06.06.2013 Views

Download - Nanowerk

Download - Nanowerk

Download - Nanowerk

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

1 Introduction ................................................................................................ 2<br />

2 Detection ..................................................................................................... 3<br />

2.1 Introduction ............................................................................................ 3<br />

2.2 Image detection....................................................................................... 3<br />

2.2.1 Gamma-Ray imaging............................................................................. 4<br />

2.2.2 X-Ray imaging...................................................................................... 4<br />

2.2.4 Infra-Red imaging................................................................................. 5<br />

2.3 Sensors .................................................................................................. 9<br />

2.3.1 Direct detection ...................................................................................10<br />

2.3.2 Indirect detection.................................................................................11<br />

2.4 Sensor networks .....................................................................................17<br />

2.4.1 Power management .............................................................................18<br />

2.4.2 Data management ...............................................................................19<br />

2.5 Conclusions ............................................................................................20<br />

2.6 References .............................................................................................21<br />

3 Protection .................................................................................................. 22<br />

3.1 Introduction - Nanoscience opportunities for protection................................22<br />

3.2 Decontamination and Filter Applications .....................................................23<br />

3.3 Personal Protective Equipment Applications ................................................27<br />

3.4 Electromagnetic Shielding ........................................................................31<br />

3.5 Conclusions ............................................................................................32<br />

3.6 References .............................................................................................35<br />

4 Identification ............................................................................................. 36<br />

4.1 Introduction ...........................................................................................36<br />

4.2 Anti counterfeiting and authentication........................................................36<br />

4.3 Forensics................................................................................................39<br />

4.4 Quantum Cryptography............................................................................42<br />

4.5 Market of counterfeit and grey products .....................................................43<br />

4.6 Conclusions ............................................................................................44<br />

4.7 References and further reading .................................................................45<br />

5 Societal Implications ................................................................................. 46<br />

5.1 Introduction ...........................................................................................46<br />

5.2 Regulatory and ethical framework .............................................................46<br />

5.2.1 EU regulatory and ethical framework......................................................46<br />

5.2.2 Other international declarations .............................................................49<br />

5.2.3 Conclusions on regulatory and ethical framework.....................................49<br />

5.3 Impacts on ethics and human rights ..........................................................50<br />

5.3.1 Impacts of Security technologies ...........................................................50<br />

5.3.2 Impacts of RFID and related technologies ...............................................52<br />

vii

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!