Download - Nanowerk
Download - Nanowerk
Download - Nanowerk
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
1 Introduction ................................................................................................ 2<br />
2 Detection ..................................................................................................... 3<br />
2.1 Introduction ............................................................................................ 3<br />
2.2 Image detection....................................................................................... 3<br />
2.2.1 Gamma-Ray imaging............................................................................. 4<br />
2.2.2 X-Ray imaging...................................................................................... 4<br />
2.2.4 Infra-Red imaging................................................................................. 5<br />
2.3 Sensors .................................................................................................. 9<br />
2.3.1 Direct detection ...................................................................................10<br />
2.3.2 Indirect detection.................................................................................11<br />
2.4 Sensor networks .....................................................................................17<br />
2.4.1 Power management .............................................................................18<br />
2.4.2 Data management ...............................................................................19<br />
2.5 Conclusions ............................................................................................20<br />
2.6 References .............................................................................................21<br />
3 Protection .................................................................................................. 22<br />
3.1 Introduction - Nanoscience opportunities for protection................................22<br />
3.2 Decontamination and Filter Applications .....................................................23<br />
3.3 Personal Protective Equipment Applications ................................................27<br />
3.4 Electromagnetic Shielding ........................................................................31<br />
3.5 Conclusions ............................................................................................32<br />
3.6 References .............................................................................................35<br />
4 Identification ............................................................................................. 36<br />
4.1 Introduction ...........................................................................................36<br />
4.2 Anti counterfeiting and authentication........................................................36<br />
4.3 Forensics................................................................................................39<br />
4.4 Quantum Cryptography............................................................................42<br />
4.5 Market of counterfeit and grey products .....................................................43<br />
4.6 Conclusions ............................................................................................44<br />
4.7 References and further reading .................................................................45<br />
5 Societal Implications ................................................................................. 46<br />
5.1 Introduction ...........................................................................................46<br />
5.2 Regulatory and ethical framework .............................................................46<br />
5.2.1 EU regulatory and ethical framework......................................................46<br />
5.2.2 Other international declarations .............................................................49<br />
5.2.3 Conclusions on regulatory and ethical framework.....................................49<br />
5.3 Impacts on ethics and human rights ..........................................................50<br />
5.3.1 Impacts of Security technologies ...........................................................50<br />
5.3.2 Impacts of RFID and related technologies ...............................................52<br />
vii