T, M., B, D., P, G., & Kanna B, N. (2018). Identifying the unauthorized user in e-government compliant system using valid proofs.
International Journal of Engineering and Technology
,
7
(2.26), 40-43.
https://doi.org/10.14419/ijet.v7i2.26.12531