{"id":610,"date":"2024-03-27T11:19:51","date_gmt":"2024-03-27T09:19:51","guid":{"rendered":"https:\/\/members.loria.fr\/VCortier\/?page_id=610"},"modified":"2025-07-12T17:33:46","modified_gmt":"2025-07-12T15:33:46","slug":"program-committes","status":"publish","type":"page","link":"https:\/\/members.loria.fr\/VCortier\/program-committes\/","title":{"rendered":"Program committees"},"content":{"rendered":"<ul>\n<li><a>CCS 2026<\/a>, <strong>Co-chair<\/strong> of the 31st ACM Conference on Computer and Communication Security, The Hague, Netherland, Nov 16-19, 2026.<\/li>\n<li><a href=\"https:\/\/www.sigsac.org\/ccs\/CCS2025\/\">CCS 2025<\/a>, <strong>Co-chair<\/strong> of the 30th ACM Conference on Computer and Communication Security, Taipei, Taiwan, Oct 13-17, 2025.<\/li>\n<li><a href=\"https:\/\/cic.iacr.org\/\">Communications in Cryptology 2024<\/a><\/li>\n<li><a href=\"https:\/\/www.e-vote-id2024.org\/\">E-VoteID 2024<\/a>, Tarragona, Spain, 2-4 October 2024. Track on Security, Usability, and Technical Issues.<\/li>\n<li><a href=\"https:\/\/csf2024.ieee-security.org\/index.html\">CSF 2024 Test-of-Time Awards Committee<\/a>, 37th Computer Security Foundations Symposium, July 2024, Enschede, The Netherlands.<\/li>\n<li><a href=\"https:\/\/www.ieee-security.org\/TC\/CSF2023\/\">CSF 2023<\/a>, 36th Computer Security Foundations Symposium, July 2023, Dubrovnik, Croatia.<\/li>\n<li><a href=\"https:\/\/www.e-vote-id.org\/\">E-VoteID 2023<\/a>, Luxembourg, 3-6 October 2023. Track on Security, Usability, and Technical Issues.<\/li>\n<li><a href=\"https:\/\/www.ieee-security.org\/TC\/SP2022\/\">S&amp;P 2022<\/a>, 43rd IEEE Symposium on Security and Privacy, San Francisco, US, 22-26 May, 2022.<\/li>\n<li><a href=\"https:\/\/www.ieee-security.org\/TC\/CSF2022\/\">CSF 2022<\/a>, 35th Computer Security Foundations Symposium, August 2022, Haifa, Israel.<\/li>\n<li><a href=\"https:\/\/www.e-vote-id.org\/\">E-VoteID 2022<\/a>, Schloss Hofen, Bregenz, Austria, 4-7 October 2022. Track on Security, Usability, and Technical Issues.<\/li>\n<li><a href=\"https:\/\/www.e-vote-id.org\/\">E-VoteID 2021<\/a>, Schloss Hofen, Bregenz, Austria, 5-8 October 2021. Track on Security, Usability, and Technical Issues.<\/li>\n<li><a href=\"https:\/\/eurocrypt.iacr.org\/2021\/\">Eurocrypt 2021<\/a>, 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 2-6, 2021, Zagreb, Croatia.<\/li>\n<li><a href=\"https:\/\/www.ieee-security.org\/TC\/CSF2021\/\">CSF 2021<\/a>, 34th Computer Security Foundations Symposium, June 2021, Dubrovnik, Croatia.<\/li>\n<li><a href=\"https:\/\/www.e-vote-id.org\/\">E-VoteID 2020<\/a>, Schloss Hofen, Bregenz, Austria, 6-9 October 2020. Track on Security, Usability, and Technical Issues.<\/li>\n<li><a href=\"https:\/\/www.sigsac.org\/ccs\/CCS2020\/index.html\">CCS 2020<\/a>, 25th ACM Conference on Computer and Communication Security, Orlando, USA, 2020.