Skip to content
Permalink
Branch: master
Find file Copy path
Find file Copy path
Fetching contributors…
Cannot retrieve contributors at this time
1686 lines (1360 sloc) 68.9 KB

This is a list of positions that were available on older versions of this list. These positions/contacts may be out of date.

If a position/contact here is still available, please feel free to submit a pull request to move the entry back into the current openings. Otherwise create a github issue or send an email to infoseccontacts@gmail.com

Table of Contents

Information Security & Cryptography

Australia

Dali Kaafar
CSIRO Data61, Networks Group (Sydney)
Data Privacy, Network Security, Internet Measurement and Modeling
https://research.csiro.au/ng/about-us/people/dali-kaafar/
Dali.Kaafar@data61.csiro.au
Internships, PhD applications and current Openings for Data Privacy senior Researchers and Post-docs.

Ralph Holz
University of Sydney and Data61
ralph.holz@sydney.edu.au
http://sydney.edu.au/engineering/people/ralph.holz.php
Internet and network security; empirical security; blockchains
Admission and scholarship details: https://sydney.edu.au/study/admissions/apply/entry-requirements/postgraduate-research.html
http://sydney.edu.au/scholarships/prospective/international_students.shtml

Toby Murray
University of Melbourne and Data61
toby.murray@unimelb.edu.au
http://people.eng.unimelb.edu.au/tobym/
Security and Formal Methods, Secure Programming
Scholarship information:
https://studenteforms.app.unimelb.edu.au/apex/f?p=153:2:0:::2:P2_ID:641
Research Degree information:
https://futurestudents.unimelb.edu.au/admissions/applications/research

Vanessa Teague
University of Melbourne
vjteaguevjteague@unimelb.edu.au
http://people.eng.unimelb.edu.au/vjteague/
Applied cryptography, security and privacy, especially e-voting.
Scholarship information:
https://studenteforms.app.unimelb.edu.au/apex/f?p=153:2:0:::2:P2_ID:641
Research Degree information:
https://futurestudents.unimelb.edu.au/admissions/applications/research

Yuval Yarom
University of Adelaide
yval@cs.adelaide.edu.au
.adelaide.edu.http://wwwau/directory/yuval.yarom
Computer and Network Security. Cryptography (may require vetting by DFAT - see http://www.adelaide.edu.au/graduatecentre/admission/apply-now/international/sanctions/)
Scholarship information: http://www.adelaide.edu.au/graduatecentre/scholarships/research-international/

Austria

Krzysztof Pietrzak
Institute of Science and Technology (IST) Austria
http://pub.ist.ac.at/crypto/
pietrzak@ist.ac.at

Stephan Krenn
AIT Austrian Institute of Technology GmbH
http://ait.ac.at
stephan.krenn@ait.ac.at
Research and implementation in applied cryptography & privacy

Edgar Weippl
SBA Research / Vienna University of Technology / University of Applied Sciences St. Pölten
https://www.sba-research.org/
eweippl@sba-research.org

René Mayrhofer
Johannes Kepler University Linz
https://ins.jku.at
rm@ins.jku.at
Computer security with a focus on cryptographic protocols and secure code/systems design; special topics include usable authentication, mobile device security, and digital identity
Note: We do not have any open funded staff positions or scholarships at this time (new funding may become available in 2018, and we will update this note if it does). Johannes Kepler University Linz is open to PhD students, but at the moment students would have to be self-funded. Such self-funding would need to cover 3-5 years of tuition (depending on the student’s nationality and other conditions, see http://www.jku.at/content/e262/e256786/e233509/e249123?showlang=eng) and living expenses in Linz, Austria (price levels are comparable to other major central European cities).

Christian Rechberger
Graz University of Technology
https://iaik.tugraz.at
christian.rechberger@tugraz.at

Belgium

Olivier Pereira, François-Xavier Standaert
Université catholique de Louvain (Crypto Group)
http://www.uclouvain.be/crypto/
http://www.uclouvain.be/crypto/jobs/
olivier.pereira@uclouvain.be, fstandae@uclouvain.be

Bart Preneel, Seda Gürses, Claudia Diaz, Ingrid Verbauwhede
University of Leuven (COSIC)
Applied crypto, hardware security, privacy research
https://www.esat.kuleuven.be//cosic/
seda@esat.kuleuven.be , jobs-cosic@esat.kuleuven.be

Brazil

Jean Martina
Ricardo Custódio
Computer Security Lab
Universidade Federal de Santa Catarina - Florianópolis -SC
Digital Signatures, Finite Fields and Applications, Security Protocols, Formal Methods Applied to Security, IoT Security, Usable security.
http://jeanmartina.paginas.ufsc.br/
http://www.labsec.ufsc.br/
We are welcoming applications for PhDs in the areas above. Funding opportunities can be assessed on project basis (industry or locally funded by the university). We have cooperations in place and joint international projects with Canada, Luxembourg, USA, Italy and UK where some students could work and spend time on.

Brazil’s government has a program of scholarships for international students called PEC-PG. The call usually opens in October and scholarships are awarded to start in March the following year. This call is only available for student from developing countries. Last applicants manual availabe at: http://www.capes.gov.br/images/stories/download/editais/07102016-Manual-CAPES-PEC-PG.pdf

Diego F. Aranha, Ricardo Dahab, Julio López
Institute of Computing - University of Campinas
Research in electronic voting, cryptographic protocols, efficient hardware/software implementations and side-channel attacks (Cryptographic Engineering)
http://www.lasca.ic.unicamp.br/site/

Canada

Carlisle Adams
School of Electrical Engineering and Computer Science
University of Ottawa, Ontario, Canada
cadams@uottawa.ca
http://www.eecs.uottawa.ca/~cadams/
Computer and network security, cryptography, access control, privacy enhancing technologies

Jonathan Anderson
Department of Electrical and Computer Engineering
Memorial University, St. John’s, NL, Canada
Computer security, operating systems, compiler-based security transformation
jonathan.anderson@mun.ca
https://www.engr.mun.ca/~anderson/

Ken Barker
University of Calgary
Calgary, Alberta, Canada
T2N 1N4
kbarker@ucalgary.ca
www.ucalgary.ca/kbarker
Data privacy, privacy enhancing technologies, sensor security, block-chain

Konstantin (Kosta) Beznosov
University of British Columbia
beznosov@ece.ubc.ca
http://konstantin.beznosov.net/professional/
Usable privacy and security, computer and software systems security

Jeremy Clark
Concordia University, Montreal
j.clark@concordia.ca
@PulpSpy
https://madiba.encs.concordia.ca
http://vaddr.space
Applied crypto, voting, bitcoin, pki

Aleksander Essex
Western Information Security and Privacy Research Lab
Department of Electrical and Computer Engineering
Western University, London, ON
aessex@uwo.ca
http://essex.cc
https://whisperlab.org
Applied crypto, trustworthy voting, secure health informatics

Philip W. L. Fong
Department of Computer Science
University of Calgary, Alberta
pwlfong@ucalgary.ca
http://www.cpsc.ucalgary.ca/~pwlfong
Access control, security and privacy for the Internet of Things, protection technologies for social media

Ian Goldberg, Sergey Gorbunov, Urs Hengartner, Florian Kerschbaum, Ian McKillop and Doug Stinson
Cryptography, Security, and Privacy (CrySP) Group
University of Waterloo, Waterloo, ON
crysp@cs.uwaterloo.ca
https://crysp.uwaterloo.ca/
https://cs.uwaterloo.ca/future-graduate-students/applying-admissions#app_procedures

Michael Jacobson, Jr.
Department of Computer Science
University of Calgary, Alberta
jacobs@ucalgary.ca
http://www.cpsc.ucalgary.ca/~jacobs
Public-key cryptography, computational number theory

Mohammad Mannan, Madiba Security Research Group
Concordia University, Montreal
m.mannan@concordia.ca
Group: https://madiba.encs.concordia.ca
Web: https://users.encs.concordia.ca/~mmannan/

Atefeh (Atty) Mashatan,
Information Technology Management, Ryerson University
Toronto, Ontario, Canada
http://www.ryerson.ca/itm/faculty/atefeh-mashatan/
amashatan@ryerson.ca
Cryptography, Security of Internet-of-Things, Information Technology Security Management

