{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:15:58Z","timestamp":1725466558831},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/aiccsa.2005.1387084","type":"proceedings-article","created":{"date-parts":[[2005,4,1]],"date-time":"2005-04-01T20:16:50Z","timestamp":1112386610000},"page":"487-493","source":"Crossref","is-referenced-by-count":2,"title":["Multi-speaker voice cryptographic key generation"],"prefix":"10.1109","author":[{"given":"L.P.","family":"Garcia-Perera","sequence":"first","affiliation":[]},{"given":"J.C.","family":"Mex-Perera","sequence":"additional","affiliation":[]},{"given":"J.A.","family":"Nolazco-Flores","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Fundamentals of speech recognition","year":"1993","author":"rabiner","key":"15"},{"journal-title":"Advances in Kernel Methods Support Vector Learning","year":"1999","author":"scho?lkopf","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.1997.609310"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/5.18626"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/72.914517"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.1997.609310"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"journal-title":"Features and Measures for Speaker Recognition","year":"1992","author":"campbell jr","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/130385.130401"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359172"},{"key":"7","article-title":"SVMLight: Support Vector Machine","author":"joachims","year":"1999","journal-title":"SVM-light support vector machine"},{"journal-title":"HTK Hidden Markov Model Toolkit Home Page","year":"0","key":"6"},{"journal-title":"YOHO Speaker Authentication Final Report","year":"1989","author":"higgins","key":"5"},{"journal-title":"Digital Speech Processing Synthesis and Recognition","year":"2001","author":"furui","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924299"},{"key":"8","article-title":"Foiling the cracker; A survey of, and improvements to unix password security, (original paper)","author":"klein","year":"1990","journal-title":"United Kingdom UNIX User s Group"}],"event":{"name":"The 3rd ACS\/IEEE International Conference onComputer Systems and Applications, 2005.","location":"Cairo, Egypt"},"container-title":["The 3rd ACS\/IEEE International Conference onComputer Systems and Applications, 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9525\/30191\/01387084.pdf?arnumber=1387084","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T04:04:56Z","timestamp":1489550696000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1387084\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/aiccsa.2005.1387084","relation":{},"subject":[]}}