Login / Signup

Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones.

Maliheh ShirvanianNitesh Saxena
Published in: CCS (2014)
Keyphrases