Ashraf Matrawy
Carleton University, School of Information Technology
http://www.csit.carleton.ca/~amatrawy/
Network security

Paul C. van Oorschot
Carleton University-School of Computer Science
Ottawa, Ontario, Canada
http://people.scs.carleton.ca/~paulv/
Authentication, computer security, Internet security

Rei Safavi-Naini
University of Calgary
Calgary, Alberta, Canada
Cryptography, information security, communication security.
Position for postdocs and graduate students. Contact details:
http://pages.cpsc.ucalgary.ca/~rei/

Douglas Stebila
McMaster University
Hamilton, Ontario, Canada
Cryptography
https://www.cas.mcmaster.ca/~stebilad/

Amr Youssef
Concordia University, Montreal, Canada
Cryptography and cryptanalysis
youssef@ciise.concordia.ca
https://users.encs.
concordia.ca/~youssef/
Ali Miri
Computer and Information Security Lab (iCaSL)
Ryerson University
Toronto, Ontario, Ontario
http://www.scs.ryerson.ca/~samiri
Applied cryptography, Cloud computing, Big data and machine learning, IoT

Chile

Ahmed Elmesiry
Department of Electronics Engineering
Federico Santa María Technical University
Valparaíso, Valparaiso Region, Chile
https://goo.gl/dbk3vv
Applied cryptography, Cloud computing, computer security, Internet security, security and privacy for the Internet of Things
Scholarship information:
The main step is to be accepted in the post graduation program from the Electronic Engineering Department. Please, contact DGIP for further details [DGIP offers grants]. Additionally, CONICYT offers funding opportunities every year. Usually, the call starts on november and the results are published in march

Cyprus

Michael Sirivianos
Cyprus University of Technology
Limassol, Cyprus
https://www.cut.ac.cy/eecei/staff/michael.sirivianos/
michael.sirivianos@gmail.com

Social network security and privacy, device-centric and attribute-based authentication, web data privacy and online discrimination, trustworthy distributed systems.

EU-funded PhD and post-doc positions. (www.recred.eu, encase.socialcomputing.eu)
MSc in Data Science and Engineering

Denmark

Hackerspaces
Talk to the people at the https://labitat.dk/ hackerspace, either using their mailing list or IRC.

Claudio Orlandi
Aarhus University
Aarhus, Denmark
http://cs.au.dk/~orlandi/

Cryptographic protocols (MPC, ZK), foundations of cryptography etc. PhD and postdocs enquiries are welcome.

Lars R. Knudsen
Technical University of Denmark
Kgs. Lyngby, Denmark
DTU Compute, Cyber Security
Estonia
Helger Lipmaa
University of Tartu
Tartu, Estonia
http://www.ut.ee/~lipmaa

Cryptographic protocols, zero knowledge, mixnets, e-voting. Especially postdoc enquiries are welcome, but PhD enquiries will be considered too.

Marlon Dumas
Software Engineering & Information Systems Group
University of Tartu, Estonia
http://www.ut.ee/~dumas and http://sep.cs.ut.ee
Four PhD positions available in 2017 in the fields of business process management, process mining, privacy and security aspects of business processes.
Postdoc enquiries are also very welcome from recent or soon-to-be PhD graduates with a background in information systems engineering or in applied data mining.

Finland

N. Asokan
Secure Systems Group
Aalto University
asokan@acm.org
Web: http://asokan.org/asokan/, https://twitter.com/nasokan
Systems security (including mobile platform security, machine learning for security, blockchains & consensus, cloud security, ...). Postdoc enquiries welcome, too.
Relevant links: Helsinki-Aalto Center for Information Security, HIIT, Secure Systems group

Kimmo Halunen
Cyber security team
VTT Technical Research Centre of Finland Ltd.
kimmo.halunen@vtt.fi
Relevant links: http://www.vttresearch.com/services/digital-society/cyber-security
Currently three internships open (2 in Oulu and 1 in Espoo).
VTT has also a wide range of other technical research topics beyond security (check http://www.vttresearch.com for more information)

France

Luca De Feo
Université de Versailles, Versailles
Inria Saclay, Palaiseau
(Paris region)
luca.de-feo@uvsq.fr
Group: http://lmv.math.cnrs.fr/teams/crypto/
Group: https://team.inria.fr/grace/
Web: http://defeo.lu/

Harry Halpin, Nadim Kobeissi
INRIA Paris
harry.halpin@inria.fr, nadim.kobeissi@inria.fr
Group: http://prosecco.gforge.inria.fr/
Internships and possible Ph.D. studies and post-docs. Applied cryptography, formal verification, symbolic and computational protocol modeling and verification.

Nataliia Bielova
Inria of Sophia Antipolis (Nice)
nataliia.bielova@inria.fr
Group: https://team.inria.fr/indes/job-offers/
Web: http://www-sop.inria.fr/members/Nataliia.Bielova/
Internships and possible PhD/postdocs in Web privacy measurements and security

Olivier Blazy
Université de Limoges
olivier.blazy@unilim.fr
Group : http://www.xlim.fr/en/dmi/information-protection-cryptography-and-coding
Web: http://www.blazy.eu
Public Key Cryptography (Protocol design / Implementations)
Internships / Ph.D. / PostDoc positions funded on French grants
Master program: www.cryptis.fr (B2 lvl in french required)

Clément Pernet
Université Grenoble Alpes,
Grenoble.
clement.pernet@univ-grenoble-alpes.fr
Web: http://ljk.imag.fr/membres/Clement.Pernet/
Group: http://ljk.imag.fr/CASYS/
Computational mathematics, fault tolerance, and verification protocols
Master program on Crypto and cybersecurity in Grenoble: http://cybersecurity.imag.fr/

Kavé Salamatian
Université de Savoie, Grenoble-Alpes
Annecy, France
kave.salamatian@univ-savoie.fr
Networking, social network analysis, cybersecurity

Christos Dimitrakakis
christos.dimitrakakis@gmail.com
University of Lille 3, INRIA-Lille
Differential privacy, machine learning, reinforcement learning. security applications
More info and contact: https://sites.google.com/site/christosdimitrakakis/

Fabrizio Biondi
CentraleSupeléc / IRISA Rennes
Information leakage, malware analysis, vulnerability detection, cryptography, unconditional cryptography, hardware vulnerabilities, symbolic execution
More info and contacts: http://people.rennes.inria.fr/Fabrizio.Biondi/

Axel Legay
Team Leader - TAMIS team, Inria Rennes
Any security-related subject, model checking, statistical model checking, formal methods, product lines, attack trees, et al.
Team page: https://team.inria.fr/tamis/
Email: axel DOT legay AT inria DOT fr

Christian Grothoff
TAMIS team, Inria Rennes
Privacy-preserving protocols, decentralization, electronic payments, building secure systems
E-mail: christian.grothoff@inria.fr
More info: http://grothoff.org/christian/

Benjamin Smith
GRACE team, INRIA Saclay and École polytechnique (Paris region)
http://www.lix.polytechnique.fr/~smith
Public-key cryptography, computational number theory

Davide Frey
ASAP Team, Inria Rennes
Privacy Preserving decentralized data analytics
e-mail : davide.frey@inria.fr
More info: https://www.irisa.fr/asap/

Aurélien Francillon
Systems Security, Embedded Systems security
Eurecom, Sophia Antipolis (Close to Nice)
email:aurelien.francillon@eurecom.fr
More info:http://www.s3.eurecom.fr/~aurel/

Germany

Chris Brzuska
brzuska@tuhh.de
TU Hamburg
Chair for IT Security Analysis
Topics that we are interested in:
Foundations of cryptography (and other selected topics in theoretical CS)
Analyzing Standards of cryptographic protocols, e.g., EMV, TLS, messaging
Formal verification of protocols
Integrating secure hardware into secure systems (close cooperation with NXP semi-conductors)
www.chrisbrzuska.de
Most of our courses are in English:
https://www.tuhh.de/alt/tuhh/education.html

Thomas Eisenbarth
thomas.eisenbarth@uni-luebeck.de
University of Lübeck, Germany
its.uni-luebeck.de
Applied Cryptography and System Security
University of Lübeck has several institutes covering all areas of
theoretical and applied Computer Science: http://bit.ly/2h0bzWH

Tim Güneysu
tim.gueneysu@uni-bremen.de
Dept. Mathematics and Computer Science
University of Bremen, Germany
Topics: Embedded and System Security

