Login / Signup

Simple voice security protocol.

Carole BassilAhmed SerhrouchniNicolas Rouhana
Published in: IWCMC (2006)
Keyphrases
  • security protocols
  • automated design
  • artificial immune algorithm
  • databases
  • security services
  • real time
  • data mining
  • low cost