Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
intérêt d'une part pour des calculs effectifs de variétés tropicales, et d'autre part, pour l'étude de familles de systèmes polynomiaux issues notamment de la cryptographie post-quantique. Le point de
-
within SCI and across other departments within Pitt, and initiatives like the $11.6M Western Pennsylvania Quantum Information Core (https://www.pitt.edu/pittwire/features-articles/pitt-investment-pa
-
include signal processing, coding and modulation; the role of entanglement; error detection and correction; cryptography and security; and information processing in integrated quantum computers and in
-
for protecting privacy in an ever more interconnected world? Are you willing to take on the challenge of upgrading cryptography to deal with the threat posed by quantum computation? Do you enjoy working in a team
-
motivated and enthusiastic Lecturer in Cyber Security. We welcome applicants who have experience in Ethical Hacking, System Penetration, Secure Software Development, Information Security and Cryptography
-
backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services
-
engineering Computer science -> Cybernetics Positions: PhD postion Type of contract: Temporary Job status: Full-time Hours per week: 40 How to apply: https://www.fei.vsb.cz/en/applicant/doctoral-study/ Select
-
the Control and Cyber-Physical Systems Group at TU Dortmund, focuses on encrypted control for discrete-event systems (DES). Encrypted control combines methods from control and cryptography to enable a new class
-
to contact Prof. Bart Mennink, Professor in Cryptography and Information Security, at bart.mennink@maastrichtuniversity.nl for more information. The end date of the publication is 5 May 2026. To apply
-
backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services