1. Information technology ACT, 2000. https://www.meity.gov.in/writereaddata/files/act2000n_0.doc
2. Fccx briefing (2014). https://csrc.nist.gov/csrc/media/events/ispab-june-2014-meeting/documents/ispab_jun2014_fccx-briefing_glair.pdf
3. Adhikari, G.P.: National ID project of Nepal: future challenges. In: Proceedings of the 5th International Conference on Theory and Practice of Electronic Governance, ICEGOV 2011, pp. 379–380. Association for Computing Machinery, New York (2011). https://doi.org/10.1145/2072069.2072151
4. Agrawal, S., Banerjee, S., Sharma, S.: Privacy and security of Aadhaar: a computer science perspective. Econ. Polit. Wkly 52, 93–102 (2017)
5. Aiemworawutikul, W., Datla, M.V., Lee, J.C.S., Wen, T., Zhang, Y.: Vulnerability assessment in national identity services (2019)