Login / Signup
Using voice to generate cryptographic keys.
Fabian Monrose
Michael K. Reiter
Qi Li
Susanne Wetzel
Published in:
Odyssey (2001)
Keyphrases
</>
hash functions
databases
data sets
information systems
smart card
automatically generating
database