<\/li>\n<li><a href=\"https:\/\/www.ieee-security.org\/TC\/SP2020\/\">S&amp;P 2020<\/a>, 41st IEEE Symposium on Security and Privacy, San Francisco, US, 18-20 May, 2020.<\/li>\n<li><a href=\"https:\/\/concur2020.forsyte.at\/\">Concur 2020<\/a>, 31st International Conference on Concurrency Theory, Vienna, Austria, August 31-September 5, 2020.<\/li>\n<li><a href=\"http:\/\/fc20.ifca.ai\/voting\/\">Voting 2020<\/a>, Advances in Secure Electronic Voting Schemes 2020, in association with <a href=\"https:\/\/fc20.ifca.ai\/\">Financial Crypto 2020<\/a>, Kota Kinabalu, Sabah, Malaysia, 14 February, 2020.<\/li>\n<li><a href=\"https:\/\/web.stevens.edu\/csf2019\/index.html\">CSF 2019<\/a>, 32nd Computer Security Foundations Symposium, 25-28 June 2019, Hoboken NJ, USA.<\/li>\n<li><a href=\"https:\/\/www.ieee-security.org\/TC\/SP2019\/\">S&amp;P 2019<\/a>, 40th IEEE Symposium on Security and Privacy, San Francisco, US, 20-22 May, 2019.<\/li>\n<li><a href=\"https:\/\/www.e-vote-id.org\/\">E-VoteID 2019<\/a>, Schloss Hofen, Bregenz, Austria, 1-4 October 2019. <strong>Co-chair<\/strong> of the Track on Security, Usability, and Technical Issues.<\/li>\n<li><a href=\"https:\/\/conf.researchr.org\/track\/etaps-2019\/post-2019-papers\">POST 2019<\/a>, 8th Conference on Principles of Security and Trust, part of <a>ETAPS 2019<\/a>, 2019.<\/li>\n<li><a href=\"https:\/\/www.sigsac.org\/ccs\/CCS2018\/index.html\">CCS 2018<\/a>, 25th ACM Conference on Computer and Communication Security, 2018.<\/li>\n<li><a href=\"https:\/\/www.e-vote-id.org\/\">E-VoteID 2018<\/a>, Schloss Hofen, Bregenz, Austria, 2-5 October 2018. <strong>Co-chair<\/strong> of the Track on Security, Usability, and Technical Issues.<\/li>\n<li><a href=\"https:\/\/www.etaps.org\/index.php\/2018\/post\">POST 2018<\/a>, 7th Conference on Principles of Security and Trust, part of <a href=\"http:\/\/www.etaps.org\/2018\/\">ETAPS 2018<\/a>. 14-21 April 2018, Thessaloniki, Greece.<\/li>\n<li><a href=\"https:\/\/www.e-vote-id.org\/\">E-VoteID 2017<\/a>, Schloss Hofen, Bregenz, Austria, 24-27 October 2017.<\/li>\n<li><a href=\"http:\/\/www.sigsac.org\/ccs\/CCS2017\/\">CCS 2017<\/a>, 24th ACM Conference on Computer and Communication Security, Dallas, USA, 2017.<\/li>\n<li><a href=\"http:\/\/lics.rwth-aachen.de\/lics17\/\">LICS 2017<\/a>, 42th Annual IEEE Symposium on Logic in Computer Science, 20-23 June 2017, Reykjavik, Iceland.<\/li>\n<li><a href=\"http:\/\/www.sigapp.org\/sac\/sac2017\/\">SAC 2017<\/a> (Computer Security Track), 32nd ACM Symposium on Applied Computing (SEC@SAC17), 27-31 March 2017, Marrakech, Morocco.<\/li>\n<li><a href=\"https:\/\/infsec.uni-trier.de\/events\/hotspot2017\">HotSpot 2017<\/a>, 5th Workshop on Hot Issues in Security Principles and Trust. Affiliated with <a href=\"http:\/\/www.etaps.org\/2017\/\">ETAPS 2017<\/a>, April, 2017, Uppsala, Sweden.