Psychological User Profiling in the Telecommunications Industry. Recording user behaviour allows businesses to learn about their customers. This is particularly important in telecommunications, since the core business involves a large number of users who vary considerably from one another. This project combines psychological insights with modern statistical methods to develop a psychologically plausible user profiling framework, accounting for the idiosyncratic usage patterns of customers, and t ....Psychological User Profiling in the Telecommunications Industry. Recording user behaviour allows businesses to learn about their customers. This is particularly important in telecommunications, since the core business involves a large number of users who vary considerably from one another. This project combines psychological insights with modern statistical methods to develop a psychologically plausible user profiling framework, accounting for the idiosyncratic usage patterns of customers, and the way in which they change over time. The profiles will be tied to marketing prospects through interviews and surveys. Applied benefits include the ability to predict, understand and act upon user behaviour. The project also adds substantially to theories of memory, individual differences and decision-making.Read moreRead less
Stochastic Construction of Error Correcting Codes with Application to Digital Communications. Modern society would be unrecognisable without error correcting codes; mobile telephones, storage devices such as DVD's and high speed data communications simply would not exist. Yet most theoretical results on error correcting codes are asymptotic in nature and ignore computational complexity issues, that is, they are not representative of many real life situations. By building on recent breakthrough ....Stochastic Construction of Error Correcting Codes with Application to Digital Communications. Modern society would be unrecognisable without error correcting codes; mobile telephones, storage devices such as DVD's and high speed data communications simply would not exist. Yet most theoretical results on error correcting codes are asymptotic in nature and ignore computational complexity issues, that is, they are not representative of many real life situations. By building on recent breakthroughs in statistics and stochastic optimisation, this project will develop algorithms for designing optimised error correcting codes subject to realistic finite data length and computational complexity constraints. Successful outcomes will lead to enhanced data communications and storage, greatly benefiting industry and consumers alike.
Read moreRead less
Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of el ....Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users.Read moreRead less
Cryptographic Protocols from Pairings: Proofs and Designs. Modern society has become critically dependent on information and communications infrastructures. At the same time, the development of e-commerce is being slowed by lack of confidence in its security. By providing increased assurance and enhanced cryptographic security protocols this research will improve the dependability of the nation's information and communications infrastructure, as well as encourage the growth of e-commerce. Throu ....Cryptographic Protocols from Pairings: Proofs and Designs. Modern society has become critically dependent on information and communications infrastructures. At the same time, the development of e-commerce is being slowed by lack of confidence in its security. By providing increased assurance and enhanced cryptographic security protocols this research will improve the dependability of the nation's information and communications infrastructure, as well as encourage the growth of e-commerce. Through the expertise and experience gained with this project, Australia's excellence in information security research will be reinforced. The training of PhD and Honours students will provide a much needed source of highly trained information security professionals.Read moreRead less
Complexity Constrained Iterative Information Processing. The contribution of Information and Communications Technologies to the National Economy has been widely recognized. ICT enables wealth creation, employment and exports, and underpins many innovation processes. Immediate project benefits will be: Contribution to the knowledge base and fundamental capabilities in high-speed wireless communications networks; Education of future Australian academic and industrial innovators; Raising the inter ....Complexity Constrained Iterative Information Processing. The contribution of Information and Communications Technologies to the National Economy has been widely recognized. ICT enables wealth creation, employment and exports, and underpins many innovation processes. Immediate project benefits will be: Contribution to the knowledge base and fundamental capabilities in high-speed wireless communications networks; Education of future Australian academic and industrial innovators; Raising the international profile of Australian research in the area of information technology. Applied development of the outcomes will lead to the generation of valuable intellectual property. Close links to Australian industry ensures that Australian ICT companies stand to gain commercial advantage.Read moreRead less
Iterative Architechtures for Data Communications. Growing markets for data intensive applications such as real-time video or speech necessitate continual improvements of communications systems. Iterative information processing algorithms have recently received attention for communications equipment design, however theoretical understanding of these methods is still lacking. Within an iterative processing paradigm, the project aim is the optimization of complex communications systems subject to c ....Iterative Architechtures for Data Communications. Growing markets for data intensive applications such as real-time video or speech necessitate continual improvements of communications systems. Iterative information processing algorithms have recently received attention for communications equipment design, however theoretical understanding of these methods is still lacking. Within an iterative processing paradigm, the project aim is the optimization of complex communications systems subject to constraints on computational complexity. Theoretical analysis and design methodologies for such systems will be developed, resulting in basic contributions to statistical science and in cheaper communications infrastructures supporting a wider range of services through better use of limited bandwidth, power and computational complexity.Read moreRead less
Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the c ....Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the complexity of an algorithm that solves the appropriate system of equations. This project leads to new techniques for the design and analysis of stream ciphers.Read moreRead less
Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic ....Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic properties and later we derive a design methodology for provably secure stream ciphers. The project leads to new secure and efficient designs for stream ciphers that are the preferred cryptographic tools used in Australian industry.Read moreRead less
Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach ....Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach can be applied to design new and more powerful factoring algorithms. The project has an explosive potential to redefine the theory and practice of modern cryptography.Read moreRead less
Algorithmics for Extremely Mobile Wireless Networks. Existing wireless network protocols need stringent conditions to be effective. These conditions are rarely met for concrete applications such as Defence, Disaster-Relief, Search-and-Rescue. All these cannot rely on existing infrastructure, and often require high mobility. This is crucial in the case of Australia which cannot rely on complete network coverage of its lands and seas. This project will develop new wireless protocols for applicati ....Algorithmics for Extremely Mobile Wireless Networks. Existing wireless network protocols need stringent conditions to be effective. These conditions are rarely met for concrete applications such as Defence, Disaster-Relief, Search-and-Rescue. All these cannot rely on existing infrastructure, and often require high mobility. This is crucial in the case of Australia which cannot rely on complete network coverage of its lands and seas. This project will develop new wireless protocols for applications requiring extreme mobility. It will increase Australia's control of this, now ubiquitous, technology thus rendering Australia a key player in this field.Read moreRead less