Sign Up to like & get
recommendations!
0
Published in 2020 at "Journal of Communications Technology and Electronics"
DOI: 10.1134/s1064226920120013
Abstract: The amount of digital information is growing every year. Various identification and verification systems are used to access them. Most of them require a special key (for example, a password), which can easily be lost…
read more here.
Keywords:
voice;
system using;
verification;
development authentication ... See more keywords