<\/li>\n<li><a href=\"http:\/\/www.sigsac.org\/ccs\/CCS2016\/\">CCS 2016<\/a>, 23rd ACM Conference on Computer and Communication Security, Vienna, Austria, 2016.<\/li>\n<li><a href=\"https:\/\/www.e-voting.cc\/en\/service\/conferences\/2016-2\/\">E-VoteID 2016<\/a>, Schloss Hofen, Bregenz, Austria, 18-21 October 2016.<\/li>\n<li><a href=\"http:\/\/www.concur2016.ulaval.ca\/\">Concur 2016<\/a>, 27th Conference on Concurrency Theory. 24-27 August, Quebec city, 2016.<\/li>\n<li><a href=\"http:\/\/mfcs.ki.agh.edu.pl\/\">MFCS 2016<\/a>, 41st International Symposium on Mathematical Foundations of Computer Science, August 22-26 2016, Krakow, Poland.<\/li>\n<li><a href=\"http:\/\/www.ieee-security.org\/TC\/EuroSP2016\/\">EuroS&amp;P 2016<\/a>, 1st IEEE European Symposium on Security and Privacy. Saarbruecken, Germany, March 21-24, 2016.<\/li>\n<li><a href=\"http:\/\/www.acm.org\/conferences\/sac\/sac2016\/\">SAC 2016<\/a> (Computer Security Track), 31st ACM Symposium on Applied Computing (SEC@SAC16), April 4-8 2016, Pisa, Italy.<\/li>\n<li><a href=\"https:\/\/members.loria.fr\/VCortier\/files\/HotSpot2016\/\">HotSpot 2016<\/a>, 4th Workshop on Hot Issues in Security Principles and Trust. Affiliated with <a href=\"http:\/\/www.etaps.org\/2016\/\">ETAPS 2016<\/a>, April, 2016, Eindhoven, The Netherlands. <span style=\"font-weight: bold\"> (chair)<br \/>\n<\/span><\/li>\n<li><a>Advances in Secure Electronic Voting Schemes<\/a>. Affiliated with <a href=\"http:\/\/fc16.ifca.ai\/\">FC 2016<\/a>, February, 2016, Barbados.<\/li>\n<li><a href=\"http:\/\/mafalda.fdi.ucm.es\/concur2015\/\">Concur 2015<\/a>, 26th Conference on Concurrency Theory. 1-4 September 2015, Madrid, Spain.<\/li>\n<li><a>LICS 2015<\/a>, 40th Annual IEEE Symposium on Logic in Computer Science, Kyoto, Japan, 6-10 July, 2015. Colocated with ICALP 2015.<\/li>\n<li><a href=\"http:\/\/www.etaps.org\/index.php\/2015\/post\">POST 2015<\/a>, 4th Conference on Principles of Security and Trust, part of <a href=\"http:\/\/www.etaps.org\/\">ETAPS 2015<\/a>. 11-19 April 2015, London, UK.<\/li>\n<li><a href=\"http:\/\/www.sigsac.org\/ccs\/CCS2014\/\">CCS 2014<\/a>, 21st ACM Conference on Computer and Communication Security, 2014, Scottsdale, Arizona, USA.<\/li>\n<li><a href=\"http:\/\/www.etaps.org\/2014\/fossacs14\">FoSSaCS 2014<\/a>, 17th International Conference on Foundations of Software Science and Computation Structures, part of <a href=\"http:\/\/www.etaps.org\/\">ETAPS 2014<\/a>. 5 &#8211; 13 April 2014, Grenoble, France.<\/li>\n<li><a href=\"http:\/\/icalp2014.itu.dk\/\">Icalp 2014<\/a>, Track B, 41st International Colloquium on Automata, Languages and Programming.<\/li>\n<li><a href=\"http:\/\/esorics2014.pwr.wroc.pl\/\">ESORICS 2014<\/a>, 19th European Symposium on Research in Computer Security, Wroclaw, Poland.