Back to Results
First PageMeta Content
Password / Entropy / Salt / Public-key cryptography / Key / Brute-force attack / Password strength / Password cracking / Cryptography / Key management / Randomness


Cryptographic Key Generation from Voice (Extended Abstract) Fabian Monrose Michael K. Reiter
Add to Reading List

Document Date: 2008-08-14 14:22:35


Open Document

File Size: 263,42 KB

Share Result on Facebook

Company

Reiter Qi Li Susanne Wetzel Bell Labs / Ericsson / Intel / Lucent Technologies / /

Country

United States / /

Currency

Rs / /

/

IndustryTerm

user devices / biometric-measuring device / web.mit.edu/network/pgpfone/ / text-to-speech tool / dictation device / telephone device / speech processing / automatic speech processing / subnotebook-format device / optical computing techniques / above algorithm / private networks / dictation devices / secure telephony / particular algorithm / user authentication applications / text-to-speech systems / speaker verification technology / /

NaturalFeature

Shannon / /

OperatingSystem

EPOC / /

Person

Michael K. Reiter Qi Li Susanne / Murray Hill / Fabian Monrose Michael / /

/

Position

speaker / /

ProvinceOrState

New Jersey / /

Technology

above algorithm / speech recognition / particular algorithm / public key / text-to-speech / Viterbi algorithm / speaker verification technology / file encryption / mobile phones / private key / operating system / 190 MHz StrongArm processor / be performed efficiently using the Viterbi algorithm / /

URL

www.biometrics.org / www.speakfreely.org / /

SocialTag