63 computer-security-"https:"-"https:"-"https:"-"https:"-"DFG-TRR" scholarships in Netherlands
Sort by
Refine Your Search
-
Listed
-
Program
-
Employer
-
Field
-
communication—it is also a powerful tool for enabling private computations. Secure Multi-Party Computation (MPC) is an exciting field that bridges privacy and data utility, allowing multiple parties with private
-
computational social choice; please visit https://algo.win.tue.nl/ for more details on the cluster. The cluster provides a lively and international environment for your research. As a PhD student, you do need
-
PhD Position in Computational Modelling of Fungal Evolution Faculty: Faculty of Science Department: Department of Biology Hours per week: 36 to 40 Application deadline: 14 April 2026 Apply now
-
Framework Programme? Horizon Europe (other) Is the Job related to staff position within a Research Infrastructure? No Offer Description Introduction Are you passionate about mathematical systems and control
-
) Application Deadline 30 Apr 2026 - 21:59 (UTC) Country Netherlands Type of Contract Temporary Job Status Not Applicable Hours Per Week 36.0 Is the job funded through the EU Research Framework Programme? Not
-
Website https://www.academictransfer.com/en/jobs/357906/phd-position-on-computational-i… Requirements Specific Requirements We are looking for talented enthusiastic PhD candidates who meet the following
-
16 Jan 2026 Job Information Organisation/Company Eindhoven University of Technology (TU/e) Research Field Computer science » Computer architecture Computer science » Computer hardware Researcher
-
PhD position in AI and Human Centered Decision Making Faculty: Faculty of Science Department: Department of Information and Computing Sciences Hours per week: 36 to 40 Application deadline: 5
-
PhD Position in Sequential Decision-Making Faculty: Faculty of Science Department: Department of Information and Computing Sciences Hours per week: 36 to 40 Application deadline: 15 May 2026
-
databases and digital collections (such as newspaper archives, policy documents, and media sources) and apply techniques such as crisis event detection, computational narratology, and semantic modelling. In