{"id":309,"date":"2016-09-01T13:58:39","date_gmt":"2016-09-01T11:58:39","guid":{"rendered":"http:\/\/members.loria.fr\/VCortier\/?page_id=309"},"modified":"2026-01-18T19:25:04","modified_gmt":"2026-01-18T17:25:04","slug":"invited-talks","status":"publish","type":"page","link":"https:\/\/members.loria.fr\/VCortier\/invited-talks\/","title":{"rendered":"Invited talks"},"content":{"rendered":"<p><big><span style=\"font-weight: bold\">2026<br \/>\n<\/span><\/big><\/p>\n<ul>\n<li>Invited speaker at <a href=\"https:\/\/petrinets2026.informatik.uni-hamburg.de\/\">PetriNets 2026,<\/a> Hambourg, Germany, June 2026\n<\/li>\n<li>Invited tutorial at <a href=\"\">Movep 2026,<\/a> Nancy, France, June 2026\n<\/li>\n<li>Invited speaker at <a href=\"https:\/\/jfla.inria.fr\/jfla2026.html\">Journ\u00e9es Francophones des Langages Applicatifs 2026,<\/a> Vosges, France, January 2026\n<\/li>\n<\/ul>\n<p><big><span style=\"font-weight: bold\">2025<br \/>\n<\/span><\/big><\/p>\n<ul>\n<li>Conference at Grenoble university, <a href=\"https:\/\/culture.univ-grenoble-alpes.fr\/menu-principal\/lieux-culturels\/la-culture-dans-les-campus\/parlons-sciences-peut-on-avoir-confiance-dans-le-vote-electronique--1655478.kjsp?RH=1753367028997\">Parlons sciences<\/a>, Grenoble, November 25, 2025<\/li>\n<li><a href=\"https:\/\/www.lip6.fr\/colloquium\/\">Colloquium d\u2019Informatique de Sorbonne Universit\u00e9<\/a>, Paris, November 26, 2025<\/li>\n<li>Invited talk at <a href=\"https:\/\/gtmfs2025.sciencesconf.org\/\">GTMFS 2025<\/a>, Annual Meeting of the WG \u00ab\u00a0Formal Methods in Security\u00a0\u00bb, Auvergne, March 18, 2025<\/li>\n<li>Expos\u00e9 <a href=\"https:\/\/filles-et-maths.fr\/evenements\/journee-filles-maths-et-informatique-paris-campus-de-jussieu\/\">Journ\u00e9e Filles, Maths et Informatique<\/a>, Paris, April 4, 2025<\/li>\n<\/ul>\n<p><big><span style=\"font-weight: bold\">2024<br \/>\n<\/span><\/big><\/p>\n<ul>\n<li><a href=\"https:\/\/www.irif.fr\/seminaires\/irif\/index\">IRIF Distinguished Talk<\/a>, Paris, France, February 7th, 2024<\/li>\n<li>Invited Speaker for <a href=\"https:\/\/www.uni.lu\/snt-en\/events\/rescom-lecture-challenges-and-solutions-in-electronic-voting\/\">Lectures on Cybersecurity<\/a>, Luxembourg, March 4, 2024<\/li>\n<\/ul>\n<p><big><span style=\"font-weight: bold\">2023<br \/>\n<\/span><\/big><\/p>\n<ul>\n<li>Unifying speaker at <a href=\"https:\/\/etaps.org\/\">ETAPS 2023<\/a>, Paris, France, April 22-27, 2023<\/li>\n<li>Keynote speaker at <a href=\"https:\/\/abz2023.loria.fr\/\">ABZ 2023<\/a>, Nancy, France, May 30 &#8211; June 2, 2023<\/li>\n<li>Seminar at the <a href=\"https:\/\/summerschool-croatia.cs.ru.nl\/2023\/\">Summer School on real-world crypto and privacy 2023<\/a>, Vodice, Croatia, 5-9 June 2023<\/li>\n<li>Invited speaker at <a href=\"https:\/\/e-vote-id.org\/call-for-papers-2023\/\">EVoteID 2023<\/a>, Luxembourg City, Luxembourg, 3-6 October 2023 (<a href=\"https:\/\/members.loria.fr\/VCortier\/files\/EVoteID2023.pdf\">slides<\/a>)<\/li>\n<\/ul>\n<p><big><span style=\"font-weight: bold\">2022<br \/>\n<\/span><\/big><\/p>\n<ul>\n<li>Invited speaker at <a href=\"https:\/\/nordsec2022.ru.is\/\">NordSec 2022<\/a>, 27th Nordic Conference on Secure IT Systems, Reykjavik, Iceland, November 2022<\/li>\n<li>Keynote speaker at the <a href=\"https:\/\/cyber-in-nancy.loria.fr\/\">Summer School in Cybersecurity<\/a>, Nancy, France, July 2022<\/li>\n<li>Panel at the <a href=\"https:\/\/congres.societe-informatique-de-france.fr\/programme\/\">10 years SIF congress<\/a>, June 14-15th, Paris, 2022<\/li>\n<li>Seminar at the <a href=\"https:\/\/www.imtlucca.it\/\">IMT<\/a> (virtual), Lucca, Italy, March 2022.<\/li>\n<\/ul>\n<p><big><span style=\"font-weight: bold\">2021<br \/>\n<\/span><\/big><\/p>\n<ul>\n<li>Seminar at the <a \/>Formal Methods Laboratory (LMF)<\/a>, University of Paris Saclay, December 2021.<\/li>\n<li>Seminar at the <a href=\"https:\/\/wwwfr.uni.lu\/snt\">Interdisciplinary Centre for Security, Reliability and Trust (SnT) &#8211; University of Luxembourg<\/a>, November 2021.<\/li>\n<li>Invited talk at the <a href=\"https:\/\/www.newton.ac.uk\/event\/vsow03\">Isaac Newton Institute workshop on Verified software: from theory to practice<\/a> (virtual), May 2021.\n<\/li>\n<\/ul>\n<p><big><span style=\"font-weight: bold\">2020<br \/>\n<\/span><\/big><\/p>\n<ul>\n<li>Invited talk at the <a href=\"https:\/\/indocrypt2020.iiitb.ac.in\/\">21st International Conference on Cryptology in India (IndoCrypt 2020)<\/a>, Bangalore (virtual), India, December 2020.\n<\/li>\n<li>Invited talk at the <a href=\"https:\/\/visp.wien\/news\/contact-tracing-workshop\/\">Workshop on Security and Privacy in Contact Tracing<\/a>, virtually at the TU Wien (Austria), September 2020. Here is my <a href=\"https:\/\/members.loria.fr\/VCortier\/files\/tracing-Vienna.pdf\">presentation<\/a>.\n<\/li>\n<li>Plenary talk at the <a href=\"http:\/\/www.cs.upc.edu\/csl2020\/\">28th edition of Computer Science Logic  (CSL 2020)<\/a>, Barcelona, Spain, January 2020.\n<\/li>\n<\/ul>\n<p><big><span style=\"font-weight: bold\">2019<br \/>\n<\/span><\/big><\/p>\n<ul>\n<li>Keynote speaker at the <a href=\"https:\/\/www.andrew.cmu.edu\/user\/pmardzie\/plas2019\/\">ACM SIGSAC 14th Workshop on Programming Languages and Analysis for Security (PLAS 2019)<\/a>, London, UK, November 15th, 2019.\n<\/li>\n<li>Keynote speaker at the <a href=\"https:\/\/esorics2019.uni.lu\/\">24th European Symposium on Research in Computer Security (Esorics 2019)<\/a>, Luxembourg, September 2019.\n<\/li>\n<li>Lecturer at the <a href=\"http:\/\/vmcaischool19.tecnico.ulisboa.pt\/\">winter school<\/a> of the <a href=\"https:\/\/popl19.sigplan.org\/track\/VMCAI-2019\">VMCAI 2019 conference<\/a>, Cascais\/Lisbon, Portugal, January 2019. <a href=\"http:\/\/homepages.loria.fr\/VCortier\/School\/VMCAI-school2019\/\">Some material<\/a>.\n<\/li>\n<\/ul>\n<p><big><span style=\"font-weight: bold\">2018<br \/>\n<\/span><\/big><\/p>\n<ul>\n<li>Keynote speaker of the <a href=\"2018.discotec.org\/\">13th International Federated Conference on Distributed Computing Techniques (DisCoTec 2018)<\/a>, Madrid, Spain, June 2018.