Tibor Jager
tibor.jager@upb.de
Paderborn University, Germany
Theoretical and applied crypto
Institute of CS of Paderborn U covers all areas of applied and theoretical CS

Dominique Schröder
dosc@cs.fau.de
Friedrich-Alexander-Universität Erlangen-Nürnberg
Chair for Applied Cryptography
Nuremberg Campus of Technology
Fürther Str 246c / Eingang 5 / 2. OG
90429 Nürnberg
https://www13.cs.fau.de

Topics: We’re broadly interested in topics around theoretical and applied crypto (we are not working on cryptoanalysis, number theory, block ciphers)

Ruhr-University Bochum (HGI) also has a number of open positions in IT Security, see
https://hgi.rub.de/hgi/Institut/struktur/

Rheinische Friedrich-Wilhelms-Universität Bonn
For Master Students:
The university of Bonn offers an english Masters degree in Computer Science including a number of security courses.
https://www.informatik.uni-bonn.de/en/for-students/master-of-science-in-computer-science?set_language=en
For PhDs:
Matthew Smith,
Usable Security and Privacy
Malware Analysis
Please include your current US supervisor in CC when contacting smith@cs.uni-bonn.de

TU Darmstadt has a number of open PhD positions in IT Security, see
https://www.cysec.tu-darmstadt.de/de/cysec/jobs/
It also offers M.Sc. programs in IT Security and other CS topics. See
https://www.informatik.tu-darmstadt.de/en/students/study-programmes/

TU Dresden frequently offers positions in groups working on
Privacy and IT Security (Strufe, please note)
Physical Layer Security (Jorswieck)
Dependability (Fetzer)

CISPA - Center for IT-Security, Privacy and Accountability
https://cispa.saarland
Saarland Informatics Campus
Campus E9 1
66123 Saarbrücken, Germany

Research Areas:
Cryptography
Information Retrieval and Machine Learning
Programming Language Principles and Verification
Societal and Legal Concepts
Software Security
System Design Principles
Threat Analysis & Modeling
Usable Privacy & Security

We have open positions at core CISPA (https://cispa.saarland/education/careers/) and our collaborative research center on "Methods and Tools for Understanding and Controlling Privacy" (https://privacy-sfb.cispa.saarland/).

Please include your current US supervisor in CC when contacting us.

Hong Kong

Sherman S.M. Chow
smchow@ie.cuhk.edu.hk
Chinese University of Hong Kong
Applied Cryptography
http://staff.ie.cuhk.edu.hk/~smchow
HK PhD Fellowship (https://cerg1.ugc.edu.hk/hkpfs) / Department Support / My Research Grant
(All our courses are in English)

India

Prof. Manoj Prabhakaran
mp@cse.iitb.ac.in
Indian Institute of Technology Bombay
Cryptography
http://mmp.cs.illinois.edu/research.html

Dr. Arpita Patra
arpita@csa.iisc.ernet.in
Indian Institute of Science
Cryptography and Secure Distributed Computing
http://drona.csa.iisc.ernet.in/~arpita/

Dr. Shweta Agrawal
shweta@iitm.ac.in
Indian Institute of Technology, Madras
Cryptography
http://www.cse.iitm.ac.in/~shwetaag/

Dr. Somitra Sanadhya
somitra@iiitd.ac.in
IIIT Delhi
Cryptography (Symmetric ciphers, cryptanalysis, applied cryptography)
https://sites.google.com/a/iiitd.ac.in/somitra/home

Dr. Souradyuti Paul
souradyutip@iitgn.ac.in, souradyuti.paul@gmail.com
IIT Gandhinagar
Cryptography
https://sites.google.com/a/iitgn.ac.in/souradyuti-paul/

Prof C. Pandu Rangan
department of computer science and engg,
IIT, MADRAS, CHENNAI
INDIA - 600036.
Cryptography, provable security, post quantum cryptography, leakage- resilience Crypto
prangan55@gmail.com

Sanjit Chatterjee
sanjit@csa.iisc.ernet.in
Indian Institute of Science
Applied Cryptography and Information Security
http://drona.csa.iisc.ernet.in/~sanjit

Italy

Marco Mellia
mellia@polito.it
Politecnico di Torino, Italy
The group is currently focusing on Big Data and Data Science topics, considering both fundamental problems, i.e., scalability of parallel algorithms in mapreduce/spark/streaming processing, and applications to different domains, from Internet Traffic analysis for malware detection, to applications for customer segmentation, from predictive maintenance of large and distributed systems, to pattern and anomaly detection.
More information can be found at
http://bigdata.polito.it
And more information about the PhD program is available at
http://dottorato.polito.it/en/admission

Stefano Zanero
Stefano.zanero@polimi.it
Politecnico di Milano, Italy
My group performs research on cybersecurity areas such as cyber physical systems security, malware analysis, fraud and anomaly detection. We have funding for temporary positions in most areas. Other groups work on applied cryptography and other security areas.
Polimi offers degrees in engineering at all levels, and welcomes foreign students with low tuition and special scholarships.

Bruno Crispo, Fabio Massacci
University of Trento, Italy
The group current interest are in malware analysis, mobile and biometrics (Bruno), malware and vulnerability analysis, empirical risk assessment, security requirements engineering and security economics (Fabio), other groups works on security testing (Paolo Tonella at nearby FBK) and formal methods (Silvio Ranise again at FBK). We do have three-years fellowships for most positions but we typically ask wanna-be phd students to come for a 6-months internship.
More technical information on the group (as well as students) can be found here
-- http://securitylab.disi.unitn.it/doku.php
And more general information on the international PhD programme can be found here
-- http://ict.unitn.it/

Elena Ferrari
elena.ferrari@uninsubria.it
University of Insubria, Italy

StrictSociaLab activities are mainly in the field of data security, privacy and trust. Main application domains are currently Big Data, Iot, NoSQL Databases, Cloud and Social Networks. We offer Phd fellowships for our 3 years Phd programme in Computer Science as well as Post-Doc positions.
More information on our research activities can be found at:
-- http://dawsec.dicom.uninsubria.it/elena.ferrari/
--- http://strict.dista.uninsubria.it/

Andrea Lanzi,
andrea.lanzi@unimi.it
University of Milan, Italy
My research group is working on several research security area. More in particular our research deals with Host Intrusion Detection Systems (HIDS), memory error exploits, reverse engineering, malware and forensic analysis. In recent years we’ve mainly studied the application of emulation/virtualization and compiler techniques for malware analysis and detection. In addition we’ve been working on analyzing large-scale security datasets (e.g., Anubis malware collection) to investigate the behavior of current cyber threats. We are open for any internship and Ph.D application.
More information about our research group:
-- http://security.di.unimi.it/

Japan

Prof. Youki Kadobayashi
youki-k@is.aist-nara.ac.jp
Nara Institute of Science and Technology
Internet engineering, web security, cybersecurity education, cybersecurity standards
https://iplab.naist.jp/member/youki/

Prof. Jun Murai
junsec@wide.ad.jp
Keio University, Shonan Fujisawa Campus
Internet, security, IoT, IT policy
https://www.sfc.wide.ad.jp/IRL/

Yoichi Shinoda
shinoda@jaist.ac.jp
Japan Advanced Institute of Science and Technology
Security, Internet traffic analysis, mobile networking, network testbeds
https://shinoda-www.jaist.ac.jp/

Prof. Hideki Sunahara
suna@wide.ad.jp
Keio University, Graduate School of Media Design
Security, mobile communication, sensor networks, networked knowledge construction
http://www.kmd.keio.ac.jp/en/experience/faculty/sunahara.html

Assoc. Prof. Rodney Van Meter
rdv@sfc.wide.ad.jp
Keio University, Shonan Fujisawa Campus
Quantum networking, quantum computer architecture
http://web.sfc.keio.ac.jp/~rdv/

Luxembourg

Prof. Dr. Thomas Engel
admin-engel@uni.lu
University of Luxembourg, SECAN-Lab
Security and Networking Lab
Web: https://secan-lab.uni.lu

Peter Y A Ryan
peter.ryan@uni.lu
University of Luxembourg and the Interdisciplinary Centre for Security and Trust,
APSIA Research Group:
http://wwwen.uni.lu/snt/research/apsia

Dr. Radu State (senior researcher)
radu.state@uni.lu
Interdisciplinary Centre for Security, Reliability and Trust, SEDAN group
IDS, Authentication, Security in/for Data Science Applications
http://wwwen.uni.lu/snt/research/sedan

Netherlands

Tanja Lange tanja@hyperelliptic.org
Technische Universiteit Eindhoven (TU/e)
Department of Mathematics and Computer Science https://www.tue.nl/en/university/departments/mathematics-and-computer-science/

We offer a program in IT/Cyber security for Master students: https://true-security.nl/
together with Radboud University Nijmegen. Sadly enough there are only very few stipends.

