|
Rank
|
Conference
|
Full Name
|
| | | |
| Conference: | |
| | | |
| 13 | CCS | ACM Conference on Computer and Communications Security |
| 28 | USENIX Security Symposium | USENIX Security Symposium |
| 30 | NDSS | Network and Distributed System Security Symposium |
| 33 | CSFW | Computer Security Foundations Workshop |
| 35 | CRYPTO | International Cryptology Conference |
| 63 | PET | Privacy Enhancing Technologies |
| 74 | S&P | IEEE Symposium on Security and Privacy |
| 79 | RAID | International Symposium On Recent Advances in Intrusion Detection |
| 88 | PKC | Public Key Cryptography |
| 96 | EUROCRYPT | Theory and Application of Cryptographic Techniques |
| 125 | ESORICS | European Symposium on Research in Computer Security |
| 131 | ASIACRYPT | The Annual International Conference on the Theory and Application of Cryptology & Information Security |
| 139 | SACMAT | Symposium on Access Control Models and Technologies |
| 160 | Financial Cryptography | Financial Cryptography |
| 186 | Information Hiding | Information Hiding |
| 224 | DSN | Dependable Systems and Networks |
| 225 | ACSAC | Annual Computer Security Applications Conference |
| 276 | FSE | Fast Software Encryption |
| 279 | ACISP | Australasian Conference on Information Security and Privacy |
| 283 | CHES | Cryptographic Hardware and Embedded Systems |
| 350 | ISSS | International Symposium on Systems Synthesis |
| 359 | NSPW | Workshop on New Security Paradigms |
| 389 | SAC | ACM Symposium on Applied Computing |
| 421 | AESCC | AES Candidate Conference |
| 449 | CARDIS | International Conference on Smart Card Research and Advanced Applications |
| 456 | LISA | USENIX Large Installation Systems Administration Conference |
| 496 | ISC(ISW) | Information Security Conference/Information Security Workshop |
| 542 | Security Protocols Workshop | Security Protocols Workshop |
| 579 | SAM | Security and Management |
| 611 | ICISC | International Calendar of Information Science Conferences |
| 612 | DISCEX | DARPA Information Survivability Conference and Exposition |
| 646 | SEC | Information Security |
| 685 | CMS | Communications and Multimedia Security |
| 712 | ICICS | International Conference on Information and Communication Security |
| 785 | INDOCRYPT | INDOCRYPT |
| 910 | PST | Conference on Privacy, Security and Trust |
| 928 | IAW | IEEE Information Assurance Workshop |
| 980 | DIMVA | Detection of Intrusions and Malware & Vulnerability Assessment |
| 987 | ISI | Intelligence and Security Informatics |
| 1102 | ACNS | Applied Cryptography and Network Security |
| 1121 | TrustBus | Trust and Privacy in Digital Business |
| 1218 | ACSW | ACSW Frontiers |
| 1254 | MMM | Annual Conference on Magnetism and Magnetic Materials |
| 1259 | DRM | ACM Digital Rights Management Workshop |
| 1267 | EUROPKI | European Public Key Infrastructure Workshop |
| 1273 | IWIA | IEEE International Workshop on Information Assurance |
| 1274 | WISA | Workshop on Information Security Applications |
| 1340 | CIS | International Conference on Computational Intelligence and Security |
| 1390 | WITS | Workshop on Issues in the Theory of Security |
| 1409 | Security in Information Systems | Security in Information Systems |
| 1474 | CANS | Cryptology and Network Security |
| 1477 | DRMTICS | Digital Rights Management: Technology, Issues, Challenges and Systems |
| 1502 | VIZSEC | IEEE Workshop on Visualization for Computer Security |
| - | ANTS | International Workshop on Ant Algorithms |
| - | WDIAU | Workshop on Design Issues in Anonymity and Unobservability |
| - | Mobile Agents and Security | Mobile Agents and Security |
| - | TCC | Theory of Cryptography |
| - | ISPEC | Information Security Practice and Experience |
| - | ITNG | International Conference on Information Technology: New Generations |
| - | Sicherheit | Sicherheit |
| - | IEEEARES | Availability, Reliability and Security |
| - | ICEB | International Conference on Electronic Business |
| - | IMA Conference on Cryptography and Coding | IMA Conference on Cryptography and Coding |
| - | ICISS | International Conference on Information Systems Security |
| - | CISC | Conference on Information Security and Cryptology |
| - | WIDNM | Workshop on Intrusion Detection and Network Monitoring |
| - | ECIW | European Conference on Information Warfare and Security |
| - | AUSFORENSICS | Australian Computer, Network & Information Forensics Conference |
| - | ETRICS | Emerging Trends in Information and Communication Security |
| - | WPES | Workshop on Privacy in the Electronic Society |
| - | WISI | Workshop on Intelligence and Security Informatics |
| - | AISM | Australian Information Security Management Conference |
| - | WS | Wireless Security |
| - | IWSEC | International Workshop on Security |
| - | CaLC | Cryptography and Lattices |
| - | TCGOV | TED Conference on e-Government |
| - | VIETCRYPT | VIETCRYPT |
| - | IFIP TC11 Publications | IFIP TC11 Publications |
| - | MYCRYPT | International Conference on Cryptology in Malaysia |
| - | CRITIS | International Workshop on Critical Information Infrastructures Security |
| - | FDTC | Fault Diagnosis and Tolerance in Cryptography |
| - | WISTP | Workshop in Information Security Theory and Practice |
| - | SADFE | Systematic Approaches to Digital Forensic Engineering |
| - | MADNES | Secure Mobile Ad-hoc Networks and Sensors |
| - | IFIP WG11.8 Publications | IFIP WG11.8 Publications |
| - | Infrastructure Security | Infrastructure Security |
| - | SECPERU | Security, Privacy and Trust in Pervasive and Ubiquitous Computing |
| - | CFP | Computers, Freedom and Privacy |
| - | WEWoRC | Western European Workshop on Research in Cryptology 聽 |
| - | DFRWS | Digital Forensic Research Workshop |
| - | IEEE Security in Storage Workshop | IEEE Security in Storage Workshop |
| - | FASec | Formal Aspects of Security |
| - | CAU | Cryptographic Algorithms and their Uses |
| - | ODRL | Open Digital Rights Language |
| | | |
| Journal: | |
| | | |
| - | DuD | Datenschutz und Datensicherheit |