<\/li>\n<li><a href=\"http:\/\/acns2014.epfl.ch\/\">ACNS 2014<\/a>, 12th International Conference on Applied Cryptography and Network Security.<\/li>\n<li><a>MOVEP 2014<\/a>, 11th School on MOdelling and VErifying parallel Processes, July 7-11 2014, Nantes, France.<\/li>\n<li><a> FCS-FCC 2014<\/a>, Joint Workshop on Foundations of Computer Security and Formal and Computational Cryptography, affiliated to <a href=\"http:\/\/csf2014.di.univr.it\/\">CSF 2014<\/a>, Vienna, Austria<\/li>\n<li><a href=\"http:\/\/fms-14.appspot.com\/\">FMS 2014<\/a>, 5th Workshop on Formal Methods for Security, affiliated to <a href=\"http:\/\/petrinets2014.cnam.fr\/\">PetriNets 2014<\/a>, June 23rd, Tunis, Tunisia. (<span style=\"font-weight: bold\">co-chair<\/span>)<\/li>\n<li><a href=\"http:\/\/www.sigsac.org\/ccs\/CCS2013\/\">CCS 2013<\/a>, 20th ACM Conference on Computer and Communication Security, Berlin, Germany. November 4-8, 2013.<\/li>\n<li><a href=\"http:\/\/csf2013.seas.harvard.edu\/\">CSF 2013<\/a>, 26th Computer Security Foundations Symposium, New Orleans, USA. Colocated with LICS and MFPS. (<span style=\"font-weight: bold\">co-chair<\/span>)<\/li>\n<li><a href=\"http:\/\/www2.informatik.hu-berlin.de\/lics\/lics13\/index.html\">LICS 2013<\/a>, 38th Annual IEEE Symposium on Logic in Computer Science, New Orleans, USA. Colocated with CSF and MFPS.<\/li>\n<li><a href=\"http:\/\/www.etaps.org\/2013\/post13\">POST 2013<\/a>, Second Conference on Principles of Security and Trust, part of <a href=\"http:\/\/www.etaps.org\/\">ETAPS 2013<\/a>, Rome, Italy.<\/li>\n<li><a href=\"http:\/\/csf2012.seas.harvard.edu\/\">CSF 2012<\/a>, 25th Computer Security Foundations Symposium, Chicago, USA. (<span style=\"font-weight: bold\">co-chair<\/span>)<\/li>\n<li><a href=\"http:\/\/www.sigsac.org\/ccs\/CCS2012\/\">CCS 2012<\/a>, 19th ACM Conference on Computer and Communication Security, Raleigh, NC, USA, October 16 &#8211; 18, 2012.<\/li>\n<li><a href=\"http:\/\/www.iit.cnr.it\/esorics2012\/\/\">ESORICS 2012<\/a>, 17th European Symposium on Research in Computer Security, Pisa, Italy.<\/li>\n<li><a href=\"http:\/\/web.cs.wpi.edu\/%7Eguttman\/post12\/\">POST 2012<\/a>, First Conference on Principles of Security and Trust, part of <a href=\"http:\/\/www.etaps.org\/\">ETAPS 2012<\/a>, Tallinn, Estonia.<\/li>\n<li><a href=\"http:\/\/www.cs.bris.ac.uk\/fcc12\/\">FCC 2012<\/a>, 8th Workshop on Formal and Computational Cryptography, Boston, USA June 2012<\/li>\n<li><a href=\"http:\/\/www.cedar-forest.org\/forest\/events\/scss2012\/\">SCSS 2012<\/a>, International Symposium on Symbolic Computation in Software Science, Gammarth, Tunisie, December 15-17, 2012.<\/li>\n<li><a href=\"http:\/\/www.lpar-18.info\/\">LPAR 2012<\/a>, 18th International Conference on Logic for Programming Artificial Intelligence and Reasoning, M\u00e9rida, Venezuela.