[1]
Rachoń, J. et al. 2011. Authentication in VoIP Telephony with Use of the Echo Hiding Method. Journal of Telecommunications and Information Technology. 43, 1 (Mar. 2011), 17–21. DOI:https://doi.org/10.26636/jtit.2011.1.1127.