\n<\/li>\n<li> Invited speaker at the <a href=\"http:\/\/www.iecl.univ-lorraine.fr\/Cycle-Conferences-Sciences-et-Societe\/lanceur.php?action=accueil\">Science and Society conferences<\/a>, Nancy, May 15th, 2018.\n<\/li>\n<\/ul>\n<p><big><span style=\"font-weight: bold\">2017<br \/>\n<\/span><\/big><\/p>\n<ul>\n<li>Invited talk at <a href=\"http:\/\/fps2017.loria.fr\/\">10th International Symposium on Foundations &amp; Practice of Security (FPS 2017)<\/a>, Nancy, France, October 23rd, 2017.\n<\/li>\n<li>Invited tutorial at <a href=\"http:\/\/highlights-conference.org\/\">Highlights 2017<\/a>, London, UK, September 12th, 2017.<\/li>\n<li>Invited talk at <a href=\"http:\/\/ciaa17.univ-mlv.fr\/\">CIAA 2017<\/a> , Marne-la-Vall\u00e9e, France, June 2017.<\/li>\n<li>Invited talk at <a href=\"https:\/\/www.lsv.ens-cachan.fr\/registration\/lsv20years\/\">Workshop on the 20th Anniversary of LSV<\/a>, Cachan, France, May 11th 2017.<\/li>\n<li>Invited tutorial at <a href=\"http:\/\/www.etaps.org\/\">ETAPS 2017<\/a>, Uppsala, Sweden, April 22nd, 2017.<\/li>\n<li>Invited talk at <a href=\"https:\/\/www.cs.bris.ac.uk\/Research\/CryptographySecurity\/MTP\/\">Models and Tools for Security Analysis and Proofs Workshop<\/a>, affiliated with <a href=\"https:\/\/eurocrypt2017.di.ens.fr\/\">Eurocrypt 2017<\/a>, Paris, France, April 29th 2017.<\/li>\n<\/ul>\n<p><big><span style=\"font-weight: bold\">2016<br \/>\n<\/span><\/big><\/p>\n<ul>\n<li>Invited talk at <a href=\"https:\/\/www.liglab.fr\/evenements\/keynote-speeches\">LIG<\/a> (Keynote Speech), Grenoble, France, October 2016.<\/li>\n<li>Invited talk at the <a href=\"http:\/\/www.lirmm.fr\/\">LIRMM<\/a> Colloquium, Montpellier, France, September 2016.<\/li>\n<li>Invited talk at the <a href=\"http:\/\/www.jnmetz2012.fr\/\">regional days of the APMEP<\/a> (<a href=\"http:\/\/www.apmep.asso.fr\/\">Association des Professeurs de Math\u00e9matiques de l&rsquo;Enseignement Public<\/a>), Reims, France, April 2016.<\/li>\n<li>Invited talk at the <a href=\"http:\/\/www.societe-informatique-de-france.fr\/congres-2016\/\">2016 Colloquium of the French Society in Computer Science<\/a>, Strasbourg, France, January 2016.<\/li>\n<li>Invited talk at the <a href=\"https:\/\/lipn.univ-paris13.fr\/GDR-IM-2016\/\">2016 National days of the GdR-IM<\/a>, Villetaneuse, France, January 2016.<\/li>\n<li>Invited talk at <a href=\"https:\/\/paris.numa.co\/Evenements\/Cafe-techno-Inria-Alumni\">Caf\u00e9 techno Inria Alumni<\/a>, au NUMA, Paris, France, January 2016.<\/li>\n<\/ul>\n<p><big><span style=\"font-weight: bold\">2015<br \/>\n<\/span><\/big><\/p>\n<ul>\n<li>Lectures at <a href=\"https:\/\/asimod.in.tum.de\/\">Summer School Marktoberdorf 2015<\/a>, Marktoberdorf, Germany, August 2015.<\/li>\n<li>Invited talk for <a href=\"http:\/\/www.lsv.ens-cachan.fr\/Events\/DHC-2015\/\">Colloquium in honour of Martin Abadi<\/a>, Cachan, France, June 25th, 2015.<\/li>\n<li>Lectures at <a href=\"http:\/\/ejcp2015.inria.fr\/\">Summer School EJCP 2015<\/a>, Nancy, France, June 2015.