Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,637,188 papers from all fields of science
Search
Sign In
Create Free Account
BitLocker
Known as:
Bitlocker Drive Encryption
, Microsoft BitLocker
, Microsoft BDE
Expand
BitLocker is a full disk encryption feature included with select editions of Windows Vista and later in January 2007. It is designed to protect data…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Active Directory
BIOS
Backdoor (computing)
Boot sector
Expand
Broader (1)
Disk encryption
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
Survey on Bitlocker Techniques
Deepika Goyal
2016
Corpus ID: 64553076
Bitlocker technology is one of the most popular system used in safety measure of Microsoft Window Operating system. Bitlocker is…
Expand
Review
2014
Review
2014
A Survey on the Security Fight againstRansomware and Trojans in Android
T. T. Gotora
,
Kudakwashe Zvarevashe
,
N. Pranav
,
An
2014
Corpus ID: 55109044
Android has taken the world of mobile computing to a whole different level and made possible persuasive interaction between user…
Expand
2014
2014
Self-Encrypting Drives
J. Tanguy
2014
Corpus ID: 13993810
In the classic ROT13 method, each letter in the plain text is substituted with a corresponding letter 13 places further ahead in…
Expand
Review
2013
Review
2013
Implementing a PC Hardware Configuration ( BIOS ) Baseline GIAC ( GSEC ) Gold Certification
David R. Fletcher
2013
Corpus ID: 15377070
High level operating system features such as patch management, full disk encryption, virtualization, and malware protection are…
Expand
2011
2011
Secure Control of Remote Electrical Devices Using Mobile SMS Services
K. Mane
,
D. Patil
2011
Corpus ID: 15260894
In this paper an attempt is made to extend the capability of mobile phones for secure control of remote electrical devices using…
Expand
2011
2011
Lost iPhone? Lost Passwords! Practical Consideration of iOS Device Encryption Security
J. Heider
,
Matthias Boll
2011
Corpus ID: 15386552
The paper highlights risks that accompany losing a locked iOS device regarding confidentiality of passwords stored in the…
Expand
2010
2010
Lisa '09: 23rd Large Installation System Administration Conference
S. Bellovin
,
Jason Nieh
2010
Corpus ID: 50286375
First, Werner introduced an exemplary customer of Amazon’s services—“animoto” (http://animoto.com/), a company that developed an…
Expand
2008
2008
The key generation device, encryption device and decryption device
潤二 古川
,
古川 潤
2008
Corpus ID: 67378970
2006
2006
Encryption device, encryption method, decryption device, decryption method, and data structure
中村贵利
2006
Corpus ID: 57227293
The present invention provides an encryption processing apparatus, an encryption method, a decryption processing apparatus, a…
Expand
2002
2002
Cryptographic key, encryption device, encryption/decryption device, cryptographic key management device, and decryption device
이시하라데츠야
,
우에노오사무
,
니시노요시카즈
,
니시야마후미아키
,
스즈키다쿠미
,
이소가이레이
2002
Corpus ID: 140234933
PURPOSE: A cipher key, an enciphering device, an enciphering/deciphering device, a cipher key management device, and a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE