L. Figaro, Etudiants: les examens sur tablettes numériques appellésappellés`appellésà se multiplier. Press release (2015) Available at goo.gl/ahxQJD

L. Copeland, School cheating scandal shakes up atlanta, USA TODAY, p.40, 2013.

R. Watson, Student visa system fraud exposed in BBC investigation, 2014.

H. Barringer, Y. Falcone, K. Havelund, G. Reger, and D. E. Rydeheard, Quantified Event Automata: Towards Expressive and Efficient Runtime Monitors, FM 2012: Formal Methods -18th International Symposium, pp.68-84, 2012.
DOI : 10.1007/978-3-642-32759-9_9

URL : https://hal.archives-ouvertes.fr/hal-00857285

G. Reger, Automata Based Monitoring and Mining of Execution Traces, 2014.

G. Reger, H. C. Cruz, and D. E. Rydeheard, MarQ: Monitoring at Runtime with QEA, Tools and Algorithms for the Construction and Analysis of Systems -21st International Conference, TACAS, pp.596-610, 2015.
DOI : 10.1007/978-3-662-46681-0_55

A. Kassem, Y. Falcone, and P. Lafourcade, Monitoring Electronic Exams, 2015.
DOI : 10.1007/978-3-319-23820-3_8

URL : https://hal.archives-ouvertes.fr/hal-01248349

J. Dreier, R. Giustolisi, A. Kassem, P. Lafourcade, and G. Lenzini, A Framework for Analyzing Verifiability in Traditional and Electronic Exams, 11th International Conference on Information Security Practice and Experience (ISPEC'15, 2015.
DOI : 10.1007/978-3-319-17533-1_35

URL : https://hal.archives-ouvertes.fr/hal-01218138

M. Abadi and C. Fournet, Mobile values, new names, and secure communication, POPL'01, pp.104-115, 2001.
URL : https://hal.archives-ouvertes.fr/hal-01423924

B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.82-96, 2001.
DOI : 10.1109/CSFW.2001.930138

J. Dreier, H. Jonker, and P. Lafourcade, Defining verifiability in e-auction protocols, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ASIA CCS '13, pp.547-552, 2013.
DOI : 10.1145/2484313.2484387

URL : https://hal.archives-ouvertes.fr/hal-01337416

S. Kremer, M. Ryan, and B. Smyth, Election Verifiability in Electronic Voting Protocols, ESORICS'10, pp.389-404, 2010.
DOI : 10.1007/978-3-642-15497-3_24

M. Backes, C. Hritcu, and M. Maffei, Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus, 2008 21st IEEE Computer Security Foundations Symposium, pp.195-209, 2008.
DOI : 10.1109/CSF.2008.26

J. Dreier, R. Giustolisi, A. Kassem, P. Lafourcade, G. Lenzini et al., Formal Analysis of Electronic Exams, Proceedings of the 11th International Conference on Security and Cryptography, pp.101-112, 2014.
DOI : 10.5220/0005050901010112

URL : https://hal.archives-ouvertes.fr/hal-01337413

E. Bartocci, B. Bonakdarpour, and Y. Falcone, First International Competition on Software for Runtime Verification, pp.1-9
DOI : 10.1007/978-3-319-11164-3_1

URL : https://hal.archives-ouvertes.fr/hal-01120552

C. Colombo and G. J. Pace, Fast-Forward Runtime Monitoring ??? An Industrial Case Study, Third International Conference, RV 2012, pp.214-228, 2012.
DOI : 10.1007/978-3-642-35632-2_22

D. A. Basin, G. Caronni, S. Ereth, M. Harvan, F. Klaedtke et al., Scalable Offline Monitoring, pp.31-47
DOI : 10.1007/978-3-319-11164-3_4

Y. Falcone, H. Barringer, Y. Falcone, B. Finkbeiner, K. Havelund et al., You Should Better Enforce Than Verify, Runtime Verification -First International Conference Proceedings. Volume 6418 of Lecture Notes in Computer Science, pp.89-105, 2010.
DOI : 10.1007/978-3-642-16612-9_9

URL : https://hal.archives-ouvertes.fr/hal-00523653