-
ballot may leak the voter’s preferences if published publicly in plaintext, as the ranking order can reveal detailed information about the voter’s identity. Therefore encryption is necessary to hide
-
for Encrypted IoT Traffic Please note, this is open to home students only. PhD Studentship:cyberQuarter funded. The Studentship is available for an October 2025 start. A PhD studentship that comprises tax-free
-
management. Expertise in securing a multiplayer game network system. Knowledge of encryption techniques to ensure data in transit remains confidential. Prevention measures against common threats like DDoS
-
record with a focus on network security, cryptography, information privacy or other areas closely related to it Proven expertise in encryption, zero trust architecture, security protocols, access controls
-
various encryption methods Installing new operating systems, updates and releases, specifically for Linux, Windows and Mac Follow me printing infrastructure management Racking, fibre optic and Cat5/6A cable
-
explore solutions to implement grid optimisation in a cyber-secure manner, such as enabling encryption services, and quantify the associated trade-offs. The results will be validated using datasets provided
-
to earn career academics within the department. We are looking for candidates with expertise in one of the following areas: Cryptography, quantum encryption, or secure quantum communications OT(Operational
-
, Ceph (CephFS, RADOSGW, RBD), Discourse, Flask, Git, GitLab, GLPI, Grafana, Laravel, Let's Encrypt, Linux (primarily Ubuntu), mkdocs, Nginx, OpenStack, OpenSSL, OpenSSH, OpenTofu, OpenOnDemand, OpenVPN
-
Background The rise of quantum computers could break many existing encryption methods, making post-quantum cryptography (PQC) vital for future security. Digital signatures, which act like electronic
-
responsibilities, maintaining in-depth and up-to-date health and safety knowledge. Assist with completion and updating safety paperwork relevant to the specialism, e.g. data protection, GDPR, GCP, data encryption