6 research outputs found

    Security protocol verification: Symbolic and computational models

    Get PDF
    Security protocol verification has been a very active research area since the 1990s. This paper surveys various approaches in this area, considering the verification in the symbolic model, as well as the more recent approaches that rely on the computational model or that verify protocol implementations rather than specifications. Additionally, we briefly describe our symbolic security protocol verifier ProVerif and situate it among these approaches

    A Review of Visual Descriptors and Classification Techniques Used in Leaf Species Identification

    No full text
    corecore