REFERENCES
Abadi, M. and Fournet, C. (2001). Mobile values, new
names, and secure communication. In POPL. ACM.
Arapinis, M., Bursuc, S., and Ryan, M. (2013). Privacy-
supporting cloud computing by in-browser key trans-
lation. Journal of Computer Security, 21(6):847–880.
Backes, M., Hritcu, C., and Maffei, M. (2008a). Automated
verification of remote electronic voting protocols in
the applied pi-calculus. In CSF. IEEE.
Backes, M., Maffei, M., and Unruh, D. (2008b). Zero-
knowledge in the applied pi-calculus and automated
verification of the direct anonymous attestation proto-
col. In IEEE S & P’08.
Bella, G., Costantino, G., Coles-Kemp, L., and Ric-
cobene, S. (2011). Remote management of face-to-
face written authenticated though anonymous exams.
In CSEDU (2), pages 431–437. SciTePress.
Blanchet, B. (2001). An efficient cryptographic protocol
verifier based on prolog rules. In CSFW. IEEE.
Blanchet, B., Abadi, M., and Fournet, C. (2008). Auto-
mated verification of selected equivalences for secu-
rity protocols. J. Log. Algebr. Program., 75(1):3–51.
Castell`a-Roca, J., Herrera-Joancomart´ı, J., and Dorca-Josa,
A. (2006). A secure e-exam management system. In
ARES, pages 864–871. IEEE Computer Society.
Copeland, L. (2013). School cheat-
ing scandal shakes up atlanta.
http://www.usatoday.com/story/news/nation/2013/04/
13/atlanta-school-cheatring-race/2079327/.
Delaune, S., Kremer, S., and Ryan, M. (2006a). Verifying
properties of electronic voting protocols. In Proceed-
ings of WOTE’06.
Delaune, S., Kremer, S., and Ryan, M. (2009). Verifying
privacy-type properties of electronic voting protocols.
Journal of Computer Security, 17(4):435–487.
Delaune, S., Kremer, S., and Ryan, M. D. (2006b).
Coercion-resistance and receipt-freeness in electronic
voting. In CSFW’06. IEEE.
Dolev, D. and Yao, A. C. (1983). On the security of pub-
lic key protocols. Information Theory, IEEE Transac-
tions on, 29(2):198–208.
Dong, N., Jonker, H. L., and Pang, J. (2010). Analysis of a
receipt-free auction protocol in the applied pi calculus.
In FAST’10, volume 6561 of LNCS. Springer.
Dreier, J., Jonker, H., and Lafourcade, P. (2013a). Defin-
ing verifiability in e-auction protocols. In ASIACCS,
pages 547–552. ACM.
Dreier, J., Lafourcade, P., and Lakhnech, Y. (2011). Vote-
independence: A powerful privacy notion for voting
protocols. In FPS, volume 6888 of LNCS. Springer.
Dreier, J., Lafourcade, P., and Lakhnech, Y. (2012a). Defin-
ing privacy for weighted votes, single and multi-voter
coercion. In ESORICS, LNCS. Springer.
Dreier, J., Lafourcade, P., and Lakhnech, Y. (2012b). A
formal taxonomy of privacy in voting protocols. In
ICC, pages 6710–6715. IEEE.
Dreier, J., Lafourcade, P., and Lakhnech, Y. (2013b). For-
mal verification of e-auction protocols. In POST, vol-
ume 7796 of LNCS, pages 247–266. Springer.
Elgamal, T. (1985). A public key cryptosystem and a signa-
ture scheme based on discrete logarithms. Information
Theory, IEEE Transactions on, 31(4):469–472.
Furnell, S., Onions, P., Knahl, M., Sanders, P., Bleimann,
U., Gojny, U., and R¨oder, H. (1998). A security frame-
work for online distance learning and training. Inter-
net Research, 8(3):236–242.
Giustolisi, R., Lenzini, G., and Bella, G. (2013). What se-
curity for electronic exams? 8th Int. Conf. on Risk and
Security of Internet and Systems (CRiSIS).
Giustolisi, R., Lenzini, G., and Ryan, P. (2014). Remark!:
A secure protocol for remote exams. In Security
Protocols XXII, LNCS. Springer. to appear. Draft
http://apsia.uni.lu/stast/codes/exams/preSPW14.pdf.
Golle, P. and Jakobsson, M. (2003). Reusable anonymous
return channels. In Proc. of the 2003 ACM workshop
on Privacy in the electronic society, WPES ’03. ACM.
Haenni, R. and Spycher, O. (2011). Secure internet voting
on limited devices with anonymized dsa public keys.
In WOTE’11. USENIX.
Herrera-Joancomart´ı, J., Prieto-Bl´azquez, J., and Castell`a-
Roca, J. (2004). A secure electronic examination pro-
tocol using wireless networks. In ITCC. IEEE.
Hjeltnes, T. and Hansson, B. (2005). Cost Effectiveness and
Cost Efficiency in E-learning. QUIS - Quality, Inter-
operability and Standards in e-learning, Norway.
Huszti, A. and Peth˝o, A. (2010). A secure electronic
exam system. Publicationes Mathematicae Debrecen,
77:299–312.
Ryan, M. and Smyth, B. (2011). Applied pi calculus. In
Formal Models and Techniques for Analyzing Security
Protocols, chapter 6. IOS Press.
Ryan, P. Y. A. and Schneider, S. A. (2001). Process algebra
and non-interference. J. Comput. Secur., 9(1-2).
Ryan, P. Y. A., Schneider, S. A., Goldsmith, M., Lowe,
G., and Roscoe:, A. W. (2000). The Modelling and
Analysis of Security Protocols: The CSP Approach.
Addison-Wesley Professional, first edition.
Shamir, A. (1979). How to share a secret. Commun. ACM,
22(11):612–613.
Watson, R. (2014). Student visa system fraud exposed
in BBC investigation. http://www.bbc.com/news/uk-
26024375.
Weippl, E. (2005). Security in E-learning, volume 6 of Ad-
vances in Information Security. Springer Science +
Business Media.
SECRYPT2014-InternationalConferenceonSecurityandCryptography
112