Author of the publication

Modeling cryptographic properties of voice and voice-based entity authentication.

, , and . Digital Identity Management, page 53-61. ACM, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Convergence Using Universal Numbers: The UPT Project., , and . Databases in Telecommunications, volume 2209 of Lecture Notes in Computer Science, page 155-166. Springer, (2001)Client-Server Caching with Expiration Timestamps., , , and . Distributed Parallel Databases, 10 (1): 5-22 (2001)The Touring Machine System., , , , , , , , , and 11 other author(s). Commun. ACM, 36 (1): 68-77 (1993)On the Accuracy and Completeness of the Record Matching Process., , , , and . IQ, page 54-69. MIT, (2000)A model-driven approach to rapid service introduction., , and . Integrated Network Management, page 659-672. IEEE, (2005)Database Performance for Next Generation Telecommunications.. ICDE, page 295-298. IEEE Computer Society, (2001)Internet Traffic Warehouse., , , , , , and . SIGMOD Conference, page 550-558. ACM, (2000)SIGMOD Record 29(2), June 2000.Data Caching for Telephony Services., , , and . IDEAS, page 101-112. IEEE Computer Society, (2000)A Multidatabase Solution for a Financial Application., , and . ADB, volume 819 of Lecture Notes in Computer Science, page 204-214. Springer, (1994)Modeling cryptographic properties of voice and voice-based entity authentication., , and . Digital Identity Management, page 53-61. ACM, (2007)