<\/li>\n<li>Seminar at <a href=\"http:\/\/www.college-de-france.fr\">Coll\u00e8ge de France<\/a>, Paris, March 25th, 2015.<\/li>\n<\/ul>\n<p><big><span style=\"font-weight: bold\">2014<br \/>\n<\/span><\/big><\/p>\n<ul>\n<li>Invited speaker at <a href=\"http:\/\/www.cs.le.ac.uk\/events\/tgc2014\/\">TGC 2014 (Trustworthy Global Computing)<\/a>, Roma, September, 2014.<\/li>\n<li>Plenary speaker at <a href=\"http:\/\/vsl2014.at\/logic-in-computer-science\/\">FLOC 2014 (Federated Logic Conference)<\/a>, Vienna, July 20th, 2014.<\/li>\n<li>Invited speaker at <a href=\"http:\/\/www.math.u-bordeaux1.fr\/ED\/ecole_doctorale\/index.php?n=Formation.LeconsDeMath\">Lecture on today&rsquo;s Mathematics and Computer Science<\/a> (Lecon de Math\u00e9matiques et d&rsquo;Informatique d&rsquo;Aujourd&rsquo;hui), Bordeaux, France, June 5th, 2014.<\/li>\n<li>Lectures at the Fourth <a href=\"http:\/\/fm.csl.sri.com\/SSFT14\/\">Summer School on Formal Techniques<\/a>, Menlo College, Atherton, CA, May 2014.<\/li>\n<\/ul>\n<p><big><span style=\"font-weight: bold\">2013<br \/>\n<\/span><\/big><\/p>\n<ul>\n<li>Invited speaker at the <a href=\"http:\/\/www.iecn.u-nancy.fr\/Charlemagne.php\">Science and Society conferences<\/a>, Nancy, January 17th, 2013.<\/li>\n<\/ul>\n<p><big><span style=\"font-weight: bold\">2012<br \/>\n<\/span><\/big><\/p>\n<ul>\n<li>Lecture at the <a href=\"http:\/\/gpl2012.irisa.fr\/?q=node\/21\">EJCP Summer School<\/a>, Rennes, France, June 16-19th, 2012.<\/li>\n<li><a href=\"http:\/\/www-sop.inria.fr\/colloquium\/intervenant.php?nom=Cortier%20&amp;prenom=V%E9ronique\">Invited talk<\/a> at the Jacques Morgenstern Colloquium, Sophia-Antipolis, France, June 7th, 2012.<\/li>\n<li>Invited speaker at the <a href=\"http:\/\/www.jnmetz2012.fr\/\">national annual days of the APMEP<\/a> (<a href=\"http:\/\/www.apmep.asso.fr\/\">Association des Professeurs de Math\u00e9matiques de l&rsquo;Enseignement Public<\/a>), Metz, October 29th 2012.<big><\/big><br \/>\n<big><\/big><\/li>\n<\/ul>\n<p><big><span style=\"font-weight: bold\"> 2011<br \/>\n<\/span><\/big><\/p>\n<ul>\n<li><a href=\"http:\/\/www.college-de-france.fr\/default\/EN\/all\/cha_inf\/index.htm\">Seminar <\/a>at \u00ab\u00a0Coll\u00e8ge de France\u00a0\u00bb, Paris, May 18th, 2011.<\/li>\n<li>Invited speaker at <a href=\"http:\/\/www.avantssar.eu\/arspa-wits11\/\">TOSCA 2011<\/a>, Theory of Security and Applications, affiliated with <a href=\"http:\/\/www.etaps.org\/\">ETAPS 2011<\/a>, March 31st and April 1st, 2011.<\/li>\n<li>Invited lecture at <a href=\"http:\/\/www.stacs2011.de\/\">STACS 2011<\/a>, Symposium on Theoretical Aspects of Computer Science, Dortmund, Germany, March 12th, 2011.<\/li>\n<li>Invited talk at the Seminar \u00ab\u00a0<a href=\"http:\/\/www.irisa.fr\/celtique\/blazy\/seminar\/20110121.html\">Security and Formal Methods<\/a>, Rennes, January 21th, 2011.<big><\/big><br \/>\n<big><\/big><\/li>\n<\/ul>\n<p><big><span style=\"font-weight: bold\"> 2010<br \/>\n<\/span><\/big><\/p>\n<ul>\n<li>Lecture at <a href=\"http:\/\/www.sti.uniurb.it\/events\/fosad10\/\">FOSAD 2010<\/a>, International School on Foundations of Security Analysis and Design, Bertinoro, Italy. September 6-11, 2010.