Industrial and Applied Mathematics has a Discrete Mathematics and Applications track that also covers a lot of cryptography. Same stipend situation https://www.tue.nl/en/university/departments/mathematics-and-computer-science/education/graduate-programs/masters-programs/industrial-and-applied-mathematics/

Open PhD positions at TU/e are advertised on the IACR job page.

Peter Schwabe peter@cryptojedi.org
Digital Security Group, Radboud University

We offer a program in IT/Cyber security for Master students: https://true-security.nl/
together with Technische Universiteit Eindhoven (TU/e).

Open Ph.D. positions in Cryptography are advertised on the IACR job page.

Jaap-Henk Hoepman jhh@cs.ru.nl
Digital Security Group, Radboud University

We offer PhD and postdoc positions in the area of Privacy by Design, Privacy Enhancing Technologies, Applied cryptography.

Herbert Bos, Cristiano Giuffrida
VUSec Lab - Systems and Network Security
Vrije Universiteit Amsterdam

University of Amsterdam

Christian Schaffner, c.schaffner@uva.nl
University of Amsterdam - Institute for Logic, Language and Computation
QuSoft, Research Center for Quantum Software

Currently looking for Postdoc candidate

Karst Koymans K.Koymans@uva.nl
Master programme in Security/System Engineering and Networking
OS3/UvA website
Admission information SNE master (info@os3.nl)

SNE is the University of Amsterdam top rated master education in System/Security and Network Engineering. We focus on Open Standards, Open Software and Open Security, hence the name OS3.

University of Twente
Master program: Cyber Security
We are also participating in the EIT Digital Master on Security & Privacy (see also scholarships)

Andreas Peter a.peter@utwente.nl
University of Twente
Privacy-Enhancing Technologies, Cryptographic Protocol Design and Analysis, Application and Theory of Functional and Homomorphic Encryption
http://wwwhome.ewi.utwente.nl/~petera/

Delft University of Technology
Prof.dr.ir. Pieter Hartel Pieter.Hartel@tudelft.nl

Applied cryptography, privacy enhancing technologies, computing encrypted data, network security, data analytics for cyber security. More information: http://cys.ewi.tudelft.nl

New Zealand

Steven Galbraith s.galbraith@auckland.ac.nz
Mathematics Department, University of Auckland.
My group works mostly on the mathematics of public key cryptography and post-quantum cryptography.

Rizwan Asghar
r.asghar@auckland.ac.nz
Department of Computer Science, The University of Auckland
Research Interests: Access Control, Applied Cryptography, Security and Privacy.
Homepage: https://www.cs.auckland.ac.nz/~asghar/

Giovanni Russello
g.russello@auckland.ac.nz
Department of Computer Science, The University of Auckland
Research Interests: Android Security, Privacy in the Cloud, IoT Security, Obfuscation..
Homepage: https://cs.auckland.ac.nz/~russello/

Norway

Colin Boyd colin.boyd@ntnu.no
Applied Crypto Group, Department of Information Security and Communications Technology,
Norwegian University of Science and Technology (NTNU).

Our new department spans Trondheim and Gjøvik and covers a broad range of information security topics. Vacancies are advertised in the department: https://www.ntnu.edu/iik, and also across all of NTNU: http://www.ntnu.edu/vacancies.

simula@uib
https://www.simula.no/research/projects/simulauib
https://simula-uib.com/

Portugal

Manuel Barbosa mbb@dcc.fc.up.pt
HASLab - INESC TEC & Faculty of Science - University of Porto.

Our group works mostly on bridging the theoretical and practical views of cryptographic security; this includes provable security and efficient implementation of crypto, as well as the formal verification approach to both. Positions in these and other areas of research are advertised via our institutional website at www.inesctec.pt.

South Korea

Hyoungshick Kim hyoung@skku.edu
Department of Software, Sungkyunkwan University.
Research Interests: Usable Security, User Authentication, Software Security
See our website: http://seclab.skku.edu/

Sweden

Panos Papadimitratos, papadim@kth.se
Networked Systems Security (NSS) Group (www.ee.kth.se/nss)
What we are after is to make current and upcoming networked systems trustworthy, shielding them and their users from attacks and abuse. Our research agenda includes a gamut of security and privacy problems, with emphasis on wireless and mobile systems. We have a strong systems character, implementing and evaluating our solutions. At the same time, we pay close attention to theoretical methods, including, notably, formal protocol analysis and information-theoretic results. We are part of the School of Electrical Engineering at KTH and we are affiliated with the ACCESS and the ICES centers

Currently open positions for postdocs:

Openings at NSS (deadline: Feb. 15, 2017) as described here: https://lnkd.in/en8bDtB

A broader call, including security (deadline: January 31, 2017), in the context of ACCESS, as described here: https://lnkd.in/eW2DsJ2.

Katerina Mitrokotsa
aikmitr@chalmers.se
Chalmers University of Technology
All aspects of information security, privacy and cryptography, especially applied crypto.
More info and contact: http://www.cse.chalmers.se/~aikmitr/Group.html

Christos Dimitrakakis
christos.dimitrakakis@gmail.com
Chalmers University of Technology
Differential privacy, machine learning, reinforcement learning. security applications
More info and contact: https://sites.google.com/site/christosdimitrakakis/

Pablo Picazo-Sanchez, Gerardo Schneider
Chalmers University of Technology
Security and Privacy in IoT and eHealth. Malware detection.
pablop@chalmers.se
gersch@chalmers.se

Spain

Dario Fiore, Boris Köpf, Carmela Troncoso
dario.fiore@imdea.org
boris.koepf@imdea.org
carmela.troncoso@imdea.org
IMDEA Software Institute, Madrid
http://software.imdea.org
Cryptography (theoretical and applied: protocols, provable security),
Formal Methods and program analysis for security, side-channel attacks
Privacy, anonymity

Postdoc and PhD positions currently available: https://software.imdea.org/open_positions/call_for_postdocs.html

Dr. Narseo Vallina-Rodriguez (research assistant professor)
narseo.vallina@imdea.org
IMDEA Networks Institute and ICSI-Berkeley
Internet measurements, privacy and security. Focus on mobile and IoT.
PhD positions available.
Madrid
http://www.networks.imdea.org/
Personal: http://people.networks.imdea.org/~narseo_vallina/

Switzerland

Jean-Philippe Aumasson
Kudelski Security, Global Research team
We co-supervise semester projects and masters theses jointly with EPFL or HEIG-VD
Topics: applied crypto, secure communications, vulnerability research, reverse engineering
https://research.kudelskisecurity.com
jp.aumasson@kudelskisecurity.com
@veorq on Twitter, Wire

Bryan Ford
École Polytechnique Fédérale de Lausanne (EPFL)
Decentralized and Distributed Systems Laboratory (DEDIS)
http://dedis.epfl.ch/
dedis@epfl.ch
Topics: large scale decentralized crypto/security protocols, anonymous communication systems, blockchain technology & cryptocurrencies, e-voting systems
We are always looking for motivated interns, PhD students, postdocs, or software engineers. More details on the EPFL’s PhD program: http://phd.epfl.ch/edic

Serge Vaudenay
Ecole Polytechnique Fédérale de Lausanne (EPFL)
Cryptographic algorithms and protocols, cryptanalysis, privacy
http://lasec.epfl.ch/

Singapore

Khin Mi Mi Aung
Data Center Technologies (DCT), Data Storage Institute, A*STAR Singapore
Fully Homomorphic Encryption, Blockchain
https://www.a-star.edu.sg/singa-award/
mi_mi_aung@dsi.a-star.edu.sg

Roland Yap
School of Computing, National University of Singapore
Android, Isolation/Sandboxing, Malware, Memory Safety, Operating Systems, Programming Languages, Social Networks
http://www.comp.nus.edu.sg/~ryap
ryap@comp.nus.edu.sg

United Kingdom (UK)

Martin Albrecht, Carlos Cid, Kenny Paterson
martin.albrecht@royalholloway.ac.uk / kenny.paterson@rhul.ac.uk / carlos.cid@rhul.ac.uk
Information Security Group
Royal Holloway, University of London, UK
All areas of cryptography and information security, especially applied crypto; post-quantum cryptography; computational mathematics; symmetric crypto; security economics.
We have funding for at least one talented international student per year through our Centre for Doctoral Training in Cyber Security (https://www.royalholloway.ac.uk/isg/cybersecuritycdt/home.aspx).
https://www.royalholloway.ac.uk/isg/home.aspx

Alastair Beresford
University of Cambridge, UK
arb33@cam.ac.uk
Mobile device security and privacy. Also, one of the faculty working at the cambridgecybercrime.uk centre.

