Index coding for multimedia content distribution networks. The project aims to develop new bandwidth-efficient index coding schemes to reduce network congestion. A large portion of the increasing internet traffic is due to video content browsing and distribution. This creates serious strains on the current network infrastructure, which is designed to support conventional data. It is crucial to explore new avenues to reduce the network congestion due to large file downloads. The project aims to t ....Index coding for multimedia content distribution networks. The project aims to develop new bandwidth-efficient index coding schemes to reduce network congestion. A large portion of the increasing internet traffic is due to video content browsing and distribution. This creates serious strains on the current network infrastructure, which is designed to support conventional data. It is crucial to explore new avenues to reduce the network congestion due to large file downloads. The project aims to tackle this problem by exploring new index coding techniques that are robust to failures in wireless and wired network links. Using advanced mathematical tools from algebraic number theory and module theory, the project aims to design optimally bandwidth-efficient index coding schemes that enable timely and reliable content distribution to end users.Read moreRead less
Efficient Transmission Strategies for Cooperative Wireless Ad Hoc Networks. The contribution of information and communications technologies to the national economy has been widely recognized. It enables wealth creation, employment and exports, underpinning many innovation processes. Immediate project benefits will be: contribution to the knowledge base and fundamental capabilities in wireless communication; education of future Australian academic and industrial innovators; raising the internati ....Efficient Transmission Strategies for Cooperative Wireless Ad Hoc Networks. The contribution of information and communications technologies to the national economy has been widely recognized. It enables wealth creation, employment and exports, underpinning many innovation processes. Immediate project benefits will be: contribution to the knowledge base and fundamental capabilities in wireless communication; education of future Australian academic and industrial innovators; raising the international profile of Australian research in the area of information technology. The proposed research is in areas of great commercial interest, addressing new directions and technologies for future wireless networks. Applied development of the outcomes will lead to valuable intellectual property for commercial exploitation.Read moreRead less
Adaptive Broadband Wireless Communication. The contribution of Information and Communications Technologies to the National Economy has been widely recognized. ICT enables wealth creation, employment and exports, and underpins many innovation processes. Immediate project benefits will be: Contribution to the knowledge base and fundamental capabilities in broadband wireless communication; Education of future Australian academic and industrial innovators; Raising the international profile of Austr ....Adaptive Broadband Wireless Communication. The contribution of Information and Communications Technologies to the National Economy has been widely recognized. ICT enables wealth creation, employment and exports, and underpins many innovation processes. Immediate project benefits will be: Contribution to the knowledge base and fundamental capabilities in broadband wireless communication; Education of future Australian academic and industrial innovators; Raising the international profile of Australian research in the area of information technology. Applied development of the outcomes will lead to valuable intellectual property with potential for commercial exploitation. Close links to Australian industry ensures Australian ICT companies stand to gain commercial advantage.Read moreRead less
Cooperative Mesh Networks for Municipal Wireless Access. Robust mobile broadband data communication is vital for public safety and emergency services applications. This project will improve the performance and cost-effectiveness of mesh networks, enabling new network architectures. Immediate benefits to Australia will be: Contribution to a growing knowledge base and fundamental capabilities wireless broadband communications; Education of future leading academic and industrial innovators; Raising ....Cooperative Mesh Networks for Municipal Wireless Access. Robust mobile broadband data communication is vital for public safety and emergency services applications. This project will improve the performance and cost-effectiveness of mesh networks, enabling new network architectures. Immediate benefits to Australia will be: Contribution to a growing knowledge base and fundamental capabilities wireless broadband communications; Education of future leading academic and industrial innovators; Raising the international profile of Australian research in information technology. The contribution of Information and Communications Technology to the National economy is widely recognized. ICT contributes to wealth creation, employment and exports, underpinning many innovation processes.Read moreRead less
Privacy in Genetic Databases. With the recent advances in genetic and computer technology enormous databases containing genetic information have become available for research and other purposes. An example of such databases is the Icelandic Health Database containing health and genetic records about the total population of Iceland. This has raised many privacy and ethical questions both among health professionals and the general public. Many agree that genetic information bears more ethical and ....Privacy in Genetic Databases. With the recent advances in genetic and computer technology enormous databases containing genetic information have become available for research and other purposes. An example of such databases is the Icelandic Health Database containing health and genetic records about the total population of Iceland. This has raised many privacy and ethical questions both among health professionals and the general public. Many agree that genetic information bears more ethical and privacy concerns than other health databases. In this project we shall investigate privacy and ethical issues connected to genetic information and we develop techniques to prevent a disclosure of individual values through statistical analysis.Read moreRead less
Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applic ....Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applications of pairings. The results will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users. It will also support many new product opportunities aligned with Motorola's business markets.Read moreRead less
Analysis and classification of malicious code. Malicious software such as viruses and worms directly attacks the security, privacy and integrity of Australian e-commerce, large databases and communication channels. The recent uptake of malicious software by organised crime has made finding effective countermeasures more urgent. Around 80% of the malicious code in circulation is disguised in some way. This significantly increases the difficulty of automated detection and delays analysis. Automate ....Analysis and classification of malicious code. Malicious software such as viruses and worms directly attacks the security, privacy and integrity of Australian e-commerce, large databases and communication channels. The recent uptake of malicious software by organised crime has made finding effective countermeasures more urgent. Around 80% of the malicious code in circulation is disguised in some way. This significantly increases the difficulty of automated detection and delays analysis. Automated classification and de-obfuscation technologies are a precondition to applying more sophisticated detection heuristics. The project will be instrumental in safeguarding Australia by protecting critical infrastructure and defending us from online organised crime and information warfare.Read moreRead less
Secure and Efficient Electronic Auctions. For the first time in history electronic commerce promises the possibility of auctions to decide the correct market price for a widespread variety of everyday goods and services. Security and efficiency are critical factors in making this a reality, but almost all the many protocols for secure auctions proposed to date suffer from extreme computational requirements. This project will develop efficient and secure auction protocols using innovative approac ....Secure and Efficient Electronic Auctions. For the first time in history electronic commerce promises the possibility of auctions to decide the correct market price for a widespread variety of everyday goods and services. Security and efficiency are critical factors in making this a reality, but almost all the many protocols for secure auctions proposed to date suffer from extreme computational requirements. This project will develop efficient and secure auction protocols using innovative approaches based on advanced cryptographic techniques. In particular we will pioneer the exploration of secure microauctions suitable for negotiating the price of small value goods and utilities in almost real time.Read moreRead less
Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of el ....Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users.Read moreRead less
Cryptographic Protocols from Pairings: Proofs and Designs. Modern society has become critically dependent on information and communications infrastructures. At the same time, the development of e-commerce is being slowed by lack of confidence in its security. By providing increased assurance and enhanced cryptographic security protocols this research will improve the dependability of the nation's information and communications infrastructure, as well as encourage the growth of e-commerce. Throu ....Cryptographic Protocols from Pairings: Proofs and Designs. Modern society has become critically dependent on information and communications infrastructures. At the same time, the development of e-commerce is being slowed by lack of confidence in its security. By providing increased assurance and enhanced cryptographic security protocols this research will improve the dependability of the nation's information and communications infrastructure, as well as encourage the growth of e-commerce. Through the expertise and experience gained with this project, Australia's excellence in information security research will be reinforced. The training of PhD and Honours students will provide a much needed source of highly trained information security professionals.Read moreRead less