Return to Article Details Identifying the unauthorized user in e-government compliant system using valid proofs Download Download PDF