Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

Edith Cowan University

Performance

Articles 1 - 2 of 2

Full-Text Articles in Social and Behavioral Sciences

Using Graphic Methods To Challenge Cryptographic Performance, Brian Cusack, Erin Chapman Jan 2016

Using Graphic Methods To Challenge Cryptographic Performance, Brian Cusack, Erin Chapman

Australian Information Security Management Conference

Block and stream ciphers have formed the traditional basis for the standardisation of commercial ciphers in the DES, AES, RC4, and so on. More recently alternative graphic methods such as Elliptic Curve Cryptography (ECC) have been adopted for performance gains. In this research we reviewed a range of graphic and non-graphic methods and then designed our own cipher system based on several graphic methods, including Visual Cryptography (VC). We then tested our cipher against RC4 and the AES algorithms for performance and security. The results showed that a graphics based construct may deliver comparable or improved security and performance in …


Evaluating Small Drone Surveillance Capabilities To Enhance Traffic Conformance Intelligence, Brian Cusack, Reza Khaleghparast Jan 2015

Evaluating Small Drone Surveillance Capabilities To Enhance Traffic Conformance Intelligence, Brian Cusack, Reza Khaleghparast

Australian Security and Intelligence Conference

The availability of cheap small physical drones that fly around and have a variety of visual and sensor networks attached invites investigation for work applications. In this research we assess the capability of a set of commercially available drones (VTOL) that cost less than $1000 (Cheap is a relative term and we consider anything less than $5000 relatively cheap). The assessment reviews the capability to provide secure and safe motor vehicle surveillance for conformance intelligence. The evaluation was conducted by initially estimating a set of requirements that would satisfy an ideal surveillance situation and then by comparing a sample of …