Advertisement

Improving Verification: Trends and Perspectives for Research

  • Roland Schenkel

Keywords

Nuclear Weapon Fuel Cycle Spend Fuel Additional Protocol Minor Actinide 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Nobuyasu Abe (2005): Challenges and Opportunities for the 2005 NPT Review Conference: Strengthening the Non-Proliferation Regime, High-Level Seminar on Weapons of Mass Destruction, 17 March — Royal Institute for International Relations — Brussels, Belgium.Google Scholar
  2. 2.
    Reference ESARDA homepage: http://esarda2.jrc.it/about/index.html, INMM homepage: http://www.inmm.org/, IAEA homepage: http://www.iaea.org/Google Scholar
  3. 3.
    R.G. Lugar (2005): The Lugar Survey On Proliferation Threats and Responses, http://lugar.senate.gov, June.Google Scholar
  4. 4.
    J.W. Tape (2003): International Safeguards and Verification Challenges, INMM Fall.Google Scholar
  5. 5.
    GOV/2005/8 Medium Term Strategy 2006–2011, IAEA, January, ViennaGoogle Scholar
  6. 6.
    N. Khlebnikov (2005): 2006–2011 IAEA Equipment Development Strategic Plan, IAEA.Google Scholar
  7. 7.
    Abousahl, S.; van Belle, P.; Eberle, H.; Ottmar, H.; Lynch, B.; Vallet; P.; Mayer; K.; Ougier, M. (2005): Development of Quantitative Analytical Methods for the Control of Actinides in a Pyrochemical Partitioning Process, Radiochimica Acta 93, 147–153.CrossRefGoogle Scholar
  8. 8.
    B. Jasani, Civil Renaissance satellites opportunities and challenges, this book.Google Scholar
  9. 9.
    I. Niemeyer, Sven Nussbaum, Change Detection — the Potential for Nuclear Safeguards, this book.Google Scholar
  10. 10.
    D. Schriefer, Information Collection and Analysis The International Level, this book.Google Scholar
  11. 11.
    L. Bril and J. Gonalves, Open Source Information Collection, Processing and Applications, this book.Google Scholar
  12. 12.
    M. Richard, Information Collection and Analysis: National level, this book.Google Scholar
  13. 13.
    C. Best et al (2002): Europe Media Monitor, JRC technical note No. T.02.88.Google Scholar
  14. 14.
    C. Best, private communicationGoogle Scholar
  15. 15.
    M. Kalinowski et al, Environmental Sample Analysis, this book.Google Scholar
  16. 16.
    K. Mayer et al, Tracing the Origin of Diverted or Stolen Nuclear Material through Nuclear Forensic Investigation, this book.Google Scholar
  17. 17.
    S. Vogt et al (2005): ACS Annual Meeting, 28 August–1 September, Washington D.C., USAGoogle Scholar
  18. 18.
    Stetzer et al (2004): Nuclear Instruments and Methods in Physics Research, A525, 582–592Google Scholar
  19. 19.
    K. Mayer, M. Wallenius, I. Ray (2005): The Analyst, 130, 433–441.CrossRefGoogle Scholar
  20. 20.
    IAEA TECDOC 1311 (2002): Prevention of the inadvertent movement and illicit trafficking of radioactive materials, September.Google Scholar
  21. 21.
    IAEA TECDOC 1312 (2002): Detection of radioactive materials at borders, September.Google Scholar
  22. 22.
    IAEA TECDOC 1313 (2002): Response to events involving the advertent movement or illicit trafficking of radioactive materials, September.Google Scholar
  23. 23.
    IAEA Nuclear Security Series No. 2, Nuclear Forensics Support (to be published)Google Scholar
  24. 24.
    A. von Zweidorf et al (2005): ESARDA Annual Meeting, 10–12 May, London, UKGoogle Scholar

Copyright information

© Springer Berlin · Heidelberg 2006

Authors and Affiliations

  • Roland Schenkel
    • 1
  1. 1.European Commission - Joint Research CentreBrusselsBelgium

Personalised recommendations