64 computer-security "https:" "https:" "https:" "https:" "https:" "https:" "Dr" uni jobs at University of Lund
Sort by
Refine Your Search
-
equality and diversity as a strength and an asset. Work duties The work involves field studies and associated computer, greenhouse and laboratory work as part of the POLLCLIM project that focuses
-
Description of the workplace The Division of Secure and Networked Systems within the Department of Electrical and Information Technology works broadly with research within Cryptography, Computer
-
Dr Christopher Douse and currently consists of seven researchers. The group works closely with in close alignment with strategic infrastructures within the Medical Faculty, particularly Lund Stem Cell
-
Dr Christopher Douse and currently consists of seven researchers. The group works closely with in close alignment with strategic infrastructures within the Medical Faculty, particularly Lund Stem Cell
-
broadly with research within Cryptography, Computer Security, Wireless and Fixed Networks. The security group has around 20 members. The main research directions are Cryptography, Privacy and System
-
. In this project, you will work on nanoparticle research in close collaboration with Dr Cindy Xiao, analyzing cryo-TEM and scattering data and integrating these results to draw scientifically robust
-
and humidity monitoring and cooling control. We are looking for a student to work on the implementation of this environmental and safety control. To be successful in this role you need to have the
-
conditions that encourage personal development and inclusion for all co-workers. We care deeply about both physical and safety and the psychosocial work environment. What we offer Lund University is a public
-
systems, Applied AI/ML, Computer Security and Cryptography. The division runs several research projects through different large research collaboration platforms and arranges extensive workshops and seminar
-
an emphasis on large-scale and/or distributed methods and systems. Central aspects include scalable methods with well‑founded analysis of, for example, computational and communication cost, convergence and