Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,548,600 papers from all fields of science
Search
Sign In
Create Free Account
Secure voice
Known as:
Ciphony
, Voice privacy
, Voice encryption
Expand
Secure voice (alternatively secure speech or ciphony) is a term in cryptography for the encryption of voice communication over a range of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
ANDVT
Crypto phone
Cryptography
Cryptoperiod
Expand
Broader (1)
Secure communication
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Design and deployment of a smart system for data gathering in estuaries using wireless sensor networks
L. Parra
,
Efstathios Karampelas
,
S. Sendra
,
Jaime Lloret
,
J. Rodrigues
International Conference on Computer, Information…
2015
Corpus ID: 17451124
The use of a Wireless Sensor Network (WSN) has increased in the last years in many different fields. One of the main advantages…
Expand
2015
2015
Proposed Random Unified Chaotic Map as PRBG for Voice Encryption in Wireless Communication
Sattar B. Sadkhan
,
R. S. Mohammed
2015
Corpus ID: 60672007
2015
2015
Improvement of UC Secure Searchable Symmetric Encryption Scheme
Shunsuke Taketani
,
W. Ogata
International Workshop on Security
2015
Corpus ID: 31015254
Searchable symmetric encryption refers to a system whereby clients store encrypted documents in a server that can be searched by…
Expand
2011
2011
Implementation of secure speaker verification at web login page using Mel Frequency Cepstral Coefficient-Gaussian Mixture Model (MFCC-GMM)
B. Putra
,
S. Suyanto
2nd International Conference on Instrumentation…
2011
Corpus ID: 15629600
The need of security for web page was increased as the development of online activity especially trading or banking. Speaker…
Expand
2010
2010
Secure speech template protection in speaker verification system
A. Teoh
,
L. Chong
Speech Communication
2010
Corpus ID: 205222510
2009
2009
The Interaction of Pitch and Creaky Voice: Data from Yucatec Maya and Cross-Linguistic Implications
Melissa Frazier
2009
Corpus ID: 55804019
Using examples from Yucatec Maya, I present new methodologies with regard to coding glottalization and measuring pitch. I show…
Expand
2001
2001
An Adaptive File Distribution Algorithm for Wide Area Network
T. Hoshino
,
K. Taura
,
T. Chikayama
Scalable Computing : Practice and Experience
2001
Corpus ID: 11083891
This paper describes a data distribution algorithm suitable for copying large files to many nodes in multiple clusters in wide…
Expand
Review
1995
Review
1995
Building in Big Brother
L. Hoffman
Springer: New York
1995
Corpus ID: 5432121
The Escrowed Encryption Standard (EES) defines a US Government family of cryptographic processors, popularly known as "Clipper…
Expand
Review
1990
Review
1990
Opportunities for Advanced Speech Processing in Military Computer-Based Systems*
C. Weinstein
Human Language Technology - The Baltic Perspectiv
1990
Corpus ID: 11723265
The author presents a study of military applications of advanced speech processing technology which includes three major elements…
Expand
1990
1990
Constrained-stochastic excitation coding of speech at 4.8 kb/s
Y. Shoham
ICSLP
1990
Corpus ID: 23814181
In the last few years, Code-Excited Linear Predictive (CELP) coding has emerged as the most prominent technique for digital…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE