Véronique Cortier

3.7k total citations
61 papers, 825 citations indexed

About

Véronique Cortier is a scholar working on Artificial Intelligence, Computer Networks and Communications and Information Systems. According to data from OpenAlex, Véronique Cortier has authored 61 papers receiving a total of 825 indexed citations (citations by other indexed papers that have themselves been cited), including 47 papers in Artificial Intelligence, 38 papers in Computer Networks and Communications and 31 papers in Information Systems. Recurrent topics in Véronique Cortier's work include Advanced Authentication Protocols Security (38 papers), Cryptography and Data Security (35 papers) and User Authentication and Security Systems (30 papers). Véronique Cortier is often cited by papers focused on Advanced Authentication Protocols Security (38 papers), Cryptography and Data Security (35 papers) and User Authentication and Security Systems (30 papers). Véronique Cortier collaborates with scholars based in France, United Kingdom and United States. Véronique Cortier's co-authors include Bogdan Warinschi, Stéphanie Delaune, Hubert Comon-Lundh, Ben Smyth, Martı́n Abadi, Steve Kremer, Pascal Lafourcade, Eugen Zălinescu, David Galindo and R. Kuesters and has published in prestigious journals such as Theoretical Computer Science, Lecture notes in computer science and Information and Computation.

In The Last Decade

Véronique Cortier

56 papers receiving 788 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Véronique Cortier France 18 641 476 418 137 96 61 825
Bogdan Warinschi United Kingdom 18 711 1.1× 386 0.8× 405 1.0× 149 1.1× 59 0.6× 55 861
Iliano Cervesato United States 18 652 1.0× 449 0.9× 286 0.7× 275 2.0× 79 0.8× 68 860
Gian-Luigi Ferrari Italy 15 578 0.9× 447 0.9× 340 0.8× 273 2.0× 90 0.9× 78 876
Stéphanie Delaune France 14 467 0.7× 367 0.8× 338 0.8× 75 0.5× 90 0.9× 48 602
Michele Bugliesi Italy 15 512 0.8× 218 0.5× 274 0.7× 108 0.8× 94 1.0× 64 673
Duško Pavlović United States 14 353 0.6× 340 0.7× 275 0.7× 152 1.1× 54 0.6× 62 584
Srinath Setty United States 15 973 1.5× 468 1.0× 555 1.3× 209 1.5× 68 0.7× 24 1.3k
Steve Kremer France 17 630 1.0× 495 1.0× 450 1.1× 93 0.7× 157 1.6× 49 840
Ricardo Corin Netherlands 14 277 0.4× 270 0.6× 250 0.6× 73 0.5× 87 0.9× 30 434
Santiago Zanella-Béguelin United Kingdom 13 541 0.8× 154 0.3× 145 0.3× 124 0.9× 53 0.6× 23 646

Countries citing papers authored by Véronique Cortier

Since Specialization
Citations

This map shows the geographic impact of Véronique Cortier's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Véronique Cortier with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Véronique Cortier more than expected).

Fields of papers citing papers by Véronique Cortier

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Véronique Cortier. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Véronique Cortier. The network helps show where Véronique Cortier may publish in the future.

Co-authorship network of co-authors of Véronique Cortier

This figure shows the co-authorship network connecting the top 25 collaborators of Véronique Cortier. A scholar is included among the top collaborators of Véronique Cortier based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Véronique Cortier. Véronique Cortier is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Krimmer, Robert, Melanie Volkamer, Véronique Cortier, et al.. (2019). Electronic Voting. Lecture notes in computer science. 1 indexed citations
2.
Cortier, Véronique, et al.. (2018). Voting. HAL (Le Centre pour la Communication Scientifique Directe). 53–66. 3 indexed citations
3.
Cortier, Véronique. (2018). Verification of Security Protocols. EPiC series in computing. 3. 1.
4.
Cortier, Véronique. (2015). Formal verification of e-voting. HAL (Le Centre pour la Communication Scientifique Directe). 2(1). 25–34. 9 indexed citations
5.
Cortier, Véronique & Steve Kremer. (2014). Formal Models and Techniques for Analyzing Security Protocols: A Tutorial. HAL (Le Centre pour la Communication Scientifique Directe). 1(3). 151–267. 8 indexed citations
6.
Cortier, Véronique & Graham Steel. (2014). A generic security API for symmetric key management on cryptographic devices. Information and Computation. 238. 208–232. 3 indexed citations
7.
Cortier, Véronique, et al.. (2014). Modeling and verifying ad hoc routing protocols. Information and Computation. 238. 30–67. 9 indexed citations
8.
Cortier, Véronique & Steve Kremer. (2014). Formal Models and Techniques for Analyzing Security Protocols: A Tutorial. now publishers, Inc. eBooks. 5 indexed citations
9.
Cheval, Vincent, Véronique Cortier, & Stéphanie Delaune. (2013). Deciding equivalence-based properties using constraint solving. Theoretical Computer Science. 492. 1–39. 17 indexed citations
10.
Cortier, Véronique, et al.. (2011). Formal Models and Techniques for Analyzing Security Protocols. HAL (Le Centre pour la Communication Scientifique Directe). 5. 312. 18 indexed citations
11.
Cortier, Véronique & Steve Kremer. (2011). Formal Models and Techniques for Analyzing Security Protocols - Volume 5. IOS Press eBooks. 3 indexed citations
12.
Cortier, Véronique, et al.. (2009). Formal to Practical Security: Papers Issued from the 2005-2008 French-Japanese Collaboration. Springer eBooks. 4 indexed citations
13.
Cortier, Véronique & Stéphanie Delaune. (2009). A Method for Proving Observational Equivalence. 266–276. 22 indexed citations
14.
Baudet, Mathieu, Véronique Cortier, & Steve Kremer. (2009). Computationally sound implementations of equational theories against passive adversaries. Information and Computation. 207(4). 496–520. 9 indexed citations
15.
Cortier, Véronique, R. Kuesters, & Bogdan Warinschi. (2007). European Symposium On Research In Computer Security - ESORICS 2007. Lecture notes in computer science. 38 indexed citations
16.
Cortier, Véronique, Stéphanie Delaune, & Pascal Lafourcade. (2006). A survey of algebraic properties used in cryptographic protocols. Journal of Computer Security. 14(1). 1–43. 57 indexed citations
17.
Abadi, Martı́n & Véronique Cortier. (2006). Deciding knowledge in security protocols under equational theories. Theoretical Computer Science. 367(1-2). 2–32. 68 indexed citations
18.
Cortier, Véronique & Bogdan Warinschi. (2005). European Symposium on Programming - ESOP 2005. Lecture notes in computer science. 51 indexed citations
19.
Comon-Lundh, Hubert & Véronique Cortier. (2004). Security properties: two agents are sufficient. Science of Computer Programming. 50(1-3). 51–71. 30 indexed citations
20.
Comon, Hubert & Véronique Cortier. (2004). Tree automata with one memory set constraints and cryptographic protocols. Theoretical Computer Science. 331(1). 143–214. 22 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026