Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applic ....Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applications of pairings. The results will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users. It will also support many new product opportunities aligned with Motorola's business markets.Read moreRead less
Investigations Into New Public Key Systems. Public key cryptography is now mainstream technology and an essential tool in electronic business. In order to go beyond the basic security services of confidentiality and authentication, additional features are now desirable, such as verifiability of encryption, distributed key generation, and group-oriented encryption and signatures. At the same time the increasing demand for mobile business requires public key implementations with minimal computatio ....Investigations Into New Public Key Systems. Public key cryptography is now mainstream technology and an essential tool in electronic business. In order to go beyond the basic security services of confidentiality and authentication, additional features are now desirable, such as verifiability of encryption, distributed key generation, and group-oriented encryption and signatures. At the same time the increasing demand for mobile business requires public key implementations with minimal computational and storage demands. This project will study five recently proposed public key algorithms and assess their suitability for various secure applications. These results are of significant potential value in Australia's electronic commerce market.Read moreRead less
Secure Communications for Critical Infrastructure Control Systems. Control systems are crucial to the nation's critical infrastructure. They supervise and command the remote devices used in the energy distribution, water management, telecommunications, and transport industries. Historically, security has not been a concern in the design of control systems communications, which has resulted in their current vulnerable state. This project will establish the communications security requirements ....Secure Communications for Critical Infrastructure Control Systems. Control systems are crucial to the nation's critical infrastructure. They supervise and command the remote devices used in the energy distribution, water management, telecommunications, and transport industries. Historically, security has not been a concern in the design of control systems communications, which has resulted in their current vulnerable state. This project will establish the communications security requirements of control systems technologies and propose suitable secure communications schemes. New cryptographic protocols and analytic models will be developed to account for the criticality and operational peculiarities of control systems communications. These results are of significant potential value to Australia's critical infrastructure protection.Read moreRead less
Reconfigurable System-on-Chip for Computer Network Appliances. As Internet connectivity becomes ubiquitous, so does the need for computer network security. As algorithms become more sophisticated, and network speeds increase, software-only implementations of network security applications become less feasible on small, embedded network appliances. This project investigates new computer architectures, based on reconfigurable System-on-Chip technology, which can improve algorithm speed through sp ....Reconfigurable System-on-Chip for Computer Network Appliances. As Internet connectivity becomes ubiquitous, so does the need for computer network security. As algorithms become more sophisticated, and network speeds increase, software-only implementations of network security applications become less feasible on small, embedded network appliances. This project investigates new computer architectures, based on reconfigurable System-on-Chip technology, which can improve algorithm speed through specialised instruction sets, hardware accelerators, and parallel processing. Research outcomes will be commercialised by the project's industry partner - a global leader in low-cost network security appliances.Read moreRead less
Software Defined Networking: Transforming Emergency Operations. The project aims to improve the effectiveness and efficiency of Australia's emergency operations, for example, bushfire and rescue missions, by providing robust and integrated communications systems for police and the emergency services. Emergency communications systems are currently fragmented by the different technologies, creating disconnected islands of information. The project aims to provide techniques that allow multiple wire ....Software Defined Networking: Transforming Emergency Operations. The project aims to improve the effectiveness and efficiency of Australia's emergency operations, for example, bushfire and rescue missions, by providing robust and integrated communications systems for police and the emergency services. Emergency communications systems are currently fragmented by the different technologies, creating disconnected islands of information. The project aims to provide techniques that allow multiple wireless technologies to communicate seamlessly using modern software-defined networking solutions.Read moreRead less
Tools and models for measuring and predicting growth in internet addressing and routing complexity. We analyse patterns in the allocation and actual use of Internet Protocol version 4 (IPv4) addresses to predict the technical and market pressures for deployment of IPv6. The utilisation models will help evaluate the potential for emerging markets in scarce IPv4 address prefixes to increase costs to the end-users of Australia's future national broadband network.
Audit Security Models for Multiparty Internet Transactions. The aim of this project is to conduct the study for a secure, low overhead means of auditing secure transactions between two parties over the Internet, especially where some doubt surrounds the trustfulness of the other party.
A study will be conducted in this project by investigating security models for multiparty secure transactions in order to identify a number of likely applications for the technology, to develop a high level arch ....Audit Security Models for Multiparty Internet Transactions. The aim of this project is to conduct the study for a secure, low overhead means of auditing secure transactions between two parties over the Internet, especially where some doubt surrounds the trustfulness of the other party.
A study will be conducted in this project by investigating security models for multiparty secure transactions in order to identify a number of likely applications for the technology, to develop a high level architecture of the solution.Read moreRead less
Real-time and self-adaptive stream data analyser for intensive care management. The clinical benefit of this project will be in improved success rates and reduced mortality and risk in surgery and intensive care units. The Information and communication technology (ICT) benefit of this project is associated with the novel online algorithms and models aligned with the stream data research, and will be enhanced by our stream compression techniques. The stream data analyser developed in this projec ....Real-time and self-adaptive stream data analyser for intensive care management. The clinical benefit of this project will be in improved success rates and reduced mortality and risk in surgery and intensive care units. The Information and communication technology (ICT) benefit of this project is associated with the novel online algorithms and models aligned with the stream data research, and will be enhanced by our stream compression techniques. The stream data analyser developed in this project will be suitable for more than medical surveillance data; it will also improve the processing of other kinds of massive stream data (for example data from remote sensors, communication networks and other dynamic environments). The project involves a scientifically rich collaboration that will enhance the skills of PhD students and staff and drive the field forward.Read moreRead less
Information Security Evaluation of Embedded Computer Software. Safeguarding classified electronic communications is of major national importance. This research, into security evaluation of computer software, is supported by the Defence Signals Directorate, which verifies the security of communications devices used by Australia's government and armed forces. As such devices become increasingly sophisticated, traditional security evaluation techniques have become unacceptably difficult and costl ....Information Security Evaluation of Embedded Computer Software. Safeguarding classified electronic communications is of major national importance. This research, into security evaluation of computer software, is supported by the Defence Signals Directorate, which verifies the security of communications devices used by Australia's government and armed forces. As such devices become increasingly sophisticated, traditional security evaluation techniques have become unacceptably difficult and costly. Hardware evaluation techniques, based on tracing paths through circuitry diagrams, have proven unsuitable for software evaluations. Consequently, devising new tools and techniques for information security evaluation of embedded computer software is essential for preserving Australia's national security.Read moreRead less
Engaging Augmented Reality on 3D Head Up Displays to Reduce Risky Driving. This project aims to reduce risky driving behaviours through novel augmented reality applications for three-dimensional head-up displays, making safe driving more engaging so that drivers will take less risk. Over 1 million people are killed and 50 million are seriously injured on roads each year worldwide. Risky driving behaviours (speeding and distracted driving) are major causes. This project intends to produce novel i ....Engaging Augmented Reality on 3D Head Up Displays to Reduce Risky Driving. This project aims to reduce risky driving behaviours through novel augmented reality applications for three-dimensional head-up displays, making safe driving more engaging so that drivers will take less risk. Over 1 million people are killed and 50 million are seriously injured on roads each year worldwide. Risky driving behaviours (speeding and distracted driving) are major causes. This project intends to produce novel in-car interaction design implementations, provide important visual design guidelines for future display technologies, and provide novel road safety interventions.Read moreRead less