ORCID Profile
0000-0001-6222-282X
Current Organisation
RMIT University
Does something not look right? The information on this page has been harvested from data sources that may not be up to date. We continue to work with information providers to improve coverage and quality. To report an issue, use the Feedback Form.
In Research Link Australia (RLA), "Research Topics" refer to ANZSRC FOR and SEO codes. These topics are either sourced from ANZSRC FOR and SEO codes listed in researchers' related grants or generated by a large language model (LLM) based on their publications.
Pattern Recognition and Data Mining | Software Engineering | Computer System Security | Architecture | Architectural Design | Coding and Information Theory | Computer Software | Artificial Intelligence and Image Processing
Internet Hosting Services (incl. Application Hosting Services) | National Security | Application Tools and System Utilities | Construction Design not elsewhere classified |
Publisher: Springer Berlin Heidelberg
Date: 2006
DOI: 10.1007/11617983_21
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 11-2013
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 16-03-2022
DOI: 10.36227/TECHRXIV.19350680.V1
Abstract: The recent expansion of the Internet of things (IoT) and its applications continues to dramatically change the IT services supporting manufacturing, energy management, intelligent transportation, smart cities, etc. These IT services often interconnect Internet-based Cloud systems with IoT or intelligent smart devices held by organisations. As IoT devices are resource-limited, the security of their communication is provided by lightweight cryptography that could consequently lead to the devices being insecure against a quantum adversary. On the other hand, Internet Cloud systems are resource-rich and could easily support post-quantum cryptography. This paper presents a proxy re-encryption scheme that translates ciphertexts of a classical lightweight encryption algorithm into their post quantum equivalent and vice versa. More precisely, we propose a lattice-based ABE-IBE (L ABE-IBE) proxy re-encryption scheme that transforms a classical lightweight ciphertext into a lattice based ciphertext. We compare our proposed L ABE-IBE proxy re-encryption scheme with classical proxy re-encryption (ABEIBE) schemes. We discuss the security and efficiency of our construction. /
Publisher: IEEE
Date: 07-2006
Publisher: IEEE
Date: 12-2013
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2010
Publisher: IOP Publishing
Date: 10-03-2010
Publisher: IEEE
Date: 10-2014
Publisher: IEEE
Date: 03-2015
Publisher: Springer Science and Business Media LLC
Date: 30-11-2016
Publisher: IOP Publishing
Date: 2016
Publisher: IEEE
Date: 12-2008
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2004
Publisher: Springer Science and Business Media LLC
Date: 06-2010
Publisher: Elsevier BV
Date: 2023
Publisher: IEEE
Date: 11-2014
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 15-03-2021
Publisher: IEEE
Date: 2005
Publisher: Springer International Publishing
Date: 2015
Publisher: Wiley
Date: 06-12-2018
DOI: 10.1002/RNC.3989
Publisher: IEEE
Date: 11-2015
Publisher: Springer Science and Business Media LLC
Date: 25-01-2022
Publisher: Springer International Publishing
Date: 30-11-2016
Publisher: American Physical Society (APS)
Date: 30-03-2011
Publisher: Emerald
Date: 15-02-2013
DOI: 10.1108/13581981311297849
Abstract: Money laundering is a financial crime that does not directly affect a business but poses a serious threat to a nation's stability and security. The Australian Anti‐money Laundering and Counter Terrorism Financing Act (AML/CTF Act – the Act) passed into law in 2006, but achieving compliance is proving a daunting task, especially within the small and medium enterprises (SME) sector. This paper aims to propose a co‐designed communication strategy, which if adopted by the Australian regulator, AUSTRAC, could improve communication and education about the Act within this sector. A literature review is done to understand the complexities of the Act and its compliance regime, especially with regards to SME. By establishing the importance of SME to a country's economy, as well as the need for AUSTRAC to understand their limitations, this paper uses the concepts of design in communication, and the importance of involving stakeholders in designing solutions, to develop a communication strategy. It is clear that the current compliance regime is not very successful, and a better communication strategy would achieve better education among the SME sector and could result in better compliance indices. This paper is based on the available literature including journals, white papers and the AUSTRAC website and did not involve in‐person communication or contact with either the stakeholders or AUSTRAC. This paper is first of its kind to propose the use of “design” in order to improve the AML/CTF compliance indices.
Publisher: Elsevier BV
Date: 2016
Publisher: IEEE
Date: 07-2012
Publisher: Elsevier BV
Date: 10-2021
Publisher: IEEE
Date: 07-2015
Publisher: IEEE
Date: 2005
Publisher: Elsevier BV
Date: 12-2015
Publisher: Elsevier BV
Date: 09-2022
Publisher: Springer Science and Business Media LLC
Date: 2001
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 16-03-2022
DOI: 10.36227/TECHRXIV.19350680
Abstract: The recent expansion of the Internet of things (IoT) and its applications continues to dramatically change the IT services supporting manufacturing, energy management, intelligent transportation, smart cities, etc. These IT services often interconnect Internet-based Cloud systems with IoT or intelligent smart devices held by organisations. As IoT devices are resource-limited, the security of their communication is provided by lightweight cryptography that could consequently lead to the devices being insecure against a quantum adversary. On the other hand, Internet Cloud systems are resource-rich and could easily support post-quantum cryptography. This paper presents a proxy re-encryption scheme that translates ciphertexts of a classical lightweight encryption algorithm into their post quantum equivalent and vice versa. More precisely, we propose a lattice-based ABE-IBE (L ABE-IBE) proxy re-encryption scheme that transforms a classical lightweight ciphertext into a lattice based ciphertext. We compare our proposed L ABE-IBE proxy re-encryption scheme with classical proxy re-encryption (ABEIBE) schemes. We discuss the security and efficiency of our construction. /
Start Date: 2011
End Date: 2014
Funder: Australian Research Council
View Funded ActivityStart Date: 2013
End Date: 2015
Funder: Australian Research Council
View Funded ActivityStart Date: 10-2011
End Date: 10-2014
Amount: $255,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 04-2015
End Date: 04-2018
Amount: $280,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 04-2013
End Date: 12-2016
Amount: $105,000.00
Funder: Australian Research Council
View Funded Activity