Skip to search formSkip to main contentSkip to account menu

Secure voice

Known as: Ciphony, Voice privacy, Voice encryption 
Secure voice (alternatively secure speech or ciphony) is a term in cryptography for the encryption of voice communication over a range of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
The use of a Wireless Sensor Network (WSN) has increased in the last years in many different fields. One of the main advantages… 
2015
2015
Searchable symmetric encryption refers to a system whereby clients store encrypted documents in a server that can be searched by… 
2011
2011
  • B. PutraS. Suyanto
  • 2011
  • Corpus ID: 15629600
The need of security for web page was increased as the development of online activity especially trading or banking. Speaker… 
2009
2009
Using examples from Yucatec Maya, I present new methodologies with regard to coding glottalization and measuring pitch. I show… 
2001
2001
This paper describes a data distribution algorithm suitable for copying large files to many nodes in multiple clusters in wide… 
Review
1995
Review
1995
  • L. Hoffman
  • 1995
  • Corpus ID: 5432121
The Escrowed Encryption Standard (EES) defines a US Government family of cryptographic processors, popularly known as "Clipper… 
Review
1990
Review
1990
The author presents a study of military applications of advanced speech processing technology which includes three major elements… 
1990
1990
In the last few years, Code-Excited Linear Predictive (CELP) coding has emerged as the most prominent technique for digital…