Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Employer
-
Field
-
candidate should have (or expect to soon be awarded) a PhD in quantum information theory (including some aspects of quantum computing, quantum cryptography and/or quantum communication) and some experience in
-
candidate should have (or expect to soon be awarded) a PhD in quantum information theory (including some aspects of quantum computing, quantum cryptography and/or quantum communication) and some experience in
-
post-doctoral researcher position. Led by Prof. Nektarios Tsoutsos, the Trustworthy Computing Group specializes in the broader areas of cybersecurity, applied cryptography, computer architecture
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
advantage is also a prospective topic, especially in relation to cryptography. The exact research topics can be adjusted within the limits set by our current projects according to the interests
-
-quantum cryptography and coded computing (1 postdoc, 1 PhD, Antonia Wachter-Zeh, antonia.wachter-zeh@tum.de) • Theory for communication systems beyond Shannon's approach (1 postdoc, 1 PhD, Christian Deppe