Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,289,558 papers from all fields of science
Search
Sign In
Create Free Account
BitLocker
Known as:
Bitlocker Drive Encryption
, Microsoft BitLocker
, Microsoft BDE
Expand
BitLocker is a full disk encryption feature included with select editions of Windows Vista and later in January 2007. It is designed to protect data…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Active Directory
BIOS
Backdoor (computing)
Boot sector
Expand
Broader (1)
Disk encryption
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
SUB-DEVICE ENCRYPTION METHOD AND DEVICE FOR RECEIVING DATA OF INTERNET OF THINGS AP
Guangdong Du
,
杜光东
2019
Corpus ID: 88500644
Review
2014
Review
2014
A Survey on the Security Fight againstRansomware and Trojans in Android
T. T. Gotora
,
Kudakwashe Zvarevashe
,
N. Pranav
,
An
2014
Corpus ID: 55109044
Android has taken the world of mobile computing to a whole different level and made possible persuasive interaction between user…
Expand
2011
2011
Lost iPhone? Lost Passwords! Practical Consideration of iOS Device Encryption Security
J. Heider
,
Matthias Boll
2011
Corpus ID: 15386552
The paper highlights risks that accompany losing a locked iOS device regarding confidentiality of passwords stored in the…
Expand
2011
2011
ARM Realization of Storage Device Encryption Based on Chaos and AES Algorithm
Chunlei Wang
,
Guangyi Wang
,
Yue Sun
,
Wei Chen
Fourth International Workshop on Chaos-Fractals…
2011
Corpus ID: 14765942
In order to improve the security of the private information in memorizer, an encryption algorithm, which inherits the advantages…
Expand
2011
2011
Secure Control of Remote Electrical Devices Using Mobile SMS Services
K. Mane
,
D. Patil
2011
Corpus ID: 15260894
In this paper an attempt is made to extend the capability of mobile phones for secure control of remote electrical devices using…
Expand
2010
2010
Lisa '09: 23rd Large Installation System Administration Conference
S. Bellovin
,
Jason Nieh
2010
Corpus ID: 50286375
First, Werner introduced an exemplary customer of Amazon’s services—“animoto” (http://animoto.com/), a company that developed an…
Expand
2009
2009
'This Inferior Female Body': Reflections on Life as a Treasure Revealer Through the Autobiographical Eyes of Se ra mkha' 'gro (Bde ba'i rdo rje, 1892-1940)
S. Jacoby
2009
Corpus ID: 193731885
2008
2008
Windows Vista and digital investigations
C. Hargreaves
,
Howard Chivers
,
D. Titheridge
Digital Investigation. The International Journal…
2008
Corpus ID: 37318596
2008
2008
The key generation device, encryption device and decryption device
潤二 古川
,
古川 潤
2008
Corpus ID: 67378970
2002
2002
Cryptographic key, encryption device, encryption/decryption device, cryptographic key management device, and decryption device
이시하라데츠야
,
우에노오사무
,
니시노요시카즈
,
니시야마후미아키
,
스즈키다쿠미
,
이소가이레이
2002
Corpus ID: 140234933
PURPOSE: A cipher key, an enciphering device, an enciphering/deciphering device, a cipher key management device, and a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE