<--- Back to Details
First PageDocument Content
Cryptography / Computer security / Security / Computer access control / Challengeresponse authentication / Password / Cryptographic nonce / Authentication / Server / Biometrics / Key / Public-key cryptography
Date: 2013-12-13 13:04:18
Cryptography
Computer security
Security
Computer access control
Challengeresponse authentication
Password
Cryptographic nonce
Authentication
Server
Biometrics
Key
Public-key cryptography

WITH VAULTED VOICE VERIFICATION MY VOICE IS MY KEY R.C. Johnson and Terrance E. Boult

Add to Reading List

Source URL: vast.uccs.edu

Download Document from Source Website

File Size: 383,37 KB

Share Document on Facebook

Similar Documents

AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1  Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

DocID: 1rsSn - View Document

The Politics of Cryptography: Bitcoin and The Ordering Machines

The Politics of Cryptography: Bitcoin and The Ordering Machines

DocID: 1rmtA - View Document

WITH VAULTED VOICE VERIFICATION MY VOICE IS MY KEY R.C. Johnson and  Terrance E. Boult

WITH VAULTED VOICE VERIFICATION MY VOICE IS MY KEY R.C. Johnson and Terrance E. Boult

DocID: 1r7Iu - View Document

Low-Overhead Byzantine Fault-Tolerant Storage James Hendricks Gregory R. Ganger  Michael K. Reiter

Low-Overhead Byzantine Fault-Tolerant Storage James Hendricks Gregory R. Ganger Michael K. Reiter

DocID: 1r7EO - View Document

The Politics of Cryptography: Bitcoin and The Ordering Machines

The Politics of Cryptography: Bitcoin and The Ordering Machines

DocID: 1r7cb - View Document