A Data-Centric Mobile Edge Platform for Resilient Logistics & Supply Chain. This project aims to develop a secure mobile edge computing platform for resilient logistic and supply chain management. It consists of easy-used functions that help businesses realise low latency, high reliability, low cost, and high security in their logistics and supply chain system. To cope with the vast generated application data, we invent new data replication, placement, and deduplication techniques to optimise th ....A Data-Centric Mobile Edge Platform for Resilient Logistics & Supply Chain. This project aims to develop a secure mobile edge computing platform for resilient logistic and supply chain management. It consists of easy-used functions that help businesses realise low latency, high reliability, low cost, and high security in their logistics and supply chain system. To cope with the vast generated application data, we invent new data replication, placement, and deduplication techniques to optimise the mobile edge computing platform from the computation, storage, and network aspects. The invented mobile edge computing platform will enable more intelligent business applications for various industries, e.g., IT, manufacturing, and media, to appear, thus benefiting both the economy of Australia.Read moreRead less
Cost-effective and Reliable Edge Caching for Software Vendors. This project aims to deliver a suite of models and techniques for cost-effective and reliable data caching in the multi-access edge computing (MEC) environment facilitated by 5G mobile network. MEC offers great promises for rapidly advancing mobile and IoT applications in various domains in Australia, e.g., smart cities, remote medical services, advanced manufacturing, etc. Combining graph analytics, optimisation techniques and game ....Cost-effective and Reliable Edge Caching for Software Vendors. This project aims to deliver a suite of models and techniques for cost-effective and reliable data caching in the multi-access edge computing (MEC) environment facilitated by 5G mobile network. MEC offers great promises for rapidly advancing mobile and IoT applications in various domains in Australia, e.g., smart cities, remote medical services, advanced manufacturing, etc. Combining graph analytics, optimisation techniques and game theory, this project tackles the new challenges in the placement, update and adaptation of edge data faced by software vendors embracing 5G. The outcomes can ease software vendors' cost and security concerns during the transition from 4G to 5G, and significantly promote the wave of 5G innovation in Australia.Read moreRead less
A Novel Optical Network Security and Encryption Device. The project falls within two of the desginated National Research Priorities, namely Frontier Technologies for Building and Transforming Australian Industries and Safeguarding Australia. The project will generate high quality graduates and will result in a novel photonic device. The outcome of this project would be an optical encryption device that will safeguard Australia through superior secure data communications. It will also create lucr ....A Novel Optical Network Security and Encryption Device. The project falls within two of the desginated National Research Priorities, namely Frontier Technologies for Building and Transforming Australian Industries and Safeguarding Australia. The project will generate high quality graduates and will result in a novel photonic device. The outcome of this project would be an optical encryption device that will safeguard Australia through superior secure data communications. It will also create lucrative opportunity for expanding the export capabilities of Australian ICT industry.Read moreRead less
Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applic ....Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applications of pairings. The results will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users. It will also support many new product opportunities aligned with Motorola's business markets.Read moreRead less
Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research ....Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research will include new data privacy models, new privacy-preserving data mining algorithms, and a prototype of cloud data mining software. These will help businesses cut costs for data mining and privacy protection, and provide significant benefits toward helping Australia achieve its national cyber security strategy and potentially provide economic impact from commercialisation of new software technology for the industry partner.Read moreRead less
Investigations Into New Public Key Systems. Public key cryptography is now mainstream technology and an essential tool in electronic business. In order to go beyond the basic security services of confidentiality and authentication, additional features are now desirable, such as verifiability of encryption, distributed key generation, and group-oriented encryption and signatures. At the same time the increasing demand for mobile business requires public key implementations with minimal computatio ....Investigations Into New Public Key Systems. Public key cryptography is now mainstream technology and an essential tool in electronic business. In order to go beyond the basic security services of confidentiality and authentication, additional features are now desirable, such as verifiability of encryption, distributed key generation, and group-oriented encryption and signatures. At the same time the increasing demand for mobile business requires public key implementations with minimal computational and storage demands. This project will study five recently proposed public key algorithms and assess their suitability for various secure applications. These results are of significant potential value in Australia's electronic commerce market.Read moreRead less
A new spectrum access technology for future wireless terminals. This project will develop a new frequency flexible wireless transceiver structure for the next generation of smartphones and wireless devices. The project will improve the roaming experience of travellers and reduce the cost of wireless connectivity, enabling new applications such as machine-to-machine communications and the internet-of-things.
Analysis and classification of malicious code. Malicious software such as viruses and worms directly attacks the security, privacy and integrity of Australian e-commerce, large databases and communication channels. The recent uptake of malicious software by organised crime has made finding effective countermeasures more urgent. Around 80% of the malicious code in circulation is disguised in some way. This significantly increases the difficulty of automated detection and delays analysis. Automate ....Analysis and classification of malicious code. Malicious software such as viruses and worms directly attacks the security, privacy and integrity of Australian e-commerce, large databases and communication channels. The recent uptake of malicious software by organised crime has made finding effective countermeasures more urgent. Around 80% of the malicious code in circulation is disguised in some way. This significantly increases the difficulty of automated detection and delays analysis. Automated classification and de-obfuscation technologies are a precondition to applying more sophisticated detection heuristics. The project will be instrumental in safeguarding Australia by protecting critical infrastructure and defending us from online organised crime and information warfare.Read moreRead less
Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the c ....Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the complexity of an algorithm that solves the appropriate system of equations. This project leads to new techniques for the design and analysis of stream ciphers.Read moreRead less
Reconstructing land tenure maps of Australia in 3D. Existing land tenure maps of above and below ground, such as apartment ownership, tunnels, and mining, are maintained using 2D drawings. However, the drawings are not structured and valuable for detailed and advanced visualisation, analytics, and simulation, which are essential for testing potential interventions and policy development. This project aims to develop a data validation framework for transforming current drawings and reconstructing ....Reconstructing land tenure maps of Australia in 3D. Existing land tenure maps of above and below ground, such as apartment ownership, tunnels, and mining, are maintained using 2D drawings. However, the drawings are not structured and valuable for detailed and advanced visualisation, analytics, and simulation, which are essential for testing potential interventions and policy development. This project aims to develop a data validation framework for transforming current drawings and reconstructing them into 3D models. The outcomes include validation principles, formal mathematical terms, and computational algorithms. Benefits include a cost-effective onshore alternative to offshore 3D reconstruction practices, efficient land development and infrastructure planning, and fewer property disputes.Read moreRead less