China Computer Society recommends international academic publications
(Network and information security) Category A
Serial number |
Publication abbreviation |
Publication Full Name |
Press |
Url |
1 |
Tdsc |
IEEE transactions on dependable and Secure Computing |
Ieee |
Http://www.computer.org/portal/web/tdsc |
2 |
Tifs |
IEEE transactions on information forensics and Security |
Ieee |
Http://www.signalprocessingsociety.org/publications /periodicals/forensics/forensics-authors-info/ |
3 |
|
Journal of cryptology |
Springer |
Http://www.iacr.org/jofc/jofc.html |
Second, Class B
Serial number |
Publication abbreviation |
Publication Full Name |
Press |
Url |
1 |
Tissec |
ACM transactions on information and System Security |
Acm |
http://tissec.acm.org/ |
2 |
|
Computers & Security |
Elsevier |
Http://www.journals.elsevier.com/computers -and-security/ |
3 |
|
Designs, Codes and cryptography |
Springer |
http://link.springer.com/journal/10623/ |
4 |
Jcs |
Journal of Computer Security |
IOS Press |
http://iospress.metapress.com/content/103167/ |
Third, Class C
Serial number |
Publication abbreviation |
Publication Full Name |
Press |
Url |
1 |
Clsr |
Computer Law and Security Reports |
Elsevier |
http://www.journals.elsevier.com/computer- law-and-security-review/ |
2 |
|
Eurasip Journal on Information Security |
Springer |
http://jis.eurasipjournals.com/ |
3 |
|
IET Information Security |
IET |
Http://www.ietdl.org/IET-IFS |
4 |
IMCS |
Information Management & Computer Security |
Emerald |
Http://www.emeraldinsight.com/info/journals /imcs/imcs.jsp |
5 |
ISTR |
Information Security Technical Report |
Elsevier |
Http://www.elsevier.com/locate/istr |
6 |
Ijisp |
International Journal of Information Security and Privacy |
Idea Groupinc |
http://www.igi-global.com/journal/international- journal-information-security-privacy/1096 |
7 |
Ijics |
International Journal of Information and Computer Security |
Inderscience |
Http://www.inderscience.com/browse/%0bindex. Php?journalcode=ijics |
8 |
Scn |
Security and Communication Networks |
Wiley |
http://onlinelibrary.wiley.com/journal/10.1002 /(ISSN) 1939-0122 |
Recommended international academic Conference of the Chinese Computer Society
(Network and information security) Category A
Serial number |
Conference abbreviation |
Conference Full Name |
Press |
Url |
1 |
DC4 |
Acmconferenceoncomputerand Communicationssecurity |
Acm |
http://www.acm.org/sigs/sigsac/ccs/ |
2 |
CRYPTO |
International cryptology Conference |
Springer |
http://www.iacr.org/conferences/ |
3 |
Eurocrypt |
European cryptology Conference |
Springer |
http://www.iacr.org/conferences/ |
4 |
The |
Ieeesymposiumonsecurityandprivacy |
Ieee |
Http://www.ieee-security.org/TC/SP-Index.html |
5 |
USENIX Security |
Usenix Security Symposium |
USENIX Association |
https://www.usenix.org/conference/ |
Second, Class B
Serial number |
Conference abbreviation |
Conference Full Name |
Press |
Url |
1 |
Acsac |
Annual Computer Security Applications Conference |
Ieee |
http://www.acsac.org/ |
2 |
Asiacrypt |
Annual international Conference on the theory and application of cryptology and information Security |
Springer |
http://www.iacr.org/conferences/ |
3 |
Esorics |
Europeansymposiumonresearchin Computersecurity |
Springer |
http://esorics2013.isg.rhul.ac.uk/ |
4 |
FSE |
