1.
RachoĊ„ J, Piotrowski Z, Gajewski P. Authentication in VoIP Telephony with Use of the Echo Hiding Method. JTIT [Internet]. 2011 Mar. 30 [cited 2026 Apr. 18];43(1):17-21. Available from: https://jtit.pl/jtit/article/view/1127