Lightweight security solutions for wearable healthcare sensor devices. The aim of this project is to develop new methods to secure the data and context associated with body-wearable health monitoring devices. The novelty of the scheme is in making the methods work on resource-poor devices, by combining new security capabilities derived from the operating environment with conventional cryptographic techniques. This project aims to increase the trust that medical practitioners and insurance provid ....Lightweight security solutions for wearable healthcare sensor devices. The aim of this project is to develop new methods to secure the data and context associated with body-wearable health monitoring devices. The novelty of the scheme is in making the methods work on resource-poor devices, by combining new security capabilities derived from the operating environment with conventional cryptographic techniques. This project aims to increase the trust that medical practitioners and insurance providers can place on health data from wearable devices, and showcase Australian innovation in developing world-class security solutions. The outcome of this project is expected to be the development and demonstration of ultra-lightweight algorithms and mechanisms that execute in wearable devices to safeguard the integrity of the data.Read moreRead less
Visual Analytics for Next Generation Sequencing. Next-generation sequencing technologies have brought a revolution in biology and healthcare, while taxing the ability of scientists and clinicians to identify and process relevant data, to make sense of it all and communicate it to others in a concise and meaningful way. This project aims to tackle this problem through fundamentally new approaches to data selection and visualisation at very large scale, actively encoding for insight into underlyin ....Visual Analytics for Next Generation Sequencing. Next-generation sequencing technologies have brought a revolution in biology and healthcare, while taxing the ability of scientists and clinicians to identify and process relevant data, to make sense of it all and communicate it to others in a concise and meaningful way. This project aims to tackle this problem through fundamentally new approaches to data selection and visualisation at very large scale, actively encoding for insight into underlying biological and biomedical processes, bringing sustainable discovery of new relationships and variations within the data. The project aims to support new approaches to medical diagnosis and treatment, and offer crucial lessons to address the broader challenge of understanding large, complex data sets.Read moreRead less
Enhancing information credibility using mathematical prediction. The aim of this project is to develop theory, techniques, mathematical tools and practical algorithms for rumor detection and forecast in social media to enhance credibility of news, especially in time-sensitive situations and trending events. This project will significantly advance human knowledge of rumor formation, detection, and forecast, which will enable timely and efficient counter attacks. The outcomes from this project wil ....Enhancing information credibility using mathematical prediction. The aim of this project is to develop theory, techniques, mathematical tools and practical algorithms for rumor detection and forecast in social media to enhance credibility of news, especially in time-sensitive situations and trending events. This project will significantly advance human knowledge of rumor formation, detection, and forecast, which will enable timely and efficient counter attacks. The outcomes from this project will offer a reliable information environment for our society.Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE150101116
Funder
Australian Research Council
Funding Amount
$315,000.00
Summary
Leakage-Resilient and Quantum-Secure Authenticated Key Exchange Protocols. Authenticated key exchange protocols allow multiple parties to establish a common secret key over a public network, and are a central component of network security. Key-leakage and quantum attacks are two primary threats against the existing protocols. This project aims to fill the gap by developing new authenticated key exchange protocols which are secure against both attacks. The new models, theories, and techniques dev ....Leakage-Resilient and Quantum-Secure Authenticated Key Exchange Protocols. Authenticated key exchange protocols allow multiple parties to establish a common secret key over a public network, and are a central component of network security. Key-leakage and quantum attacks are two primary threats against the existing protocols. This project aims to fill the gap by developing new authenticated key exchange protocols which are secure against both attacks. The new models, theories, and techniques developed in this project will produce technologies essential for securing data communications in current and future computer networks, and hence directly contribute to improving cybersecurity for all Australians.Read moreRead less
Visual analytics for massive multivariate networks. Visual analytics for massive multivariate networks. This project aims to create methods to visually analyse massive multivariate networks. The amount of network data available has exploded in recent years: software systems, social networks and biological systems have millions of nodes and billions of edges with multivariate attributes. Their size and complexity makes these data sets hard to exploit. More efficient ways to understand the data ar ....Visual analytics for massive multivariate networks. Visual analytics for massive multivariate networks. This project aims to create methods to visually analyse massive multivariate networks. The amount of network data available has exploded in recent years: software systems, social networks and biological systems have millions of nodes and billions of edges with multivariate attributes. Their size and complexity makes these data sets hard to exploit. More efficient ways to understand the data are needed. This project will design, implement and evaluate visualisation methods for massive multivariate network data sets. This research is expected to be used by Australian software development, biotechnology and security companies to exploit their data.Read moreRead less