T, Mekala; B, Devakar; P, Govindhasamy; KANNA B, Nishkal. Identifying the unauthorized user in e-government compliant system using valid proofs.
International Journal of Engineering and Technology,
[S. l.], v. 7, n. 2.26, p. 40–43, 2018.
DOI: 10.14419/ijet.v7i2.26.12531. Disponível em: https://sciencepubco.com/index.php/IJET/article/view/12531.. Acesso em: 28 apr. 2025.