<\/li>\n<li>Tutorial at <a href=\"http:\/\/www.automata.rwth-aachen.de\/movep2010\">MOVEP 2010<\/a>, Summer school on modeling and verifying parallel processes, Aachen, Germany. June 28th &#8211; July 2nd, 2010.<\/li>\n<li>Invited talk at <a href=\"http:\/\/www.mais.informatik.tu-darmstadt.de\/verify2010\/\">VERIFY 2010<\/a>, 6th International Verification Workshop, Edinburgh, UK, July 20\u201321, 2010. (<a href=\"http:\/\/www.loria.fr\/%7Ecortier\/Verify2010.pdf\">slides<\/a>)<big><\/big><br \/>\n<big><\/big><\/li>\n<\/ul>\n<p><big><span style=\"font-weight: bold\"> 2009<br \/>\n<\/span><\/big><\/p>\n<ul>\n<li><span style=\"font-style: italic\">Verification of Security Protocols <span style=\"font-weight: bold\">(invited tutorial)<\/span><\/span>. <a href=\"http:\/\/cs.uni-muenster.de\/vmcai09\/\">Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI&rsquo;09)<\/a>, January 18-20, 2009, Savannah, GA, USA (co-located with POPL 2009).<\/li>\n<\/ul>\n<p><big><span style=\"font-weight: bold\">2008<\/span><\/big><\/p>\n<ul>\n<li><span style=\"font-style: italic\">Verifying security protocols<\/span>. <a href=\"http:\/\/www.lsv.ens-cachan.fr\/HubertMedaille\/\">Workshop in Honour of Hubert Comon-Lundh<\/a>, November 18\u201319, 2008.\u00a0Cachan, France.<cite><\/cite><\/li>\n<li><cite>Verification techniques for cryptographic protocols<\/cite>. <a href=\"http:\/\/www.risc.uni-linz.ac.at\/about\/conferences\/rta2008\/index.html\">International Conference on Rewriting Techniques and Applications (RTA&rsquo;08)<\/a>, July 15-17, 2008. Hagenberg, Austria.<\/li>\n<li><span style=\"font-style: italic\">On the use of formal models for proving cryptographic security notions.<\/span> <a href=\"http:\/\/www.lsv.ens-cachan.fr\/Seminaires\/index-en.php\">LSV Seminar<\/a>, Cachan, France, May 6th, 2008.<\/li>\n<li><span style=\"font-style: italic\">Building secure protocols<\/span>. <a href=\"http:\/\/www.csie.ntu.edu.tw\/%7Etfit08\/\">Fourth Taiwanese-French Conference on Information Technology (TFIT&rsquo;08)<\/a>,\u00a0Taipei, Taiwan, March 3-5, 2008.<\/li>\n<\/ul>\n<p><big><span style=\"font-weight: bold\">2007<\/span><\/big><\/p>\n<ul>\n<li><span style=\"font-style: italic\">V\u00e9rification formelle des protocoles cryptographiques : construction de protocoles et lien avec la cryptographie<\/span>. <a href=\"http:\/\/www.univ-paris12.fr\/lacl\/Labo\/seminaire.html\">LACL Seminar<\/a>, Cr\u00e9teil, France, 23 avril 2007.<cite><\/cite><\/li>\n<li><cite>On the use of formal models for proving cryptographic security notions<\/cite>. <a href=\"http:\/\/www.dsi.unive.it\/IFIPWG1_7\/wits2007.html\">7th International Workshop on Issues in the Theory of Security (WITS&rsquo;07)<\/a>, Braga, Portugal, 24 March 2007.<\/li>\n<li><cite>V\u00e9rification formelle des protocoles cryptographiques : lien avec la cryptanalyse<\/cite>.\u00a0<a href=\"http:\/\/www.liafa.jussieu.fr\/web9\/manifsem\/listmanifannee_fr.php?typecongres=4\">LIAFA Seminar<\/a>, Paris, France, 19 mars 2007.