Research

Independent publications, technical papers, and briefings.

// TECHNICAL PAPER

Card-Based Cryptographic Protocols: Novel Constructions for Physical-Digital Bridging

Bind Security ResearchQ2 2024

Formal specification of card-based blockchain interaction primitives, examining physical-layer trust assumptions and implications for hardware security module design.

IP protected
// TECHNICAL PAPER

Blockchain-Based Molecular Imaging NFTs for Combating Synthetic Precursor Material Trafficking

J.E. Ahearne — ORCID: 0009-0009-3736-9438Q1 2025

Formal specification of a blockchain-NFT framework for authenticating molecular fingerprints of controlled synthetic precursors at the supply chain level. Proposes on-chain provenance tracking, border enforcement integration, and tamper-evident chain of custody.

Open access
// TECHNICAL PAPER

Behavioural Science Applications in AI-Driven Financial Education

Bind Security ResearchQ4 2024

Examination of Kahneman and Tversky dual-process theory applied to structured trading education. Covers cognitive bias intervention, AI mentor agent design, and competency measurement via tokenised credentialling systems.

Open access
// TECHNICAL PAPER

Threat Modelling Frameworks for Delay-Tolerant Networks in Adversarial Environments

Bind Security ResearchQ1 2025

Formal analysis of attack surfaces in mesh-topologised payment networks operating under intermittent connectivity. Covers adversary modelling, trust assumptions, and proposed mitigations for offline transaction integrity.

Open access
// TECHNICAL PAPER

Card-Based Cryptographic Protocols: Novel Constructions for Physical-Digital Bridging

Bind Security ResearchQ2 2024

Formal specification of card-based blockchain interaction primitives, examining physical-layer trust assumptions and implications for hardware security module design.

IP protected
// TECHNICAL PAPER

Behavioural Science Applications in AI-Driven Financial Education

Bind Security ResearchQ4 2024

Examination of Kahneman and Tversky's dual-process theory applied to structured trading education. Covers cognitive bias intervention, AI mentor agent design, and competency measurement via tokenised credentialling systems.

Open access
// TECHNICAL PAPER

Threat Modelling Frameworks for Delay-Tolerant Networks in Adversarial Environments

Bind Security ResearchQ1 2025

Formal analysis of attack surfaces in mesh-topologised payment networks operating under intermittent connectivity. Covers adversary modelling, trust assumptions, and proposed mitigations for offline transaction integrity.

Open access