Privacy in Genetic Databases. With the recent advances in genetic and computer technology enormous databases containing genetic information have become available for research and other purposes. An example of such databases is the Icelandic Health Database containing health and genetic records about the total population of Iceland. This has raised many privacy and ethical questions both among health professionals and the general public. Many agree that genetic information bears more ethical and ....Privacy in Genetic Databases. With the recent advances in genetic and computer technology enormous databases containing genetic information have become available for research and other purposes. An example of such databases is the Icelandic Health Database containing health and genetic records about the total population of Iceland. This has raised many privacy and ethical questions both among health professionals and the general public. Many agree that genetic information bears more ethical and privacy concerns than other health databases. In this project we shall investigate privacy and ethical issues connected to genetic information and we develop techniques to prevent a disclosure of individual values through statistical analysis.Read moreRead less
Secure and Resistant Blockchain for Financial and Business Applications. The aim of this project is to develop a practical secure blockchain technology for the booming applications in finance and business. This project expects to address the leading security threats to the current blockchain applications. The expected outcome is an executable secure and resistant blockchain prototype through the integration of the latest developed and customized techniques. The success of the project will dramat ....Secure and Resistant Blockchain for Financial and Business Applications. The aim of this project is to develop a practical secure blockchain technology for the booming applications in finance and business. This project expects to address the leading security threats to the current blockchain applications. The expected outcome is an executable secure and resistant blockchain prototype through the integration of the latest developed and customized techniques. The success of the project will dramatically benefit Australian people and government, especially for the Australian ICT industry for commercializing the research outputs. Read moreRead less
A Novel Optical Network Security and Encryption Device. The project falls within two of the desginated National Research Priorities, namely Frontier Technologies for Building and Transforming Australian Industries and Safeguarding Australia. The project will generate high quality graduates and will result in a novel photonic device. The outcome of this project would be an optical encryption device that will safeguard Australia through superior secure data communications. It will also create lucr ....A Novel Optical Network Security and Encryption Device. The project falls within two of the desginated National Research Priorities, namely Frontier Technologies for Building and Transforming Australian Industries and Safeguarding Australia. The project will generate high quality graduates and will result in a novel photonic device. The outcome of this project would be an optical encryption device that will safeguard Australia through superior secure data communications. It will also create lucrative opportunity for expanding the export capabilities of Australian ICT industry.Read moreRead less
Deep Learning Attacks and Active Defences: A Cybersecurity Perspective. The belief that deep learning technology is imperative for economic development, military control, and strategic competitiveness has accelerated its development across the globe. However, experience has revealed the disappointing fact that deep learning models are vulnerable to a range of security attacks. Hence, a series of methodologies and defence strategies will be devised that make deep learning systems robust to these ....Deep Learning Attacks and Active Defences: A Cybersecurity Perspective. The belief that deep learning technology is imperative for economic development, military control, and strategic competitiveness has accelerated its development across the globe. However, experience has revealed the disappointing fact that deep learning models are vulnerable to a range of security attacks. Hence, a series of methodologies and defence strategies will be devised that make deep learning systems robust to these attacks. The methodologies require analysing attack lifecycles to identify them in their early stages. With this knowledge, active defence methods and forensic strategies can be developed to ensure efficient defences and prevent further attacks. Moreover, the outputs will be generalisable to most deep learning services.Read moreRead less
Balance and reinforcement: privacy and fairness in high intelligence models. The aim of this project is to develop a series of privacy preservation methods to achieve a new balance between privacy and fairness in highly accurate intelligence models. The main issue in achieving this goal is that high-accuracy intelligence technologies have resulted in significant privacy violations and are very vulnerable to issues of unfairness. This project will analyse the privacy risks associated with intelli ....Balance and reinforcement: privacy and fairness in high intelligence models. The aim of this project is to develop a series of privacy preservation methods to achieve a new balance between privacy and fairness in highly accurate intelligence models. The main issue in achieving this goal is that high-accuracy intelligence technologies have resulted in significant privacy violations and are very vulnerable to issues of unfairness. This project will analyse the privacy risks associated with intelligent systems and devise mechanisms to mutually reinforce both privacy and fairness based on the theoretical foundations laid by our analysis. These outcomes will enable model owners to effectively protect their intellectual property and offer services to users in a private, fair, and accurate manner.Read moreRead less
Improved security and privacy for online platforms. Online platforms provide goods and services to people all over the world in a flexible way. Due to COVID-19, the number of online platforms increased significantly. As more and more business activities are conducted in a virtual environment, there is a corresponding increase in major privacy and security challenges. This project aims to work in the online education industry to provide a revolutionary secure environment for both business owners ....Improved security and privacy for online platforms. Online platforms provide goods and services to people all over the world in a flexible way. Due to COVID-19, the number of online platforms increased significantly. As more and more business activities are conducted in a virtual environment, there is a corresponding increase in major privacy and security challenges. This project aims to work in the online education industry to provide a revolutionary secure environment for both business owners and users. This secure online environment will enable privacy and security guarantees that will be first implemented on our Partner Organisation’s education platform. The developed technologies can be easily adapted to most online-service industries and can be commercialised immediately.Read moreRead less
Security for Wireless Mobile Ad hoc Networks. Mobile ad hoc networks, a new emerging wireless networking paradigm, poses challenging problems in security, due to its dynamic nature and lack of centralised infrastructure, for which no adequate solutions exist today. This research addresses theory and design of secure mobile ad hoc networks. It achieves conceptual advances in terms of new security models for distributed location management, mobile authentication and multicasting; it proposes nove ....Security for Wireless Mobile Ad hoc Networks. Mobile ad hoc networks, a new emerging wireless networking paradigm, poses challenging problems in security, due to its dynamic nature and lack of centralised infrastructure, for which no adequate solutions exist today. This research addresses theory and design of secure mobile ad hoc networks. It achieves conceptual advances in terms of new security models for distributed location management, mobile authentication and multicasting; it proposes novel dynamic group key management and denial of service protection schemes, develops new security mechanisms for ad hoc routing, provides new insights into formal reasoning of security and demonstrates and evaluates practical secure wireless mobile applications.Read moreRead less
Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the c ....Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the complexity of an algorithm that solves the appropriate system of equations. This project leads to new techniques for the design and analysis of stream ciphers.Read moreRead less
Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic ....Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic properties and later we derive a design methodology for provably secure stream ciphers. The project leads to new secure and efficient designs for stream ciphers that are the preferred cryptographic tools used in Australian industry.Read moreRead less
Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach ....Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach can be applied to design new and more powerful factoring algorithms. The project has an explosive potential to redefine the theory and practice of modern cryptography.Read moreRead less