Sort by
Refine Your Search
-
security requirements. Taking an interdisciplinary approach, you will combine post-quantum cryptography and cyber security with methodologies from the social sciences to guide system design and evaluation
-
of computer science, cryptography. All positions are fully funded for up to 4 years. Candidates should have (at the beginning of the contract but not necessarily at the time of application) a Master's degree in
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
instrumentation , X-Ray Physics , X-ray Scattering , X-ray Science Appl Deadline: 2025/08/31 11:59PM (posted 2025/06/05, listed until 2025/12/05) Position Description: Apply Position Description Program Overview
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
within Computer Science, Mathematics, Electrical Engineering, or a closely related subject area. You must have a Master's degree in Computer Science, Mathematics, or a closely related area or equivalent