<\/li>\n<li><cite>V\u00e9rification des protocoles cryptographiques : techniques et lien avec la cryptanalyse<\/cite>. <a href=\"http:\/\/www.logique.jussieu.fr\/semcli\/\">CLI Seminar <\/a><a href=\"http:\/\/www.logique.jussieu.fr\/semcli\/\">\u00ab\u00a0Complexit\u00e9, Logique et Informatique\u00a0\u00bb<\/a>, Paris, France, 13 f\u00e9vrier 2007.<\/li>\n<\/ul>\n<p><big><span style=\"font-weight: bold\">2006<\/span><\/big><\/p>\n<ul>\n<li><cite>Verification of cryptographic protocols: techniques and link to cryptanalysis<\/cite>. <a href=\"http:\/\/avocs06.loria.fr\/\">Sixth International Workshop on Automated Verification of Critical Systems (Avocs 2006)<\/a>, Nancy, France, September 19th, 2006.<\/li>\n<li><cite>On the use of formal models for proving cryptographic security notions<\/cite>.\u00a0 <a href=\"http:\/\/www.ucc.ie\/info-mfcsit\/SpecSess-MFCSIT\/dipierro-et-al.html\">Special Session on Formal Approaches to Security<\/a>. Information-MFCSIT&rsquo;06 conference, Cork, Irland, August 2006.<\/li>\n<li><cite>When reachability-based secrecy implies equivalence-based secrecy in security protocols<\/cite>. <a href=\"http:\/\/www.artist-embedded.org\/FP6\/ARTIST2Events\/PastEvents\/Security-Pisa\/\">Artist 2 Workshop on Specification and Verification of Secure Embedded Systems<\/a>, Pisa, Italy, May 18th 2006.<\/li>\n<li>Intervention au <a href=\"http:\/\/www.salondulivreparis.com\/programme.php?id=11&amp;lieu=13&amp;idh=17\">Salon du livre, dans le cadre du Bar des Sciences<\/a>, Paris, March 17th 2006 on the following subject: <span style=\"font-style: italic\">O\u00f9 va la recherche en France? Des jeunes chercheurs t\u00e9moignent<\/span>.<\/li>\n<li><span style=\"font-style: italic\">Computationally Sound Security Proof using Formal Models<\/span>, <a href=\"http:\/\/www.math.univ-rennes1.fr\/crypto\/seminaire.html\">Cryptography Seminar<\/a>, Rennes, January 27th 2006.<\/li>\n<\/ul>\n<p><big><span style=\"font-weight: bold\">2005<\/span><\/big><\/p>\n<ul>\n<li><span style=\"font-style: italic\">Relations between abstract and probalistic models of cryptographic protocols<\/span>, <a href=\"http:\/\/protheo.loria.fr\/workshops\/saar05\/\">Nancy-Saarbr\u00fccken workshop<\/a> Nancy, France, October 14th, 2005.<\/li>\n<li><span style=\"font-style: italic\">V\u00e9rifier les protocoles cryptographiques<\/span>, <a href=\"http:\/\/www.irit.fr\/archive-une\/programme-29-09-05.pdf\">Journ\u00e9e S\u00e9curit\u00e9 Informatique <\/a>\u00e0 l&rsquo;IRIT, Toulouse, France, September 29th 2005.<\/li>\n<li><span style=\"font-style: italic\">Les protocoles cryptographiques : comment s\u00e9curiser nos communications ?<\/span>, <a href=\"http:\/\/www.dptinfo.ens-cachan.fr\/STIC\/Conferences05\/cortier.php\">s\u00e9minaire de rentr\u00e9e<\/a> du d\u00e9partement informatique de l&rsquo;ENS de Cachan, Cachan, France, September 15th, 2005.