ARDC Research Link Australia Research Link Australia   BETA Research
Link
Australia
  • ARDC Newsletter Subscribe
  • Contact Us
  • Home
  • About
  • Feedback
  • Explore Collaborations
  • Researcher
  • Funded Activity
  • Organisation
  • Researcher
  • Funded Activity
  • Organisation
  • Researcher
  • Funded Activity
  • Organisation

Need help searching? View our Search Guide.

Advanced Search

Current Selection
Australian State/Territory : QLD
Research Topic : Mathematical Software
Field of Research : Data Security
Clear All
Filter by Field of Research
Data Security (9)
Data Format (5)
Discrete Mathematics (3)
Law Not Elsewhere Classified (2)
Mathematics Not Elsewhere Classified (2)
Analysis Of Algorithms And Complexity (1)
Biomechanical Engineering (1)
Biomedical Engineering (1)
Computation Theory and Mathematics (1)
Computer Software (1)
Computer Software Not Elsewhere Classified (1)
Data Encryption (1)
Intellectual Property (1)
Law (1)
Mathematical Logic And Formal Languages (1)
Mathematical Software (1)
Numerical Analysis (1)
Other Information, Computing And Communication Sciences (1)
Filter by Socio-Economic Objective
Computer software and services not elsewhere classified (4)
Communication services not elsewhere classified (3)
Telecommunications (3)
Information services not elsewhere classified (2)
Mathematical sciences (2)
Application packages (1)
Combined operations (1)
Computer hardware and electronic equipment not elsewhere classified (1)
Consumer affairs (1)
Information processing services (1)
Filter by Funding Provider
Australian Research Council (9)
Filter by Status
Closed (9)
Filter by Scheme
Discovery Projects (5)
Linkage Projects (2)
Linkage Infrastructure, Equipment and Facilities (1)
Special Research Initiatives (1)
Filter by Country
Australia (9)
Filter by Australian State/Territory
QLD (9)
NSW (1)
VIC (1)
  • Researchers (14)
  • Funded Activities (9)
  • Organisations (4)
  • Funded Activity

    Linkage Projects - Grant ID: LP0776838

    Funder
    Australian Research Council
    Funding Amount
    $256,000.00
    Summary
    Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applic .... Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applications of pairings. The results will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users. It will also support many new product opportunities aligned with Motorola's business markets.
    Read more Read less
    More information
    Funded Activity

    Linkage Projects - Grant ID: LP0776344

    Funder
    Australian Research Council
    Funding Amount
    $120,000.00
    Summary
    Information Security Evaluation of Embedded Computer Software. Safeguarding classified electronic communications is of major national importance. This research, into security evaluation of computer software, is supported by the Defence Signals Directorate, which verifies the security of communications devices used by Australia's government and armed forces. As such devices become increasingly sophisticated, traditional security evaluation techniques have become unacceptably difficult and costl .... Information Security Evaluation of Embedded Computer Software. Safeguarding classified electronic communications is of major national importance. This research, into security evaluation of computer software, is supported by the Defence Signals Directorate, which verifies the security of communications devices used by Australia's government and armed forces. As such devices become increasingly sophisticated, traditional security evaluation techniques have become unacceptably difficult and costly. Hardware evaluation techniques, based on tracing paths through circuitry diagrams, have proven unsuitable for software evaluations. Consequently, devising new tools and techniques for information security evaluation of embedded computer software is essential for preserving Australia's national security.
    Read more Read less
    More information
    Funded Activity

    Special Research Initiatives - Grant ID: SR0354880

    Funder
    Australian Research Council
    Funding Amount
    $10,000.00
    Summary
    Building trust in Australia's infrastructure: dealing with scientific, technological, business, policy and legal issues in information security. Australia is faced with the challenge of engendering trust in, and protecting, the information systems vital to the economic and social development of the nation. This initiative will produce a national direction for research, development and educational activities in information security with particular emphasis on the protection of the national intere .... Building trust in Australia's infrastructure: dealing with scientific, technological, business, policy and legal issues in information security. Australia is faced with the challenge of engendering trust in, and protecting, the information systems vital to the economic and social development of the nation. This initiative will produce a national direction for research, development and educational activities in information security with particular emphasis on the protection of the national interest. It will do so by bringing together for the first time, academic, government and business people from a vast array of backgrounds, and whose interests lie across a spectrum of commercial, legal, policy and research outcomes.
    Read more Read less
    More information
    Funded Activity

