Benaloh, J., Tuinstra, D.: Receipt-free secret-ballot elections (extended abstract). In: STOC 1994, pp. 544–553. ACM, New York (1994)
Blanchet, B.: A Computationally Sound Mechanized Prover for Security Protocols. In: Proc. of the IEEE Symposium on Security and Privacy, Oakland, pp. 140–154 (May 2006)
Blanchet, B.: An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In: CSFW, pp. 82–96. IEEE Computer Society, Cape Breton (2001)
Castellà-Roca, J., Herrera-Joancomartí, J., Dorca-Josa, A.: A Secure E-Exam Management System. In: ARES, pp. 864–871. IEEE Computer Society (2006)
Cohen, J., Fischer, M.: A robust and verifiable cryptographically secure election scheme (extended abstract). In: FOCS 1985, pp. 372–382. IEEE Computer Society (October 1985)
Culnane, C., Schneider, S.: A peered bulletin board for robust use in verifiable voting systems. In: CSF (2014)
Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Transactions on Information Theory 29(2), 198–208 (1983)
Dreier, J., Giustolisi, R., Kassem, A., Lafourcade, P., Lenzini, G.: On the verifiability of (electronic) exams. Tech. Rep. TR-2014-2, Verimag (April 2014)
Dreier, J., Giustolisi, R., Kassem, A., Lafourcade, P., Lenzini, G., Ryan, P.Y.A.: Formal analysis of electronic exams. In: SECRYPT 2014. SciTePress (2014)
Dreier, J., Jonker, H., Lafourcade, P.: Defining verifiability in e-auction protocols. In: ASIACCS 2013, pp. 547–552. ACM (2013)
Figaro, L.: Etudiants: les examens sur tablettes numériques appellés a se multiplier. Press release (January 2015), goo.gl/ahxQJD
Flock, E.: Aps (atlanta public schools) embroiled in cheating scandal. (November 2011), http://goo.gl/fqzBBR (retrieved)
Giustolisi, R., Lenzini, G., Bella, G.: What security for electronic exams? In: CRiSIS 2013, pp. 1–5. IEEE (2013)
Giustolisi, R., Lenzini, G., Ryan, P.Y.A.: Remark!: A secure protocol for remote exams. In: Christianson, B., Malcolm, J., Matyáš, V., Švenda, P., Stajano, F., Anderson, J. (eds.) Security Protocols 2014. LNCS, vol. 8809, pp. 38–48. Springer, Heidelberg (2014)
Guénard, F.: La Fabrique des Tricheurs: La fraude aux examens expliquée au ministre, aux parents et aux professeurs. Jean-Claude Gawsewitch (2012)
Guts, N., Fournet, C., Zappa Nardelli, F.: Reliable evidence: Auditability by typing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 168–183. Springer, Heidelberg (2009)
Haenni, R., Spycher, O.: Secure internet voting on limited devices with anonymized dsa public keys. In: EVT/WOTE 2011. USENIX (2011)
Hirt, M., Sako, K.: Efficient receipt-free voting based on homomorphic encryption. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 539–556. Springer, Heidelberg (2000)
Huszti, A., Pethõ, A.: A secure electronic exam system. Publicationes Mathematicae Debrecen 77, 299–312 (2010)
Kremer, S., Ryan, M., Smyth, B.: Election verifiability in electronic voting protocols. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 389–404. Springer, Heidelberg (2010)
Küsters, R., Truderung, T., Vogt, A.: Accountability: definition and relationship to verifiability. In: CCS 2010, pp. 526–535. ACM (2010)
Ryan, P.Y.A., Schneider, S.A., Goldsmith, M., Lowe, G., Roscoe, A.W.: The Modelling and Analysis of Security Protocols: The CSP Approach. Addison-Wesley Professional (2000)
Smyth, B., Ryan, M., Kremer, S., Kourjieh, M.: Towards automatic analysis of election verifiability properties. In: Armando, A., Lowe, G. (eds.) ARSPA-WITS 2010. LNCS, vol. 6186, pp. 146–163. Springer, Heidelberg (2010)