{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:51:46Z","timestamp":1725871906623},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319498058"},{"type":"electronic","value":"9783319498065"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49806-5_16","type":"book-chapter","created":{"date-parts":[[2016,11,23]],"date-time":"2016-11-23T12:34:29Z","timestamp":1479904469000},"page":"303-323","source":"Crossref","is-referenced-by-count":0,"title":["A Framework for Analyzing Associativity and Anonymity in Conventional and Electronic Summative Examinations"],"prefix":"10.1007","author":[{"given":"Kissan Gauns","family":"Dessai","sequence":"first","affiliation":[]},{"given":"Venkatesh","family":"Kamat","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,24]]},"reference":[{"issue":"3","key":"16_CR1","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1145\/373243.360213","volume":"36","author":"M Abadi","year":"2001","unstructured":"Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. ACM SIGPLAN Not. 36(3), 104\u2013115 (2001)","journal-title":"ACM SIGPLAN Not."},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Apampa, K.M., Wills, G., Argles, D.: An approach to presence verification in summative e-assessment security. In: 2010 International Conference on Information Society (i-Society), pp. 647\u2013651. IEEE (2010)","DOI":"10.1109\/i-Society16502.2010.6018836"},{"key":"16_CR3","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/978-3-319-18467-8_33","volume-title":"ICT Systems Security and Privacy Protection","author":"G Bella","year":"2015","unstructured":"Bella, G., Giustolisi, R., Lenzini, G., Ryan, P.Y.A.: A secure exam protocol without trusted parties. In: Federrath, H., Gollmann, D. (eds.) SEC 2015. IAICT, vol. 455, pp. 495\u2013509. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-18467-8_33"},{"issue":"3","key":"16_CR4","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1080\/19393555.2011.569907","volume":"20","author":"M Bhardwaj","year":"2011","unstructured":"Bhardwaj, M., Singh, A.J.: Automated integrated examination system: a security concern. Inf. Secur. J. Glob. Perspect. 20(3), 156\u2013162 (2011)","journal-title":"Inf. Secur. J. Glob. Perspect."},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: Schneider, S. (ed.) 14th IEEE Computer Security Foundations Workshop, pp. 82\u201396. IEEE Computer Society Press (2001)","DOI":"10.1109\/CSFW.2001.930138"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Blanchet, B., Abadi, M., Fournet, C.: Automated verification of selected equivalences for security protocols. In: 20th Annual IEEE Symposium on Logic in Computer Science (LICS 2005), pp. 331\u2013340 (2005)","DOI":"10.1109\/LICS.2005.8"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Castella-Roca, J., Herrera-Joancomarti, J., Dorca-Josa, A.: A secure e-exam management system. In: The First International Conference on Availability, Reliability and Security, ARES 2006. IEEE (2006)","DOI":"10.1109\/ARES.2006.14"},{"issue":"4","key":"16_CR8","doi-asserted-by":"crossref","first-page":"435","DOI":"10.3233\/JCS-2009-0340","volume":"17","author":"S Delaune","year":"2009","unstructured":"Delaune, S., Kremer, S., Ryan, M.: Verifying privacy-type properties of electronic voting protocols. J. Comput. Secur. 17(4), 435\u2013487 (2009)","journal-title":"J. Comput. Secur."},{"issue":"2","key":"16_CR9","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198\u2013208 (1983)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"16_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/978-3-319-17533-1_35","volume-title":"Information Security Practice and Experience","author":"J Dreier","year":"2015","unstructured":"Dreier, J., Giustolisi, R., Kassem, A., Lafourcade, P., Lenzini, G.: A framework for analyzing verifiability in traditional and electronic exams. In: Lopez, J., Wu, Y. (eds.) ISPEC 2015. LNCS, vol. 9065, pp. 514\u2013529. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-17533-1_35"},{"key":"16_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/978-3-642-36830-1_13","volume-title":"Principles of Security and Trust","author":"J Dreier","year":"2013","unstructured":"Dreier, J., Lafourcade, P., Lakhnech, Y.: Formal verification of e-auction protocols. In: Basin, D., Mitchell, J.C. (eds.) POST 2013. LNCS, vol. 7796, pp. 247\u2013266. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-36830-1_13"},{"key":"16_CR12","unstructured":"Eckstein, M.A.: Combating academic fraud: Towards a culture of integrity. International Institute for Educational Planning (2003)"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Giustolisi, R., Lenzini, G., Bella, G.: What security for electronic exams? In: International Conference on Risks and Security of Internet and Systems (CRiSIS), pp. 1\u20135. IEEE (2013)","DOI":"10.1109\/CRiSIS.2013.6766348"},{"key":"16_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/978-3-319-12400-1_5","volume-title":"Security Protocols XXII","author":"R Giustolisi","year":"2014","unstructured":"Giustolisi, R., Lenzini, G., Ryan, P.Y.A.: Remark!: a secure protocol for remote exams. In: Christianson, B., Malcolm, J., Maty\u00e1\u0161, V., \u0160venda, P., Stajano, F., Anderson, J. (eds.) Security Protocols 2014. LNCS, vol. 8809, pp. 38\u201348. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-12400-1_5"},{"key":"16_CR15","unstructured":"Good, C.V., et al.: Dictionary of education (1945)"},{"issue":"3\u20134","key":"16_CR16","doi-asserted-by":"crossref","first-page":"299","DOI":"10.5486\/PMD.2010.4682","volume":"77","author":"A Huszti","year":"2010","unstructured":"Huszti, A., Petho, A.: A secure electronic exam system. Publicationes Mathematicae Debrecen 77(3\u20134), 299\u2013312 (2010)","journal-title":"Publicationes Mathematicae Debrecen"},{"key":"16_CR17","unstructured":"Kungpisdan, S.: Modelling, design, and analysis of secure mobile payment systems. Ph.D. thesis, Monash University (2005)"},{"key":"16_CR18","unstructured":"Maheshwari, V.: Malpractices in examinations-the termites destroying the educational set up (2011)"},{"key":"16_CR19","unstructured":"Morgan, C., O\u2019reilly, M.: Assessing Open and Distance Learners. Psychology Press, Cambridge (1999)"},{"issue":"3","key":"16_CR20","first-page":"9","volume":"3","author":"D Varble","year":"2014","unstructured":"Varble, D.: Reducing cheating opportunities in online test. Atlantic Mark. J. 3(3), 9 (2014)","journal-title":"Atlantic Mark. J."}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49806-5_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T01:09:59Z","timestamp":1692580199000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49806-5_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319498058","9783319498065"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49806-5_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}