Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
A Fully Homomorphic Encryption (FHE) Engineer position is currently available at NTU and the start-up TT-logic, part of the incubator NTUitive from the Nanyang Technological University
-
at the devices, and even if encryption is used to protect ML models, those models can be extracted during dynamic analysis. To secure on-device ML models, in this project, we aim to employ privacy-enhancing
-
Royal Netherlands Academy of Arts and Sciences (KNAW); Published 14 Nov ’25 | Netherlands | 24 days ago
of encrypted storage for data deposits. In addition, you will take care of daily maintenance and support.
-
intelligence to optimize security controls and tool configurations. Ensure secure handling of API keys, authentication tokens, and encryption practices. Implement and manage Identity and Access Controls across
-
Communications and Networking, Springer, 6 (2022). https://doi.org/10.1186/s13638-021-02081-4 Abu-Tair, M., Zia, U., Memon, J., Scotney, B.W., Martínez Carracedo, J. & Sajjad, A. (Apr 2024). Transparent Encryption
-
of computer security, with emphasis on applied encryption, software/system security, and web security. Subjects such as encryption algorithm, access control, authentication, buffer overflow, SQL injection and
-
. Ensure all integrations follow security, privacy, and compliance standards (e.g., secure data handling, encryption in transit and at rest). Observability, Monitoring & Logging Leverage centralized logging
-
lecturer for Spring 2026 to teach CS 452: Introduction to Computer Security Course Description Introduces students to the principles of computer security, with emphasis on applied encryption, software/system
-
storage BASH shell, PowerShell and Python scripting Computer architecture - security and exploitation Web application security Encryption and decryption Job classification: S4001 - Instructor Hourly Rate
-
communication confidentiality by leveraging the inherent characteristics of the wireless channel. It protects transmitted data against eavesdropping without relying solely on higher-layer encryption. PHYSEC