Toggle navigation
SECUR
1
TY
Find an Expert
Toggle Dropdown
Compliance
Incident Response
Penetration Testing
Software Development
Website/Application Security
Security Marketing and PR
Security Staffing
Education and Training
Network Security
Social Engineering
Cryptography
Mobile App Security
Video Surveillance
CIO / CTO / CSO / CISO / Virtual CISO
Private Investigation
Custom
More...
For Experts
Advice
Sign Up
Login
×
Welcome
Sign up. It's fast and free!
Sign up with:
LinkedIn
or
Sign up for free:
6 characters or more
8 characters or more
Sign Up
×
17
MIT's Bitcoin inspired 'Enigma' let's computers mine encrypted data
Decentralized homomorphic encryption scheme allows secure computations in the cloud
Post by:
advancesec
Tweet
Upvoted By:
Thank you for posting a comment.
Please login to post comments.
This is about the coolest thing I've read all month. Great research!
need to see more details to evaluate how practical this will really be
Sounds pretty computationally expensive, but as it scales out it might become like a security version of hadoop.
Security Forum
Share security advice on our community forum. Ask questions, post news and best practices.
Submit a Post
×
Welcome! Create a free account.
I want to hire
an expert
Post a description. Connect with top security and IT experts.
Sign up as a business
or
I'm an expert
Find opportunities with great companies. Network with our community.
Sign up as an expert
Have an account? Login here.
SHOW ALL
2
×
Welcome! Create a free account.
I want to hire
an expert
Post a description. Connect with top security and IT experts.
Sign up as a business
or
I'm an expert
Find opportunities with great companies. Network with our community.
Sign up as an expert
Have an account? Login here.
How to Buy a Security Awareness Training Program
Are you looking to buy a security awareness training program?
0
2
×
Welcome! Create a free account.
I want to hire
an expert
Post a description. Connect with top security and IT experts.
Sign up as a business
or
I'm an expert
Find opportunities with great companies. Network with our community.
Sign up as an expert
Have an account? Login here.
Cyber Security Awareness Month Spring Cleaning
Learn how to use October to clean up your cyber security program
0
2
×
Welcome! Create a free account.
I want to hire
an expert
Post a description. Connect with top security and IT experts.
Sign up as a business
or
I'm an expert
Find opportunities with great companies. Network with our community.
Sign up as an expert
Have an account? Login here.
Employees "Defend Against DeeDee" in New Phishing Simulator
Employees "Defend Against DeeDee" in New Phishing Simulation Experience for Businesses
0
more
loading
Yours
FREE!
Where should we email
free access to your Security Grader?
We don't share emails
Get
FREE
access to my Security Grader
17
MIT's Bitcoin inspired 'Enigma' let's computers mine encrypted data
Decentralized homomorphic encryption scheme allows secure computations in the cloud
Post by: advancesec
Tweet
Upvoted By:
Thank you for posting a comment.
This is about the coolest thing I've read all month. Great research!
need to see more details to evaluate how practical this will really be
Sounds pretty computationally expensive, but as it scales out it might become like a security version of hadoop.
Security Forum