About
Technologist with multidisciplinary background with two decades in security and cryptography. Over the years have been involved in architecting/building micropayments, reinsurance hubs, big data platforms for banking among other things. Have been involved in design or design verification of half a dozen blockchains and more than a dozen distributed applications.
Articles by Anish
-
The Math Behind The Smart Contract Audit Crisis
The Math Behind The Smart Contract Audit Crisis
By Anish Mohammed
-
Coinscrum interview - on Building a Team and the Importance of Protocol Expertise
Coinscrum interview - on Building a Team and the Importance of Protocol Expertise
By Anish Mohammed
Activity
-
Faculty mentors at the North American Young Rheumatology Investogator’s forum in Destin, Florida. Professors: Ronald van Vollenhoven (Amsterdam)…
Faculty mentors at the North American Young Rheumatology Investogator’s forum in Destin, Florida. Professors: Ronald van Vollenhoven (Amsterdam)…
Liked by Anish Mohammed
-
We're thrilled to announce that we will be present at Consensus 2024! Head of Product, Saif Akhtar, will participate in a panel on unlocking…
We're thrilled to announce that we will be present at Consensus 2024! Head of Product, Saif Akhtar, will participate in a panel on unlocking…
Liked by Anish Mohammed
-
Discover how AI and Agile techniques are transforming government operations in our latest blog post! #AI #Agile #GovernmentInnovation
Discover how AI and Agile techniques are transforming government operations in our latest blog post! #AI #Agile #GovernmentInnovation
Liked by Anish Mohammed
Experience
Publications
-
How Astute are Smart Cities? Reimagining municipal infrastructure in our digital world.
Backfeed
Are legacy governance structures able to produce the results smart cities promise? Christina Bowen and Anish Mohammed elaborate on the future of smart cities and on how they might connect to the Blockchain and decentralized infrastructures.
Other authorsSee publication -
The Future of Business
Fast Future Publishing
Contributed the chapter on Singularity
-
Smart Cities Built on Emerging Tech is India's Latest Initiative
The world is urbanizing -- and fast. Why are cities so popular?
They’re where the opportunities are. In 2014, the world’s 300 largest cities accounted for 20 percent of the world’s population and nearly half of global output. It is estimated that growing cities could bring nearly $30 trillion a year into the global economy by 2025.
As we rapidly urbanize—and 70 percent of urban growth takes place in emerging economies—understanding cities becomes critical. How can we, for example,…The world is urbanizing -- and fast. Why are cities so popular?
They’re where the opportunities are. In 2014, the world’s 300 largest cities accounted for 20 percent of the world’s population and nearly half of global output. It is estimated that growing cities could bring nearly $30 trillion a year into the global economy by 2025.
As we rapidly urbanize—and 70 percent of urban growth takes place in emerging economies—understanding cities becomes critical. How can we, for example, improve livability and resource management? Manage disease and sanitation?Other authorsSee publication -
The Public Sphere From Outside the West
Bloomsbury Publishing
Contributed to the chapter titled : Principle of Sufficient Reason 2.0: On Information Metaphysics
-
Chattering laptops
Privacy Enhancing Technologies Symposium
Mobile computer users often have a false sense of anonymity when they connect to the Internet at cafes, hotels, airports or other public places. In this paper, we analyze information leaked by mobile computers to the local access link when they are outside their home domain. While most application data can be encrypted, there is no similar protection for signaling messages in the lower layers of the protocol stack. We found that all layers of the protocol stack leak various plaintext…
Mobile computer users often have a false sense of anonymity when they connect to the Internet at cafes, hotels, airports or other public places. In this paper, we analyze information leaked by mobile computers to the local access link when they are outside their home domain. While most application data can be encrypted, there is no similar protection for signaling messages in the lower layers of the protocol stack. We found that all layers of the protocol stack leak various plaintext identifiers of the user, the computer and their affiliations to the local link, which a casual attacker can observe. This violates the user's sense of privacy and may make the user or computer vulnerable to further attacks. It is, however, not possible to disable the offending protocols because many of them are critical to the mobile user experience. We argue that the most promising solutions to the information leaks are to filter outbound data, in particular name resolution requests, and to disable unnecessary service discovery depending on the network location. This is because most information leaks result from failed attempts by roaming computers to connect to services that are not available in the current access network.
Other authors -
Final Fantasy – Securing On-Line Gaming with Trusted Computing
Autonomic and Trusted Computing Lecture Notes in Computer Science Volume 4610
On-line gaming has seen something of a popular explosion in recent years, and is rapidly becoming the predominant focus of many gaming platforms. Unfortunately, honesty is not a virtue favoured by all players in these networks. This paper proposes a Trusted Computing based security framework for gaming consoles that will be resilient to platform modification based cheating mechanisms. In addition to this, we propose a Trusted Computing based auction mechanism that can be used for auctioning…
On-line gaming has seen something of a popular explosion in recent years, and is rapidly becoming the predominant focus of many gaming platforms. Unfortunately, honesty is not a virtue favoured by all players in these networks. This paper proposes a Trusted Computing based security framework for gaming consoles that will be resilient to platform modification based cheating mechanisms. In addition to this, we propose a Trusted Computing based auction mechanism that can be used for auctioning in-game items.
