Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
deployment of this technology. Responsibilities The successful candidate will contribute to ongoing research projects in cryptography and privacy, performing the following tasks within a cutting-edge research
-
Probability and Stochastic Processes, and Cryptography. A conferred Ph.D. or equivalent international doctoral degree is required. Junior candidates are expected to show outstanding promise in research, as
-
or related areas. No prior knowledge of cryptography is required. Expertise in optimization or efficient algorithm design will be considered an asset. Applications should include a CV, a list of publications
-
network security, hardware and embedded system security, cryptography, privacy-preserving and trustworthy computing, AI-driven security and adversarial machine learning, security of cyber-physical and
-
Engineering or a closely related field. Areas of expertise may include, but not limited to, cybersecurity, computer and network security, hardware and embedded system security, cryptography, privacy-preserving
-
in this form https://www.it.pt/Positions/OtherResearchPosition/8311 After the notification of the results, candidates have 10 working days if they wish to contest the decision. E-mail submissions will
-
backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services
-
computing, machine learning, natural language processing, networking, distributed systems, operating systems, programming languages, formal methods, real-time systems, security and cryptography, and theory
-
ensuring privacy? Do you enjoy working in a team of young and motivated researchers? If so, we have the perfect opportunity for you! Join our team! Cryptography today is about much more than just securing
-
these exiting domains. Topics include but are not limited to remote direct memory access, hardware offloading and acceleration, AI for networking and security, storage management, cryptography, and architecture