Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
- Delft University of Technology (TU Delft)
- Delft University of Technology (TU Delft); Delft
- Delft University of Technology (TU Delft); yesterday published
- University of Amsterdam (UvA)
- University of Groningen
- Leiden University
- Radboud University
- University of Amsterdam (UvA); Amsterdam
- Eindhoven University of Technology (TU/e)
- University of Amsterdam (UvA); yesterday published
- University of Twente (UT)
- Delft University of Technology (TU Delft); today published
- Eindhoven University of Technology (TU/e); yesterday published
- Leiden University; 's-Gravenhage
- University of Amsterdam (UvA); today published
- University of Groningen; Groningen
- Delft University of Technology
- Delft University of Technology (TU Delft); 10 Oct ’25 published
- Delft University of Technology (TU Delft); 3 Oct ’25 published
- Eindhoven University of Technology (TU/e); 4 Oct ’25 published
- Erasmus University Rotterdam
- Leiden University; today published
- Maastricht University (UM)
- Maastricht University (UM); 26 Sep ’25 published
- Radboud University; yesterday published
- The Open Universiteit (OU)
- The Open Universiteit (OU); today published
- Tilburg University
- Universiteit van Amsterdam
- University Medical Center Utrecht (UMC Utrecht)
- University Medical Center Utrecht (UMC Utrecht); today published
- University of Amsterdam (UvA); 10 Oct ’25 published
- University of Twente
- University of Twente (UT); 26 Sep ’25 published
- Wageningen University and Research Center
- 25 more »
- « less
-
Field
-
issues such as privacy, security, and bias in digital health systems. You will adopt a mixed-methods approach, combining qualitative and participatory methods to map the needs of healthcare professionals
-
cryptography guarantees better performance and faster speed for encrypting data. Without doubt, AES (Advanced Encryption Standard) and Keccak/SHA-3 (Secure Hash Algorithm 3) are the two most used and famous
-
the Graduate Schools Admission Requirements . Please note: You can apply online. We will not process applications sent by email and/or post. As part of knowledge security, TU Delft conducts a risk
-
referees. A knowledge security check can be part of the selection procedure (for details: national knowledge security guidelines ). Applications must be submitted no later than 3 November 2025. Only
-
defence safety screening procedure. TU Delft (Delft University of Technology) Delft University of Technology is built on strong foundations. As creators of the world-famous Dutch waterworks and pioneers in
-
part of the selection procedure. For the final candidates, a knowledge security check will be part of the application procedure. For more information on this check, please consult Chapter 8
-
: You can apply online. We will not process applications sent by email and/or post. As part of knowledge security, TU Delft conducts a risk assessment during the recruitment of personnel. We do
-
Requirements . Please note: You can apply online. We will not process applications sent by email and/or post. As part of knowledge security, TU Delft conducts a risk assessment during the recruitment
-
note: You can apply online. We will not process applications sent by email and/or post. As part of knowledge security, TU Delft conducts a risk assessment during the recruitment of personnel. We do
-
: Organisational differences (1.0 fte) For our NWO-funded project “From ‘what went wrong’ to ‘what works well?’ Using Safety 2 principles to develop new cybersecurity solutions”, we are looking for a PhD candidate