Fast Software Encryption |
Springer |
http://fse2013.spms.ntu.edu.sg/ |
5 |
Ndss |
ISOC Network and distributed System Security Symposium |
ISOC |
http://www.isoc.org/isoc/conferences/ndss/ |
6 |
Csfw |
IEEE Computer Security Foundations Workshop |
|
http://www.ieee-security.org/CSFWweb/ |
7 |
Raid |
International Symposium on Recent advances In Intrusion Detection |
Springer |
http://www.raid-symposium.org/ |
8 |
Pkc |
International Workshop on practice and theory in public Key cryptography |
Springer |
http://ohta-lab.jp/pkc2013/ |
9 |
Dsn |
The international Conference on dependable Systems and Networks |
Ieee/ifip |
http://www.dsn.org/ |
10 |
TCC |
Theory of cryptography Conference |
Springer |
http://tcc2013.com/ |
11 |
Srds |
IEEE International Symposium on Reliable distributed Systems |
Ieee |
http://web.mst.edu/~cswebdb/srds2012/ |
12 |
CHES |
Workshop on cryptographic Hardware and Embedded Systems |
Springer |
http://www.chesworkshop.org/ |
Third, Class C
Serial number |
Conference abbreviation |
Conference Full Name |
Press |
Url |
1 |
Wisec |
ACM Conference on Security and Privacy Inwireless and Mobile Networks |
Acm |
http://www.sigsac.org/wisec/ |
2 |
Acm Mm&sec |
ACM Multimedia and Security Workshop |
Acm |
http://www.mmsec12.com/ |
3 |
Sacmat |
ACM Symposium on Access Control Models and Technologies |
Acm |
http://www.sacmat.org/ |
4 |
Asiaccs |
ACM Symposium on Information, computer and Communications Security |
Acm |
http://dsns.csie.nctu.edu.tw/asiaccs/ |
5 |
Drm |
ACM Workshop on Digital rights Management |
Acm |
http://drm11.cased.de/ |
6 |
ACNS |
Applied Cryptography and Network Security |
Springer |
http://www.geocities.com/acns_home/ |
7 |
Acisp |
Australasiaconferenceoninformation Security Andprivacy |
Springer |
https://ssl.informatics.uow.edu.au/acisp2012/ |
8 |
Dfrws |
Digital Forensic Workshop |
Elsevier |
http://www.dfrws.org/ |
9 |
Fc |
Financial cryptography and Data Security |
Springer |
http://fc13.ifca.ai/ |
10 |
Dimva |
Detection of Intrusions and Malware & Vulnerability assessment |
SIDAR, GI, Springer |
http://dimva.sec.t-labs.tu-berlin.de/ |
11 |
SEC |
IFIP International Information Security Conference |
Springer |
http://www.sec2013.org/ |
12 |
IFIP WG 11.9 |
IFIP WG 11.9 International Conference On Digital Forensics |
Springer |
http://www.ifip119.org/Conferences/ |
13 |
Isc |
Information Security Conference |
Springer |
http://web.sec.uni-passau.de/isc2012/ |
14 |
Secure Comm |
International Conference on Security and Privacy in Communication Networks |
Acm |
http://www.securecomm.org/ |
15 |
Nspw |
New Security Paradigms Workshop |
Acm |
http://www.nspw.org/current/ |
16 |
Ct-rsa |
RSA Conference, cryptographers ' track |
Springer |
http://conf.isi.qut.edu.au/ct-rsa2013/ |
17 |
Soups |
Symposium on Usable Privacy and Security |
Acm |
http://cups.cs.cmu.edu/soups/2013/ |
18 |
Hotsec |
USENIX Workshop on hot Topics in Security |
USENIX |
http://www.usenix.org/events/ |
19 |
SAC |
Selected Areas in cryptography |
Springer |
http://dblp.uni-trier.de/db/conf/sacrypt/ |
20 |
Trustcom |
IEEE International Conference on Trust, Security and Privacy in Computing andcommunications |
Ieee |
http://www.scim.brad.ac.uk/~hmibrahi/TrustCom2012/
|
China Computer Society recommends international academic publications Conference and periodicals catalogue