Subject's file

verification strategies

Related Works