<\/li>\n<li><a href=\"http:\/\/movep.lif.univ-mrs.fr\/\">MOVEP 2012<\/a>, 10th School on MOdelling and VErifying parallel Processes, Marseilles, France, from December 3rd to 7th, 2012.<\/li>\n<li><a href=\"http:\/\/www.cosic.esat.kuleuven.be\/esorics2011\/\">ESORICS 2011<\/a>, 16th European Symposium on Research in Computer Security,\u00a0September 12-14, 2011, Leuven, Belgium.<\/li>\n<li><a href=\"http:\/\/www.ut.ee\/%7Eunruh\/fcc2011\/\">FCC 2011<\/a>, 7th Workshop on Formal and Computational Cryptography, Paris, June 30, 2011<\/li>\n<li><a href=\"http:\/\/www.di.ens.fr\/%7Eblanchet\/fcs11\/\">FCS 2011<\/a>, Workshop on Foundations of Computer Security, June 2011, Toronto, Ontario, Canada.<\/li>\n<li><a href=\"www.math.tulane.edu\/%7Emfps\/MFPS27\">MFPS 2011<\/a>, 27th Conference on the Mathematical Foundations of Programming Semantics, 24-28 May 2011, Carnegie Mellon University, Pittsburgh, USA.<\/li>\n<li><a href=\"http:\/\/ifca.ai\/fc11\/\">FC 2011<\/a>, 15th International Conference on Financial Cryptography and Data Security, February 28\u2013March 4, 2011 Bay Gardens Beach Resort St. Lucia.<\/li>\n<li><a href=\"http:\/\/www.rdp2011.uns.ac.rs\/rta\/index.html\">RTA 2011<\/a>, 22nd International Conference on Rewriting Techniques and Applications, May 30 &#8211; June 1, 2011,\u00a0Novi Sad, Serbia. RTA 2011 will part of <a href=\"http:\/\/www.rdp2011.uns.ac.rs\/index.html\">RDP 2011<\/a> (Federated Conference on Rewriting, Deduction, and Programming).<\/li>\n<li><a href=\"http:\/\/www.imsc.res.in\/fsttcs\/\">FSTTCS 2010<\/a>, IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, December 15-18, 2009, Chenai, India<\/li>\n<li><a href=\"http:\/\/www.sigsac.org\/ccs\/CCS2010\/\">CCS 2010<\/a>, 17th ACM Conference on Computer and Communication Security, Chicago, Illinois, USA,\u00a0 October 4 &#8211; 8, 2010.<\/li>\n<li><a href=\"http:\/\/www.esorics2010.org\/\">ESORICS 2010<\/a>, 15th European Symposium on Research in Computer Security, Athens, Greece, 20-22 September 2010.<\/li>\n<li><a href=\"http:\/\/homepages.inf.ed.ac.uk\/bklin\/FLoC2010\/LICS.html\">LICS 2010<\/a>, 35th Annual IEEE Symposium on Logic in Computer Science, Edinburgh, Scotland, July 9-21th, 2010.<\/li>\n<li><a href=\"http:\/\/automata.rwth-aachen.de\/movep2010\/index.php\">MOVEP 2010<\/a>, 9th School on MOdelling and VErifying parallel Processes, Aachen, Germany, from June 28 to July 2, 2010.<\/li>\n<li><a href=\"http:\/\/software.imdea.org\/events\/plas2010\/index.html\">PLAS 2010<\/a>, 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, Toronto, Canada, June 10, 2010. Affiliated to <a href=\"http:\/\/cs.stanford.edu\/pldi10\/\">PLDI 2010<\/a>.<\/li>\n<li><a href=\"http:\/\/www.win.tue.nl\/%7Ekostas\/SecCo2010\/\">SECCO 2010<\/a>, Security in Concurrency, (<span style=\"font-weight: bold\">co-chair<\/span>)<\/li>\n<li><a href=\"http:\/\/webloria.loria.fr\/%7Ecortier\/FCS-PrivMod10\/\">FCS-PrivMod 2010<\/a>,\u00a0Workshop on Foundations of\u00a0Security and Privacy (<span style=\"font-weight: bold\">co-chair<\/span>), Edinburgh, UK, July 14-15th, 2010, affiliated to <a href=\"http:\/\/www.floc-conference.org\/\">FLOC 2010<\/a>.