@dblp

Modeling cryptographic properties of voice and voice-based entity authentication.

, , and . Digital Identity Management, page 53-61. ACM, (2007)

Links and resources

Tags