Get free PhD updates, every week | SIGN UP NOW Get free PhD updates, every week | SIGN UP NOW

We have 12 Royal Holloway, University of London, Information Security Group PhD Projects, Programmes & Scholarships PhD Projects, Programmes & Scholarships

Discipline

Discipline

All disciplines

Location

Location

All locations

Institution

Institution

Information Security Group  Royal Holloway, University of London

PhD Type

PhD Type

All PhD Types

Funding

Funding

All Funding


Royal Holloway, University of London, Information Security Group PhD Projects, Programmes & Scholarships PhD Projects, Programmes & Scholarships

We have 12 Royal Holloway, University of London, Information Security Group PhD Projects, Programmes & Scholarships PhD Projects, Programmes & Scholarships

PhD saved successfully

Software Supply Chain Ecosystem

Please note that advertised projects are sample projects and prospective applicants are not required to apply to one of the advertised projects, but are welcome to discuss broader research interests with the academic named in the advert - and/or to apply with their own research proposal. Read more

Securing Sensors in Insecure IoT

Please note that advertised projects are sample projects and prospective applicants are not required to apply to one of the advertised projects, but are welcome to discuss broader research interests with the academic named in the advert - and/or to apply with their own research proposal. Read more

Individual and Cultural Dimensions of Security Behaviour

Please note that advertised projects are sample projects and prospective applicants are not required to apply to one of the advertised projects, but are welcome to discuss broader research interests with the academic named in the advert - and/or to apply with their own research proposal. Read more

Protecting Users from Online Intimidation and Coercion

Please note that advertised projects are sample projects and prospective applicants are not required to apply to one of the advertised projects, but are welcome to discuss broader research interests with the academic named in the advert - and/or to apply with their own research proposal. Read more

Applications of Time and Delay in Cryptographic Protocols

Please note that advertised projects are sample projects and prospective applicants are not required to apply to one of the advertised projects, but are welcome to discuss broader research interests with the academic named in the advert - and/or to apply with their own research proposal. Read more

Understanding cyber security risk behaviour of Generation Z

Please note that advertised projects are sample projects and prospective applicants are not required to apply to one of the advertised projects, but are welcome to discuss broader research interests with the academic named in the advert - and/or to apply with their own research proposal. Read more

Privacy-Preserving Applications based on Secure Multi-Party Computation

Please note that advertised projects are sample projects and prospective applicants are not required to apply to one of the advertised projects, but are welcome to discuss broader research interests with the academic named in the advert - and/or to apply with their own research proposal. Read more

Digital security standardization and great power competition

Please note that advertised projects are sample projects and prospective applicants are not required to apply to one of the advertised projects, but are welcome to discuss broader research interests with the academic named in the advert - and/or to apply with their own research proposal. Read more

Evil Digital Twins- Combinatorial Structures over Sparse Graphs:

Please note that advertised projects are sample projects and prospective applicants are not required to apply to one of the advertised projects, but are welcome to discuss broader research interests with the academic named in the advert - and/or to apply with their own research proposal. Read more

Cyber Security and International Relations: Conceptualizing the Threat

Please note that advertised projects are sample projects and prospective applicants are not required to apply to one of the advertised projects, but are welcome to discuss broader research interests with the academic named in the advert - and/or to apply with their own research proposal. Read more

Cybersecurity and Privacy in Female-oriented Technologies (FemTech)

Please note that advertised projects are sample projects and prospective applicants are not required to apply to one of the advertised projects, but are welcome to discuss broader research interests with the academic named in the advert - and/or to apply with their own research proposal. Read more

Automating Cyber Security?: Models, Environments and the (Geo)Political

Please note that advertised projects are sample projects and prospective applicants are not required to apply to one of the advertised projects, but are welcome to discuss broader research interests with the academic named in the advert - and/or to apply with their own research proposal. Read more
  • 1

Filtering Results