(1)
T, M.; B, D.; P, G.; Kanna B, N. Identifying the Unauthorized User in E-Government Compliant System Using Valid Proofs. IJET 2018, 7 (2.26), 40-43. https://doi.org/10.14419/ijet.v7i2.26.12531.