Mobile values, new names, and secure communication, POPL, 2001. ,
URL : https://hal.archives-ouvertes.fr/hal-01423924
Privacy-supporting cloud computing by in-browser key translation, Journal of Computer Security, vol.21, issue.6, pp.847-880, 2013. ,
DOI : 10.3233/JCS-130489
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus, 2008 21st IEEE Computer Security Foundations Symposium, 2008. ,
DOI : 10.1109/CSF.2008.26
Zeroknowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol, IEEE S & P'08, 2008. ,
Remote management of face-toface written authenticated though anonymous exams, In CSEDU, issue.2, pp.431-437, 2011. ,
An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., 2001. ,
DOI : 10.1109/CSFW.2001.930138
Automated verification of selected equivalences for security protocols, ARES, pp.3-51, 2006. ,
DOI : 10.1016/j.jlap.2007.06.002
School cheating scandal shakes up atlanta, 2013. ,
Verifying properties of electronic voting protocols, Proceedings of WOTE'06, 2006. ,
Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2009. ,
DOI : 10.3233/JCS-2009-0340
On the security of public key protocols. Information Theory, IEEE Transactions on, vol.29, issue.2, pp.198-208, 1983. ,
Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus, FAST'10, 2010. ,
DOI : 10.1016/j.jlap.2007.06.002
Defining verifiability in e-auction protocols, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ASIA CCS '13, pp.547-552, 2013. ,
DOI : 10.1145/2484313.2484387
URL : https://hal.archives-ouvertes.fr/hal-01337416
Voteindependence: A powerful privacy notion for voting protocols, FPS, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-01338071
Defining Privacy for Weighted Votes, Single and Multi-voter Coercion, ESORICS, 2012. ,
DOI : 10.1007/978-3-642-33167-1_26
URL : https://hal.archives-ouvertes.fr/hal-01338037
A formal taxonomy of privacy in voting protocols, 2012 IEEE International Conference on Communications (ICC), pp.6710-6715, 2012. ,
DOI : 10.1109/ICC.2012.6364938
URL : https://hal.archives-ouvertes.fr/hal-01338064
Formal Verification of e-Auction Protocols, POST, pp.247-266, 2013. ,
DOI : 10.1007/978-3-642-36830-1_13
URL : https://hal.archives-ouvertes.fr/hal-01338031
A public key cryptosystem and a signature scheme based on discrete logarithms. Information Theory, IEEE Transactions on, vol.31, issue.4, pp.469-472, 1985. ,
A security framework for online distance learning and training, Internet Research, vol.8, issue.3, pp.236-242, 1998. ,
DOI : 10.1108/10662249810217821
What security for electronic exams? 8th Int, Conf. on Risk and Security of Internet and Systems (CRiSIS), 2013. ,
Remark!: A Secure Protocol for Remote Exams, Security Protocols XXII, 2014. ,
DOI : 10.1007/978-3-319-12400-1_5
Reusable anonymous return channels, Proceeding of the ACM workshop on Privacy in the electronic society , WPES '03, 2003. ,
DOI : 10.1145/1005140.1005155
Secure internet voting on limited devices with anonymized dsa public keys, WOTE'11. USENIX, 2011. ,
A secure electronic examination protocol using wireless networks, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004., 2004. ,
DOI : 10.1109/ITCC.2004.1286643
Cost Effectiveness and Cost Efficiency in E-learning. QUIS -Quality, Interoperability and Standards in e-learning, 2005. ,
A secure electronic exam system, Publicationes Mathematicae Debrecen, vol.77, pp.299-312, 2010. ,
Applied pi calculus, Formal Models and Techniques for Analyzing Security Protocols, 2011. ,
Process algebra and non-interference, J. Comput. Secur, vol.9, issue.12, 2001. ,
DOI : 10.3233/jcs-2001-91-204
URL : http://doi.org/10.3233/jcs-2001-91-204
The Modelling and Analysis of Security Protocols: The CSP Approach, 2000. ,
How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979. ,
DOI : 10.1145/359168.359176
Student visa system fraud exposed in BBC investigation, 2014. ,
Security in E-learning, volume 6 of Advances in Information Security, 2005. ,