Login / Signup

A software based approach to secure voice applications.

George Troullinos
Published in: ICECS (1996)
Keyphrases
  • software development
  • voice recognition
  • user interface
  • software tools
  • software maintenance
  • data mining
  • artificial intelligence
  • mobile devices
  • lightweight
  • software systems
  • software quality
  • covert channel