M. Abadi and C. Fournet, Mobile values, new names, and secure communication, POPL'01, pp.104-115, 2001.
URL : https://hal.archives-ouvertes.fr/hal-01423924

J. Benaloh, Verifiable Secret-Ballot Elections, 1996.

J. Benaloh and D. Tuinstra, Receipt-free secret-ballot elections (extended abstract), Proceedings of the twenty-sixth annual ACM symposium on Theory of computing , STOC '94, pp.544-553, 1994.
DOI : 10.1145/195058.195407

B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.82-96, 2001.
DOI : 10.1109/CSFW.2001.930138

J. Castelì-a-roca, J. Herrera-joancomartí, and A. Dorca-josa, A secure e-exam management system, First International Conference on Availability, Reliability and Security (ARES'06), pp.864-871, 2006.
DOI : 10.1109/ARES.2006.14

J. Cohen and M. Fischer, A robust and verifiable cryptographically secure election scheme (extended abstract), FOCS'85, pp.372-382, 1985.

C. Culnane and S. Schneider, A Peered Bulletin Board for Robust Use in Verifiable Voting Systems, 2014 IEEE 27th Computer Security Foundations Symposium, pp.2014-2019
DOI : 10.1109/CSF.2014.20

D. Dolev and A. C. Yao, On the security of public key protocols. Information Theory, IEEE Transactions on, vol.29, issue.2 5, pp.198-208, 1983.

J. Dreier, R. Giustolisi, A. Kassem, P. Lafourcade, G. Lenzini et al., Formal Analysis of Electronic Exams, Proceedings of the 11th International Conference on Security and Cryptography, 2014.
DOI : 10.5220/0005050901010112

URL : https://hal.archives-ouvertes.fr/hal-01337413

J. Dreier, J. H. , and P. Lafourcade, Defining verifiability in e-auction protocols, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ASIA CCS '13, pp.547-552, 2013.
DOI : 10.1145/2484313.2484387

URL : https://hal.archives-ouvertes.fr/hal-01337416

E. Flock, Aps (atlanta public schools) embroiled in cheating scandal Re- trieved from http://www.washingtonpost.com/blogs/blogpost/post/ aps-atlanta-public-schools-embroiled-in-cheating-scandal, 2011.

U. J. Fourier, Premier examen sur tablettes numériques Press release, Februrary 2014

R. Giustolisi, G. Lenzini, and G. Bella, What security for electronic exams? In CRiSIS'13, pp.1-5

R. Giustolisi, G. Lenzini, and P. Ryan, Remark!: A Secure Protocol for Remote Exams, Security Protocols XXII, 2014.
DOI : 10.1007/978-3-319-12400-1_5

F. Guénard, La Fabrique des Tricheurs: La fraude aux examens expliquée au ministre, aux parents et aux professeurs, 2012.

N. Guts, C. Fournet, and F. Z. Nardelli, Reliable Evidence: Auditability by Typing, ES- ORICS'09, pp.168-183, 2009.
DOI : 10.1016/S0140-3664(02)00049-X

R. Haenni and O. Spycher, Secure internet voting on limited devices with anonymized dsa public keys, EVT/WOTE'11. USENIX, pp.2011-2016

M. Hirt and K. Sako, Efficient Receipt-Free Voting Based on Homomorphic Encryption, EURO- CRYPT'00, pp.539-556, 2000.
DOI : 10.1007/3-540-45539-6_38

A. Huszti and A. Pethõ, A secure electronic exam system, Publicationes Mathematicae Debrecen, vol.77, issue.2, pp.299-312, 2010.

S. Kremer, M. Ryan, and B. Smyth, Election Verifiability in Electronic Voting Protocols, ES- ORICS'10, pp.389-404, 2010.
DOI : 10.1007/978-3-642-15497-3_24

R. Küsters, T. Truderung, and A. Vogt, Accountability: definition and relationship to verifiability, CCS'10, pp.526-535, 2010.

P. Y. Ryan, S. A. Schneider, M. Goldsmith, G. Lowe, and A. W. Roscoe, The Modelling and Analysis of Security Protocols: The CSP Approach, 2000.

B. Smyth, M. Ryan, S. Kremer, and K. Mounira, Towards Automatic Analysis of Election Verifiability Properties, ARSPA-WITS'10, pp.146-163, 2010.
DOI : 10.1007/978-3-642-16074-5_11