Sort by
Refine Your Search
-
Category
-
Program
-
Employer
-
Field
-
developing the department's specialist strategy. Current projects of the institute, which are to be continued in the department, are in the areas of security architectures, secure identities, encryption and
-
multi-party computation, homomorphic encryption) Machine Learning (e.g., federated learning, data privacy Bioinformatics (e.g., variant analysis, genetic data) Solid programming skills in at least one
-
able to receive electronically signed and encrypted data) or to: TU Dresden, Vodafone Stiftungsprofessur für Mobile Nachrichtensysteme,HerrnProf. Gerhard Fettweis, Helmholtzstr. 10, 01069 Dresden
-
display relevant and personalized Google advertising. Lifetime 6 months Name HSID Use Includes encrypted entries of your Google account and last login time to protect against attacks and data theft from
-
display relevant and personalized Google advertising. Lifetime 6 months Name HSID Use Includes encrypted entries of your Google account and last login time to protect against attacks and data theft from
-
Max Planck Institute for Chemical Energy Conversion, Mülheim an der Ruhr | M lheim an der Ruhr, Nordrhein Westfalen | Germany | 3 months ago
to getting to know you! Encrypted data transfer is possible on the site Cryptshare.mpg.de . Further information regarding the data protection for applicants can be found on our webpage.
-
Max Planck Institute for Chemical Energy Conversion, Mülheim an der Ruhr | M lheim an der Ruhr, Nordrhein Westfalen | Germany | 3 months ago
for Chemical Energy Conversion Stiftstrasse 34-36 45470 Muelheim an der Ruhr Germany E-Mail: olaf.ruediger@cec.mpg.de and kushal.sengupta@cec.mpg.de Encrypted data transfer is possible on the site
-
exceptional cases to send documents by e-mail correspondence, we urgently request you to encrypt them in view of the vulnerability of electronic communication and the sensitivity of the data transmitted
-
VoIP desktop phone that is trustworthy and secure. The phone's primary function is to offer hacking-proof end-to-end encryption that is easy to use. The development encompasses the hardware and software