Login / Signup
Cryptographic Key Generation from Voice.
Fabian Monrose
Michael K. Reiter
Qi Li
Susanne Wetzel
Published in:
IEEE Symposium on Security and Privacy (2001)
Keyphrases
</>
smart card
data sets
secure communication
interactive voice response
real time
information systems
video sequences
evolutionary algorithm
key management
security protocols
s box
cryptographic protocols
text to speech
voice recognition
voice and data services