[1]
T, M. et al. 2018. Identifying the unauthorized user in e-government compliant system using valid proofs. International Journal of Engineering & Technology. 7, 2.26 (May 2018), 40–43. DOI:https://doi.org/10.14419/ijet.v7i2.26.12531.