<\/li>\n<li><a href=\"http:\/\/www.wcc2010.com\/TCS2010\/index.html\">IFIP TCS 2010, track B<\/a>. 6th IFIP International Conference on Theoretical\u00a0Computer\u00a0Science,\u00a0Brisbane,\u00a0September 20-23, 2010. Part\u00a0of the <a href=\"http:\/\/www.wcc2010.org\/\">IFIP\u00a0World\u00a0Computer\u00a0Congress<\/a>.\n<div><\/div>\n<\/li>\n<li><a href=\"http:\/\/conferences.telecom-bretagne.eu\/esorics2009\/EN\/home.php\">ESORICS&rsquo;09<\/a>, 14th European Symposium on Research in Computer Security, Saint Malo, France, September 21-25, 2009.<\/li>\n<li><a href=\"http:\/\/asian09.xju.edu.cn\/\">ASIAN&rsquo;09<\/a>, 13th Annual Asian Computing Science Conference, Urumqi, China, October 8-10, 2009.<\/li>\n<li><a href=\"http:\/\/www.loria.fr\/%7Ecortier\/FCS09\/\">FCS 2009<\/a>, Workshop on Foundations of Computer Security, (<span style=\"font-weight: bold\">co-chair<\/span>) August 9-10th, 2009, Los Angeles, California, USA. The workshop is affiliated with <a href=\"http:\/\/www2.informatik.hu-berlin.de\/lics\/lics09\/\">LICS 2009<\/a>.<\/li>\n<li><a href=\"http:\/\/www.cs.stonybrook.edu\/csf09\/\">CSF 2009<\/a>, 22nd IEEE Computer Security Foundations Symposium, July 8-10, 2009, Port Jefferson, New York, USA.<\/li>\n<li><a href=\"http:\/\/sarssi.enseeiht.fr\/FR\/home.php\">SARSSI&rsquo;09<\/a>, Conf\u00e9rence sur la s\u00e9curit\u00e9 des architectures r\u00e9seaux et des syst\u00e8mes d&rsquo;information, Luchon, France, June 23-26th, 2009.<\/li>\n<li><a href=\"http:\/\/www.cs.york.ac.uk\/etaps09\/\">TACAS 2009<\/a>, 15th International Conference on Tools and Algorithms for the Construction<br \/>\nand Analysis of Systems, York, UK, March 22-29, 2009.\u00a0Affiliated with <a href=\"http:\/\/www.cs.york.ac.uk\/etaps09\/\">ETAPS 2009<\/a>.<\/li>\n<li><a href=\"http:\/\/profs.sci.univr.it\/%7Evigano\/arspa-wits09\/\">ARSPA-WITS&rsquo;09<\/a>, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, York, UK,<br \/>\nMarch 2009. Affiliated with <a href=\"http:\/\/www.cs.york.ac.uk\/etaps09\/\">ETAPS 2009<\/a>.<\/li>\n<li><a href=\"http:\/\/www.cylab.cmu.edu\/CSF2008\/\">CSF 2008, <\/a>21st IEEE Computer Security Foundations Symposium, Carnegie Mellon University, Pittsburgh, USA, June 23-25, 2008.<\/li>\n<li><a href=\"http:\/\/www.lsv.ens-cachan.fr\/SecCo08\/\">SecCo&rsquo;08<\/a>,6th International Workshop on Security Issues in Concurrency,\u00a0August 23, 2008,\u00a0Toronto, Canada. Affiliated to <a href=\"http:\/\/www.cse.yorku.ca\/concur08\/\">Concur 2008<\/a>.