Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
Algebraic Topology, Poisson Geometry, Algebraic Geometry, Mathematical Physics, Number Theory, Cryptography, Multivariate Statistical Analysis, Information Retrieval, and Kähler Geometry. Faculty members have
-
backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services
-
Resource Efficient Pseudo Random Number Generator based on Sawtooth Maps for Internet of Things. Wiley Online: https://doi.org/10.1002/spy2.304 Abu Tair, M., Djahel, S., Perry, P., Scotney, B.W., Zia, U
-
research internships. Criteria of the candidate: PhD in the field of Cryptography, Computer security or any related field. Strong publication record in high impact conferences / journals. Very good
-
backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services
-
Probability and Stochastic Processes, and Cryptography. A conferred Ph.D. or equivalent international doctoral degree is required. Junior candidates are expected to show outstanding promise in research, as
-
in this form https://www.it.pt/Positions/OtherResearchPosition/8311 After the notification of the results, candidates have 10 working days if they wish to contest the decision. E-mail submissions will
-
or related areas. No prior knowledge of cryptography is required. Expertise in optimization or efficient algorithm design will be considered an asset. Applications should include a CV, a list of publications
-
deployment of this technology. Responsibilities The successful candidate will contribute to ongoing research projects in cryptography and privacy, performing the following tasks within a cutting-edge research
-
backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services