Sort by
Refine Your Search
-
Listed
-
Country
-
Employer
-
Field
-
missions. 6) Crypto key management and adaptation of post-quantum cryptography (PQC) Developing robust key management protocols to ensure secure generation, distribution, and storage of cryptographic keys in
-
, -- mathematical theory for artificial intelligence, -- optimization and numerical computation over manifold, -- systems and control theory, -- algebraic computation theory and cryptography. The position is for two
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
post-doctoral researcher position. Led by Prof. Nektarios Tsoutsos, the Trustworthy Computing Group specializes in the broader areas of cybersecurity, applied cryptography, computer architecture
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
candidate should have (or expect to soon be awarded) a PhD in quantum information theory (including some aspects of quantum computing, quantum cryptography and/or quantum communication) and some experience in
-
candidate should have (or expect to soon be awarded) a PhD in quantum information theory (including some aspects of quantum computing, quantum cryptography and/or quantum communication) and some experience in
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular