Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Internet authentication protocols: theory and practice. Authentication is the foundation for secure electronic communication. It is the first step for many everyday online processes such as remote login or electronic banking. This project aims to make analysis of such protocols more realistic and more complete, allowing online communication to become more secure for both corporate users and individuals.
Post-Quantum Functional Encryption : Principles, Protocols and Practice. Modern cryptography has the power to revolutionise virtually every aspect of our online lives. Large-scale secure data sharing could become a breeze, with tools such as functional encryption (FE) to give us fine control over access rights by means of expressive languages, and there will be no more juggling of crypto keys. Finally, the known foundations of FE will crumble when even small-sized quantum computers become realit ....Post-Quantum Functional Encryption : Principles, Protocols and Practice. Modern cryptography has the power to revolutionise virtually every aspect of our online lives. Large-scale secure data sharing could become a breeze, with tools such as functional encryption (FE) to give us fine control over access rights by means of expressive languages, and there will be no more juggling of crypto keys. Finally, the known foundations of FE will crumble when even small-sized quantum computers become reality, perhaps next decade. This project aims to recreate and expand the power of FE from post-quantum (PQ) mathematical principles, immune to quantum attacks, building on recent discoveries of limited forms of PQ-FE from rock-solid crypto principles. It begs exploring, for the truly spectacular outcomes likely to ensue.Read moreRead less
Embedding Enterprise Systems in IoT Fog Networks through Microservices. The project will enable automated re-engineering of enterprise systems, to allow them to reused in Internet-of-Things (IoT) applications. It will support efficient ways in which the core business logic of these large scale and monolithic systems can be extended into resource control and data sensing functions managed through the IoT. The project will develop a novel, fine-grained software architecture style suitable for loca ....Embedding Enterprise Systems in IoT Fog Networks through Microservices. The project will enable automated re-engineering of enterprise systems, to allow them to reused in Internet-of-Things (IoT) applications. It will support efficient ways in which the core business logic of these large scale and monolithic systems can be extended into resource control and data sensing functions managed through the IoT. The project will develop a novel, fine-grained software architecture style suitable for localised IoT execution, through microservices executing autonomously on nodes of IoT fog networks. It will develop new techniques for automated discovery of microservices from enterprise systems and the verification of future-state system execution based on current-state behavioural and other properties such as security.Read moreRead less
Feature-Level Fusion with Incomplete Data for Automatic Person Identification. This research addresses the current key problems in automated person recognition with incomplete data using multiple traits. The outcomes of this research will not only make a significant contribution to fundamental theory but also result in a wide range of crime and terrorism preventing applications including police database searching, access control, security monitoring and surveillance. They can be used either by p ....Feature-Level Fusion with Incomplete Data for Automatic Person Identification. This research addresses the current key problems in automated person recognition with incomplete data using multiple traits. The outcomes of this research will not only make a significant contribution to fundamental theory but also result in a wide range of crime and terrorism preventing applications including police database searching, access control, security monitoring and surveillance. They can be used either by police and law enforcement agencies, or at places of airport, government buildings, military facilities and even sensitive areas in offices and factories. It will help reduce crime, enhance the security of the nation to a world-advanced level, and generate new industry and export opportunities for Australian security industry.Read moreRead less
Face recognition under varying pose and lighting--towards automatic personal identification for surveillance systems. One of the key remaining problems in computerized human face recognition is the need to handle the variability in appearance due to changes in pose. This proposed research targets at identifying a person with a face image in a pose different from the example view by using a novel texture analysis and synthesis technique. This technique makes use of facial textures at different vi ....Face recognition under varying pose and lighting--towards automatic personal identification for surveillance systems. One of the key remaining problems in computerized human face recognition is the need to handle the variability in appearance due to changes in pose. This proposed research targets at identifying a person with a face image in a pose different from the example view by using a novel texture analysis and synthesis technique. This technique makes use of facial textures at different viewing directions and can recover appropriate textures for virtual views in arbitrary poses. The successfulness of the proposed research would make a technical breakthrough towards solving the major remaining problem in face recognition.Read moreRead less
Privacy Preservation over 5G and IoT Smart Devices. This project aims to investigate privacy preservation protocols in a 5G integrated IoT environment through an analysis of the depth of smart-device use in common smart domains. 5G’s addition to IoT-based smart devices will be effectively deployed and utilised by a large majority of individual and organisation-based users. The knowledge-based ontology and tools developed in the project will help form the new privacy preservation mechanisms that ....Privacy Preservation over 5G and IoT Smart Devices. This project aims to investigate privacy preservation protocols in a 5G integrated IoT environment through an analysis of the depth of smart-device use in common smart domains. 5G’s addition to IoT-based smart devices will be effectively deployed and utilised by a large majority of individual and organisation-based users. The knowledge-based ontology and tools developed in the project will help form the new privacy preservation mechanisms that are required for the 5G enabled environment. The construction of new AI-based tools and testing facilities as well as the generation of new knowledge in the field of privacy preservation and collaboration between universities are expected outcomes of this project. Read moreRead less
Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current comme ....Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current commercial IT product environments. The safety and security of information systems against attack and illicit usage form an essential component of ?National Information Infrastructure Protection (NIIP)?, a move to better ?e-security?. Existing commercial (untrusted) operating systems lack the critical security bases for e-security making e-applications vulnerable to tampering and bypass which can cause failures in overall system security.Read moreRead less
Unlocking Mass Mobile Video Analytics with Advanced Neural Memory Networks. This project will develop neural memory architectures and dense spatial-temporal bundle adjustment to predict movement, behaviour, and perform multi-sensor fusion across large asynchronous video feeds. This capability will allow us to better interrogate and analyse mass video information recorded from the vast number of smartphones, action cameras, and surveillance cameras which exist at public events of interest. Outcom ....Unlocking Mass Mobile Video Analytics with Advanced Neural Memory Networks. This project will develop neural memory architectures and dense spatial-temporal bundle adjustment to predict movement, behaviour, and perform multi-sensor fusion across large asynchronous video feeds. This capability will allow us to better interrogate and analyse mass video information recorded from the vast number of smartphones, action cameras, and surveillance cameras which exist at public events of interest. Outcomes include the ability to ingest multiple video feeds into a dense and dynamic 3D reconstruction for knowledge representation and discovery, and analysis of events and behaviour through new spatio-temporal analytic approaches. This will offer significant benefits for video forensic analysis, policing, and emergency response.Read moreRead less
The Use of Information and Cryptographic Technology to Restrict Competition. This project will deliver the following benefits:
- Improve the understanding of how security technologies can be misapplied to restrict competition;
- Development of an early warning mechanism to assist regulators in determining when anti-competitive behaviour is occurring thorough the use of security technologies;
- provide assistance to the Australian Government, and thus the Australian economy, by developing an i ....The Use of Information and Cryptographic Technology to Restrict Competition. This project will deliver the following benefits:
- Improve the understanding of how security technologies can be misapplied to restrict competition;
- Development of an early warning mechanism to assist regulators in determining when anti-competitive behaviour is occurring thorough the use of security technologies;
- provide assistance to the Australian Government, and thus the Australian economy, by developing an international framework that can be promoted to Australia's major trading partners to achieve a harmonisation of complimentary competitive regulation.
- The provision of criteria for consideration by Australian industry in developing new products that may incorporate security technologies
Read moreRead less