T, Mekala, et al. “Identifying the Unauthorized User in E-Government Compliant System Using Valid Proofs”. International Journal of Engineering & Technology, vol. 7, no. 2.26, May 2018, pp. 40-43, https://doi.org/10.14419/ijet.v7i2.26.12531.