Inproceedings,

Modeling cryptographic properties of voice and voice-based entity authentication.

, , and .
Digital Identity Management, page 53-61. ACM, (2007)

Meta data

Tags

Users

  • @dblp

Comments and Reviews