Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
ensuring privacy? Do you enjoy working in a team of young and motivated researchers? If so, we have the perfect opportunity for you! Join our team! Cryptography today is about much more than just securing
-
these exiting domains. Topics include but are not limited to remote direct memory access, hardware offloading and acceleration, AI for networking and security, storage management, cryptography, and architecture
-
, Beijing 100190, China [map ] Appl Deadline: none (posted 2022/04/11 05:00 AM UnitedKingdomTime) Position Description: Apply Position Description Hua Loo-Keng Center for Mathematical Sciences (HCMS, https
-
Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. About the role... We offer an attractive PhD candidate position in close collaboration with our industrial
-
background in cybersecurity including detection, response, cryptography and control access; also, strong background in artificial intelligence, networks and its secure management, cyber-physical systems, and
-
Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. About the role... We offer an attractive PhD candidate position in close collaboration with our industrial
-
Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. About the role... We offer an attractive PhD candidate position in close collaboration with our industrial
-
Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. About the role... We offer an attractive PhD candidate position in close collaboration with our industrial
-
& Cryptography, Graph Theory & Combinatorics, Statistics, Artificial Intelligence, Computational & Applied Mathematics, Dynamical Systems & Mathematical Biology. It hosts the Key Laboratory of Nonlinear Analysis
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and