Speech Authentication Strategies, Risk Mitigation, and Business Metrics
| Security Article Published 22-Jun-07
Compare the economic and technical differences among voice authenticated applications and those using traditional or other biometric methods of authentication.
