[1]
T, M. et al. 2018. Identifying the unauthorized user in e-government compliant system using valid proofs.
International Journal of Engineering and Technology
. 7, 2.26 (May 2018), 40–43
. DOI:https://doi.org/10.14419/ijet.v7i2.26.12531
.