1.
T M, B D, P G, Kanna B N. Identifying the unauthorized user in e-government compliant system using valid proofs. IJET [Internet]. 2018 May 7 [cited 2024 May 6];7(2.26):40-3. Available from: https://sciencepubco.com/index.php/ijet/article/view/12531