Sort by
Refine Your Search
-
Listed
-
Country
-
Employer
-
Field
-
to the applications of mathematics in cryptography, computing, business, and finance. PAP covers many areas of fundamental and applied physics, including quantum information, condensed matter physics, biophysics, and
-
backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services
-
Requirements Profile Education: A PhD in Computer Science, Mathematics, Data Science, Cybersecurity, or a related field, with a strong interest in cryptography. Experience: A minimum of 1 year of experience in
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
of the elderly to space robotics. We are now looking for a Doctoral Researcher in quantum computing and algorithms. Are you as excited about quantum technology and its future applications as we are? We are now
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. Your role We offer a fully funded PhD student position within the Trustworthy Software Engineering (TruX
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and