Author of the publication

Cryptographic-Speech-Key Generation Using the SVM Technique over the lp-Cepstral Speech Space.

, , and . Summer School on Neural Networks, volume 3445 of Lecture Notes in Computer Science, page 370-374. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SVM Applied to the Generation of Biometric Speech Key., , and . CIARP, volume 3287 of Lecture Notes in Computer Science, page 637-644. Springer, (2004)Cryptographic-Speech-Key Generation Using the SVM Technique over the lp-Cepstral Speech Space., , and . Summer School on Neural Networks, volume 3445 of Lecture Notes in Computer Science, page 370-374. Springer, (2004)Parameter Optimization in a Text-Dependent Cryptographic-Speech-Key Generation Task., , and . NOLISP, volume 3817 of Lecture Notes in Computer Science, page 92-99. Springer, (2005)Using PCA to Improve the Generation of Speech Keys., , , and . MICAI, volume 4293 of Lecture Notes in Computer Science, page 1085-1094. Springer, (2006)Some Representations of the S-Box of Camellia in GF(((22)2)2)., , and . CANS, 7712, page 296-309. Springer, (2012)Cryptographic-Speech-Key Generation Architecture Improvements., , and . IbPRIA (2), volume 3523 of Lecture Notes in Computer Science, page 579-585. Springer, (2005)Hybrid Method for Detecting Masqueraders Using Session Folding and Hidden Markov Models., , , and . MICAI, volume 4293 of Lecture Notes in Computer Science, page 622-631. Springer, (2006)Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers., , , , and . IMACC, volume 2260 of Lecture Notes in Computer Science, page 374-377. Springer, (2001)An efficient Multi-Parent Hierarchical routing protocol for WSNs., , , , , and . WTS, page 1-8. IEEE, (2014)Merging the Camellia, SMS4 and AES S-Boxes in a Single S-Box with Composite Bases., , and . ISC, volume 7807 of Lecture Notes in Computer Science, page 209-217. Springer, (2013)