Jannik Dreier
Orcid: 0000-0002-1026-3360
According to our database1,
Jannik Dreier
authored at least 41 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Shaken, not Stirred - Automated Discovery of Subtle Attacks on Protocols using Mix-Nets.
Proceedings of the 33rd USENIX Security Symposium, 2024
2022
Automatic generation of sources lemmas in Tamarin: Towards automatic proofs of security protocols.
J. Comput. Secur., 2022
IEEE Secur. Priv., 2022
Themis: An On-Site Voting System with Systematic Cast-as-intended Verification and Partial Accountability.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
J. Comput. Secur., 2020
Automatic Generation of Sources Lemmas in Tamarin: Towards Automatic Proofs of Security Protocols.
Proceedings of the Computer Security - ESORICS 2020, 2020
2019
ERCIM News, 2019
Comput. Secur., 2019
2018
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2018
Proceedings of the 12th International Conference on Research Challenges in Information Science, 2018
Proceedings of the 9th International Conference on Fun with Algorithms, 2018
Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols.
Proceedings of the Principles of Security and Trust - 6th International Conference, 2017
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017
A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and Its Application to Fair Exchange.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
2016
On the existence and decidability of unique decompositions of processes in the applied π-calculus.
Theor. Comput. Sci., 2016
Proceedings of the 8th International Conference on Fun with Algorithms, 2016
2015
Proceedings of the Information Security Practice and Experience, 2015
Proceedings of the E-Business and Telecommunications - 12th International Joint Conference, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014
Proceedings of the Fun with Algorithms - 7th International Conference, 2014
2013
Proceedings of the Principles of Security and Trust - Second International Conference, 2013
Proceedings of the Foundations of Software Science and Computation Structures, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
2011
Practical Secure and Efficient Multiparty Linear Programming Based on Problem Transformation.
IACR Cryptol. ePrint Arch., 2011
Practical Privacy-Preserving Multiparty Linear Programming Based on Problem Transformation.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the Foundations and Practice of Security, 2011