Sort by
Refine Your Search
-
Category
-
Country
-
Employer
-
Field
-
. The project will investigate how advanced and modern cryptographic protocols, such as zero-knowledge proofs, secure multiparty computation, homomorphic encryption, exotic signatures, and their post-quantum
-
importance in the field of cybersecurity and data protection, offering tools for data encryption and authentication. While public-key cryptography is crucial for exchanging the key or signing data, symmetric
-
for Encrypted IoT Traffic Please note, this is open to home students only. PhD Studentship:cyberQuarter funded. The Studentship is available for an October 2025 start. A PhD studentship that comprises tax-free
-
continue reading! Join Us! Our modern society relies upon numerous electronic devices that use encryption to communicate and operate securely. However, even strong cryptography can break when the device
-
APISID Use Used for targeting purposes to profile the interests of website visitors in order to display relevant and personalized Google advertising. Lifetime 6 months Name HSID Use Includes encrypted
-
will design quantum-safe threshold encryption and/or authentication algorithms. The expected outcome is the design of methods, techniques and their software prototype to implement quantum-safe threshold
-
encrypted entries of your Google account and last login time to protect against attacks and data theft from form entries. Lifetime 2 years Name SID Use Used for security purposes to store digitally signed and
-
encrypted entries of your Google account and last login time to protect against attacks and data theft from form entries. Lifetime 2 years Name SID Use Used for security purposes to store digitally signed and
-
, Biology and Mathematics, Humanoid Robotics, Cognitive Science, Mechnotronics, Advanced Manufacturing, Cyber security, Encryption and decryption, Petroleum and Petro-Chemical Engineering, Science of Climate