Maybe poor johnny really cannot encrypt: The case for a complexity theory for usable security
Psychology and neuroscience literature shows the existance of upper bounds on the human
capacity for executing cognitive tasks and for information processing. These bounds are …
capacity for executing cognitive tasks and for information processing. These bounds are …
[PDF][PDF] Election verifiability: cryptographic definitions and an analysis of Helios and JCJ
Definitions of election verifiability in the computational model of cryptography are proposed.
The definitions formalize notions of voters verifying their own votes, auditors verifying the …
The definitions formalize notions of voters verifying their own votes, auditors verifying the …
Secure internet exams despite coercion
We study coercion-resistance for online exams. We propose two new properties,
Anonymous Submission and Single-Blindness which preserve the anonymity of the links …
Anonymous Submission and Single-Blindness which preserve the anonymity of the links …
Monitoring electronic exams
Universities and other educational organizations are adopting computer-based assessment
tools (herein called e-exams) to reach larger and ubiquitous audiences. While this makes …
tools (herein called e-exams) to reach larger and ubiquitous audiences. While this makes …
[PDF][PDF] Subjects, lawmaking and land rights: Agrarian regime and state formation in late-colonial Netherlands East Indies
U Djalins - 2012 - ecommons.cornell.edu
In this dissertation I interrogate colonial state formation in the Netherlands East Indies
between 1870 and 1939, using the lens of land appropriation sanctioned by colonial laws …
between 1870 and 1939, using the lens of land appropriation sanctioned by colonial laws …
Election verifiability: cryptographic definitions and an analysis of helios, helios-c, and jcj
Election verifiability is defined in the computational model of cryptography. The definition
formalizes notions of voters verifying their own votes, auditors verifying the tally of votes, and …
formalizes notions of voters verifying their own votes, auditors verifying the tally of votes, and …
Formal analysis and offline monitoring of electronic exams
More and more universities are moving toward electronic exams (in short e-exams). This
migration exposes exams to additional threats, which may come from the use of the …
migration exposes exams to additional threats, which may come from the use of the …
Trustworthy exams without trusted parties
Historically, exam security has mainly focused on threats ascribed to candidate cheating.
Such threats have been normally mitigated by invigilation and anti-plagiarism methods …
Such threats have been normally mitigated by invigilation and anti-plagiarism methods …
[PDF][PDF] Can We Formally Catch Cheating in E-exams?
IV Sandoval, G Lenzini - ICISSP, 2022 - pdfs.semanticscholar.org
Cheating in exams is a practice as old as exams themselves. Institutions and examiners
have learned to mitigate traditional ways of cheating, such as the use of crib notes. Yet, the …
have learned to mitigate traditional ways of cheating, such as the use of crib notes. Yet, the …
[PDF][PDF] Web Expert System For Educational Applications: Developing Of Electronic Exam Platform During Covid-19 Pandemic
MJF Ali, OI Al-Sanjary, AA Budalal… - Int. J. Sci. Technol …, 2021 - academia.edu
Expert systems help to save time due to their high speed and accuracy in completing the
required tasks. In this study, an expert system that helps in the educational process has …
required tasks. In this study, an expert system that helps in the educational process has …