![Security / Prevention / Biometrics / Cybercrime / E-commerce / Secure communication / Speaker recognition / Speech processing / Authentication / Password / Computer security / Transmission Control Protocol Security / Prevention / Biometrics / Cybercrime / E-commerce / Secure communication / Speaker recognition / Speech processing / Authentication / Password / Computer security / Transmission Control Protocol](https://www.pdfsearch.io/img/b393c3406acfb04dc23a70d6fc90c9a9.jpg) Date: 2013-12-13 11:59:39Security Prevention Biometrics Cybercrime E-commerce Secure communication Speaker recognition Speech processing Authentication Password Computer security Transmission Control Protocol | | Voice Authentication Using Short Phrases: Examining Accuracy, Security and Privacy Issues R.C. Johnson, Terrance E. Boult University of Colorado, Colorado Springs Colorado Springs, CO, USA rjohnso9 | tboultAdd to Reading ListSource URL: vast.uccs.eduDownload Document from Source Website File Size: 605,75 KBShare Document on Facebook
|