Tamper detection for safeguards and treaty monitoring: Fantasies, realities, and potentials
暂无分享,去创建一个
[2] James F. Keeley. Verification, On-Site Inspection and "93+2" , 1996 .
[3] Michael Krepon. Technology won't solve verification problems , 1985 .
[4] J. L. Jones. Improving tag/seal technologies: the vulnerability assessment component , 1996 .
[5] Ronald B. Mitchell,et al. Sources of Transparency: Information Systems in International Regimes , 1998 .
[6] P. L. Chrzanowski. Preparation for the Nuclear Non-Proliferation Treaty Extension Conference in 1995. Workshop summary , 1993 .
[7] N. Kamal. Cooperative Monitoring Center Occasional Paper/6: Pakistani Perceptions and Prospects of Reducing the Nuclear Danger in South Asia , 1999 .
[8] Matthew G. Bunn. The Next Wave: Urgently Needed New Steps to Control Warheads and Fissile Material , 2000 .
[9] Rg Johnston. Effective Vulnerability Assessment of Tamper-Indicating Seals , 1997 .
[10] David Albright,et al. South Africa Flirts with the NPT , 1991 .
[11] Steve Fetter,et al. Using Tags to Monitor Numerical Limits in Arms Control Agreements , 1989 .
[12] T. B. Taylor. TECHNICAL REQUIREMENTS FOR NUCLEAR SAFEGUARDS. , 1967 .
[13] Kathleen Vogel,et al. Ensuring the security of Russia's chemical weapons: A lab‐to‐lab partnering program , 1999 .
[14] Harry H. Almond,et al. Nuclear Theft: Risks and Safeguards. , 1975, American Journal of International Law.
[15] M. G. Morgan. Nuclear Arms Control: Background and Issues , 1985 .
[16] Matthew G. Bunn,et al. MANAGING MILITARY URANIUM AND PLUTONIUM IN THE UNITED STATES AND THE FORMER SOVIET UNION , 1997 .
[17] Nancy W. Gallagher. The Politics of Verification , 1999 .
[18] Matthew G. Bunn,et al. Management and disposition of excess weapons plutonium , 1994 .
[19] Roger G. Johnston,et al. Vulnerability assessment of passive tamper-indicating seals , 1995 .
[20] Ivars Peterson,et al. Chinks in digital armor: Exploiting faults to break smart‐card cryptosystems , 1997 .
[21] James E. Doyle,et al. A proposed approach for monitoring nuclear warhead dismantlement , 2001 .
[22] Roger G. Johnston,et al. Title: SIMPLE, LOW-COST WAYS TO DRAMATICALLY IMPROVE THE SECURITY OF TAGS AND SEALS , 1997 .
[23] B. Chellaney,et al. Nuclear terrorism: Threat, perception, and response in South Asia , 1988 .
[24] Steve Fetter. A Comprehensive Transparency Regime for Warheads and Fissile Materials , 1999 .
[25] O. Bukharin,et al. The U.S.‐Russian HEU agreement: Internal safeguards to prevent diversion of HEU , 1994 .
[26] Ann Florini. A New Role for Transparency , 1997 .
[27] A. DeVolpi. Tags and seals to strengthen arms control verification , 1990 .
[28] Strategy and Arms Control , 1975 .
[29] David B. Thomson. A Guide to the Nuclear Arms Control Treaties , 2001 .
[30] Robert Mozley. Verifying the Number of Warheads on Multiple-warhead Missiles through On-site Inspections , 1990 .
[31] Richard Phillips Feynman,et al. ‘‘Surely You’re Joking Mr. Feynman!’’ Adventures of a Curious Character , 1985 .
[32] George Bunn. Raising international standards for protecting nuclear materials from theft and sabotage , 2000 .
[33] Michael M. May,et al. How much is enough? A risk management approach to computer security , 2000 .
[34] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[36] Theodore B. Taylor,et al. Nuclear Theft: Nuclear Theft: Risks and Safeguards , 1974 .
[37] William C. Potter,et al. Potatoes were guarded better , 1995 .
[38] Roger G. Johnston,et al. Were ancient seals secure? , 2001, Antiquity.
[39] Steve Fetter. Verifying Nuclear Disarmament , 2021, Nuclear Weapons.
[40] Roger G. Johnston. Tamper‐indicating seals for nuclear disarmament and hazardous waste management , 2001 .
[41] Herbert L. Abrams,et al. Security issues in the handling and disposition of fissionable material , 1993 .
[43] Safety. Nuclear explosive safety study process , 1997 .