Return to Article Details
A METHOD FOR USER AUTHENTICATING TO CRITICAL INFRASTRUCTURE OBJECTS BASED ON VOICE MESSAGE IDENTIFICATION
Download
Download PDF