T, M. (2018) “Identifying the unauthorized user in e-government compliant system using valid proofs”, International Journal of Engineering & Technology, 7(2.26), pp. 40–43. doi:10.14419/ijet.v7i2.26.12531.