T, Mekala, Devakar B, Govindhasamy P, and Nishkal Kanna B. “Identifying the Unauthorized User in E-Government Compliant System Using Valid Proofs”. International Journal of Engineering and Technology 7, no. 2.26 (May 7, 2018): 40–43. Accessed April 28, 2025. https://sciencepubco.com/index.php/IJET/article/view/12531.