1.
RachoĊ„ J, Piotrowski Z, Gajewski P. Authentication in VoIP Telephony with Use of the Echo Hiding Method. JTIT. 2011;43(1):17-21. doi:10.26636/jtit.2011.1.1127