Sort by
Refine Your Search
-
Country
-
Program
-
Employer
- European Space Agency
- Korea Institute for Advanced Study
- Pennsylvania State University
- Rutgers University
- University of Tübingen
- ; Xi'an Jiaotong - Liverpool University
- DAAD
- Nanyang Technological University
- SINGAPORE INSTITUTE OF TECHNOLOGY (SIT)
- University of Delaware
- University of Houston Central Campus
- XIAN JIAOTONG LIVERPOOL UNIVERSITY (XJTLU)
- 2 more »
- « less
-
Field
-
on emerging privacy-preserving techniques such as homomorphic encryption, secure multi-party computation and federate learning. Key Responsibilities: Conduct advanced research in the areas of privacy-preserving
-
management. Expertise in securing a multiplayer game network system. Knowledge of encryption techniques to ensure data in transit remains confidential. Prevention measures against common threats like DDoS
-
Computation Zero-Knowledge Proofs Fully Homomorphic Encryption Post-doc Positions Multiple positions are open at the level of post-doctoral researcher with two-year term. Positions will remain open until filled
-
packages for the successful candidate. Topics of Interests Post-Quantum Cryptography Multi-Party Computation Zero-Knowledge Proofs Fully Homomorphic Encryption Post-doc Position The position is open at
-
encrypted entries of your Google account and last login time to protect against attacks and data theft from form entries. Lifetime 2 years Name SID Use Used for security purposes to store digitally signed and
-
encrypted entries of your Google account and last login time to protect against attacks and data theft from form entries. Lifetime 2 years Name SID Use Used for security purposes to store digitally signed and
-
, hardware security, and encrypted computation. The post-doctoral researcher will take the lead in research projects supported by the National Science Foundation to advance the performance and usability
-
Cryptography o Data Sciences, Complex Networks, Mathematical Biology o Quantum Computation & Information Science o Post-Quantum Cryptography, Homomorphic Encryption and Computing o Theoretical and Computational
-
: □ Computational Sciences o Cryptography o Data Sciences, Complex Networks, Mathematical Biology o Quantum Computation & Information Science o Post-Quantum Cryptography, Homomorphic Encryption and Computing o
-
encryption and zero-knowledge proofs to protect personal data. • Create solutions for real-time detection of model tampering, including mechanisms for identifying and preventing personal data exposure