Login / Signup
Modeling cryptographic properties of voice and voice-based entity authentication.
Giovanni Di Crescenzo
Munir Cochinwala
Hyong Sop Shim
Published in:
Digital Identity Management (2007)
Keyphrases
</>
hidden markov models
smart card
desirable properties
emotion recognition
data sets
security protocols
text to speech
named entities
security requirements
user authentication
fragile watermarking