T, Mekala; B, Devakar; P, Govindhasamy; KANNA B, Nishkal. Identifying the unauthorized user in e-government compliant system using valid proofs. International Journal of Engineering & Technology, [S. l.], v. 7, n. 2.26, p. 40–43, 2018. DOI: 10.14419/ijet.v7i2.26.12531. Disponível em: https://sciencepubco.com/index.php/ijet/article/view/12531.. Acesso em: 5 may. 2024.