Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
California State University, Long Beach | Long Beach, California | United States | about 3 hours ago
Engineering or a closely related field. Areas of expertise may include, but not limited to, cybersecurity, computer and network security, hardware and embedded system security, cryptography, privacy-preserving
-
, Beijing 100190, China [map ] Appl Deadline: none (posted 2022/04/11 05:00 AM UnitedKingdomTime) Position Description: Apply Position Description Hua Loo-Keng Center for Mathematical Sciences (HCMS, https
-
to the Cybersecurity (CSY) group, where our work on cryptography sits, and will have the opportunity to contribute to cross-cutting hubs (see https://www.kcl.ac.uk/informatics/research ). Research collaboration across
-
State University of New York University at Albany | Albany, New York | United States | about 13 hours ago
exponentially more efficient calculations than conventional computers. This would revolutionize fields that involve optimization, modeling and simulation, cryptography, and AI. However, realizing this potential
-
School graduates over a thousand students who are ready to take on great ambitions and challenges. For more details, please view: https://www.ntu.edu.sg/eee We are looking for a Research Fellow to focus
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
Government of Canada | Government of Canada Ottawa and Gatineau offices, Ontario | Canada | about 11 hours ago
asset qualifications may be evaluated during the course of an interview, however candidates will not be eliminated if they do not demonstrate asset qualifications. Technical competencies: • Cryptography
-
Science, Actuarial Sciences, or Cryptography. Additional Assignment has the following Preferred Education & Experience: Five years of teaching experience at the college/university level as the instructor
-
department. The successful candidates will teach a variety of undergraduate courses in Computer Security, including information security, computer forensics, cryptography, biometrics, physical security and
-
Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. Your role The successful candidate is expected to assume a leading role in defining, acquiring, managing, and