| CCS |
ACM Conference on Computer and Communications Security |
ACM |
网络与信息安全 |
A |
| EUROCRYPT |
European Cryptology Conference |
Springer |
网络与信息安全 |
A |
| S&P |
IEEE Symposium on Security and Privacy |
IEEE |
网络与信息安全 |
A |
| CRYPTO |
International Cryptology Conference |
Springer |
网络与信息安全 |
A |
| USENIX Security |
Usenix Security Symposium |
USENIX Association |
网络与信息安全 |
A |
| ACSAC |
Annual Computer Security Applications Conference |
IEEE |
网络与信息安全 |
B |
| ASIACRYPT |
Annual International Conference on the Theory and Application of Cryptology and Information Security |
Springer |
网络与信息安全 |
B |
| ESORICS |
European Symposium on Research in Computer Security |
Springer |
网络与信息安全 |
B |
| FSE |
Fast Software Encryption |
Springer |
网络与信息安全 |
B |
| CSFW |
IEEE Computer Security Foundations Workshop |
IEEE |
网络与信息安全 |
B |
| SRDS |
IEEE International Symposium on Reliable Distributed Systems |
IEEE |
网络与信息安全 |
B |
| CHES |
International Conference on Cryptographic Hardware and Embedded Systems |
Springer |
网络与信息安全 |
B |
| DSN |
International Conference on Dependable Systems and Networks |
IEEE/IFIP |
网络与信息安全 |
B |
| RAID |
International Symposium on Recent Advances in Intrusion Detection |
Springer |
网络与信息安全 |
B |
| PKC |
International Workshop on Practice and Theory in Public Key Cryptography |
Springer |
网络与信息安全 |
B |
| NDSS |
ISOC Network and Distributed System Security Symposium |
ISOC |
网络与信息安全 |
B |
| TCC |
Theory of Cryptography Conference |
Springer |
网络与信息安全 |
B |
| WiSec |
ACM Conference on Security and Privacy in Wireless and Mobile Networks |
ACM |
网络与信息安全 |
C |
| SACMAT |
ACM Symposium on Access Control Models and Technologies |
ACM |
网络与信息安全 |
C |
| DRM |
ACM Workshop on Digital Rights Management |
ACM |
网络与信息安全 |
C |
| IH&MMSec |
ACM Workshop on Information Hiding and Multimedia Security |
ACM |
网络与信息安全 |
C |
| ACNS |
Applied Cryptography and Network Security |
Springer |
网络与信息安全 |
C |
| AsiaCCS |
Asia Conference on Computer and Communications Security |
ACM |
网络与信息安全 |
C |
| ACISP |
Australasia Conference on Information Security and Privacy |
Springer |
网络与信息安全 |
C |
| CT-RSA |
Cryptographer's Track at RSA Conference |
Springer |
网络与信息安全 |
C |
| DIMVA |
Detection of Intrusions and Malware & Vulnerability Assessment |
|
网络与信息安全 |
C |
| DFRWS |
Digital Forensic Research Workshop |
Elsevier |
网络与信息安全 |
C |
| FC |
Financial Cryptography and Data Security |
Springer |
网络与信息安全 |
C |
| TrustCom |
IEEE International Conference on Trust, Security and Privacy in Computing and Communications |
IEEE |
网络与信息安全 |
C |
| SEC |
IFIP International Information Security Conference |
Springer |
网络与信息安全 |
C |
| IFIP WG 11.9 |
IFIP WG 11.9 International Conference on Digital Forensics |
Springer |
网络与信息安全 |
C |
| ISC |
Information Security Conference |
Springer |
网络与信息安全 |
C |
| ICDF2C |
International Conference on Digital Forensics & Cyber Crime |
Springer |
网络与信息安全 |
C |
| ICICS |
International Conference on Information and Communications Security |
Springer |
网络与信息安全 |
C |
| SecureComm |
International Conference on Security and Privacy in Communication Networks |
ACM |
网络与信息安全 |
C |
| NSPW |
New Security Paradigms Workshop |
ACM |
网络与信息安全 |
C |
| PAM |
Passive and Active Measurement Conference |
Springer |
网络与信息安全 |
C |
| PETS |
Privacy Enhancing Technologies Symposium |
Springer |
网络与信息安全 |
C |
| SAC |
Selected Areas in Cryptography |
Springer |
网络与信息安全 |
C |
| SOUPS |
Symposium On Usable Privacy and Security |
USENIX |
网络与信息安全 |
C |
| HotSec |
USENIX Workshop on Hot Topics in Security |
USENIX |
网络与信息安全 |
C |