标签:
序号 | 刊物简称 | 刊物全称 | 出版社 | 网址 |
1 |
TDSC
|
IEEE Transactions on Dependable and Secure Computing |
IEEE
|
http://www.computer.org/portal/web/tdsc |
2 |
TIFS
|
IEEE Transactions on Information Forensics and Security |
IEEE
|
http://www.signalprocessingsociety.org/publications /periodicals/forensics/forensics-authors-info/ |
3 | Journal of Cryptology |
Springer
|
http://www.iacr.org/jofc/jofc.html |
序号 | 刊物简称 | 刊物全称 | 出版社 | 网址 |
1 | TISSEC | ACM Transactions on Information and System Security |
ACM | http://tissec.acm.org/ |
2 |
|
Computers & Security |
Elsevier
|
http://www.journals.elsevier.com/computers -and-security/ |
3 |
|
Designs, Codes and Cryptography |
Springer
|
http://link.springer.com/journal/10623/ |
4 |
JCS
|
Journal of Computer Security |
IOS Press
|
http://iospress.metapress.com/content/103167/ |
序号 | 刊物简称 | 刊物全称 | 出版社 | 网址 |
1 |
CLSR
|
Computer Law and Security Reports |
Elsevier
|
http://www.journals.elsevier.com/computer- law-and-security-review/ |
2 |
|
EURASIP Journal on Information Security |
Springer
|
http://jis.eurasipjournals.com/ |
3 |
|
IET Information Security |
IET
|
http://www.ietdl.org/IET-IFS |
4 |
IMCS
|
Information Management & Computer Security |
Emerald
|
http://www.emeraldinsight.com/info/journals /imcs/imcs.jsp |
5 |
ISTR
|
Information Security Technical Report |
Elsevier
|
http://www.elsevier.com/locate/istr |
6 |
IJISP
|
International Journal of Information Security and Privacy |
Idea GroupInc
|
http://www.igi-global.com/journal/international- journal-information-security-privacy/1096 |
7 | IJICS | International Journal of Information and Computer Security |
Inderscience | http://www.inderscience.com/browse/%0bindex. php?journalCODE=ijics |
8 | SCN | Security and Communication Networks | Wiley | http://onlinelibrary.wiley.com/journal/10.1002 /(ISSN)1939-0122 |
序号 | 会议简称 | 会议全称 | 出版社 | 网址 |
1 |
CCS
|
ACMConferenceonComputerand CommunicationsSecurity |
ACM
|
http://www.acm.org/sigs/sigsac/ccs/ |
2 | CRYPTO | International Cryptology Conference | Springer | http://www.iacr.org/conferences/ |
3 | EUROCRYPT | European Cryptology Conference | Springer | http://www.iacr.org/conferences/ |
4 |
S&P
|
IEEESymposiumonSecurityandPrivacy |
IEEE
|
http://www.ieee-security.org/TC/SP-Index.html |
5 | USENIX Security |
Usenix Security Symposium | USENIX Association |
https://www.usenix.org/conference/ |
序号 | 会议简称 | 会议全称 | 出版社 | 网址 |
1 |
ACSAC
|
Annual Computer Security Applications Conference |
IEEE
|
http://www.acsac.org/ |
2 |
ASIACRYPT
|
Annual International Conference on the Theory and Application of Cryptology and Information Security |
Springer
|
http://www.iacr.org/conferences/ |
3 |
ESORICS
|
EuropeanSymposiumonResearchin ComputerSecurity |
Springer
|
http://esorics2013.isg.rhul.ac.uk/ |
4 | FSE | Fast Software Encryption | Springer | http://fse2013.spms.ntu.edu.sg/ |
5 | NDSS |
ISOC Network and Distributed System Security Symposium |
ISOC | http://www.isoc.org/isoc/conferences/ndss/ |
6 |
CSFW
|
IEEE Computer Security Foundations Workshop |
|
http://www.ieee-security.org/CSFWweb/ |
7 |
RAID
|
International Symposium on Recent Advances in Intrusion Detection |
Springer
|
http://www.raid-symposium.org/ |
8 |
PKC
|
International Workshop on Practice and Theory in Public Key Cryptography |
Springer
|
http://ohta-lab.jp/pkc2013/ |
9 |
DSN
|
The International Conference on Dependable Systems and Networks |
IEEE/IFIP
|
http://www.dsn.org/ |
10 |
TCC
|
Theory of Cryptography Conference |
Springer
|
http://tcc2013.com/ |
11 |
SRDS
|
IEEE International Symposium on Reliable Distributed Systems |
IEEE
|
http://web.mst.edu/~cswebdb/srds2012/ |
12 |
CHES
|
Workshop on Cryptographic Hardware and Embedded Systems |
Springer
|
http://www.chesworkshop.org/ |
序号 | 会议简称 | 会议全称 | 出版社 | 网址 |
1 |
WiSec |
ACM Conference on Security and Privacy |
ACM |
http://www.sigsac.org/wisec/ |
2 | ACM MM&SEC |
ACM Multimedia and Security Workshop |
ACM |
http://www.mmsec12.com/ |
3 |
SACMAT |
ACM Symposium on Access Control Models |
ACM |
http://www.sacmat.org/ |
4 |
ASIACCS |
ACM Symposium on Information, Computer |
ACM |
http://dsns.csie.nctu.edu.tw/asiaccs/ |
5 |
DRM |
ACM Workshop on Digital Rights Management |
ACM |
http://drm11.cased.de/ |
6 |
ACNS |
Applied Cryptography and Network Security |
Springer |
http://www.geocities.com/acns_home/ |
7 |
ACISP |
AustralasiaConferenceonInformation Security |
Springer |
https://ssl.informatics.uow.edu.au/acisp2012/ |
8 |
DFRWS |
Digital Forensic Research Workshop |
Elsevier |
http://www.dfrws.org/ |
9 |
FC |
Financial Cryptography and Data Security |
Springer |
http://fc13.ifca.ai/ |
10 |
DIMVA |
Detection of Intrusions and Malware & |
SIDAR、GI、 Springer |
http://dimva.sec.t-labs.tu-berlin.de/ |
11 |
SEC |
IFIP International Information Security |
Springer |
http://www.sec2013.org/ |
12 | IFIP WG 11.9 |
IFIP WG 11.9 International Conference on Digital Forensics |
Springer |
http://www.ifip119.org/Conferences/ |
13 |
ISC |
Information Security Conference |
Springer |
http://web.sec.uni-passau.de/isc2012/ |
14 |
Secure |
International Conference on Security and |
ACM |
http://www.securecomm.org/ |
15 |
NSPW |
New Security Paradigms Workshop |
ACM |
http://www.nspw.org/current/ |
16 |
CT-RSA |
RSA Conference, Cryptographers‘ Track |
Springer |
http://conf.isi.qut.edu.au/ct-rsa2013/ |
17 |
SOUPS |
Symposium On Usable Privacy and Security |
ACM |
http://cups.cs.cmu.edu/soups/2013/ |
18 |
HotSec |
USENIX Workshop on Hot Topics in Security |
USENIX |
http://www.usenix.org/events/ |
19 |
SAC |
Selected Areas in Cryptography |
Springer |
http://dblp.uni-trier.de/db/conf/sacrypt/ |
20 |
TrustCom |
IEEE International Conference on Trust, Security |
IEEE |
http://www.scim.brad.ac.uk/~hmibrahi/TrustCom2012/ |
标签:
原文地址:http://www.cnblogs.com/informatics/p/4875772.html