Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
within SCI and across other departments within Pitt, and initiatives like the $11.6M Western Pennsylvania Quantum Information Core (https://www.pitt.edu/pittwire/features-articles/pitt-investment-pa
-
for protecting privacy in an ever more interconnected world? Are you willing to take on the challenge of upgrading cryptography to deal with the threat posed by quantum computation? Do you enjoy working in a team
-
backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services
-
engineering Computer science -> Cybernetics Positions: PhD postion Type of contract: Temporary Job status: Full-time Hours per week: 40 How to apply: https://www.fei.vsb.cz/en/applicant/doctoral-study/ Select
-
to contact Prof. Bart Mennink, Professor in Cryptography and Information Security, at bart.mennink@maastrichtuniversity.nl for more information. The end date of the publication is 5 May 2026. To apply
-
the Control and Cyber-Physical Systems Group at TU Dortmund, focuses on encrypted control for discrete-event systems (DES). Encrypted control combines methods from control and cryptography to enable a new class
-
backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services
-
backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services
-
to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and