<\/li>\n<li><a href=\"http:\/\/profs.sci.univr.it\/%7Evigano\/fcs-arspa-wits08\/\">FCS-ARSPA-WITS&rsquo;08<\/a>, Joint Workshop on Foundations of Computer Security, Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security,\u00a0Carnegie Mellon University, Pittsburgh, USA, June 21-22, 2008. Affilliated to LICS 2008 and <a href=\"http:\/\/www.cylab.cmu.edu\/CSF2008\/\">CSF 2008<\/a>.<\/li>\n<li><a href=\"http:\/\/www.loria.fr\/%7Ecortier\/SecurityWorkshop\/\">3rd Franco-Japanese Computer Security Workshop<\/a>, Nancy, France, March 13-14, 2008.<\/li>\n<li><a href=\"http:\/\/www.fmis.informatik.tu-darmstadt.de\/fmse07\/\">FMSE 2007<\/a>, 5th ACM Workshop on Formal Methods in Security Engineering. The workshop is affiliated with <a href=\"http:\/\/www.acm.org\/sigs\/sigsac\/ccs\/CCS2007\/\">CCS 2007<\/a>, Alexandria, VA on October\/November 2007.<\/li>\n<li><a href=\"http:\/\/www.dsi.uniroma1.it\/%7Egorla\/SecCo07\/\">SecCo 2007<\/a>, 5th International Workshop on Security Issues in Concurrency. September 3rd, 2007, Lisboa, Portugal. Affiliated to <a href=\"http:\/\/concur07.di.fc.ul.pt\/\">CONCUR 2007<\/a>.<\/li>\n<li><a href=\"http:\/\/icalp07.ii.uni.wroc.pl\/\">ICALP 2007, Track C<\/a>, 34th International Colloquium on Automata, Languages and Programming, July 9-13, Wroclaw, Poland.<\/li>\n<li><a href=\"http:\/\/profs.sci.univr.it\/%7Evigano\/fcs-arspa07\/\">FCS-ARSPA&rsquo;07<\/a>, Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis, July 8-9, Wroclaw, Poland.<\/li>\n<li><a href=\"http:\/\/www-verimag.imag.fr\/%7Elakhnech\/FCC\/?view=cfp\">FCC 2007<\/a>, Workshop on Formal and Computational Cryptography, right before <a href=\"http:\/\/www.dsi.unive.it\/CSF20\/\">CSF 2007<\/a>, July, 4-5th 2007, Venice, Italy.<\/li>\n<li><a href=\"http:\/\/www.lsv.ens-cachan.fr\/rdp07\/secret.html\">SecReT 2007<\/a>, Security and Rewriting Techniques, June 19th, Paris, France.<\/li>\n<li><a href=\"http:\/\/avocs06.loria.fr\/\"> AVoCS 2006<\/a>, 6th International Workshop on Automated Verification of Critical Systems, September 18 and 19, 2006, Nancy, France.<\/li>\n<li><a href=\"http:\/\/www.lsv.ens-cachan.fr\/FCC2006\/\">FCC 2006<\/a>, Workshop on Formal and Computational Cryptography (<span style=\"font-weight: bold\">co-chair<\/span>), co-located with <a href=\"http:\/\/icalp06.dsi.unive.it\/index.html\">ICALP 2006<\/a>, July, 9th 2006, Venice, Italy.<\/li>\n<li><a href=\"http:\/\/www.dsi.unive.it\/CSFW19\/\">CSFW 2006<\/a>, 19th IEEE Computer Security Foundations Workshop, July 5-8, 2006, Venice, Italy .<\/li>\n<li><a href=\"http:\/\/www.secrypt.org\/\">SECRYPT 2006<\/a>, International Conf\u00e9rence on Security and Cryptography, August 7-10, Setubal, Portugal.<\/li>\n<li><a href=\"http:\/\/www.ini.dz\/conference\/EcoleP2006\/english\/index.htm\">EPSI 2006<\/a>, Spring school of Computer Science 2006, June 17, 18 and 19, 2006, Alger, Algeria.<\/li>\n<li><a href=\"http:\/\/www.loria.fr\/%7Ecortier\/workshop.html\">Workshop on the Link between Formal and Computational Models<\/a>, June 24-24, 2005, Paris, France.