Sort by
Refine Your Search
-
differentiation of generic and complex computer programs (including control flows, data structures, and possibly memory) allows for the exploitation of any-order differentials to obtain transformative effects
-
logic-based methods); non-standard computational models (e.g., quantum and bio-inspired computation); security and privacy (e.g., homomorphic encryption and anonymity); computational geometry, graph
Searches related to computer security phd student
Enter an email to receive alerts for computer-security-phd-student positions