Kevin Eagles

  • Citations Per Year
Learn More
A threat analysis framework and methodology was developed by the authors to catalogue threats, vulnerabilities, attacks and countermeasures for smart cards (contact and contactless) and wireless sensor network node technologies. The goal of this research was to determine “Security Lessons” learned from the world of smart cards that may be applied to(More)
The time dependence of the two-photon absorption process is experimentally investigated in the low intensity regime as a function of laser linewidth, Doppler width, polarisation and delay between pulses, using 5 ns pulses at two different frequencies. Excellent agreement is found between experiment and the theoretical predictions of Allen and Stroud. The(More)
The time dependence of the two-photon absorption process is experimentally investigated in the intermediate intensity rate equation regime, where incoherent relaxation plays an important role, as a function of laser linewidth and Doppler width. The saturation effects observed are in excellent agreement with the predictions of Allen and Stroud.
  • 1