<\/li>\n<li><a href=\"http:\/\/www.mfcs.univ.gda.pl\">MFCS 2005<\/a>, Mathematical Foundations of Computer Science, August 29 &#8211; September 2nd, 2005, Gdansk, Pologne.<\/li>\n<li><a href=\"http:\/\/www.ti.informatik.uni-kiel.de\/%7Ekuesters\/FMSE05\/\">FMSE 2005<\/a>, 3rd ACM Workshop on Formal Methods in Security Engineering: From Specifications to Code. The workshop is affiliated with <a href=\"http:\/\/www.acm.org\/sigs\/sigsac\/ccs\/CCS2005\/\">CCS 2005<\/a>, Alexandria, VA on November 11th, 2005.<\/li>\n<li><a href=\"http:\/\/www.iit.cnr.it\/FAST2004\/\">FAST 2004, <\/a>Workshop affiliated to the 18th conference <a href=\"http:\/\/www.laas.fr\/wcc2004\/interface.html\">WCC 2004<\/a>, Toulouse, France, August 26-27, 2004.<\/li>\n<li><a href=\"http:\/\/floc02.diku.dk\/FCS\/\">Foundation Computer Security (FCS 2002)<\/a> Copenhagen, Denmark, July<br \/>\n25-26, 2002.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<ul>\n<li><a>CCS 2026<\/a>, Co-chair of the 31st ACM Conference on Computer and Communication Security, The Hague, Netherland, Nov 16-19, 2026.<\/li>\n<li><a href=\"https:\/\/www.sigsac.org\/ccs\/CCS2025\/\">CCS 2025<\/a>, Co-chair of the 30th ACM Conference on Computer and Communication Security, Taipei, Taiwan, Oct 13-17, 2025.<\/li>\n<li><a href=\"https:\/\/cic.iacr.org\/\">Communications in Cryptology 2024<\/a><\/li>\n<li><a href=\"https:\/\/www.e-vote-id2024.org\/\">E-VoteID 2024<\/a>, Tarragona, Spain, 2-4 October 2024. Track on Security, Usability, and Technical Issues.<\/li>\n<li><a href=\"https:\/\/csf2024.ieee-security.org\/index.html\">CSF 2024 Test-of-Time Awards Committee<\/a>, 37th Computer Security Foundations Symposium, July 2024, Enschede, The Netherlands.<\/li>\n<li><a href=\"https:\/\/www.ieee-security.org\/TC\/CSF2023\/\">CSF 2023<\/a>,<\/li>\n<\/ul>\n","protected":false},"author":92,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-610","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/members.loria.fr\/VCortier\/wp-json\/wp\/v2\/pages\/610","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/members.loria.fr\/VCortier\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/members.loria.fr\/VCortier\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/members.loria.fr\/VCortier\/wp-json\/wp\/v2\/users\/92"}],"replies":[{"embeddable":true,"href":"https:\/\/members.loria.fr\/VCortier\/wp-json\/wp\/v2\/comments?post=610"}],"version-history":[{"count":6,"href":"https:\/\/members.loria.fr\/VCortier\/wp-json\/wp\/v2\/pages\/610\/revisions"}],"predecessor-version":[{"id":625,"href":"https:\/\/members.loria.fr\/VCortier\/wp-json\/wp\/v2\/pages\/610\/revisions\/625"}],"wp:attachment":[{"href":"https:\/\/members.loria.fr\/VCortier\/wp-json\/wp\/v2\/media?parent=610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}