Jannik Dreier
Jannik Dreier
LORIA, Université de Lorraine, TELECOM Nancy
Verified email at - Homepage
Cited by
Cited by
A formal analysis of 5G authentication
D Basin, J Dreier, L Hirschi, S Radomirovic, R Sasse, V Stettler
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
Automated symbolic proofs of observational equivalence
D Basin, J Dreier, R Sasse
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Practical privacy-preserving multiparty linear programming based on problem transformation
J Dreier, F Kerschbaum
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
Physical zero-knowledge proof for Makaro
X Bultel, J Dreier, JG Dumas, P Lafourcade, D Miyahara, T Mizuki, ...
Stabilization, Safety, and Security of Distributed Systems: 20th …, 2018
Beyond subterm-convergent equational theories in automated verification of stateful protocols
J Dreier, C Duménil, S Kremer, R Sasse
Principles of Security and Trust: 6th International Conference, POST 2017 …, 2017
Physical zero-knowledge proofs for Akari, Takuzu, Kakuro and KenKen
X Bultel, J Dreier, JG Dumas, P Lafourcade
arXiv preprint arXiv:1606.01045, 2016
Automated unbounded verification of stateful cryptographic protocols with exclusive OR
J Dreier, L Hirschi, S Radomirovic, R Sasse
2018 IEEE 31st Computer Security Foundations Symposium (CSF), 359-373, 2018
A formal taxonomy of privacy in voting protocols
J Dreier, P Lafourcade, Y Lakhnech
2012 IEEE International Conference on Communications (ICC), 6710-6715, 2012
Symbolically analyzing security protocols using tamarin
D Basin, C Cremers, J Dreier, R Sasse
ACM SIGLOG News 4 (4), 19-30, 2017
Formal verification of e-auction protocols
J Dreier, P Lafourcade, Y Lakhnech
International Conference on Principles of Security and Trust, 247-266, 2013
Defining verifiability in e-auction protocols
J Dreier, H Jonker, P Lafourcade
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
A framework for analyzing verifiability in traditional and electronic exams
J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini
International Conference on Information Security Practice and Experience …, 2015
Automatic generation of sources lemmas in Tamarin: Towards automatic proofs of security protocols 1
V Cortier, S Delaune, J Dreier, E Klein
Journal of Computer Security 30 (4), 573-598, 2022
Formal analysis of e-cash protocols
J Dreier, A Kassem, P Lafourcade
e-Business and Telecommunications (ICETE), 2015 12th International Joint …, 2015
Defining privacy for weighted votes, single and multi-voter coercion
J Dreier, P Lafourcade, Y Lakhnech
Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012
Vote-independence: A powerful privacy notion for voting protocols
J Dreier, P Lafourcade, Y Lakhnech
International Symposium on Foundations and Practice of Security, 164-180, 2011
Formal analysis of electronic exams
J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini, PYA Ryan
2014 11th International Conference on Security and Cryptography (SECRYPT), 1-12, 2014
Security analysis and psychological study of authentication methods with PIN codes
X Bultel, J Dreier, M Giraud, M Izaute, T Kheyrkhah, P Lafourcade, ...
2018 12th International Conference on Research Challenges in Information …, 2018
A novel approach for reasoning about liveness in cryptographic protocols and its application to fair exchange
M Backes, J Dreier, S Kremer, R Künnemann
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 76-91, 2017
Tamarin: verification of large-scale, real-world, cryptographic protocols
D Basin, C Cremers, J Dreier, R Sasse
IEEE Security & Privacy 20 (3), 24-32, 2022
The system can't perform the operation now. Try again later.
Articles 1–20