T, Mekala, Devakar B, Govindhasamy P, and Nishkal Kanna B. “Identifying the Unauthorized User in E-Government Compliant System Using Valid Proofs”. International Journal of Engineering & Technology 7, no. 2.26 (May 7, 2018): 40–43. Accessed May 6, 2024. https://sciencepubco.com/index.php/ijet/article/view/12531.