Login / Signup

User perspectives on the security of access data, operator handover procedures and "insult rate" for speaker verification in automated telephone services.

Mark S. SchmidtSteve IronsideMervyn A. JackFred Stentiford
Published in: Pattern Recognit. Lett. (1997)
Keyphrases