T, M. (2018) “Identifying the unauthorized user in e-government compliant system using valid proofs”,
International Journal of Engineering and Technology
, 7(2.26), pp. 40–43.
doi:10.14419/ijet.v7i2.26.12531
.