Other authorsSee publication -
Experiences with Host-to-Host IPsec
Security Protocols, 13th International Workshop 2005. Springer
This paper recounts some lessons that we learned from the deployment of host-to-host IPsec in a large corporate network. Several security issues arise from mismatches between the different identifier spaces used by applications, by the IPsec security policy database, and by the security infrastructure (X.509 certificates or Kerberos). Mobile hosts encounter additional problems because private IP addresses are not globally unique, and because they rely on an untrusted DNS server at the visited…
This paper recounts some lessons that we learned from the deployment of host-to-host IPsec in a large corporate network. Several security issues arise from mismatches between the different identifier spaces used by applications, by the IPsec security policy database, and by the security infrastructure (X.509 certificates or Kerberos). Mobile hosts encounter additional problems because private IP addresses are not globally unique, and because they rely on an untrusted DNS server at the visited network. We also discuss a feature interaction in an enhanced IPsec firewall mechanism. The potential solutions are to relax the transparency of IPsec protection, to put applications directly in charge of their security and, in the long term, to redesign the security protocols not to use IP addresses as host identifiers.
Other authors
Projects
-
OpenEth.org
OpenEth.org is the world's first open ethical framework. Our crowdsourced open web platform seeds an Ethical Explication Engine that enables ethical insights for human beings, whilst also providing crucial ethical bounds for emerging autonomous systems. OpenEth is generously supported by SIDNFonds.
-
Bounder
An offshoot of the Dex project, Bounder aims to enable a physical safety mechanism for autonomous systems such as drones. A small GSM-based tracking module can be attached to drones at an event, and tracked in real time to ensure that they stay out of prohibited areas, and violators can be tracked and, if necessary, punished.
-
Crusalta
- Present
Crusalta is an open-source non-profit project that aims to create an affordable bionic lower limb that is accessible by the general population.
Other creatorsSee project -
Dex Ethics
Dex aims to bootstrap the technical and deontological infrastructure necessary for the first practical Computational Ethics system for autonomous agents.
Other creatorsSee project -
Demeter Tech
Using nano satellite systems or research space on the ISS to expose seeds to microgravity condition and thus alter their genes. The directed gene expression that is normally observed leads to increase of biomass of those crops, which we believe, we can study and replicate on Earth in normal seeds for sustainable food security of the population.
Other creators
Recommendations received
13 people have recommended Anish
Join now to viewMore activity by Anish
-
Really looking forward to the The Digital Commonwealth event at Mansion House on Thursday. I'll be covering the interplay between Financial…
Really looking forward to the The Digital Commonwealth event at Mansion House on Thursday. I'll be covering the interplay between Financial…
Liked by Anish Mohammed
-
It's an incredibly exciting day! Amazon Q (https://aws.amazon.com/q/) is now generally available (https://lnkd.in/gpjdbFtV), and I can't wait to see…
It's an incredibly exciting day! Amazon Q (https://aws.amazon.com/q/) is now generally available (https://lnkd.in/gpjdbFtV), and I can't wait to see…
Liked by Anish Mohammed
-
Picture this: A virtual migration advisor, a portal providin a single point of access to the resources immigrants need. What would it take to make…
Picture this: A virtual migration advisor, a portal providin a single point of access to the resources immigrants need. What would it take to make…
Liked by Anish Mohammed
-
Thrilled to announce that I've completed the "Leadership with AI" course from the Indian School of Business! This program provided valuable insights…
Thrilled to announce that I've completed the "Leadership with AI" course from the Indian School of Business! This program provided valuable insights…
Liked by Anish Mohammed
-
Hi TOKEN2049 week in #Dubai, I don’t even know where to start… flying right after the fireworks in the Israeli skies; one day & a half later, finding…
Hi TOKEN2049 week in #Dubai, I don’t even know where to start… flying right after the fireworks in the Israeli skies; one day & a half later, finding…
Liked by Anish Mohammed
-
Gold for Harbour.Space Barcelona - 1st in Europe and 4th of the World in top Computing contest ICPC. Harbour.Space University's team is the first…
Gold for Harbour.Space Barcelona - 1st in Europe and 4th of the World in top Computing contest ICPC. Harbour.Space University's team is the first…
Liked by Anish Mohammed
-
📍DeFi: What skills and competencies do fintech professionals need? Daniel LIEBAU presented his research findings at #ISC2024. #Blockchain…
📍DeFi: What skills and competencies do fintech professionals need? Daniel LIEBAU presented his research findings at #ISC2024. #Blockchain…
Liked by Anish Mohammed
-
Please join the 6th Blockchain International Scientific Conference 2024, taking place this Friday, 19th of April at the Carlton Hotel…
Please join the 6th Blockchain International Scientific Conference 2024, taking place this Friday, 19th of April at the Carlton Hotel…
Liked by Anish Mohammed
-
In case you were wondering why we're leading in the institutional space - we're built for it, as well as for web3
In case you were wondering why we're leading in the institutional space - we're built for it, as well as for web3
Liked by Anish Mohammed
-
We're excited to announce our investment in modular #GameFi infrastructure LYNC. LYNC provides no-code SDKs and modular infrastructure to developers,…
We're excited to announce our investment in modular #GameFi infrastructure LYNC. LYNC provides no-code SDKs and modular infrastructure to developers,…
Liked by Anish Mohammed
-
This week, our Co-Founder Anish Mohammed joined Hake from the Proof of Podcast to discuss tokenomics design and cryptography. Tune in and watch the…
This week, our Co-Founder Anish Mohammed joined Hake from the Proof of Podcast to discuss tokenomics design and cryptography. Tune in and watch the…
Liked by Anish Mohammed
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Anish Mohammed
28 others named Anish Mohammed are on LinkedIn
See others named Anish Mohammed