Author:
Bella Giampaolo,Giustolisi Rosario,Lenzini Gabriele,Ryan Peter Y. A.
Publisher
Springer International Publishing
Reference22 articles.
1. Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: POPL 2001. ACM (2001)
2. Arapinis, M., Bursuc, S., Ryan, M.: Privacy-supporting cloud computing by in-browser key translation. J. of Computer Security 21(6), 847–880 (2013)
3. Auernheimer, B., Tsai, M.: Biometric authentication for web-based course examinations. In: HICSS 2005, p. 294b. IEEE (2005)
4. Bella, G., Giustolisi, R., Lenzini, G.: Secure exams despite malicious management. In: PST 2014, pp. 274–281. IEEE (2014)
5. Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: CSFW 2001, pp. 82–96. IEEE (2001)
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Auditable Anonymous Electronic Examination;Cryptography;2024-05-01
2. Improving the online assessment in higher education with a trustworthy system based on authorship and authentication;APPLICATIONS OF MATHEMATICS IN ENGINEERING AND ECONOMICS (AMEE’22): Proceedings of the 48th International Conference “Applications of Mathematics in Engineering and Economics”;2023
3. Design of Automated Exam Proctoring for User Authentication Through Face Augmentation and Verification;2022 11th Electrical Power, Electronics, Communications, Controls and Informatics Seminar (EECCIS);2022-08-23
4. Can We Formally Catch Cheating in E-exams?;Proceedings of the 8th International Conference on Information Systems Security and Privacy;2022
5. Disguised Public Key for Anonymity and Enforced Confidentiality in Summative E-Examinations;Communications in Computer and Information Science;2018