Sort by
Refine Your Search
-
Listed
-
Country
-
Field
-
qualified talents. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Trustworthy AI, secure and reliable systems, cloud computing, cryptography, network
-
, statistics, systems science and control theory, information theory, operations research and econometrics, theoretical computer science and cryptography, mathematical theory of artificial intelligence, etc
-
State University of New York University at Albany | Albany, New York | United States | about 11 hours ago
exponentially more efficient calculations than conventional computers. This would revolutionize fields that involve optimization, modeling and simulation, cryptography, and AI. However, realizing this potential
-
faculty Position Location: Singapore, Singapore 637371, Singapore [map ] Subject Area: Post-Quantum Cryptography Appl Deadline: none (posted 2025/08/27 05:00 AM UnitedKingdomTime) Position Description
-
Science, Actuarial Sciences, or Cryptography. Additional Assignment has the following Preferred Education & Experience: Five years of teaching experience at the college/university level as the instructor
-
department. The successful candidates will teach a variety of undergraduate courses in Computer Security, including information security, computer forensics, cryptography, biometrics, physical security and
-
. · Artificial Intelligence, Machine Learning, and Data-Driven Systems – edge AI, embedded intelligence, and neuromorphic computing. · Cybersecurity & Privacy – hardware and IoT security, post-quantum cryptography
-
courses per semester and leads the outreach branch of the Mason Experimental Geometry Lab (https://megl.science.gmu.edu/). They engage the community through small-group activities at nearby K-12 schools
-
within the Department of Electrical and Information Technology at Lund University, the Faculty of Engineering, LTH, works broadly with research within Cryptography, Computer Security, Wireless and Fixed
-
algebra, cryptography, number theory, and geometry. The ideal candidate will bring strong expertise in information theory or coding theory, with a research profile that aligns with one or more of the