Eerke Boiten
E.A.Boiten@kent.ac.uk
Currently University of Kent, UK - areas there include IoT, cyber crime, steganography, malware, reverse engineering. www.cyber.kent.ac.uk
GCHQ provisionally accredited MSc degree at Kent: c
Eerke is moving to De Montfort University UK from 1 April: https://www.dmu.ac.uk/research/research-faculties-and-institutes/technology/cyber-technology-institute/cti-home.aspx
MSc degree with substantive industry input: https://www.dmu.ac.uk/study/courses/postgraduate-courses/cyber-security/cyber-security-msc-degree.aspx
Personal interests: formal methods applied to security and cryptography; data privacy.

Lorenzo Cavallaro
Lorenzo.Cavallaro@rhul.ac.uk
Systems Security Research Lab @ Information Security Group (ISG)
Royal Holloway University of London, UK
The Systems Security Research Lab (http://s2lab.isg.rhul.ac.uk) focuses on devising novel techniques to protect systems from a broad range of threats, including those perpetrated by malicious software. The underlying theme of research builds on program analysis and machine learning to address such threats. We regularly host visiting scholars and interns and we currently have two PostDoc openings for two years (MobSec Project, http://s2lab.isg.rhul.ac.uk/projects/mobsec/) and one opening for a PhD student starting in Sep/Oct---positions to be officially opened soon; feel free drop me a line for further information. In addition, full funding (stipend and fees) for at least one strong international PhD student per year (https://www.royalholloway.ac.uk/isg/cybersecuritycdt/home.aspx). The ISG at Royal Holloway also offers a well-established and renown MSc in Information Security and welcome students from all over the globe.

Cas Cremers
University of Oxford, UK.
Formal methods, applied cryptography, automated analysis & tool development, protocol analysis, and standardisation. (Oxford’s computer science department offers scholarships for top students; note applications for these are typically early January deadline for October admission.)
cas.cremers@cs.ox.ac.uk - http://www.cs.ox.ac.uk/people/cas.cremers/intro.html
More security at Oxford’s computer science department:
https://www.cs.ox.ac.uk/research/security/

Professor Erol Gelenbe FIEEE FACM
Department of Electrical and Electronic Engineering
Imperial College
London SW7 2AZ
e.gelenbe@imperial.ac.uk

Interest: Security, Energy and QoS in Clouds and Networks

Tom Chothia, Flavio Garcia, David Oswald
University of Birmingham Security and Privacy group - http://sec.cs.bham.ac.uk
PhD opportunities in applied crypto, embedded systems, formal methods, design of secure systems, analysis of systems.

T.Chothia@cs.bham.ac.uk
d.f.oswald@cs.bham.ac.uk
http://www.cs.bham.ac.uk/~tpc/
http://www.cs.bham.ac.uk/~garciaf
http://www.cs.bham.ac.uk/~oswalddf
Details of masters course: http://www.birmingham.ac.uk/postgraduate/courses/taught/computer-science/cyber-security.aspx

Emiliano De Cristofaro, Steven Murdoch, Jens Groth, Gianluca Stringhini, Sarah Meiklejohn, George Danezis
University College, London, UK
Cryptography, privacy, network security, systems security, malware, cybercrime
Contacts at: http://sec.cs.ucl.ac.uk/people/
(Specifically, Sarah has two positions for PhD students available starting in May, and funding for a postdoc and several interns. Contact details at: http://www0.cs.ucl.ac.uk/staff/S.Meiklejohn/. Gianluca has funding for a PhD student starting in October and for an intern. Contact details at: http://www0.cs.ucl.ac.uk/staff/G.Stringhini/)

Feng Hao, Thomas Gross and Changyu Dong
Newcastle University, UK
Applied cryptography, security policies, e-voting, blockchain.
Contacts at http://www.ncl.ac.uk/computing/research/groups/srs/#staff

Mike Just
Heriot-Watt University, Edinburgh, UK
Applied cryptography, network security, usable security
m.just@hw.ac.uk
http://www.macs.hw.ac.uk/staff-directory/mike-just.htm

Aggelos Kiayias
aggelos.kiayias@ed.ac.uk
University of Edinburgh, UK
All aspects of cryptography, information security. More contacts, info
http://web.inf.ed.ac.uk/security-privacy

Markus Kuhn
University of Cambridge, UK
Hardware and signal-processing aspects of security, tamper resistant hardware, secure computer architectures, mobile-device security, payment systems
https://www.cl.cam.ac.uk/research/security/

Shujun Li
hooklee@gmail.com / Shujun.Li@surrey.ac.uk
University of Surrey, UK
Human factors (usability, cyber security awareness and education, cognitive modelling, etc.), privacy, user authentication (especially passwords), mobile security, network security (especially IDS), security visualization, CAPTCHA, multimedia security, information hiding (steganography and digital watermarking), digital forensics and cybercrime
http://www.hooklee.com/default.asp?t=Research
http://www.hooklee.com/default.asp?t=Research%20Opportunities

Ben Livshits
Imperial college London, U.K.
Security, privacy, program analysis, browsers, mobile apps
Looking for Ph.D.s and postdocs
https://www.doc.ic.ac.uk/~livshits/

Mark Manulis
University of Surrey, UK
Applied cryptography, privacy, network security, system security
http://manulis.eu

Yves-Alexandre de Montjoye
deMontjoye@imperial.ac.uk
Imperial College London, Data Science Institute, UK
All area of privacy, fairness in machine learning, and information security. For instance, formal properties and metrics of privacy and fairness in algorithmic decision-making or the development of privacy-enhancing data processing systems.
For PhD or Post-docs
https://www.doc.ic.ac.uk/~ydemontj/

a.sampson@abertay.ac.uk
Security Research Group, Abertay University, Dundee, UK
Ethical hacking, digital forensics, usable security, Internet of Things security, secure software engineering, PLDI for security. We offer PhDs and Masters by Research, with a few funded places each year; please get in touch with us to discuss potential supervisors and areas of interest.
http://www.abertay.ac.uk/discover/academic-schools/arts-media-computer-games/computingandmathematics/
http://www.abertay.ac.uk/studying/postgraduate-research-degrees/

Nigel Smart, Elisabeth Oswald, Dan Page, Bogdan Warinschi, Martijn Stam
nigel@cs.bris.ac.uk
University of Bristol UK
Practical application and implementations of Multi Party Computation, side-channel analysis, secure/fast crypto implementations, provable security, protocol analysis
http://www.cs.bris.ac.uk/Research/CryptographySecurity/
Also interested in Post-Docs wanting positions

Surrey Centre for Cyber Security (SCCS)
University of Surrey, UK
Security Through Hardware, Trusted Computing, Privacy and Authentication, Secure Communications, Multimedia Security and Forensics, and Human Factors
http://www.surrey.ac.uk/surrey-centre-cyber-security/research
http://www.surrey.ac.uk/department-computer-science/study/postgraduate-research/funding (all PhD scholarships available for Surrey’s Deparment of Computer Science, covering Cyber Security as a major area)

George Theodorakopoulos
Cardiff University
http://users.cs.cf.ac.uk/G.Theodorakopoulos/
TheodorakopoulosG@cardiff.ac.uk
Privacy, trust, and security in mobile networks and IoT devices

Luca Viganò
luca.vigano@kcl.ac.uk
King’s College London, UK
Formal methods for security, security protocols, web applications, privacy

Joss Wright
joss.wright@oii.ox.ac.uk
https://www.oii.ox.ac.uk/people/joss-wright/
Oxford Internet Institute / Cybersecurity Doctoral Training Centre
University of Oxford, UK
Alan Turing Institute for Data Science, London.
Interdisciplinary analysis of information controls, filtering, and censorship. Privacy and privacy-enhancing technologies.

