Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Employer
- University of Luxembourg
- Nature Careers
- Chalmers University of Technology
- Monash University
- ;
- ; Manchester Metropolitan University
- CNRS
- DAAD
- Danmarks Tekniske Universitet
- Eindhoven University of Technology (TU/e)
- Forschungszentrum Jülich
- Institute of Mathematics
- NTNU - Norwegian University of Science and Technology
- Queensland University of Technology
- Radboud University
- Technical University of Denmark
- Technical University of Munich
- University of Bergen
- University of Twente (UT)
- University of Tübingen
- 10 more »
- « less
-
Field
-
backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services
-
backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
wandering safety with enhanced privacy. The advanced cryptography and privacy enhancing technology (e.g. homomorphic encryption, differential privacy) will be explored and utilised to construct a privacy
-
domain of science with new possibilities in opto-electronics due to the effects of chirality in light-matter and charge-matter interactions, with applications in OLEDs, cryptography, sensors. Related
-
to staff position within a Research Infrastructure? No Offer Description Public-key cryptography is vulnerable to mathematical attacks by quantum computers. Governments encourage organizations to adopt
-
backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services
-
backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services