Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Employer
- University of Luxembourg
- Nature Careers
- MOHAMMED VI POLYTECHNIC UNIVERSITY
- Stony Brook University
- AALTO UNIVERSITY
- University of Southern Denmark
- Chinese Academy of Sciences
- Ecole Normale Supérieure de Lyon
- European Space Agency
- Grenoble INP - Institute of Engineering
- ICFO - The Institute of Photonic Sciences
- Institute of Photonic Sciences
- KINGS COLLEGE LONDON
- King's College London
- Rutgers University
- Technical University of Munich
- Télécom Paris
- University College Cork
- University of Delaware
- Xi'an Jiaotong - Liverpool University
- 10 more »
- « less
-
Field
-
Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. Your role The SigCom research group of SnT, headed by Prof. Symeon Chatzinotas, focuses on wireless/satellite
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. Your role Successful candidates will join the young, vibrant, and interdisciplinary FINATRAX Research
-
. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography
-
, -- mathematical theory for artificial intelligence, -- optimization and numerical computation over manifold, -- systems and control theory, -- algebraic computation theory and cryptography. The position is for two
-
, the Trustworthy Computing Group specializes in the broader areas of cybersecurity, applied cryptography, computer architecture, hardware security, and encrypted computation. The post-doctoral researcher will take
-
missions. 6) Crypto key management and adaptation of post-quantum cryptography (PQC) Developing robust key management protocols to ensure secure generation, distribution, and storage of cryptographic keys in
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services
-
-quantum cryptography and coded computing (1 postdoc, 1 PhD, Antonia Wachter-Zeh, antonia.wachter-zeh@tum.de) • Theory for communication systems beyond Shannon's approach (1 postdoc, 1 PhD, Christian Deppe