{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:11:13Z","timestamp":1742911873412,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319123998"},{"type":"electronic","value":"9783319124001"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12400-1_5","type":"book-chapter","created":{"date-parts":[[2014,10,28]],"date-time":"2014-10-28T15:15:00Z","timestamp":1414509300000},"page":"38-48","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Remark!: A Secure Protocol for Remote Exams"],"prefix":"10.1007","author":[{"given":"Rosario","family":"Giustolisi","sequence":"first","affiliation":[]},{"given":"Gabriele","family":"Lenzini","sequence":"additional","affiliation":[]},{"given":"Peter Y. A.","family":"Ryan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,29]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","first-page":"299","DOI":"10.5486\/PMD.2010.4682","volume":"77","author":"A Huszti","year":"2010","unstructured":"Huszti, A., Peth\u00f5, A.: A secure electronic exam system. Publicationes Mathematicae Debrecen 77, 299\u2013312 (2010)","journal-title":"Publicationes Mathematicae Debrecen"},{"key":"5_CR2","unstructured":"How to Cheat on Test Using School Supplies. http:\/\/www.wikihow.com\/Cheat-on-a-Test-Using-School-Supplies"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Culnane, C., Schneider, S.: A peered bulletin board for robust use in verifiable voting systems. CoRR, abs\/1401.4151 (2014)","DOI":"10.1109\/CSF.2014.20"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Dreier, J., Giustolisi, R., Kassem, A., Lafourcade, P., Lenzini, G., Ryan, P.Y.A.: Formal analysis of electronic exams (work under review) (2014)","DOI":"10.5220\/0005050901010112"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Bella, G., Giustolisi, R., Lenzini, G.: What security for electronic exams? In: 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), pp. 1\u20135 (2013)","DOI":"10.1109\/CRiSIS.2013.6766348"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Bella, G., Giustolisi R., Lenzini, G.: Secure exams despite malicious management. In: Proceedings of 12th Conference on Privacy, Security and Trust (PST) (to appear, 2014)","DOI":"10.1109\/PST.2014.6890949"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Castella-Roca, J., Herrera-Joancomarti, J., Dorca-Josa, A.: A secure e-exam management system. In: Proceedings of the First International Conference on Availability, Reliability and Security, ARES \u201906, pp. 864\u2013871. IEEE Computer Society, Washington, DC (2006)","DOI":"10.1109\/ARES.2006.14"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/978-3-642-41717-7_8","volume-title":"Security Protocols XXI","author":"J Benaloh","year":"2013","unstructured":"Benaloh, J., Ryan, P.Y.A., Teague, V.: Verifiable postal voting. In: Christianson, B., Malcolm, J., Stajano, F., Anderson, J., Bonneau, J. (eds.) Security Protocols 2013. LNCS, vol. 8263, pp. 54\u201365. Springer, Heidelberg (2013)"},{"key":"5_CR9","unstructured":"Copeland, L.: School cheating scandal shakes up atlanta, April 2013. http:\/\/www.usatoday.com\/story\/news\/nation\/2013\/04\/13\/atlanta-school-cheatring-race\/2079327\/"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Pieczul, O., Foley, S.N.: Collaborating as normal: detecting systemic anomalies in your partner. In: Proceedings of 22nd International Security Protocols Workshop, Cambridge (to appear, 2014)","DOI":"10.1007\/978-3-319-12400-1_3"},{"key":"5_CR11","unstructured":"ProctorU. http:\/\/www.proctoru.com\/"},{"key":"5_CR12","unstructured":"Watson, R.: Student visa system fraud exposed in BBC investigation, February 2014. http:\/\/www.bbc.com\/news\/uk-26024375"},{"key":"5_CR13","unstructured":"Haenni, R., Spycher, O.: Secure internet voting on limited devices with anonymized DSA public keys. In: Proceedings of the 2011 Conference on Electronic Voting Technology\/Workshop on Trustworthy Elections, EVT\/WOTE\u201911. USENIX Association (2011)"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Murdoch, S., Anderson, R.: Security protocols and evidence: where many payment systems fail. In: Financial Cryptography (to appear, 2014)","DOI":"10.1007\/978-3-662-45472-5_2"},{"key":"5_CR15","unstructured":"U.S. Navy discloses nuclear exam cheating. http:\/\/edition.cnn.com\/2014\/02\/04\/us\/navy-cheating-investigation\/"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12400-1_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T14:48:58Z","timestamp":1676904538000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12400-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319123998","9783319124001"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12400-1_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"29 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}