Sort by
Refine Your Search
-
Listed
-
Country
-
Field
-
Probability and Stochastic Processes, and Cryptography. A conferred Ph.D. or equivalent international doctoral degree is required. Junior candidates are expected to show outstanding promise in research, as
-
include: • Organization and execution of a Hackathon for the Cryptography and Security course, fostering the application of theoretical concepts to practical, real-world challenges. • Comprehensive lecture
-
computing, machine learning, natural language processing, networking, distributed systems, operating systems, programming languages, formal methods, real-time systems, security and cryptography, and theory
-
backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services
-
qualified talents. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Trustworthy AI, secure and reliable systems, cloud computing, cryptography, network
-
to the Cybersecurity (CSY) group, where our work on cryptography sits, and will have the opportunity to contribute to cross-cutting hubs (see https://www.kcl.ac.uk/informatics/research ). Research collaboration across
-
qualified talents. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Trustworthy AI, secure and reliable systems, cloud computing, cryptography, network
-
qualified talents. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Trustworthy AI, secure and reliable systems, cloud computing, cryptography, network
-
& Cryptography, Graph Theory & Combinatorics, Statistics, Artificial Intelligence, Computational & Applied Mathematics, Dynamical Systems & Mathematical Biology. It hosts the Key Laboratory of Nonlinear Analysis
-
qualified talents. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Trustworthy AI, secure and reliable systems, cloud computing, cryptography, network