<--- Back to Details
First PageDocument Content
Security / Prevention / Biometrics / Cybercrime / E-commerce / Secure communication / Speaker recognition / Speech processing / Authentication / Password / Computer security / Transmission Control Protocol
Date: 2013-12-13 11:59:39
Security
Prevention
Biometrics
Cybercrime
E-commerce
Secure communication
Speaker recognition
Speech processing
Authentication
Password
Computer security
Transmission Control Protocol

Voice Authentication Using Short Phrases: Examining Accuracy, Security and Privacy Issues R.C. Johnson, Terrance E. Boult University of Colorado, Colorado Springs Colorado Springs, CO, USA rjohnso9 | tboult

Add to Reading List

Source URL: vast.uccs.edu

Download Document from Source Website

File Size: 605,75 KB

Share Document on Facebook

Similar Documents

Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics Simon Eberz Kasper B. Rasmussen

Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics Simon Eberz Kasper B. Rasmussen

DocID: 1xVQY - View Document

CASE STUDY  VOICE BIOMETRICS JUST THE VOICE TO VERIFY THE IDENTITY OF TATRA BANKA CLIENTS COMPANY:	 Tatra Banka

CASE STUDY VOICE BIOMETRICS JUST THE VOICE TO VERIFY THE IDENTITY OF TATRA BANKA CLIENTS COMPANY: Tatra Banka

DocID: 1xUAY - View Document

Broken Hearted: How To Attack ECG Biometrics Simon Eberz Nicola Paoletti  Marc Roeschlin

Broken Hearted: How To Attack ECG Biometrics Simon Eberz Nicola Paoletti Marc Roeschlin

DocID: 1xUjz - View Document

PDF Document

DocID: 1xSV6 - View Document

DOC Document

DocID: 1xMH5 - View Document