Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Employer
- Nature Careers
- University of Luxembourg
- MOHAMMED VI POLYTECHNIC UNIVERSITY
- CNRS
- Carnegie Mellon University
- Chinese Academy of Sciences
- DURHAM UNIVERSITY
- Durham University
- Durham University;
- Ecole Normale Supérieure de Lyon
- Fraunhofer-Gesellschaft
- Institute of Photonic Sciences
- Ludwig-Maximilians-Universität München
- Max Planck Institute for Security and Privacy, Bochum
- Technical University of Munich
- Universitat Pompeu Fabra - Department / School of Engineering
- University of Lund
- Xi'an Jiaotong - Liverpool University
- 8 more »
- « less
-
Field
-
Information Technology conducts broad research in cryptography, computer security, wireless and wired networks. The Security Group has around 20 members. The main research areas are cryptography, privacy, and
-
backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services
-
Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. The SigCom research group of SnT, headed by Prof. Symeon Chatzinotas, focuses on wireless/satellite
-
or related areas. No prior knowledge of cryptography is required. Expertise in optimization or efficient algorithm design will be considered an asset. Applications should include a CV, a list of publications
-
, including but not limited to embedded/hardware security, security of AI systems, (post-quantum) cryptography, quantum algorithms, confidential computing/trusted execution, or microarchitectural security. Key
-
, -- stochastic analysis, -- mathematical theory for artificial intelligence, -- optimization and numerical computation over manifold, -- systems and control theory, -- algebraic computation theory and cryptography
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and