2014
DOI: 10.1080/08929882.2014.917924
|View full text |Cite
|
Sign up to set email alerts
|

Supporting Technology for Chain of Custody of Nuclear Weapons and Materials Throughout the Dismantlement and Disposition Processes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…Many of these low-tech methods use a physical randomness to ensure that a broken seal cannot be faked or reproduced. For a detailed discussion see Smartt and Marleau 22 and Bunch et al 28 . In addition to the particularities of the chain of custody, the arms control treaties stipulating verified dismantlement will have to negotiate the various conditions under which a particular verification technique is applied.…”
Section: Measurements Described In the Stepsmentioning
confidence: 99%
See 1 more Smart Citation
“…Many of these low-tech methods use a physical randomness to ensure that a broken seal cannot be faked or reproduced. For a detailed discussion see Smartt and Marleau 22 and Bunch et al 28 . In addition to the particularities of the chain of custody, the arms control treaties stipulating verified dismantlement will have to negotiate the various conditions under which a particular verification technique is applied.…”
Section: Measurements Described In the Stepsmentioning
confidence: 99%
“…For example, for this experiment the [1,50] Finally, the chain of custody for the selection of the genuine object and its tamper-proof transportation to the dismantlement and verification facility is an important topic. Past literature has discussed various approaches for achieving this goal 6,28,29 . Exercises by the US and European national laboratories and organizations have taken place to test and characterize series of techniques necessary for this goal.…”
Section: Epithermal Neutronsmentioning
confidence: 99%
“…In a warhead verification protocol, a warhead owner ('host') attempts to prove to an inspection team ('inspector') that an object submitted for inspection and subsequent dismantlement and disposition is indeed a genuine nuclear warhead. An object successfully verified may then be dismantled by the host under a secure chain of custody [5] and counted towards the host's obligations under an arms reduction treaty. At the same time, the host seeks to prevent the inspector from learning any sensitive information about the design of the warhead, whether to prevent proliferation of nuclear weapons technology or disclosure of warhead architecture and vulnerabilities.…”
Section: Warhead Verificationmentioning
confidence: 99%
“…The use of Eddy current for authentication has been proposed as a unique identifier of containers [13]. This technique was further exploited to build the Trusted Radiation Identification System (TRIS) [14,15].…”
Section: Introductionmentioning
confidence: 99%