[HTML][HTML] Analysis and challenges of robust E-exams performance under COVID-19
Nowadays under COVID 2019, e-learning has become a potential prop approach of
technology in education that provides contemporary learners with authentic knowledge …
technology in education that provides contemporary learners with authentic knowledge …
Formal analysis of e-cash protocols
Electronic cash (e-cash) aims at achieving client privacy at payment, similar to real cash.
Several security protocols have been proposed to ensure privacy in e-cash, as well as the …
Several security protocols have been proposed to ensure privacy in e-cash, as well as the …
A framework for analyzing verifiability in traditional and electronic exams
The main concern for institutions that organize exams is to detect when students cheat.
Actually more frauds are possible and even authorities can be dishonest. If institutions wish …
Actually more frauds are possible and even authorities can be dishonest. If institutions wish …
Shaken, not Stirred-Automated Discovery of Subtle Attacks on Protocols using Mix-Nets
J Dreier, P Lafourcade, D Mahmoud - Usenix Security Symposium, 2024 - uca.hal.science
Mix-Nets are used to provide anonymity by passing a list of inputs through a collection of mix
servers. Each server mixes the entries to create a new anonymized list, so that the …
servers. Each server mixes the entries to create a new anonymized list, so that the …
[PDF][PDF] Intelligent electronic assessment for subjective exams
AD Alrehily, MA Siddiqui, SM Buhari - ACSIT, ICITE, SIPM, 2018 - researchgate.net
In education, the use of electronic (E) examination systems is not a novel idea, as E-
examination systems have been used to conduct objective assessments for the last few …
examination systems have been used to conduct objective assessments for the last few …
Secure internet exams despite coercion
We study coercion-resistance for online exams. We propose two new properties,
Anonymous Submission and Single-Blindness which preserve the anonymity of the links …
Anonymous Submission and Single-Blindness which preserve the anonymity of the links …
Invalid certificates in modern browsers: A socio-technical analysis
The authentication of a web server is a crucial procedure in the security of web browsing. It
relies on certificate validation, a process that may require the participation of the user. Thus …
relies on certificate validation, a process that may require the participation of the user. Thus …
A secure exam protocol without trusted parties
Relying on a trusted third party (TTP) in the design of a security protocol introduces obvious
risks. Although the risks can be mitigated by distributing the trust across several parties, it …
risks. Although the risks can be mitigated by distributing the trust across several parties, it …
Monitoring electronic exams
Universities and other educational organizations are adopting computer-based assessment
tools (herein called e-exams) to reach larger and ubiquitous audiences. While this makes …
tools (herein called e-exams) to reach larger and ubiquitous audiences. While this makes …
Formal analysis and offline monitoring of electronic exams
More and more universities are moving toward electronic exams (in short e-exams). This
migration exposes exams to additional threats, which may come from the use of the …
migration exposes exams to additional threats, which may come from the use of the …