메뉴 건너뛰기




Volumn 2, Issue , 2005, Pages 683-688

The design of a secure and pervasive multimodal Web system

Author keywords

[No Author keywords available]

Indexed keywords

CELLULAR RADIO SYSTEMS; HTML; INTERFACES (COMPUTER); SECURITY OF DATA; SERVERS; WEB BROWSERS; XML;

EID: 33744474601     PISSN: 1550445X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AINA.2005.324     Document Type: Conference Paper
Times cited : (2)

References (29)
  • 1
    • 18844382528 scopus 로고    scopus 로고
    • Integrated pervasive computing environments
    • M. Satyanarayanan, "Integrated Pervasive Computing Environments," IEEE Pervasive Computing, 1(2), 2002, pp. 2-3.
    • (2002) IEEE Pervasive Computing , vol.1 , Issue.2 , pp. 2-3
    • Satyanarayanan, M.1
  • 3
    • 33744491177 scopus 로고    scopus 로고
    • Making voice knowledge pervasive
    • N. Anerousis and E. Panagos, "Making Voice Knowledge Pervasive," IEEE Pervasive Computing, 1(2), 2002, pp. 42-48.
    • (2002) IEEE Pervasive Computing , vol.1 , Issue.2 , pp. 42-48
    • Anerousis, N.1    Panagos, E.2
  • 4
    • 0029410152 scopus 로고
    • Operational and experimental French telecommunication services using CNET speech recognition and text-to-speech synthesis
    • C. Sorin, D. Jouvet, C. Gagnoulet, D. Dubois, D. Sadek, and M. Toularhoat, "Operational and experimental French telecommunication services using CNET speech recognition and text-to-speech synthesis," Speech communication, 17, 1995, pp. 273-286.
    • (1995) Speech Communication , vol.17 , pp. 273-286
    • Sorin, C.1    Jouvet, D.2    Gagnoulet, C.3    Dubois, D.4    Sadek, D.5    Toularhoat, M.6
  • 5
    • 2942753915 scopus 로고    scopus 로고
    • Analysing interactive voice services
    • K. Turner, K. J., "Analysing interactive voice services," Computer Networks, 45(5), 2004, pp. 665-685.
    • (2004) Computer Networks , vol.45 , Issue.5 , pp. 665-685
    • Turner, K.1    J., K.2
  • 6
    • 0043092649 scopus 로고    scopus 로고
    • It's good to talk [speech technology for on-line services access]
    • R. Dettmer, "It's good to talk [speech technology for on-line services access]," IEE Review, vol. 49, 2003, pp. 30-33.
    • (2003) IEE Review , vol.49 , pp. 30-33
    • Dettmer, R.1
  • 7
    • 0242577989 scopus 로고    scopus 로고
    • VoiceXML and the W3C speech interface framework
    • J. A. Larson, "VoiceXML and the W3C speech interface framework," IEEE Multimedia, vol. 10, 2003, pp. 91-93.
    • (2003) IEEE Multimedia , vol.10 , pp. 91-93
    • Larson, J.A.1
  • 9
    • 33744496948 scopus 로고    scopus 로고
    • Current threats to and technical solutions for voice security
    • IEEE
    • M. D. Collier, "Current threats to and technical solutions for voice security," Aerospace Conference Proceedings, IEEE, 2002, pp.2685-2695.
    • (2002) Aerospace Conference Proceedings , pp. 2685-2695
    • Collier, M.D.1
  • 14
    • 0021501413 scopus 로고
    • Speech-quality assessment methods for speech-coding systems
    • N. Kitawaki, M. Honda, and K. Itoh, "Speech-quality assessment methods for speech-coding systems," IEEE Communications, vol. 22, 1984, pp. 26-33.
    • (1984) IEEE Communications , vol.22 , pp. 26-33
    • Kitawaki, N.1    Honda, M.2    Itoh, K.3
  • 15
    • 0036697706 scopus 로고    scopus 로고
    • New voice over Internet protocol technique with hierarchical data security protection
    • J.-I. Guo, J.-C. Yen, and H.-F. Pai, "New voice over Internet protocol technique with hierarchical data security protection," IEE Proceedings Vision, Image and Signal Processing, vol. 149, 2002, pp. 237-243
    • (2002) IEE Proceedings Vision, Image and Signal Processing , vol.149 , pp. 237-243
    • Guo, J.-I.1    Yen, J.-C.2    Pai, H.-F.3
  • 17
    • 0018040291 scopus 로고
    • An approach to secure voice communication based on the data encryption standard
    • M. Orceyre and R. Heller, "An approach to secure voice communication based on the data encryption standard," IEEE Communications Magazine, vol. 16, 1978, pp. 41-50.
    • (1978) IEEE Communications Magazine , vol.16 , pp. 41-50
    • Orceyre, M.1    Heller, R.2
  • 20
    • 33646500392 scopus 로고    scopus 로고
    • The Rijndael algorithm
    • T. Jamil, "The Rijndael algorithm," IEEE Potentials, vol. 23, 2004, pp. 36-38.
    • (2004) IEEE Potentials , vol.23 , pp. 36-38
    • Jamil, T.1
  • 28
    • 84953635000 scopus 로고
    • Description of a new variable-length key, 64-bit block cipher (blowfish)
    • R. Anderson, ed., Springer-Verlag
    • B. Schneier, "Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)," in R. Anderson, ed., Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer-Verlag, 1994, pp. 191-204.
    • (1994) Fast Software Encryption, Cambridge Security Workshop Proceedings , pp. 191-204
    • Schneier, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.