CCS |
ACM Conference on Computer and Communications Security |
ACM |
网络与信息安全 |
A |
EUROCRYPT |
European Cryptology Conference |
Springer |
网络与信息安全 |
A |
S&P |
IEEE Symposium on Security and Privacy |
IEEE |
网络与信息安全 |
A |
CRYPTO |
International Cryptology Conference |
Springer |
网络与信息安全 |
A |
USENIX Security |
Usenix Security Symposium |
USENIX Association |
网络与信息安全 |
A |
ACSAC |
Annual Computer Security Applications Conference |
IEEE |
网络与信息安全 |
B |
ASIACRYPT |
Annual International Conference on the Theory and Application of Cryptology and Information Security |
Springer |
网络与信息安全 |
B |
ESORICS |
European Symposium on Research in Computer Security |
Springer |
网络与信息安全 |
B |
FSE |
Fast Software Encryption |
Springer |
网络与信息安全 |
B |
CSFW |
IEEE Computer Security Foundations Workshop |
IEEE |
网络与信息安全 |
B |
SRDS |
IEEE International Symposium on Reliable Distributed Systems |
IEEE |
网络与信息安全 |
B |
CHES |
International Conference on Cryptographic Hardware and Embedded Systems |
Springer |
网络与信息安全 |
B |
DSN |
International Conference on Dependable Systems and Networks |
IEEE/IFIP |
网络与信息安全 |
B |
RAID |
International Symposium on Recent Advances in Intrusion Detection |
Springer |
网络与信息安全 |
B |
PKC |
International Workshop on Practice and Theory in Public Key Cryptography |
Springer |
网络与信息安全 |
B |
NDSS |
ISOC Network and Distributed System Security Symposium |
ISOC |
网络与信息安全 |
B |
TCC |
Theory of Cryptography Conference |
Springer |
网络与信息安全 |
B |
WiSec |
ACM Conference on Security and Privacy in Wireless and Mobile Networks |
ACM |
网络与信息安全 |
C |
SACMAT |
ACM Symposium on Access Control Models and Technologies |
ACM |
网络与信息安全 |
C |
DRM |
ACM Workshop on Digital Rights Management |
ACM |
网络与信息安全 |
C |
IH&MMSec |
ACM Workshop on Information Hiding and Multimedia Security |
ACM |
网络与信息安全 |
C |
ACNS |
Applied Cryptography and Network Security |
Springer |
网络与信息安全 |
C |
AsiaCCS |
Asia Conference on Computer and Communications Security |
ACM |
网络与信息安全 |
C |
ACISP |
Australasia Conference on Information Security and Privacy |
Springer |
网络与信息安全 |
C |
CT-RSA |
Cryptographer's Track at RSA Conference |
Springer |
网络与信息安全 |
C |
DIMVA |
Detection of Intrusions and Malware & Vulnerability Assessment |
|
网络与信息安全 |
C |
DFRWS |
Digital Forensic Research Workshop |
Elsevier |
网络与信息安全 |
C |
FC |
Financial Cryptography and Data Security |
Springer |
网络与信息安全 |
C |
TrustCom |
IEEE International Conference on Trust, Security and Privacy in Computing and Communications |
IEEE |
网络与信息安全 |
C |
SEC |
IFIP International Information Security Conference |
Springer |
网络与信息安全 |
C |
IFIP WG 11.9 |
IFIP WG 11.9 International Conference on Digital Forensics |
Springer |
网络与信息安全 |
C |
ISC |
Information Security Conference |
Springer |
网络与信息安全 |
C |
ICDF2C |
International Conference on Digital Forensics & Cyber Crime |
Springer |
网络与信息安全 |
C |
ICICS |
International Conference on Information and Communications Security |
Springer |
网络与信息安全 |
C |
SecureComm |
International Conference on Security and Privacy in Communication Networks |
ACM |
网络与信息安全 |
C |
NSPW |
New Security Paradigms Workshop |
ACM |
网络与信息安全 |
C |
PAM |
Passive and Active Measurement Conference |
Springer |
网络与信息安全 |
C |
PETS |
Privacy Enhancing Technologies Symposium |
Springer |
网络与信息安全 |
C |
SAC |
Selected Areas in Cryptography |
Springer |
网络与信息安全 |
C |
SOUPS |
Symposium On Usable Privacy and Security |
USENIX |
网络与信息安全 |
C |
HotSec |
USENIX Workshop on Hot Topics in Security |
USENIX |
网络与信息安全 |
C |