Anish Mohammed

Anish Mohammed

Dubai, United Arab Emirates
13K followers 500+ connections

About

Technologist with multidisciplinary background with two decades in security and cryptography. Over the years have been involved in architecting/building micropayments, reinsurance hubs, big data platforms for banking among other things. Have been involved in design or design verification of half a dozen blockchains and more than a dozen distributed applications.

Articles by Anish

See all articles

Activity

Join now to see all activity

Experience

  • SMAPE Capital Graphic

    SMAPE Capital

    Dubai, United Arab Emirates

  • -

    Dubai, United Arab Emirates

  • -

  • -

  • -

  • -

    Barcelona, Catalonia, Spain

Publications

  • How Astute are Smart Cities? Reimagining municipal infrastructure in our digital world.

    Backfeed

    Are legacy governance structures able to produce the results smart cities promise? Christina Bowen and Anish Mohammed elaborate on the future of smart cities and on how they might connect to the Blockchain and decentralized infrastructures.

    Other authors
    See publication
  • The Future of Business

    Fast Future Publishing

    Contributed the chapter on Singularity

    See publication
  • Smart Cities Built on Emerging Tech is India's Latest Initiative

    The world is urbanizing -- and fast. Why are cities so popular?

    They’re where the opportunities are. In 2014, the world’s 300 largest cities accounted for 20 percent of the world’s population and nearly half of global output. It is estimated that growing cities could bring nearly $30 trillion a year into the global economy by 2025.

    As we rapidly urbanize—and 70 percent of urban growth takes place in emerging economies—understanding cities becomes critical. How can we, for example,…

    The world is urbanizing -- and fast. Why are cities so popular?

    They’re where the opportunities are. In 2014, the world’s 300 largest cities accounted for 20 percent of the world’s population and nearly half of global output. It is estimated that growing cities could bring nearly $30 trillion a year into the global economy by 2025.

    As we rapidly urbanize—and 70 percent of urban growth takes place in emerging economies—understanding cities becomes critical. How can we, for example, improve livability and resource management? Manage disease and sanitation?

    Other authors
    See publication
  • The Public Sphere From Outside the West

    Bloomsbury Publishing

    Contributed to the chapter titled : Principle of Sufficient Reason 2.0: On Information Metaphysics

    See publication
  • Chattering laptops

    Privacy Enhancing Technologies Symposium

    Mobile computer users often have a false sense of anonymity when they connect to the Internet at cafes, hotels, airports or other public places. In this paper, we analyze information leaked by mobile computers to the local access link when they are outside their home domain. While most application data can be encrypted, there is no similar protection for signaling messages in the lower layers of the protocol stack. We found that all layers of the protocol stack leak various plaintext…

    Mobile computer users often have a false sense of anonymity when they connect to the Internet at cafes, hotels, airports or other public places. In this paper, we analyze information leaked by mobile computers to the local access link when they are outside their home domain. While most application data can be encrypted, there is no similar protection for signaling messages in the lower layers of the protocol stack. We found that all layers of the protocol stack leak various plaintext identifiers of the user, the computer and their affiliations to the local link, which a casual attacker can observe. This violates the user's sense of privacy and may make the user or computer vulnerable to further attacks. It is, however, not possible to disable the offending protocols because many of them are critical to the mobile user experience. We argue that the most promising solutions to the information leaks are to filter outbound data, in particular name resolution requests, and to disable unnecessary service discovery depending on the network location. This is because most information leaks result from failed attempts by roaming computers to connect to services that are not available in the current access network.

    Other authors
    • Tuomas Aura
    • Janne Lindqvist
    • Michael Roe
    See publication
  • Final Fantasy – Securing On-Line Gaming with Trusted Computing

    Autonomic and Trusted Computing Lecture Notes in Computer Science Volume 4610

    On-line gaming has seen something of a popular explosion in recent years, and is rapidly becoming the predominant focus of many gaming platforms. Unfortunately, honesty is not a virtue favoured by all players in these networks. This paper proposes a Trusted Computing based security framework for gaming consoles that will be resilient to platform modification based cheating mechanisms. In addition to this, we propose a Trusted Computing based auction mechanism that can be used for auctioning…

    On-line gaming has seen something of a popular explosion in recent years, and is rapidly becoming the predominant focus of many gaming platforms. Unfortunately, honesty is not a virtue favoured by all players in these networks. This paper proposes a Trusted Computing based security framework for gaming consoles that will be resilient to platform modification based cheating mechanisms. In addition to this, we propose a Trusted Computing based auction mechanism that can be used for auctioning in-game items.

    Other authors
    See publication
  • Experiences with Host-to-Host IPsec

    Security Protocols, 13th International Workshop 2005. Springer

    This paper recounts some lessons that we learned from the deployment of host-to-host IPsec in a large corporate network. Several security issues arise from mismatches between the different identifier spaces used by applications, by the IPsec security policy database, and by the security infrastructure (X.509 certificates or Kerberos). Mobile hosts encounter additional problems because private IP addresses are not globally unique, and because they rely on an untrusted DNS server at the visited…

    This paper recounts some lessons that we learned from the deployment of host-to-host IPsec in a large corporate network. Several security issues arise from mismatches between the different identifier spaces used by applications, by the IPsec security policy database, and by the security infrastructure (X.509 certificates or Kerberos). Mobile hosts encounter additional problems because private IP addresses are not globally unique, and because they rely on an untrusted DNS server at the visited network. We also discuss a feature interaction in an enhanced IPsec firewall mechanism. The potential solutions are to relax the transparency of IPsec protection, to put applications directly in charge of their security and, in the long term, to redesign the security protocols not to use IP addresses as host identifiers.

    Other authors
    • Tuomas Aura
    • Michael Roe
    See publication

Projects

  • OpenEth.org

    OpenEth.org is the world's first open ethical framework. Our crowdsourced open web platform seeds an Ethical Explication Engine that enables ethical insights for human beings, whilst also providing crucial ethical bounds for emerging autonomous systems. OpenEth is generously supported by SIDNFonds.

  • Bounder

    An offshoot of the Dex project, Bounder aims to enable a physical safety mechanism for autonomous systems such as drones. A small GSM-based tracking module can be attached to drones at an event, and tracked in real time to ensure that they stay out of prohibited areas, and violators can be tracked and, if necessary, punished.

    See project
  • Crusalta

    - Present

    Crusalta is an open-source non-profit project that aims to create an affordable bionic lower limb that is accessible by the general population.

    Other creators
    See project
  • Dex Ethics

    Dex aims to bootstrap the technical and deontological infrastructure necessary for the first practical Computational Ethics system for autonomous agents.

    Other creators
    See project
  • Demeter Tech

    Using nano satellite systems or research space on the ISS to expose seeds to microgravity condition and thus alter their genes. The directed gene expression that is normally observed leads to increase of biomass of those crops, which we believe, we can study and replicate on Earth in normal seeds for sustainable food security of the population.

    Other creators

Recommendations received

13 people have recommended Anish

Join now to view

More activity by Anish

View Anish’s full profile

  • See who you know in common
  • Get introduced
  • Contact Anish directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Anish Mohammed

Add new skills with these courses