EN FR
EN FR


Section: Dissemination

Teaching - Supervision - Juries

Teaching

  • Licence:

    V. Cheval, Introduction to Theoretical Computer Science (Logic, Languages, Automata), 38 hours (ETD), TELECOM Nancy

    J. Dreier, Introduction to Theoretical Computer Science (Logic, Languages, Automata), 38 hours (ETD), TELECOM Nancy

    J. Dreier, Awareness for Cybersecurity, 7.5 hours (ETD), TELECOM Nancy

    L. Hirschi, Introduction to Theoretical Computer Science (Logic, Languages, Automata), 38 hours (ETD), TELECOM Nancy

  • Master:

    V. Cortier, Security of flows, 16 hours, M2 Computer Science, TELECOM Nancy and Mines Nancy

    V. Cortier, Security of flows, 8 hours, M2 Computer Science, TELECOM Nancy and Mines Nancy

    J. Dreier, Introduction to Cryptography, 42 hours, M1 Computer Science, TELECOM Nancy

    A. Imine, Security for XML Documents, 12 hours (ETD), M1, Univ Lorraine

    S. Kremer, Security Theory, 24 hours (ETD), M2 Computer science, Univ Lorraine

    C. Ringeissen, Decision Procedures for Software Verification, 24 hours (ETD), M2 Computer science, Univ Lorraine

    L. Vigneron, Security of information systems, 32 hours (ETD), M2 Computer science, Univ Lorraine

    L. Vigneron, Advanced Security, 28 hours (ETD), Polytech Nancy – Information Systems and Networks, Univ Lorraine

    L. Vigneron, Security of information systems, 16 hours (ETD), M2 MIAGE – Audit and Design of Information Systems, Univ Lorraine

  • Summer School:

    V. Cortier. Models and Techniques for Analysing Security Protocols, Winter School of the VMCAI 2019 conference, Cascais/Lisbon, Portugal, January 2019.

Supervision

  • PhD defended in 2019:

    Joseph Lallemand, Electronic Voting: Definitions and Analysis Techniques [8], November 2019 (V. Cortier)

  • PhD in progress:

    Ahmad Abboud, Compressed and Verifiable Filtering Rules in Software-defined Networking, started in August 2018 (A. Lahmadi, M. Rusinowitch and A. Bouhoula)

    Bizhan Alipour, Privacy protection against inference attacks in social networks, started in October 2018 (A. Imine, M. Rusinowitch)

    Charlie Jacomme, Security protocols: new properties, new attackers, new protocols, started in September 2017 (H. Comon and S. Kremer)

    Itsaka Rakotonirina, Efficient verification of equivalence properties in cryptographic protocols, started in October 2017 (V. Cheval and S. Kremer)

Juries

Jury member for J. M. López Becerra, University of Luxembourg (S. Kremer).

Jury president for Hoang-Long Nguyen, University of Lorraine (M. Rusinowitch)