Etudiants: les examens sur tablettes numériques appellésappellés`appellésà se multiplier. Press release (2015) Available at goo.gl/ahxQJD ,
School cheating scandal shakes up atlanta, USA TODAY, p.40, 2013. ,
Student visa system fraud exposed in BBC investigation, 2014. ,
Quantified Event Automata: Towards Expressive and Efficient Runtime Monitors, FM 2012: Formal Methods -18th International Symposium, pp.68-84, 2012. ,
DOI : 10.1007/978-3-642-32759-9_9
URL : https://hal.archives-ouvertes.fr/hal-00857285
Automata Based Monitoring and Mining of Execution Traces, 2014. ,
MarQ: Monitoring at Runtime with QEA, Tools and Algorithms for the Construction and Analysis of Systems -21st International Conference, TACAS, pp.596-610, 2015. ,
DOI : 10.1007/978-3-662-46681-0_55
Monitoring Electronic Exams, 2015. ,
DOI : 10.1007/978-3-319-23820-3_8
URL : https://hal.archives-ouvertes.fr/hal-01248349
A Framework for Analyzing Verifiability in Traditional and Electronic Exams, 11th International Conference on Information Security Practice and Experience (ISPEC'15, 2015. ,
DOI : 10.1007/978-3-319-17533-1_35
URL : https://hal.archives-ouvertes.fr/hal-01218138
Mobile values, new names, and secure communication, POPL'01, pp.104-115, 2001. ,
URL : https://hal.archives-ouvertes.fr/hal-01423924
An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.82-96, 2001. ,
DOI : 10.1109/CSFW.2001.930138
Defining verifiability in e-auction protocols, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ASIA CCS '13, pp.547-552, 2013. ,
DOI : 10.1145/2484313.2484387
URL : https://hal.archives-ouvertes.fr/hal-01337416
Election Verifiability in Electronic Voting Protocols, ESORICS'10, pp.389-404, 2010. ,
DOI : 10.1007/978-3-642-15497-3_24
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus, 2008 21st IEEE Computer Security Foundations Symposium, pp.195-209, 2008. ,
DOI : 10.1109/CSF.2008.26
Formal Analysis of Electronic Exams, Proceedings of the 11th International Conference on Security and Cryptography, pp.101-112, 2014. ,
DOI : 10.5220/0005050901010112
URL : https://hal.archives-ouvertes.fr/hal-01337413
First International Competition on Software for Runtime Verification, pp.1-9 ,
DOI : 10.1007/978-3-319-11164-3_1
URL : https://hal.archives-ouvertes.fr/hal-01120552
Fast-Forward Runtime Monitoring ??? An Industrial Case Study, Third International Conference, RV 2012, pp.214-228, 2012. ,
DOI : 10.1007/978-3-642-35632-2_22
Scalable Offline Monitoring, pp.31-47 ,
DOI : 10.1007/978-3-319-11164-3_4
You Should Better Enforce Than Verify, Runtime Verification -First International Conference Proceedings. Volume 6418 of Lecture Notes in Computer Science, pp.89-105, 2010. ,
DOI : 10.1007/978-3-642-16612-9_9
URL : https://hal.archives-ouvertes.fr/hal-00523653