Login / Signup
A software based approach to secure voice applications.
George Troullinos
Published in:
ICECS (1996)
Keyphrases
</>
software development
voice recognition
user interface
software tools
software maintenance
data mining
artificial intelligence
mobile devices
lightweight
software systems
software quality
covert channel