User perspectives on the security of access data, operator handover procedures and "insult rate" for speaker verification in automated telephone services.
Mark S. SchmidtSteve IronsideMervyn A. JackFred StentifordPublished in: Pattern Recognit. Lett. (1997)