中国计算机学会推荐信息安全会议和期刊
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
中国计算机学会推荐国际学术刊物(网络与信息安全计算)
一、A类
序号刊物简称刊物全称出版社网址
1 TISSEC,ACM Transactions on Information and System Security,ACM ,/
2 TDSC,IEEE Transactions on Dependable and Secure Computing,IEEE, /tdsc/
3 TIFS,IEEE Transactions on Information Forensics and Security,IEEE, /organizations/society/sp/tifs.html
4 Journal of Cryptology ,Springer /jofc/jofc.html
二、B类
序号刊物简称刊物全称出版社网址
1 Computers & Security,Elsevier, http://www.elsevier.nl/inca/publications/store/ 4/0/5/8/7/7/
2 Designs,Codes and Cryptography,Springer
/east/home/math/numbers?SGWID=5-10048-70-35730330-0
3 IEEE Security & Privacy,IEEE, /security/
4 International Journal of Information Security and Privacy,Idea Group Inc, /cgi-bin/journalseek/journalsearch.cgi?field=issn&query=1930-1650
5 JCS,Journal of Computer Security,IOS Press, /jcs/
三、C类
序号刊物简称刊物全称出版社网址
1 CISDA,Computational Intelligence for Security and Defense Applications,IEEE, /
2 CLSR, Computer Law and Security Reports,Elsevier,
/science/journal/ 02673649
3 EURASIP,Journal on Information Security,Hindawi,
/journals/is
4 IET,Information Security,IET, /IET-IFS
5 Information Management & Computer Security,MCB University Press,
/info/journals/imcs/imcs.jsp
6 Information Security Technical Report,Elsevier, /locate/istr
7 JISec,Journal of Internet Security ,Nahum Goldmann,
/JiSec/index.asp
中国计算机学会推荐国际学术会议
(网络与信息安全计算)
一、A类
序号会议简称会议全称出版社网址
1 CCS,ACM Conference on Computer and Communications Security,ACM ,
/sigs/sigsac/ccs/
2 S&P,IEEE Symposium on Security and Privacy ,IEEE,
/TC/SP-Index.html
3 CRYPTO,International Cryptology Conference,Springer,
/conferences/
二、B类
序号会议简称会议全称出版社网址
1 ACSAC,Annual Computer Security Applications Conference,IEEE, /
2 ASIACRYPT,Annual International Conference on the Theory and Application of Cryptology and
Information Security,Springer, /conferences/
3 Eurocrypt,Annual International Conference on the Theory and Applications of Cryptographic Techniques,Springer, /conferences/eurocrypt2009/
4 ESORICS,European Symposium on Research in Computer Security,Springer,
as.fr/%7Eesorics/
5 CSFW,IEEE Computer Security Foundations Workshop,
/CSFWweb/
6 RAID,International Symposium on Recent Advances in Intrusion Detection,Springer,
/
7 NDSS,ISOC Network and Distributed System Security Symposium Internet Society,
/isoc/conferences/ndss/
8 DSN,The International Conference on Dependable Systems and Networks,IEEE/IFIP,
/
9 TCC,Theory of Cryptography Conference,Springer, /~tcc08/
10 Security USENIX Security Symposium,USENIX, /events/
11 IH Workshop on Information Hiding,Springer, /~rja14/ihws.html
三、C类
序号会议简称会议全称出版社网址
1 WiSec,ACM Conference on Wireless Network Security Supersedes WiSe (ACM Workshop
on Wireless Security) andSASN (ACM Workshop on Security of Ad-Hoc and SensorNetworks),ACM,/wisec/
2 ACM MM&SEC,ACM Multimedia and Security Workshop,ACM,/
3 SACMAT,ACM Symposium on Access Control Models and Technologies,ACM,
/
4 SAC,ACM Symposium on Applied Computing,ACM,/conferences/sac/
5 ASIACCS,ACM Symposium on Information, Computer and Communications Security,ACM,.tw/asiaccs/
6 DRM,ACM Workshop on Digital Rights Management,ACM,
/cs/people/hongxia-jin/DRM2009/
7 WORM,ACM Workshop on Rapid Malcode,ACM,
/~farnam/worm2006.html
8 SASN,ACM Workshop on Security of Ad-Hoc and Sensor Networks,ACM,
/~szhu/SASN2006/
9 WiSe,ACM Workshop on Wireless Security,ACM,/~adrian/wise2004/
10 ACNS,Applied Cryptography and Network Security,Springer,
/acns_home/
11 ACISP,Australasia Conference on Information Security and Privacy,Springer,
.au/infosec/ACISP2011/
12 DFRWS,Digital Forensic Research Workshop,Elsevier,/
13 FSE,Fast Software Encryption,Springer,http://fse2008.epfl.ch/
14 FC,Financial Cryptography,Springer,http://fc08.ifca.ai/
15 DIMVA,GI SIG SIDAR Conference on Detection of Intrusions and Malware and Vulnerability
Assessment,Springer,http://dimva2010.fkie.fraunhofer.de/
16 IWIA,IEEE International Information Assurance Workshop,IEEE,/
17 IAW,IEEE SMC Information Assurance Workshop,IEEE,/workshop
18 SEC,IFIP International Information Security Conference,Elsevier,/
19 IFIP WG 11.9,IFIP WG 11.9 International Conference on Digital Forensics,Springer,/Conferences/
20 ISC,Information Security Conference,Springer,/
21 ICICS,International Conference on Information and Communications Security,Springer,/ICICS06/
22 Secure Comm,International Conference on Security and Privacy in Communication Networks,
ACM,/
23 PKC,International Workshop on Practice and Theory in Public Key Cryptography,Springer,/workshops/pkc2008/
24 NSPW,New Security Paradigms Workshop,ACM,/current/
25 CT-RSA,RSA Conference, Cryptographers' Track,Springer,
rmatik.uni-trier.de/~ley/db/conf/ctrsa/
26 SRUTI,Steps to Reducing Unwanted Traffic on the Internet,USENIX,
/events/
27 SOUPS,Symposium On Usable Privacy and Security,ACM,/soups/2011/
28 HotSec,USENIX Workshop on Hot Topics in Security,USENIX,/events/
29 HotBots,USENIX Workshop on Hot Topics in Understanding Botnets,USENIX,
/event/hotbots07/tech/
30 CHES,Workshop on Cryptographic Hardware and Embedded Systems,Springer,
/。