Details of relevant courses (social science and computer science):
OII MSc Social Science of the Internet: https://www.oii.ox.ac.uk/study/msc/
Oxford Cybersecurity Doctoral Training Centre: https://www.cybersecurity.ox.ac.uk/education/cdt

Shishir Nagaraja
s.nagaraja@lancaster.ac.uk
Security Lancaster and Lancaster University
Open positions for doctoral and post-doctoral research in Network Security and Privacy.
Konstantinos Kyriakopoulos
k.kyriakopoulos@lboro.ac.uk
Loughborough University
Wolfson School of Mechanical, Electrical and Manufacturing Engineering,
Signal Processing and Networks Group
Research areas: Network Intrusion Detection Systems, Software Defined Networks, IoT, Network security in Connected Vehicles, Practical attacks, detection and mitigation. Contact me for more information. Currently there is a PhD opportunity.

Networks & Systems

Australia

Dali Kaafar
CSIRO Data61, Networks Group
Internet Measurement, Performance modeling, Privacy, Networks and Systems Security
https://research.csiro.au/ng/about-us/people/dali-kaafar/
Dali.Kaafar@data61.csiro.au
Internships, PhD applications and current Openings for Data Privacy senior Researchers and Post-docs.
Belgium
Benoit Donnet
Montefiore Institute: Department of Electrical Engineering and Computer Science
Université de Liège
Email: benoit.donnet@ulg.ac.be
http://www.montefiore.ulg.ac.be/personnel.php?op=detail&id=1077
Network Measurements and Modeling, Middleboxes, Network Architecture

Germany

Xiaoming Fu
Institute of Computer Science
University of Goettingen
Email: fuATcs.uni-goettingen.de
http://user.informatik.uni-goettingen.de/~fu
Networked systems, protocols and applications, including

Lin Wang
TU Darmstadt
wang@tk.tu-darmstadt.de
https://www.tk.informatik.tu-darmstadt.de/de/people/lin-wang/
Networked systems, edge-centric computing, discrete optimization

Hong Kong

Pan Hui
Department of Computer Science and Engineering
The Hong Kong University of Science and Technology
Email: panhuiATcse.ust.hk
http://www.cse.ust.hk/~panhui/
system aspect of mobile Augmented Reality (AR) and AR content generation, mobile computing, urban computing, and other interesting topics related to social network

Italy

Marco Ajmone Marsan
Electronics and Telecommunications Department
Politecnico di Torino
Email: marco.ajmone@polito.it
http://www.telematica.polito.it/public/faculty/marco-ajmone-marsan
Wireless networks, energy efficiency, performance evaluation
PhD applications: http://dottorato.polito.it/en/call_for_admission

Marco Mellia
mellia@polito.it
Electronics and Telecommunications Department
Politecnico di Torino
The group is currently focusing on Big Data and Data Science topics, considering both fundamental problems, i.e., scalability of parallel algorithms in mapreduce/spark/streaming processing, and applications to different domains, from Internet Traffic analysis for malware detection, to applications for customer segmentation, from predictive maintenance of large and distributed systems, to pattern and anomaly detection.
More information can be found at
http://bigdata.polito.it
And more information about the PhD program is available at
http://dottorato.polito.it/en/admission

Paolo Giaccone
Electronics and Telecommunications Department, Politecnico di Torino
Email: paolo.giaccone@polito.it
http://www.telematica.polito.it/public/faculty/paolo-giaccone
Topics: Software Defined Networking (SDN), data center architectures, cloud/fog computing, 5G Mobile Edge Computing (MEC)
PhD applications: http://dottorato.polito.it/en/call_for_admission

Carla Fabiana Chiasserini
Electronics and Telecommunications Department, Politecnico di Torino
Email: carla.chiasserini@polito.it
http://www.telematica.polito.it/public/faculty/carla-fabiana-chiasserini
http://www.telematica.polito.it/public/faculty/carla-fabiana-chiasserini
Topics: SDN and NFV for vertical support in 5G, 5G Mobile Edge Computing (MEC),
5G wireless access
PhD applications: http://dottorato.polito.it/en/call_for_admission
Emilio Leonardi
Electronics and Telecommunications Department, Politecnico di Torino
Email: emilio.leonardi@polito.it
http://www.telematica.polito.it/public/faculty/emilio-leonardi
Topics: Online social networks and their dynamics, Crowd-sourcing systems, Epidemic processes over large graphs, Performance evaluation of large systems, Network science

PhD applications: http://dottorato.polito.it/en/call_for_admission

Japan

Prof. Hiroshi Esaki
hiroshi@wide.ad.jp
University of Tokyo
Internet, green university, IPv6 promotion, Internet traffic measurement
http://hiroshi1.hongo.wide.ad.jp/hiroshi/

Prof. Youki Kadobayashi
youki-k@is.aist-nara.ac.jp
Nara Institute of Science and Technology
Internet engineering, web security, cybersecurity education, cybersecurity standards
https://iplab.naist.jp/member/youki/

Prof. Jun Murai
junsec@wide.ad.jp
Keio University, Shonan Fujisawa Campus
Internet, security, IoT, IT policy
https://www.sfc.wide.ad.jp/IRL/

Yoichi Shinoda
shinoda@jaist.ac.jp
Japan Advanced Institute of Science and Technology
Security, Internet traffic analysis, mobile networking, network testbeds
https://shinoda-www.jaist.ac.jp/

Prof. Hideki Sunahara
suna@wide.ad.jp
Keio University, Graduate School of Media Design
Security, mobile communication, sensor networks, networked knowledge construction
http://www.kmd.keio.ac.jp/en/experience/faculty/sunahara.html

Assoc. Prof. Rodney Van Meter
rdv@sfc.wide.ad.jp
Keio University, Shonan Fujisawa Campus
Quantum networking, quantum computer architecture
http://web.sfc.keio.ac.jp/~rdv/

Netherlands

University of Amsterdam

SNE
Karst Koymans K.Koymans@uva.nl
Master programme in Security/System Engineering and Networking
OS3/UvA website
Admission information SNE master (info@os3.nl)

SNE is the University of Amsterdam top rated master education in System/Security and Network Engineering. We focus on Open Standards, Open Software and Open Security, hence the name OS3.

United Kingdom (UK)

Hamed Haddadi
hamed.haddadi@qmul.ac.uk
School of Electronic Engineering and Computer Science, Queen Mary University of London
Networked Systems, Privacy, Social Computing, Sensing, IoT
http://www.eecs.qmul.ac.uk/~hamed/
http://www.eecs.qmul.ac.uk/phd/research-topics

Gareth Tyson
School of Electronic Engineering and Computer Science,
Queen Mary University of London
Internet measurements, networked systems, social media
http://www.eecs.qmul.ac.uk/~tysong/

Andrew W Moore
Andrew.moore@cl.cam.ac.uk
Computer Laboratory
University of Cambridge
Networked systems, measurements, high performance, low-latency, machine-learning in networked systems
Http://www.cl.cam.ac.uk/~awm22/

Rip Sohan
ripduman.sohan@cl.cam.ac.uk
Computer Laboratory
University of Cambridge
Data provenance, computational provenance, high-performance storage, hardware-software interfaces, NVMe, NVMF, operating system design and scalability, end-host NIC hardware and software design
https://www.cl.cam.ac.uk/research/dtg/fresco/
Research Assistant (pre-PhD) positions available
Postdoc openings available
Funded PhDs available

Yehia Elkhatib
School of Computing and Communications
Lancaster University
Cloud computing, fog computing, network architectures, network measurement
http://www.lancaster.ac.uk/~elkhatib/

Noa Zilberman
noa.zilberman@cl.cam.ac.uk
Computer Laboratory
University of Cambridge
Rack-scale computing, high performance systems, networking & computing architectures, resilient networked-systems.
http://www.cl.cam.ac.uk/~nz247

