Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Employer
- Nature Careers
- NTNU Norwegian University of Science and Technology
- Technical University of Denmark
- Technical University of Munich
- The University of Manchester
- University of Luxembourg
- ;
- AALTO UNIVERSITY
- Ariel University
- Fundació per a la Universitat Oberta de Catalunya
- Monash University
- NTNU - Norwegian University of Science and Technology
- Nanyang Technological University
- Swansea University
- University of Sheffield
- University of Twente
- 6 more »
- « less
-
Field
-
election systems that are resistant to coercion. Requirement: You are not required to be an expert in Coq or Cryptography; familiarity with Coq and Cryptography is fine. However, you should be comfortable
-
, especially in relation to cryptography. The exact research topics can be adjusted within the limits set by our current projects according to the interests of the applicant. Your goal in research will be
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. Your role We offer a fully funded PhD student position within the Trustworthy Software Engineering (TruX
-
are considered a bonus ▪ Knowledge in cryptography ▪ Experience with SDR platforms (e.g., USRP, NI VST, Ettus devices) Our offer ▪ Participation in a cutting‑edge research project with high societal impact
-
Cryptography , Applied Physics , artificial gauge fields , Artificial Intelligence , Astronomy , Astronomy and Astrophysics , Astroparticle Physics , astrophysics , Astrophysics (astro-ph) , Astrophysics
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
the impact of such attacks when executed in multi-agentic systems, where the output of one LLM is used as input for another LLM. 5. Design new defense methods, e.g., inspired by cryptography, to prevent