    Discovery Projects - Grant ID: DP0666521

    Funder
    Australian Research Council
    Funding Amount
    $169,692.00
    Summary
    The Use of Information and Cryptographic Technology to Restrict Competition. This project will deliver the following benefits: - Improve the understanding of how security technologies can be misapplied to restrict competition; - Development of an early warning mechanism to assist regulators in determining when anti-competitive behaviour is occurring thorough the use of security technologies; - provide assistance to the Australian Government, and thus the Australian economy, by developing an i .... The Use of Information and Cryptographic Technology to Restrict Competition. This project will deliver the following benefits: - Improve the understanding of how security technologies can be misapplied to restrict competition; - Development of an early warning mechanism to assist regulators in determining when anti-competitive behaviour is occurring thorough the use of security technologies; - provide assistance to the Australian Government, and thus the Australian economy, by developing an international framework that can be promoted to Australia's major trading partners to achieve a harmonisation of complimentary competitive regulation. - The provision of criteria for consideration by Australian industry in developing new products that may incorporate security technologies
    Read more Read less
    More information
    Funded Activity

    Linkage Infrastructure, Equipment And Facilities - Grant ID: LE0668502

    Funder
    Australian Research Council
    Funding Amount
    $500,000.00
    Summary
    Queensland Computational Grid Enhancement Project. State-of-the-art computational facilities will be made available to enhance research outcomes in vital areas such as environmental and sustainability modelling, security and medical engineering and thus play an important role in advancing scientific and engineering discovery within Queensland and Australia. The new computational systems will be made available on a Queensland wide basis through the Queensland Parallel Supercomputing Foundation an .... Queensland Computational Grid Enhancement Project. State-of-the-art computational facilities will be made available to enhance research outcomes in vital areas such as environmental and sustainability modelling, security and medical engineering and thus play an important role in advancing scientific and engineering discovery within Queensland and Australia. The new computational systems will be made available on a Queensland wide basis through the Queensland Parallel Supercomputing Foundation an initiative supported by Queensland universities and the State Government. The new infrastructure will support more than 390 researchers, is consistent with the national supercomputing framework and directly supports ARC research that addresses all four key national research priorities.
    Read more Read less
    More information
    Funded Activity

    Discovery Projects - Grant ID: DP0345775

    Funder
    Australian Research Council
    Funding Amount
    $150,580.00
    Summary
    Specifications, Proofs and Animations for Cryptographic Protocols. Cryptographic protocols are fundamental security tools for electronic communications. Despite years of intensive research it remains difficult to obtain high confidence in the security of almost any new protocol. Research in the computer security community has emphasised formal specifications and state based searching, while the cryptographic community has concentrated instead on complexity theoretic proofs. This project will un .... Specifications, Proofs and Animations for Cryptographic Protocols. Cryptographic protocols are fundamental security tools for electronic communications. Despite years of intensive research it remains difficult to obtain high confidence in the security of almost any new protocol. Research in the computer security community has emphasised formal specifications and state based searching, while the cryptographic community has concentrated instead on complexity theoretic proofs. This project will unify these two approaches for the first time by formally specifying and animating the very models used in cryptographic proofs. The result will be proofs that are uniquely accessible to practioners combined with increased confidence that the proofs are both correct and relevant.
    Read more Read less
    More information
    Funded Activity