Mark Handley
Dept of Computer Science
University College London
Networked systems, network architecture, congestion control, routing, datacentre networking
http://www.cs.ucl.ac.uk/staff/M.Handley

Stefano Vissicchio
s.vissicchio@cs.ucl.ac.uk
Dept of Computer Science
University College London
Network systems, Software Defined Networking (SDN), network management, routing, traffic engineering, network monitoring and testing, Internet measurements
http://www0.cs.ucl.ac.uk/staff/S.Vissicchio/

Marwan Fayed
Dept of Computer Science and Mathematics
University of Stirling
Streaming Video; Networked Systems, Architectures, and Measurement, Wireless Routing, Medium Access Control.
http://www.cs.stir.ac.uk/~mmf/

Mario Kolberg
Computer Science and Mathematics
University of Stirling
P2P overlays, MANET, IoT.
http://www.cs.stir.ac.uk/~mko/

Felix Cuadrado
School of Electronic Engineering and Computer Science,
Queen Mary University of London
Large-Scale Graph Processing, Distributed Systems, Internet-Scale Applications
http://www.eecs.qmul.ac.uk/~fcuadrado

Bogdan Ghita
bogdan.ghita@plymouth.ac.uk
Centre for Security, Communications, and Networks
Plymouth University
Network performance monitoring, network traffic analysis, user and application traffic profiling, QoS, SDN
http://www.cscan.org/bghita

Peter Pietzuch
prp@imperial.ac.uk
Large-Scale Distributed Systems Group, Imperial College London
http://lsds.doc.ic.ac.uk
Systems, distributed systems, database systems, networking, security
We have post-doc openings:
http://lsds.doc.ic.ac.uk/content/post-doctoral-researcher-distributed-systems-systems-database
We also have funding for PhD students.

Nicholas Race
School of Computing & Communications
Lancaster University
Software Defined Networking (SDN), Network Functions Virtualisation (NFV), Fog Computing, Multimedia Distribution / Streaming Video
http://www.lancaster.ac.uk/scc/about-us/people/nicholas-race

France

Giovanni Pau
University Piere et Marie Curie Sorbonne
Laboratory of Computer Science (LIP6)
Mobile Systems, IoT, Social Computing, Urban Sensing
giovanni.pau@lip6.fr

https://www.lip6.fr/actualite/personnes-fiche.php?nom=Pau

Cristel Pelsser
University of Strasbourg
Networking research group
Core networks
pelsser@unistra.fr

http://icube-reseaux.unistra.fr/en/index.php/Home

Kavé Salamatian
Université de Savoie, Grenoble-Alpes
Annecy, France
kave.salamatian@univ-savoie.fr
Networking, social network analysis, cybersecurity

Luxembourg

Dr. Radu State (senior researcher)
radu.state@uni.lu
Interdisciplinary Centre for Security, Reliability and Trust, SEDAN group
SDN, NDN, IDS in IP networks
http://wwwen.uni.lu/snt/research/sedan

Spain

Dr. Arturo Azcorra (professor)
arturo.azcorra@imdea.org
IMDEA Networks Institute and University Carlos III
5G networks, NFV, SDN, drones, energy efficient networks.
Funding available.
Madridn
http://www.networks.imdea.org/
Personal: http://people.networks.imdea.org/~arturo_azcorra
Personal: http://www.it.uc3m.es/~azcorra

Dr. Antonio Fernández Anta (research professor)
antonio.fernandez@imdea.org
IMDEA Networks Institute
Madrid
http://www.networks.imdea.org/

Dr. Narseo Vallina-Rodriguez (research assistant professor)
narseo.vallina@imdea.org
IMDEA Networks Institute and ICSI-Berkeley
Internet measurements, privacy and security. Focus on mobile and IoT.
PhD positions available.
Madrid
http://www.networks.imdea.org/
Personal: http://people.networks.imdea.org/~narseo_vallina/

Dr. Joerg Widmer (research professor)
joerg.widmer@imdea.org
IMDEA Networks Institute and ICSI-Berkeley
Millimeter-wave communication and networking, mobile broadband measurements
PhD positions available.
Madrid
http://www.networks.imdea.org/
Personal: http://people.networks.imdea.org/~joerg_widmer/

Dr. Vincenzo Mancuso (Research Associate Professor)
IMDEA Networks Institute
5G, Cellular networks, Opportunistic networks, Device-to-device communications, IoT.
PhD positions available.
Madrid
http://www.networks.imdea.org/
Personal: http://people.networks.imdea.org/~vincenzo_mancuso/
Opportunistic Architectures Lab: http://opparch.networks.imdea.org/

Data Science & Machine Learning

Australia

Adam Dunn
adam.dunn@mq.edu.au
Centre for Health Informatics, Macquarie University
Machine Learning, Data Science (applications in healthcare informatics and epidemiology)
See http://www.hdr.mq.edu.au/information_about/Scholarships for scholarships
http://www.adamgdunn.net and @adamgdunn

Ben Rubinstein
University of Melbourne (School of Computing & Information Systems)
benjamin.rubinstein@unimelb.edu.au
http://bipr.net
Statistical Machine Learning, Adversarial Learning and Robustness, Differential Privacy, Data Integration/Record Linkage in Databases. Projects make use of strong theoretical foundations or great systems building skills. I have had a number of Iranian students (for example) in my group, we have a large cohort in our School.
Scholarship information:
https://studenteforms.app.unimelb.edu.au/apex/f?p=153:2:0:::2:P2_ID:641
Research Degree information:
https://futurestudents.unimelb.edu.au/admissions/applications/research

Austria

Christoph Lampert
IST Austria (Institute of Science and Technology, Austria)
http://pub.ist.ac.at/~chl/
chl@ist.ac.at

Canada

Ali Miri
Computer and Information Security Lab (iCaSL)
Ryerson University
Toronto, Ontario, Ontario
http://www.scs.ryerson.ca/~samiri
Applied cryptography, Cloud computing, Big data and machine learning, IoT

Cyprus

Dr. Sotirios Chatzis (Assistant Professor)
sotirios.chatzis@eecei.cut.ac.cy
https://www.cut.ac.cy/eecei/staff/sotirios.chatzis/
MSc in Data Science and Engineering
Cyprus University of Technology

Data Science with a focus on Statistical Machine Learning.
Main application areas: modelling of human behavior, recommender systems, multimedia analysis, assisted and artificial creativity, computational finance, natural language processing, and social network analysis.

Denmark

Sune Lehmann
sljo@dtu.dk
Technical University of Denmark
Data science (main application areas: network science, modelling of human behavior)
https://sunelehmann.com

Natalie Schluter
natschluter@itu.dk, www.itu.dk/~nael
IT University of Copenhagen, www.itu.dk
Data Science (especially algorithms for machine learning, neural networks and natural language processing)

Germany

Arash Asadi
SEEMOO
Technical University of Darmstadt
Email: aasadiATseemoo.tu-darmstadt.de
https://www.seemoo.tu-darmstadt.de/team/arash-asadi/
Wireless communications with focus on Machine learning techniques.

Italy

Marco Mellia
mellia@polito.it
Politecnico di Torino, Italy
The group is currently focusing on Big Data and Data Science topics, considering both fundamental problems, i.e., scalability of parallel algorithms in mapreduce/spark/streaming processing, and applications to different domains, from Internet Traffic analysis for malware detection, to applications for customer segmentation, from predictive maintenance of large and distributed systems, to pattern and anomaly detection.
More information can be found at
http://bigdata.polito.it
And more information about the PhD program is available at
http://dottorato.polito.it/en/admission

Luxembourg

Dr. Radu State (senior researcher)
radu.state@uni.lu
Interdisciplinary Centre for Security, Reliability and Trust, SEDAN group
Data Science, mostly in security applications, practical machine learning
http://wwwen.uni.lu/snt/research/sedan

Spain

Dr. Antonio Fernández Anta (research professor)
antonio.fernandez@imdea.org
IMDEA Networks Institute
Madrid
http://www.networks.imdea.org/

Dr. Paolo Casari (research assistant professor)
paolo.casari@imdea.org
IMDEA Networks Institute
Madrid
Funding → http://www.networks.imdea.org/phd-student-positions-2017#phd_machinelearning
Institution’s web site: http://www.networks.imdea.org/
Personal page: http://people.networks.imdea.org/~paolo_casari/

United Kingdom (UK)