<\/li>\n<li><span style=\"font-style: italic\">Verification of cryptographic protocols: techniques, tools and link to cryptanalysis<\/span>, <a href=\"http:\/\/www.ambafrance-jp.org\/article.php3?id_article=841\">French-Japanese Symposium on Security<\/a> Tokyo, Japan, September 6th, 2005.<\/li>\n<li><span style=\"font-style: italic\">Computationally sound security proof using formal models<\/span>, seminar at the <a href=\"http:\/\/www.informatik.uni-kiel.de\">Institut, f\u00fcr Informatik und Praktische Mathematik<\/a>, Kiel, Germany, June 2005.<\/li>\n<li><span style=\"font-style: italic\">La cryptographie : comment s\u00e9curiser nos communications ?<\/span>, scientific popularization, \u00ab\u00a0<a href=\"http:\/\/www.dr12.cnrs.fr\/ag\/pub\/ComLesjeudisducnrs.htm\">Les Jeudis du CNRS<\/a>\u00ab\u00a0, Marseille, France, May 2005.<\/li>\n<li><span style=\"font-style: italic\">Verification of cryptographic protocols: relating computational and formal models<\/span>, course at the <a href=\"http:\/\/www.cmi.univ-mrs.fr\/%7Esecur05\/\">Spring Security School<\/a>, Marseille, France, April 2005. (<a href=\"http:\/\/www.cmi.univ-mrs.fr\/%7Esecur05\/cortierCIRM05.pdf\">slides<\/a>)<\/li>\n<li><span style=\"font-style: italic\">Computationally sound security proof using formal models<\/span>, seminar SIF, Nancy, France, March 2005.<\/li>\n<\/ul>\n<p><big><span style=\"font-weight: bold\">2004<br \/>\n<\/span><\/big><\/p>\n<ul>\n<li><span style=\"font-style: italic\">Protocoles cryptographiques, comment assurer leur s\u00e9curit\u00e9 ?<\/span>, seminar MIM ENS Lyon, France, October 2004.<\/li>\n<li><span style=\"font-style: italic\">Protocoles cryptographiques, comment assurer leur s\u00e9curit\u00e9 ?<\/span>, seminar at the \u00c9cole Doctorale de Marseille, France, October 2004.<\/li>\n<li><span style=\"font-style: italic\">V\u00e9rification automatique des protocoles cryptographiques<\/span>, seminar SPACES, Nancy, France, January 2004.<\/li>\n<li><span style=\"font-style: italic\">V\u00e9rification automatique des protocoles cryptographiques<\/span>, <a href=\"http:\/\/rangiroa.essi.fr\/specif\/prix-these\/\">Specif Award<\/a>, Lille, France, January 2004.<\/li>\n<\/ul>\n<p><big><span style=\"font-weight: bold\">2003<br \/>\n<\/span><\/big><\/p>\n<ul>\n<li><a href=\"https:\/\/members.loria.fr\/VCortier\/Papers\/rr-lsv-2003-2.rr.ps\"><span style=\"font-style: italic\">New decidability results for fragments of first-order logic<\/span><\/a>, seminar of the Computer Science Department of the University of California at Santa Cruz (USA), November 2003.<\/li>\n<\/ul>\n<p><big><span style=\"font-weight: bold\">2002<\/span><\/big><\/p>\n<ul>\n<li><span style=\"font-style: italic\">V\u00e9rification des protocoles cryptographiques<\/span>, seminar Irisa, Rennes, France, October 2002.<\/li>\n<li><span style=\"font-style: italic\">V\u00e9rification des protocoles cryptographiques<\/span>, seminar SIF, Nancy, France, October 2002.<\/li>\n<li><a href=\"https:\/\/members.loria.fr\/VCortier\/Papers\/ComonCortierESOP03.ps\"><span style=\"font-style: italic\">Security properties: two agents are sufficient<\/span><\/a>, Journ\u00e9e SLOVO, Orl\u00e9ans, France, September 2002.