Sort by
Refine Your Search
-
of the research areas with list of potential supervisors, list of training opportunities, programme details, description of the different stages of the selection process, and detailed instructions
-
opportunities, programme details, description of the different stages of the selection process, and detailed instructions for the application process, including templates, timelines and FAQs, are available via
-
department, Applied Cybersecurity, focuses cutting-edge problems in the foundations and applications of cryptography, including privacy‑enhancing technologies, secure and verifiable computation, and securing
-
. Our program focuses on understanding hostpathogen interactions across species (mice, chickens, pigs, dogs) using well-established viral (e.g., Marek's disease virus, Theiler virus, Hepatitis E