[Summary] information security of international conferences-

Source: Internet
Author: User

To learn about the latest academic research trends, always track top conferences, top-level workshops, and top-level researcher are all necessary.

Added the latest meeting date and the latest closing meeting. And collect their papers.

The following table is a summary of other people's tables, which are arranged according to the Conference impact factor. It is not necessarily authoritative. Will be updated occasionally

Rk

Conference

Lasted updated

R1

1. ieee s & P

IEEE Symposium on Security and Privacy

Http://www.ieee-security.org/TC/SP-Index.html


2015 5.18-5.20

Http://www.ieee-security.org/TC/SP2015/index.html

2. usenix Sec

Usenix Security Symposium

Https://www.usenix.org/conferences/byname/108

2015 5.18-5.20

Https://www.usenix.org/conference/hotos15

3. ACM CCS

ACM Conference on Computer

And Communications Security

Http://www.sigsac.org/ccs.html

2014 11.3-11.7

Http://www.sigsac.org/ccs/CCS2014/

4. crypto

International cryptology Conference

Http://www.iacr.org/conferences/

2014 8.17-21 [done]

Http://www.iacr.org/conferences/crypto2014/

Proceedings download

5. eurocrypt

European cryptology Conference

Http://www.iacr.org/conferences/

2015 4.26-30

Eurocrypt 2015

6. NDSS

ISOC network and distributed

System Security Symposium

Http://www.internetsociety.org/events/ndss-symposium

2015 2.8-11

NDSS 2015

R2

7. esorics

European Symposium on

Research in computer security

Http://homepages.laas.fr/esorics/

2014 9.7-11 [done]

Http://esorics2014.pwr.wroc.pl/

Proceedings download

8. Raid

International Symposium on recent

Advances in Intrusion Detection

Http://www.raid-symposium.org/

2014 9.17-19 [done]

Http://www.raid2014.eu/

Proceedings download

9. acsac

Annual computer security applications Conference

Http://www.acsac.org/

2014 11.8-12

Http://www.acsac.org/

10. DSN

The International Conference on

Dependable Systems and Networks

Http://www.ft.unicamp.br/dsn2015/

2015 6.22-25

Http://www.ft.unicamp.br/dsn2015/

11. CSF (csfw)

IEEE Computer Security foundations Symposium
Supersedes csfw

(Computer security foundations Workshop)

Http://www.ieee-security.org/CSFWweb/

2014 7.19-22 [done]

Http://csf2014.di.univr.it/index

12. TCC

Theory of cryptography Conference

Http://www.iacr.org/workshops/tcc/

2014 2.24-26 [done]

Http://www.iacr.org/workshops/tcc2014/

13. asiacrypt

International conference on the Theory and Application

Of cryptology and Information Security

Http://www.iacr.org/conferences/


2014 12.7-11

Http://des.cse.nsysu.edu.tw/asiacrypt2014/

14. IMC

Internet Measurement Conference

Http://www.sigcomm.org/events/imc-conference


2014 11.5-7

Http://www.sigcomm.org/events/imc-conference

R3

15. securecomm

IEEE communications society/createnet

Internation Conference

On security and privacy for emerging

Areas in Communication Networks

Http://securecomm.org/2014/show/home

2014 9.24-26 [done]

Http://securecomm.org/2014/show/home

16. dimva

Gisig sidar Conference on detection of intrusions

And malware and vulnerabilityassessment

Http://www1.gi-ev.de/fachbereiche/sicherheit/fg/sidar/dimva/

2014 7.10-11 [done]

Http://dimva2014.isg.rhul.ac.uk/

17. asiaccs

ACM Symposium on Information,

Computer and Communications Security

Http://dsns.csie.nctu.edu.tw/asiaccs/

2015 4.14-17

Http://icsd.i2r.a-star.edu.sg/asiaccs15/

18. acns

International Conference on applied

Cryptography and network security

Http://icsd.i2r.a-star.edu.sg/staff/jianying/acns_home/

2015 6.2-5

Http://acns2015.cs.columbia.edu/

19. FC

International Conference on

Financial cryptography and data security

Http://fc15.ifca.ai/

2015 1.26-30

Http://fc15.ifca.ai/


 

20. Sac

ACM Symposium on applied computing

Http://www.acm.org/conferences/sac/

2015 4.13-17

Http://www.acm.org/conferences/sac/sac2015/

21. acisp

Australasia Conference on

Information Security and Privacy 

2014 7.7-9 [done]

Https://ssl.informatics.uow.edu.au/acisp2014/

22. icics

International Conference on Information

And Communications Security

2014 12.16-17

Http://www.cs.hku.hk/icics2014/

23. icisc

InternationalConference on

Information security and Cryptology

Http://www.icisc.org/icisc14/asp/index.html

2014 12.3-5

Http://www.icisc.org/icisc14/asp/index.html

24. sacmat

ACM Symposium on Access

Control models and technologies

Http://www.sacmat.org/2015/index.php

2015 6.1-3

Http://www.sacmat.org/2015/index.php

25. wisec

ACM Conference on Wireless Network Security
Supersedes Wise (ACM Workshop on wireless security)

And sasn (ACM workshop on security

Ad-hoc and sensor networks)

Http://www.sigsac.org/wisec/WiSec2014/


2014 7.23-25 [done]

Http://www.sigsac.org/wisec/WiSec2014/

26. soups

Symposium on usable privacy and security

Http://cups.cs.cmu.edu/soups/2014/

2015 7.22-24

Http://cups.cs.cmu.edu/soups/2014/

27. malware

International Conference on

Malicious and unwanted software

Http://www.malwareconference.org/


2014 10.28-30

Http://www.malwareconference.org/

28. codaspy

ACM Conference on Data and

Application Security and Privacy

Http://codaspy.utsa.edu/cfp.html

2015 3.2-4

Http://codaspy.utsa.edu/cfp.html

Workshop

 

1. ches

Workshop on cryptographic hardware and Embedded Systems


2014 9.23-26 [done]

Http://www.chesworkshop.org/ches2014/start.php


 

2. Leet

Usenix Workshop on large-scale exploits and emergent threats
Supersedes hotbots (usenix Workshop on hot topics in understanding botnets)

And worm (ACM Workshop on recurring/rapid malcode)


 

 

 

CIF reference:

Http://icsd.i2r.a-star.edu.sg/staff/jianying/conference-ranking.html

Reference ranking:

Http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm


[Summary] information security of international conferences-

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.