Login / Signup
Simple voice security protocol.
Carole Bassil
Ahmed Serhrouchni
Nicolas Rouhana
Published in:
IWCMC (2006)
Keyphrases
</>
security protocols
automated design
artificial immune algorithm
databases
security services
real time
data mining
low cost