T, M., B, D., P, G., & Kanna B, N. (2018). Identifying the unauthorized user in e-government compliant system using valid proofs. International Journal of Engineering & Technology, 7(2.26), 40-43. https://doi.org/10.14419/ijet.v7i2.26.12531