(1)
T, M.; B, D.; P, G.; Kanna B, N. Identifying the Unauthorized User in E-Government Compliant System Using Valid Proofs.
IJET
2018
,
7
(2.26), 40-43.
https://doi.org/10.14419/ijet.v7i2.26.12531
.