Fundamentals of speech recognition
Fundamentals of speech recognition
Linux multimedia guide
Statistical methods for speech recognition
Statistical methods for speech recognition
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Protecting secret keys with personal entropy
Future Generation Computer Systems - Special issue on security on the Web
Computer Speech Technology
Multilingual Text-to-Speech Synthesis
Multilingual Text-to-Speech Synthesis
Cryptographic Approaches to Provacy in Forensic DNA Databases
PKC '00 Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Cryptographic Key Generation from Voice
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
An experimental study of speaker verification sensitivity to computer voice-altered imposters
ICASSP '99 Proceedings of the Acoustics, Speech, and Signal Processing, 1999. on 1999 IEEE International Conference - Volume 02
Noisy polynomial interpolation and noisy chinese remaindering
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
The practical subtleties of biometric key generation
SS'08 Proceedings of the 17th conference on Security symposium
An Efficient and Flexible Scheme to Support Biometric-Based and Role-Based Access Control
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
A novel algorithm of fingerprint encryption using minutiae-based transformation
Pattern Recognition Letters
ICCOMP'10 Proceedings of the 14th WSEAS international conference on Computers: part of the 14th WSEAS CSCC multiconference - Volume I
Generation of replaceable cryptographic keys from dynamic handwritten signatures
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
The effectiveness of generative attacks on an online handwriting biometric
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Fuzzy identity-based encryption
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Examining a Large Keystroke Biometrics Dataset for Statistical-Attack Openings
ACM Transactions on Information and System Security (TISSEC)
Hi-index | 0.00 |