[1]
M. T, D. B, G. P, and N. Kanna B, “Identifying the unauthorized user in e-government compliant system using valid proofs”, IJET, vol. 7, no. 2.26, pp. 40–43, May 2018, doi: 10.14419/ijet.v7i2.26.12531.