[HTML][HTML] Analysis and challenges of robust E-exams performance under COVID-19

FRA Ahmed, TE Ahmed, RA Saeed, H Alhumyani… - Results in Physics, 2021 - Elsevier
Nowadays under COVID 2019, e-learning has become a potential prop approach of
technology in education that provides contemporary learners with authentic knowledge …

Formal analysis of e-cash protocols

J Dreier, A Kassem… - 2015 12th International …, 2015 - ieeexplore.ieee.org
Electronic cash (e-cash) aims at achieving client privacy at payment, similar to real cash.
Several security protocols have been proposed to ensure privacy in e-cash, as well as the …

A framework for analyzing verifiability in traditional and electronic exams

J Dreier, R Giustolisi, A Kassem, P Lafourcade… - … on Information Security …, 2015 - Springer
The main concern for institutions that organize exams is to detect when students cheat.
Actually more frauds are possible and even authorities can be dishonest. If institutions wish …

Shaken, not Stirred-Automated Discovery of Subtle Attacks on Protocols using Mix-Nets

J Dreier, P Lafourcade, D Mahmoud - Usenix Security Symposium, 2024 - uca.hal.science
Mix-Nets are used to provide anonymity by passing a list of inputs through a collection of mix
servers. Each server mixes the entries to create a new anonymized list, so that the …

[PDF][PDF] Intelligent electronic assessment for subjective exams

AD Alrehily, MA Siddiqui, SM Buhari - ACSIT, ICITE, SIPM, 2018 - researchgate.net
In education, the use of electronic (E) examination systems is not a novel idea, as E-
examination systems have been used to conduct objective assessments for the last few …

Secure internet exams despite coercion

M Rakeei, R Giustolisi, G Lenzini - International Workshop on Data Privacy …, 2022 - Springer
We study coercion-resistance for online exams. We propose two new properties,
Anonymous Submission and Single-Blindness which preserve the anonymity of the links …

Invalid certificates in modern browsers: A socio-technical analysis

R Giustolisi, G Bella, G Lenzini - Journal of Computer Security, 2018 - content.iospress.com
The authentication of a web server is a crucial procedure in the security of web browsing. It
relies on certificate validation, a process that may require the participation of the user. Thus …

A secure exam protocol without trusted parties

G Bella, R Giustolisi, G Lenzini, PYA Ryan - ICT Systems Security and …, 2015 - Springer
Relying on a trusted third party (TTP) in the design of a security protocol introduces obvious
risks. Although the risks can be mitigated by distributing the trust across several parties, it …

Monitoring electronic exams

A Kassem, Y Falcone, P Lafourcade - Runtime Verification: 6th …, 2015 - Springer
Universities and other educational organizations are adopting computer-based assessment
tools (herein called e-exams) to reach larger and ubiquitous audiences. While this makes …

Formal analysis and offline monitoring of electronic exams

A Kassem, Y Falcone, P Lafourcade - Formal Methods in System Design, 2017 - Springer
More and more universities are moving toward electronic exams (in short e-exams). This
migration exposes exams to additional threats, which may come from the use of the …