Special Research Initiatives - Grant ID: SR0354895
Funder
Australian Research Council
Funding Amount
$40,000.00
Summary
Financial Integrity Research Network (FIRN). FIRN will be directed towards innovation in the integrity and efficiency of Australia's financial system. To address pressing problems and threats associated with this key component of Australia's infrastructure, FIRN will bring together a multi-disciplinary network featuring internationally renowned academics in a unique collaborative research effort which will cross conventional disciplinary boundaries including financial economics, applied statist ....Financial Integrity Research Network (FIRN). FIRN will be directed towards innovation in the integrity and efficiency of Australia's financial system. To address pressing problems and threats associated with this key component of Australia's infrastructure, FIRN will bring together a multi-disciplinary network featuring internationally renowned academics in a unique collaborative research effort which will cross conventional disciplinary boundaries including financial economics, applied statistics, actuarial science, financial mathematics, market micro-structure, accounting and information systems. FIRN will be supported by SIRCA's world-class financial research infrastructure and industry network. It will deliver a range of innovative research, educational, professional development and applied outcomes.Read moreRead less
ARC Financial Integrity Research Network. The integrity of the financial system is constantly under stress because of the development of ever more complex financial instruments, structures and strategies, and the associated research technologies that continues to accelerate worldwide. FIRN's vision is to harness the considerable strengths of Australia's internationally renowned finance, accounting and economics researchers into a research agenda to address issues concerning the integrity of the ....ARC Financial Integrity Research Network. The integrity of the financial system is constantly under stress because of the development of ever more complex financial instruments, structures and strategies, and the associated research technologies that continues to accelerate worldwide. FIRN's vision is to harness the considerable strengths of Australia's internationally renowned finance, accounting and economics researchers into a research agenda to address issues concerning the integrity of the financial system. It will enable Australian research in this area to match the scale and impact of similar research in other major international financial centres, and play an essential role in placing Australia among the world's leaders in financial markets related research.Read moreRead less
Content-based image retrieval using interactive feedback. Storage and retrieval of visual information plays an important role in multimedia systems. We aim to develop a method to retrieve images and visual information from multimedia databases and multimedia systems. The method will go beyond simple similarity search to retrieval data on knowledge by accommodating knowledge acquisition and sequential learning techniques, and will be able to handle complex queries with partial information. The ....Content-based image retrieval using interactive feedback. Storage and retrieval of visual information plays an important role in multimedia systems. We aim to develop a method to retrieve images and visual information from multimedia databases and multimedia systems. The method will go beyond simple similarity search to retrieval data on knowledge by accommodating knowledge acquisition and sequential learning techniques, and will be able to handle complex queries with partial information. The technology developed will find many applications in the multimedia area such as education, medical imaging, desktop publishing, advertising, business presentation, and engineering design.Read moreRead less
A scheme and a formal language for interactive video. Video has been increasingly used in many fields and plays an important role in our daily life. Most traditional video players and video formats only provide linear interaction, such as play, fast forward, fast backward or jump to a certain frame of a video stream indicated by a sequence or time on a random access device. This project aims at enabling a hyperlink type of interactions for video data through the development of video interaction ....A scheme and a formal language for interactive video. Video has been increasingly used in many fields and plays an important role in our daily life. Most traditional video players and video formats only provide linear interaction, such as play, fast forward, fast backward or jump to a certain frame of a video stream indicated by a sequence or time on a random access device. This project aims at enabling a hyperlink type of interactions for video data through the development of video interaction mark-up language (VIML). It can find many applications in education, marketing, web presentation and digital TV.Read moreRead less
Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the c ....Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the complexity of an algorithm that solves the appropriate system of equations. This project leads to new techniques for the design and analysis of stream ciphers.Read moreRead less
Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic ....Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic properties and later we derive a design methodology for provably secure stream ciphers. The project leads to new secure and efficient designs for stream ciphers that are the preferred cryptographic tools used in Australian industry.Read moreRead less
Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach ....Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach can be applied to design new and more powerful factoring algorithms. The project has an explosive potential to redefine the theory and practice of modern cryptography.Read moreRead less
Space-time and time-frequency applications of improper complex processes. This project addresses an issue of fundamental importance to many areas in science and engineering. It is thus expected that the results will be disseminated in high-quality journals and receive widespread attention and recognition. This will advance Australia's research profile in the world.
The project can also be expected to have an immediate impact on the design of next generation communications technologies, thus aid ....Space-time and time-frequency applications of improper complex processes. This project addresses an issue of fundamental importance to many areas in science and engineering. It is thus expected that the results will be disseminated in high-quality journals and receive widespread attention and recognition. This will advance Australia's research profile in the world.
The project can also be expected to have an immediate impact on the design of next generation communications technologies, thus aiding Australian industries in the development of frontier technologies.
Australia will also benefit economically and socially by the specialised engineers and researchers in signal processing and communications that will be trained in the course of this project.Read moreRead less
Secure and Efficient Cryptographic Hashing. This project will enhance information security, which is absolutely crucial for rapidly growing e-commerce, e-government services and for national security (Priority 4 -Safeguarding Australia - Protection against Terrorism and Crime). The project will strengthen international collaboration by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. At the same time, the project will he ....Secure and Efficient Cryptographic Hashing. This project will enhance information security, which is absolutely crucial for rapidly growing e-commerce, e-government services and for national security (Priority 4 -Safeguarding Australia - Protection against Terrorism and Crime). The project will strengthen international collaboration by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. At the same time, the project will help to maintain high research profile of Australian researchers, to increase the capacity for consultancy and contract work, and provide a cutting-edge information technology for the Australian telecommunications industry, business and government (Priority 3 - Frontier Technologies). Read moreRead less
Algorithmics for Interactive 2.5D Graph Drawing. Technological advances have provided a data deluge over the past few years, and consequently have led to many large and complex network models in many domains. This includes terrorrist networks and biological networks, software engineering structures, and webgraphs. Visualisation is an effective tool in helping humans to understand such networks. This project aims to provide a new direction in network visualisation, using 2.5 dimensions. The algor ....Algorithmics for Interactive 2.5D Graph Drawing. Technological advances have provided a data deluge over the past few years, and consequently have led to many large and complex network models in many domains. This includes terrorrist networks and biological networks, software engineering structures, and webgraphs. Visualisation is an effective tool in helping humans to understand such networks. This project aims to provide a new direction in network visualisation, using 2.5 dimensions. The algorithms developed in the project will help security analysts to detect abnormal behavious such as money laundering, help biologists understand protein-protein interaction networks, and help engineers to understand large software systems.Read moreRead less