Login / Signup
You are the key: Generating cryptographic keys from voice biometrics.
Brent Carrara
Carlisle Adams
Published in:
PST (2010)
Keyphrases
</>
hash functions
secure communication
data sets
pattern recognition
secret key
private key
block cipher
xml keys