(1)
RachoĊ„, J.; Piotrowski, Z.; Gajewski, P. Authentication in VoIP Telephony With Use of the Echo Hiding Method. JTIT 2011, 43 (1), 17-21. https://doi.org/10.26636/jtit.2011.1.1127.