Hamed Haddadi
hamed.haddadi@qmul.ac.uk
School of Electronic Engineering and Computer Science, Queen Mary University of London
Networked Systems, Privacy, Social Computing, Sensing, IoT
http://www.eecs.qmul.ac.uk/~hamed/
http://www.eecs.qmul.ac.uk/phd/research-topics

Mirco Musolesi
m.musolesi@ucl.ac.uk
University College London, UK
Data science (main application areas: human behaviour modelling and security&privacy), ubiquitous computing and networked systems.
http://www.ucl.ac.uk/~ucfamus

Dr. Matt Forshaw
matthew.forshaw@ncl.ac.uk
Newcastle University, UK
School of Computing Science, Newcastle University
Lecturer in Data Science
Main applications areas: energy-efficient computing, security, learning analytics
http://www.mattforshaw.com

Andrew W Moore
Andrew.moore@cl.cam.ac.uk
Computer Laboratory
University of Cambridge
Networked systems, measurements, high performance, low-latency, machine-learning in networked systems
Http://www.cl.cam.ac.uk/~awm22/

Computer Vision & Pattern Recognition

Austria

Christoph Lampert
IST Austria (Institute of Science and Technology, Austria)
http://pub.ist.ac.at/~chl/
chl@ist.ac.at

Human Computer Interaction

Cyprus

Prof. Panayiotis Zaphiris
Cyprus University of Technology
Cyprus Interaction Lab
http://www.zaphiris.com/
Areas of expertise: human computer interaction, inclusive design, social computing
We are matching international student fees to EU student fees for our online MSc in Interaction Design http://www.idmaster.eu
PhD and Internship positions at http://www.cyprusinteractionlab.com

United Kingdom (UK)

Professor Helen Petrie
Human Computer Interaction Research Group
Department of Computer Science
University of York
UK

Areas of expertise: human computer interaction, design and evaluation of technology for disabled and older people, usable security, methods for HCI
The University of York has scholarships specially for refugees for our undergraduate courses: https://www.york.ac.uk/study/undergraduate/fees-funding/international/asylum-seekers-scholarship/

Emilio Leonardi
Electronics and Telecommunications Department, Politecnico di Torino
Email: emilio.leonardi@polito.it
http://www.telematica.polito.it/public/faculty/emilio-leonardi
Topics: Online social networks and their dynamics, Crowd-sourcing systems, Epidemic processes over large graphs, Performance evaluation of large systems, Network Science

PhD applications: http://dottorato.polito.it/en/call_for_admission

Wireless Communications

Germany

Arash Asadi
SEEMOO
Technical University of Darmstadt
Email: aasadiATseemoo.tu-darmstadt.de
https://www.seemoo.tu-darmstadt.de/team/arash-asadi/
Wireless communications in general (MAC/PHY). Current interest mmWave, V2X, D2D, HetNets, Coexistence problems.

Italy

Carla Fabiana Chiasserini
Electronics and Telecommunications Department, Politecnico di Torino
Email: carla.chiasserini@polito.it
http://www.telematica.polito.it/public/faculty/paolo-giaccone
Topics: 5G wireless access, device-to-device communications and wireless relay networks,
massive MIMO
PhD applications: http://dottorato.polito.it/en/call_for_admission

Spain

Dr. Joerg Widmer (research professor)
joerg.widmer@imdea.org
IMDEA Networks Institute and ICSI-Berkeley
Millimeter-wave communication and networking, mobile broadband measurements
PhD positions available.
Madrid
http://www.networks.imdea.org/
Personal: http://people.networks.imdea.org/~joerg_widmer/

Dr. Vincenzo Mancuso (Research Associate Professor)
IMDEA Networks Institute
5G, Cellular networks, Opportunistic networks, Device-to-device communications, IoT.
PhD positions available.
Madrid
http://www.networks.imdea.org/
Personal: http://people.networks.imdea.org/~vincenzo_mancuso/
Opportunistic Architectures Lab: http://opparch.networks.imdea.org/

Mobile Computing

France

Giovanni Pau
University Pierre et Marie Curie Sorbonne
Laboratory of Computer Science (LIP6)
Mobile Systems, IoT, Social Computing, Urban Sensing
giovanni.pau@lip6.fr
https://www.lip6.fr/actualite/personnes-fiche.php?nom=Pau

Hong Kong

Pan Hui
Department of Computer Science and Engineering
The Hong Kong University of Science and Technology
Email: panhuiATcse.ust.hk
http://www.cse.ust.hk/~panhui/
system aspect of mobile Augmented Reality (AR) and AR content generation, mobile computing, urban computing, and other interesting topics related to social network

Italy

Carla Fabiana Chiasserini
Electronics and Telecommunications Department, Politecnico di Torino
Email: carla.chiasserini@polito.it
http://www.telematica.polito.it/public/faculty/paolo-giaccone
Topics: 5G Mobile Edge Computing (MEC), vehicular networks and services, social computing
PhD applications: http://dottorato.polito.it/en/call_for_admission

Bioinformatics

Programming Languages

United Kingdom

Christian Urban (and others)
christian.urban@kcl.ac.uk

Kevin Hammond, Edwin Brady and others
University of St Andrews
kevin@kevinhammond.net, http://www.kevinhammond.net

6 fully-funded PhD opportunities in the School of Computer Science at the University of St Andrews. Any topic related to functional programming, parallelism, real-time, security etc. with a programming language angle is interesting to us, including types for reasoning about security, energy, time and other systems properties, refactoring, software engineering etc, including Haskell, Erlang and Scala. We have excellent connections with the UK and international research communities, coordinate the EU Horizon 2020 RePhrase project (http://www.rephrase-ict.eu) and coordinate a project that aims to commercialise previous research results in refactoring-based parallelisation (http:www.paraformance.com).

We are also open to research visitors of all kinds, including sabbaticals etc, and anticipate increasing our permanent academic staff in line with increasing student numbers.

Software Engineering

Greece

Diomidis Spinellis
http://www.spinellis.grdds@aueb.gr
PhD Candidate or Postdoctoral Researcher in Applied Software Engineering. This is a position to perform applied research in software engineering. funded for three years through the European Union Horizon 2020 CROSSMINER project. We are looking for first stage researchers holding a Master degree or equivalent who will be hired as a PhD candidate, or for a recognized researcher holding a PhD or equivalent who will be hired as a postgraduate associate. The topic of the research is to mine and analyse data from software repositories (such as GitHub) to help developers and administrators build better software and systems. Additional details regarding benefits, application, and selection process can be found in the position’s EURAXESS posting. https://euraxess.ec.europa.eu/jobs/175366

Canada

Software Practices Lab at UBC in Vancouver
Ivan Beschastnikh, Thomas Fritz, Ronald Garcia, Reid Holmes, Gail Murphy
https://www.cs.ubc.ca/cs-research/software-practices-lab/people
Looking for candidates at all levels: MSc, PhD, Post-doctorate.
We work on programming languages, software testing, software analysis, human aspects of software engineering, and many other topics. See our personal homepages for more information.
Spain
IMDEA Software Institute, Madrid
Alessandra Gorla http://software.imdea.org/~alessandra.gorla

Computer Games

United Kingdom (UK)

Dayna Galloway (and others)
admissions@abertay.ac.uk
Division of Games and Arts, Abertay University, Dundee, UK
Computer games technology (graphics, simulation, AI), serious games, games studies. We offer PhDs and Masters by Research, with a few funded places each year; please get in touch with us to discuss potential supervisors and areas of interest.
http://www.abertay.ac.uk/discover/academic-schools/arts-media-computer-games/
http://www.abertay.ac.uk/studying/postgraduate-research-degrees/

Computer Graphics

Austria

Bernd Bickel, Computer Graphics and Digital Fabrication
Institute of Science and Technology Austria (IST Austria)
Looking for PhD students and postdocs
bernd.bickel@ist.ac.at
http://visualcomputing.ist.ac.at

Network Science

Italy

Emilio Leonardi
Electronics and Telecommunications Department, Politecnico di Torino
Email: emilio.leonardi@polito.it
http://www.telematica.polito.it/public/faculty/emilio-leonardi
Topics: Online social networks and their dynamics, Crowd-sourcing systems, Epidemic processes over large graphs, Performance evaluation of large systems, Network Science

You can’t perform that action at this time.