T, Mekala, Devakar B, Govindhasamy P, and Nishkal Kanna B. “Identifying the Unauthorized User in E-Government Compliant System Using Valid Proofs”. International Journal of Engineering & Technology 7, no. 2.26 (May 7, 2018): 40–43. Accessed May 7, 2024. https://www.sciencepubco.com/index.php/ijet/article/view/12531.