for scalable blockchains. The project aims to investigate the application of error-control coding theory in blockchains, focusing on reducing the storage, computation, and communication overheads, as well as increasing the throughput of blockchain networks. The ambition is to develop coding theory in a completely new territory: decentralised, untrusted, and peer-to-peer networks. The intended outcome is to greatly extend the current state of the art of the theory of error-control codes, previously investigated only in the context of centralised architectures, where a server coordinates every task. Practically, the project should provide significant benefits in terms of cost-effectiveness of blockchains, increase in their processing speed, and security enhancement. Read moreRead less
Practical unified framework for secure e-consent mechanism for health records. This project is driven by modern applications of cryptography and network security and their applications in securing e-health by enabling secure Personal Health Records (PHRs), which will play an important role in the future healthcare industry.
Security for Wireless Mobile Ad hoc Networks. Mobile ad hoc networks, a new emerging wireless networking paradigm, poses challenging problems in security, due to its dynamic nature and lack of centralised infrastructure, for which no adequate solutions exist today. This research addresses theory and design of secure mobile ad hoc networks. It achieves conceptual advances in terms of new security models for distributed location management, mobile authentication and multicasting; it proposes nove ....Security for Wireless Mobile Ad hoc Networks. Mobile ad hoc networks, a new emerging wireless networking paradigm, poses challenging problems in security, due to its dynamic nature and lack of centralised infrastructure, for which no adequate solutions exist today. This research addresses theory and design of secure mobile ad hoc networks. It achieves conceptual advances in terms of new security models for distributed location management, mobile authentication and multicasting; it proposes novel dynamic group key management and denial of service protection schemes, develops new security mechanisms for ad hoc routing, provides new insights into formal reasoning of security and demonstrates and evaluates practical secure wireless mobile applications.Read moreRead less
Achieving security and privacy in radio frequency identification (RFID) with lightweight security technologies. Secure RFID technology to achieve reliable identification is essential for protecting critical information infrastructures. However, they are prone to security attacks due to difficulties in protecting RFID systems. This project will develop new lightweight security techniques to achieve practical security solutions for RFID.
Internet authentication protocols: theory and practice. Authentication is the foundation for secure electronic communication. It is the first step for many everyday online processes such as remote login or electronic banking. This project aims to make analysis of such protocols more realistic and more complete, allowing online communication to become more secure for both corporate users and individuals.
Channel Coding for Beyond 5G. Significant improvements are required for ICT services if they are to meet the needs of rapid urbanization and industrial transformation while also addressing the current digital divide, which sees half of the world's population currently without sufficient access to the internet. The 6th-generation (6G) of mobile standards will be a key solution to the constantly increasing demands on our communications infrastructure. This project will develop novel communication ....Channel Coding for Beyond 5G. Significant improvements are required for ICT services if they are to meet the needs of rapid urbanization and industrial transformation while also addressing the current digital divide, which sees half of the world's population currently without sufficient access to the internet. The 6th-generation (6G) of mobile standards will be a key solution to the constantly increasing demands on our communications infrastructure. This project will develop novel communication strategies for 6G to service new applications with requirements way beyond what 5G can achieve. The outcomes of the project are expected to significantly improve users' data rate and enhance the reliability and coverage of mobile networks.Read moreRead less