Index coding for multimedia content distribution networks. The project aims to develop new bandwidth-efficient index coding schemes to reduce network congestion. A large portion of the increasing internet traffic is due to video content browsing and distribution. This creates serious strains on the current network infrastructure, which is designed to support conventional data. It is crucial to explore new avenues to reduce the network congestion due to large file downloads. The project aims to t ....Index coding for multimedia content distribution networks. The project aims to develop new bandwidth-efficient index coding schemes to reduce network congestion. A large portion of the increasing internet traffic is due to video content browsing and distribution. This creates serious strains on the current network infrastructure, which is designed to support conventional data. It is crucial to explore new avenues to reduce the network congestion due to large file downloads. The project aims to tackle this problem by exploring new index coding techniques that are robust to failures in wireless and wired network links. Using advanced mathematical tools from algebraic number theory and module theory, the project aims to design optimally bandwidth-efficient index coding schemes that enable timely and reliable content distribution to end users.Read moreRead less
Efficient Transmission Strategies for Cooperative Wireless Ad Hoc Networks. The contribution of information and communications technologies to the national economy has been widely recognized. It enables wealth creation, employment and exports, underpinning many innovation processes. Immediate project benefits will be: contribution to the knowledge base and fundamental capabilities in wireless communication; education of future Australian academic and industrial innovators; raising the internati ....Efficient Transmission Strategies for Cooperative Wireless Ad Hoc Networks. The contribution of information and communications technologies to the national economy has been widely recognized. It enables wealth creation, employment and exports, underpinning many innovation processes. Immediate project benefits will be: contribution to the knowledge base and fundamental capabilities in wireless communication; education of future Australian academic and industrial innovators; raising the international profile of Australian research in the area of information technology. The proposed research is in areas of great commercial interest, addressing new directions and technologies for future wireless networks. Applied development of the outcomes will lead to valuable intellectual property for commercial exploitation.Read moreRead less
Adaptive Broadband Wireless Communication. The contribution of Information and Communications Technologies to the National Economy has been widely recognized. ICT enables wealth creation, employment and exports, and underpins many innovation processes. Immediate project benefits will be: Contribution to the knowledge base and fundamental capabilities in broadband wireless communication; Education of future Australian academic and industrial innovators; Raising the international profile of Austr ....Adaptive Broadband Wireless Communication. The contribution of Information and Communications Technologies to the National Economy has been widely recognized. ICT enables wealth creation, employment and exports, and underpins many innovation processes. Immediate project benefits will be: Contribution to the knowledge base and fundamental capabilities in broadband wireless communication; Education of future Australian academic and industrial innovators; Raising the international profile of Australian research in the area of information technology. Applied development of the outcomes will lead to valuable intellectual property with potential for commercial exploitation. Close links to Australian industry ensures Australian ICT companies stand to gain commercial advantage.Read moreRead less
Privacy in Genetic Databases. With the recent advances in genetic and computer technology enormous databases containing genetic information have become available for research and other purposes. An example of such databases is the Icelandic Health Database containing health and genetic records about the total population of Iceland. This has raised many privacy and ethical questions both among health professionals and the general public. Many agree that genetic information bears more ethical and ....Privacy in Genetic Databases. With the recent advances in genetic and computer technology enormous databases containing genetic information have become available for research and other purposes. An example of such databases is the Icelandic Health Database containing health and genetic records about the total population of Iceland. This has raised many privacy and ethical questions both among health professionals and the general public. Many agree that genetic information bears more ethical and privacy concerns than other health databases. In this project we shall investigate privacy and ethical issues connected to genetic information and we develop techniques to prevent a disclosure of individual values through statistical analysis.Read moreRead less
Secure and Efficient Electronic Auctions. For the first time in history electronic commerce promises the possibility of auctions to decide the correct market price for a widespread variety of everyday goods and services. Security and efficiency are critical factors in making this a reality, but almost all the many protocols for secure auctions proposed to date suffer from extreme computational requirements. This project will develop efficient and secure auction protocols using innovative approac ....Secure and Efficient Electronic Auctions. For the first time in history electronic commerce promises the possibility of auctions to decide the correct market price for a widespread variety of everyday goods and services. Security and efficiency are critical factors in making this a reality, but almost all the many protocols for secure auctions proposed to date suffer from extreme computational requirements. This project will develop efficient and secure auction protocols using innovative approaches based on advanced cryptographic techniques. In particular we will pioneer the exploration of secure microauctions suitable for negotiating the price of small value goods and utilities in almost real time.Read moreRead less
Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of el ....Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users.Read moreRead less
Cryptographic Protocols from Pairings: Proofs and Designs. Modern society has become critically dependent on information and communications infrastructures. At the same time, the development of e-commerce is being slowed by lack of confidence in its security. By providing increased assurance and enhanced cryptographic security protocols this research will improve the dependability of the nation's information and communications infrastructure, as well as encourage the growth of e-commerce. Throu ....Cryptographic Protocols from Pairings: Proofs and Designs. Modern society has become critically dependent on information and communications infrastructures. At the same time, the development of e-commerce is being slowed by lack of confidence in its security. By providing increased assurance and enhanced cryptographic security protocols this research will improve the dependability of the nation's information and communications infrastructure, as well as encourage the growth of e-commerce. Through the expertise and experience gained with this project, Australia's excellence in information security research will be reinforced. The training of PhD and Honours students will provide a much needed source of highly trained information security professionals.Read moreRead less
Security for Wireless Mobile Ad hoc Networks. Mobile ad hoc networks, a new emerging wireless networking paradigm, poses challenging problems in security, due to its dynamic nature and lack of centralised infrastructure, for which no adequate solutions exist today. This research addresses theory and design of secure mobile ad hoc networks. It achieves conceptual advances in terms of new security models for distributed location management, mobile authentication and multicasting; it proposes nove ....Security for Wireless Mobile Ad hoc Networks. Mobile ad hoc networks, a new emerging wireless networking paradigm, poses challenging problems in security, due to its dynamic nature and lack of centralised infrastructure, for which no adequate solutions exist today. This research addresses theory and design of secure mobile ad hoc networks. It achieves conceptual advances in terms of new security models for distributed location management, mobile authentication and multicasting; it proposes novel dynamic group key management and denial of service protection schemes, develops new security mechanisms for ad hoc routing, provides new insights into formal reasoning of security and demonstrates and evaluates practical secure wireless mobile applications.Read moreRead less
Secure and Energy Efficient mmWave Unmanned Aerial Vehicles Communications. Future wireless networks comprising unmanned aerial vehicles (UAVs) in millimeter wave bands will provide ubiquitous connectivity to a massive number of devices, even in unexpected situations such as disaster relief. Common wireless security solutions are developed only for terrestrial infrastructures but are unsuitable for mmWave UAVs due to the high mobility and limited energy supply. This project aims to develop novel ....Secure and Energy Efficient mmWave Unmanned Aerial Vehicles Communications. Future wireless networks comprising unmanned aerial vehicles (UAVs) in millimeter wave bands will provide ubiquitous connectivity to a massive number of devices, even in unexpected situations such as disaster relief. Common wireless security solutions are developed only for terrestrial infrastructures but are unsuitable for mmWave UAVs due to the high mobility and limited energy supply. This project aims to develop novel energy efficient physical layer security techniques to prevent system attacks and malfunctions. The expected outcomes will deliver innovative solutions to safeguard future wireless networks. The project should benefit Australia in advancing knowledge base in wireless security and supporting future critical infrastructures.Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less