    Discovery Projects - Grant ID: DP0773331

    Funder
    Australian Research Council
    Funding Amount
    $380,813.00
    Summary
    Efficient Pre-Processing of Hard Problems: New Approaches, Basic Theory and Applications. Computers store even larger amounts of data about all aspects of human and industrial activity. However, they have not become significantly better at solving common problems in optimization and search. Traditional complexity theory indicates many of these problems require algorithms that are very unlikely to exist. The Parameterized Complexity approach allows us to obtain very efficient algorithms for a lar .... Efficient Pre-Processing of Hard Problems: New Approaches, Basic Theory and Applications. Computers store even larger amounts of data about all aspects of human and industrial activity. However, they have not become significantly better at solving common problems in optimization and search. Traditional complexity theory indicates many of these problems require algorithms that are very unlikely to exist. The Parameterized Complexity approach allows us to obtain very efficient algorithms for a large variety of problems, but the machinery required was diverse and complicated. This research will organize the machinery into a new approach that systematically finds good algorithms by applying simplifications around a parameter of the domain of the problem. As a result, efficient algorithms are obtained for many diverse areas.
    Read more Read less
    More information
    Funded Activity

    Discovery Projects - Grant ID: DP0664030

    Funder
    Australian Research Council
    Funding Amount
    $252,000.00
    Summary
    Security Applications of Combinatorial Puzzles. This project provides a basis for improving the implementation and maintenance of key management systems. The application of discrete mathematics to information security will help safeguard Australia, will provide opportunities for Australians to take a leading role in an important area and will develop a research network, bridging both theoretical and practical aspects of mathematics and computer science. The project will enhance Australia's inter .... Security Applications of Combinatorial Puzzles. This project provides a basis for improving the implementation and maintenance of key management systems. The application of discrete mathematics to information security will help safeguard Australia, will provide opportunities for Australians to take a leading role in an important area and will develop a research network, bridging both theoretical and practical aspects of mathematics and computer science. The project will enhance Australia's international reputation by establishing collaborations with well-respected international mathematicians and computer scientists. The proposal contains topics suitable for the training of new graduates, allowing them to make high quality original research contributions in a novel and important area.
    Read more Read less
    More information
    Funded Activity

    Discovery Projects - Grant ID: DP0344078

    Funder
    Australian Research Council
    Funding Amount
    $150,000.00
    Summary
    Timed Commitment Schemes to Smooth Internet Bottlenecks, Defend against Denial of Service Attacks, and Bypass Some Legal Problems of Enccryption. Bottlenecks on the Internet and Denial of Service attacks on a server are both caused by excessive demands made on a system. This proposal is to reduce the ill-effects of either by building on our previous theoretical work on strongboxes of combinatorial designs. In the case of bottlenecks, the demands are legitimate but badly timed, and our approach .... Timed Commitment Schemes to Smooth Internet Bottlenecks, Defend against Denial of Service Attacks, and Bypass Some Legal Problems of Enccryption. Bottlenecks on the Internet and Denial of Service attacks on a server are both caused by excessive demands made on a system. This proposal is to reduce the ill-effects of either by building on our previous theoretical work on strongboxes of combinatorial designs. In the case of bottlenecks, the demands are legitimate but badly timed, and our approach will redistribute the demands more evenly. In the case of Denial of Service attacks, the demands are malicious, and our approach will respond in such a way as to deplete the resources of the attacker.
    Read more Read less
    More information

    Showing 1-9 of 9 Funded Activites

    Advanced Search

    Advanced search on the Researcher index.

    Advanced search on the Funded Activity index.

    Advanced search on the Organisation index.

    National Collaborative Research Infrastructure Strategy

    The Australian Research Data Commons is enabled by NCRIS.

    ARDC CONNECT NEWSLETTER

    Subscribe to the ARDC Connect Newsletter to keep up-to-date with the latest digital research news, events, resources, career opportunities and more.

    Subscribe

    Quick Links

    • Home
    • About Research Link Australia
    • Product Roadmap
    • Documentation
    • Disclaimer
    • Contact ARDC

    We acknowledge and celebrate the First Australians on whose traditional lands we live and work, and we pay our respects to Elders past, present and emerging.

    Copyright © ARDC. ACN 633 798 857 Terms and Conditions Privacy Policy Accessibility Statement
    Top
    Quick Feedback