An active approach to detect and defend against peer-to-peer botnets. The aim of this project is to develop an effective defence system to help organisations detect and defend against the peer-to-peer (P2P) botnets. If this research is accomplished successfully, it will be a big step forward in defeating this new but devastating malicious software widely utilised by Internet criminals and terrorists. The capability of a nation to defend against the P2P botnet attacks on its information infrastru ....An active approach to detect and defend against peer-to-peer botnets. The aim of this project is to develop an effective defence system to help organisations detect and defend against the peer-to-peer (P2P) botnets. If this research is accomplished successfully, it will be a big step forward in defeating this new but devastating malicious software widely utilised by Internet criminals and terrorists. The capability of a nation to defend against the P2P botnet attacks on its information infrastructure is central to the control of such attacks and hence to a nation's long-term survival and prosperity. The outcomes of this project can be directly used in Australian research communities and adopted by industry and government agencies.Read moreRead less
Internet authentication protocols: theory and practice. Authentication is the foundation for secure electronic communication. It is the first step for many everyday online processes such as remote login or electronic banking. This project aims to make analysis of such protocols more realistic and more complete, allowing online communication to become more secure for both corporate users and individuals.
Post-Quantum Functional Encryption : Principles, Protocols and Practice. Modern cryptography has the power to revolutionise virtually every aspect of our online lives. Large-scale secure data sharing could become a breeze, with tools such as functional encryption (FE) to give us fine control over access rights by means of expressive languages, and there will be no more juggling of crypto keys. Finally, the known foundations of FE will crumble when even small-sized quantum computers become realit ....Post-Quantum Functional Encryption : Principles, Protocols and Practice. Modern cryptography has the power to revolutionise virtually every aspect of our online lives. Large-scale secure data sharing could become a breeze, with tools such as functional encryption (FE) to give us fine control over access rights by means of expressive languages, and there will be no more juggling of crypto keys. Finally, the known foundations of FE will crumble when even small-sized quantum computers become reality, perhaps next decade. This project aims to recreate and expand the power of FE from post-quantum (PQ) mathematical principles, immune to quantum attacks, building on recent discoveries of limited forms of PQ-FE from rock-solid crypto principles. It begs exploring, for the truly spectacular outcomes likely to ensue.Read moreRead less
Feature-Level Fusion with Incomplete Data for Automatic Person Identification. This research addresses the current key problems in automated person recognition with incomplete data using multiple traits. The outcomes of this research will not only make a significant contribution to fundamental theory but also result in a wide range of crime and terrorism preventing applications including police database searching, access control, security monitoring and surveillance. They can be used either by p ....Feature-Level Fusion with Incomplete Data for Automatic Person Identification. This research addresses the current key problems in automated person recognition with incomplete data using multiple traits. The outcomes of this research will not only make a significant contribution to fundamental theory but also result in a wide range of crime and terrorism preventing applications including police database searching, access control, security monitoring and surveillance. They can be used either by police and law enforcement agencies, or at places of airport, government buildings, military facilities and even sensitive areas in offices and factories. It will help reduce crime, enhance the security of the nation to a world-advanced level, and generate new industry and export opportunities for Australian security industry.Read moreRead less
Face recognition under varying pose and lighting--towards automatic personal identification for surveillance systems. One of the key remaining problems in computerized human face recognition is the need to handle the variability in appearance due to changes in pose. This proposed research targets at identifying a person with a face image in a pose different from the example view by using a novel texture analysis and synthesis technique. This technique makes use of facial textures at different vi ....Face recognition under varying pose and lighting--towards automatic personal identification for surveillance systems. One of the key remaining problems in computerized human face recognition is the need to handle the variability in appearance due to changes in pose. This proposed research targets at identifying a person with a face image in a pose different from the example view by using a novel texture analysis and synthesis technique. This technique makes use of facial textures at different viewing directions and can recover appropriate textures for virtual views in arbitrary poses. The successfulness of the proposed research would make a technical breakthrough towards solving the major remaining problem in face recognition.Read moreRead less
Semantic change detection through large-scale learning. This project aims to develop technologies which understand the content of images before higher-level analysis is performed. This approach is intended to allow more accurate and reliable decisions to be made using automated image analysis than has previously been possible. The project will particularly investigate the detection of change in the contents of an image.
Information Security Evaluation of Embedded Computer Software. Safeguarding classified electronic communications is of major national importance. This research, into security evaluation of computer software, is supported by the Defence Signals Directorate, which verifies the security of communications devices used by Australia's government and armed forces. As such devices become increasingly sophisticated, traditional security evaluation techniques have become unacceptably difficult and costl ....Information Security Evaluation of Embedded Computer Software. Safeguarding classified electronic communications is of major national importance. This research, into security evaluation of computer software, is supported by the Defence Signals Directorate, which verifies the security of communications devices used by Australia's government and armed forces. As such devices become increasingly sophisticated, traditional security evaluation techniques have become unacceptably difficult and costly. Hardware evaluation techniques, based on tracing paths through circuitry diagrams, have proven unsuitable for software evaluations. Consequently, devising new tools and techniques for information security evaluation of embedded computer software is essential for preserving Australia's national security.Read moreRead less
Broadband quantum networking with trapped ions. Banks and governments are now using short-range quantum communication to transmit data with secrecy guaranteed by the laws of physics. This project aims to develop the key ingredient for future broadband quantum networks: high-speed transmitters delivering quantum light pulses over present-day fibre-optic telecom infrastructure.
Audit Security Models for Multiparty Internet Transactions. The aim of this project is to conduct the study for a secure, low overhead means of auditing secure transactions between two parties over the Internet, especially where some doubt surrounds the trustfulness of the other party.
A study will be conducted in this project by investigating security models for multiparty secure transactions in order to identify a number of likely applications for the technology, to develop a high level arch ....Audit Security Models for Multiparty Internet Transactions. The aim of this project is to conduct the study for a secure, low overhead means of auditing secure transactions between two parties over the Internet, especially where some doubt surrounds the trustfulness of the other party.
A study will be conducted in this project by investigating security models for multiparty secure transactions in order to identify a number of likely applications for the technology, to develop a high level architecture of the solution.Read moreRead less
Linkage Infrastructure, Equipment And Facilities - Grant ID: LE0668502
Funder
Australian Research Council
Funding Amount
$500,000.00
Summary
Queensland Computational Grid Enhancement Project. State-of-the-art computational facilities will be made available to enhance research outcomes in vital areas such as environmental and sustainability modelling, security and medical engineering and thus play an important role in advancing scientific and engineering discovery within Queensland and Australia. The new computational systems will be made available on a Queensland wide basis through the Queensland Parallel Supercomputing Foundation an ....Queensland Computational Grid Enhancement Project. State-of-the-art computational facilities will be made available to enhance research outcomes in vital areas such as environmental and sustainability modelling, security and medical engineering and thus play an important role in advancing scientific and engineering discovery within Queensland and Australia. The new computational systems will be made available on a Queensland wide basis through the Queensland Parallel Supercomputing Foundation an initiative supported by Queensland universities and the State Government. The new infrastructure will support more than 390 researchers, is consistent with the national supercomputing framework and directly supports ARC research that addresses all four key national research priorities.Read moreRead less