<\/li>\n<\/ul>\n<p><big><span style=\"font-weight: bold\">2001<\/span><\/big><\/p>\n<ul>\n<li><a href=\"https:\/\/members.loria.fr\/VCortier\/Papers\/CMR-csfw2001.ps\"><span style=\"font-style: italic\">Proving secrecy is easy enough<\/span><\/a>, seminar at Verimag, Grenoble, France, October 2001.<\/li>\n<li><a href=\"https:\/\/members.loria.fr\/VCortier\/Papers\/CMR-csfw2001.ps\"><span style=\"font-style: italic\">Proving secrecy is easy enough<\/span><\/a>, seminar of SRI International Computer Science Laboratory (California, USA) May 2001.<\/li>\n<\/ul>\n<p><big><span style=\"font-weight: bold\">2000<\/span><\/big><\/p>\n<ul>\n<li><a href=\"https:\/\/members.loria.fr\/VCortier\/Papers\/CCM-icalp2001.ps\"><span style=\"font-style: italic\">Tree automata with one memory, set constraints and ping-pong protocols<\/span><\/a>, seminar of SRI International Computer Science Laboratory (California, USA) November 2000.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>2026\n<\/p>\n<ul>\n<li>Invited speaker at <a href=\"https:\/\/petrinets2026.informatik.uni-hamburg.de\/\">PetriNets 2026,<\/a> Hambourg, Germany, June 2026\n<\/li>\n<li>Invited tutorial at <a href=\"\">Movep 2026,<\/a> Nancy, France, June 2026\n<\/li>\n<li>Invited speaker at <a href=\"https:\/\/jfla.inria.fr\/jfla2026.html\">Journ\u00e9es Francophones des Langages Applicatifs 2026,<\/a> Vosges, France, January 2026\n<\/li>\n<\/ul>\n<p>2025\n<\/p>\n<ul>\n<li>Conference at Grenoble university, <a href=\"https:\/\/culture.univ-grenoble-alpes.fr\/menu-principal\/lieux-culturels\/la-culture-dans-les-campus\/parlons-sciences-peut-on-avoir-confiance-dans-le-vote-electronique--1655478.kjsp?RH=1753367028997\">Parlons sciences<\/a>, Grenoble, November 25, 2025<\/li>\n<li><a href=\"https:\/\/www.lip6.fr\/colloquium\/\">Colloquium d\u2019Informatique de Sorbonne Universit\u00e9<\/a>, Paris, November 26, 2025<\/li>\n<li>Invited talk at <a href=\"https:\/\/gtmfs2025.sciencesconf.org\/\">GTMFS 2025<\/a>, Annual Meeting of the WG \u00ab\u00a0Formal Methods in Security\u00a0\u00bb,<\/li>\n<\/ul>\n","protected":false},"author":92,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-309","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/members.loria.fr\/VCortier\/wp-json\/wp\/v2\/pages\/309","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/members.loria.fr\/VCortier\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/members.loria.fr\/VCortier\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/members.loria.fr\/VCortier\/wp-json\/wp\/v2\/users\/92"}],"replies":[{"embeddable":true,"href":"https:\/\/members.loria.fr\/VCortier\/wp-json\/wp\/v2\/comments?post=309"}],"version-history":[{"count":62,"href":"https:\/\/members.loria.fr\/VCortier\/wp-json\/wp\/v2\/pages\/309\/revisions"}],"predecessor-version":[{"id":641,"href":"https:\/\/members.loria.fr\/VCortier\/wp-json\/wp\/v2\/pages\/309\/revisions\/641"}],"wp:attachment":[{"href":"https:\/\/members.loria.fr\/VCortier\/wp-json\/wp\/v2\/media?parent=309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}