中国计算机学会推荐学术会议/期刊(网络与信息安全部分)

本文概述了2019年推荐的A、B、C类信息安全会议,包括ACM、Springer、IEEE等出版的顶级会议,如CCS、CRYPTO、Eurocrypt等,以及关键期刊如IEEE TIFS、Journal of Cryptology。涵盖了加密、安全实践、网络安全等多个领域。
摘要由CSDN通过智能技术生成

一、会议


1、A类

序号会议简称会议全称出版社网址
1ccsACM Conference on Computer and Communications SecurityACMhttp://dblp.uni-trier.de/db/conf/ccs/
2EUROCRYPTEuropean Cryptology ConferenceSpringerhttp://dblp.uni-trier.de/db/conf/eurocrypt/
3S&PIEEE Symposium on Security and PrivacyIEEEhttp://dblp.uni-trier.de/db/conf/sp/
4CRYPTOInternational Cryptology ConferenceSpringerhttp://dblp.uni-trier.de/db/conf/crypto/
5USENIX SecurityUsenix Security SymposiumUSENIX Associationhttp://dblp.uni-trier.de/db/conf/uss/

2、B类

序号会议简称会议全称出版社网址
1ACSACAnnual Computer Security Applications ConferenceIEEEhttp://dblp.uni-trier.de/db/conf/acsac/
2ASIACRYPTAnnual International Conference on the Theory and Application of Cryptology and Information SecuritySpringerhttp://dblp.uni-trier.de/db/conf/asiacrypt/
3ESORICSEuropean Symposium on Research in Computer SecuritySpringerhttp://dblp.uni-trier.de/db/conf/esorics/
4FSEFast Software EncryptionSpringerhttp://dblp.uni-trier.de/db/conf/fse/
5CSFWIEEE Computer Security Foundations WorkshopIEEEhttp://dblp.uni-trier.de/db/conf/csfw/
6SRDSIEEE International Symposium on Reliable Distributed SystemsIEEEhttp://dblp.uni-trier.de/db/conf/srds/
7CHESInternational Conference on Cryptographic Hardware and Embedded SystemsSpringerhttp://dblp.uni-trier.de/db/conf/ches/
8DSNInternational Conference on Dependable Systems and NetworksIEEE/IFIPhttp://dblp.uni-trier.de/db/conf/dsn/
9RAIDInternational Symposium on Recent Advances in Intrusion DetectionSpringerhttp://dblp.uni-trier.de/db/conf/raid/
10PKCInternational Workshop on Practice and Theory in Public Key CryptographySpringerhttp://dblp.uni-trier.de/db/conf/pkc/
11NDSSISOC Network and Distributed System Security SymposiumISOChttp://dblp.uni-trier.de/db/conf/ndss/
12TCCTheory of Cryptography ConferenceSpringerhttp://dblp.uni-trier.de/db/conf/tcc/

3、C类

序号会议简称会议全称出版社网址
1WiSecACM Conference on Security and Privacy in Wireless and Mobile NetworksACMhttp://dblp.uni-trier.de/db/conf/wisec/
2SACMATACM Symposium on Access Control Models and TechnologiesACMhttp://dblp.uni-trier.de/db/conf/sacmat/
3DRMACM Workshop on Digital Rights ManagementACMhttp://dblp.uni-trier.de/db/conf/drm/
4IH&MMSecACM Workshop on Information Hiding and Multimedia SecurityACMhttp://dblp.uni-trier.de/db/conf/ih/
5ACNSApplied Cryptography and Network SecuritySpringerhttp://dblp.uni-trier.de/db/conf/acns/
6AsiaCCSAsia Conference on Computer and Communications SecurityACMhttp://dblp.uni-trier.de/db/conf/ccs/
7ACISPAustralasia Conference on Information Security and PrivacySpringerhttp://dblp.uni-trier.de/db/conf/acisp/
8CT-RSACryptographer’s Track at RSA ConferenceSpringerhttp://dblp.uni-trier.de/db/conf/ctrsa/
9DIMVADetection of Intrusions and Malware & Vulnerability Assessmenthttp://dblp.uni-trier.de/db/conf/dimva/
10DFRWSDigital Forensic Research WorkshopElsevierhttp://dblp.uni-trier.de/db/conf/dfrws/
11FCFinancial Cryptography and Data SecuritySpringerhttp://dblp.uni-trier.de/db/conf/fc/
12TrustComIEEE International Conference on Trust, Security and Privacy in Computing and CommunicationsIEEEhttp://dblp.uni-trier.de/db/conf/trustcom/
13SECIFIP International Information Security ConferenceSpringerhttp://dblp.uni-trier.de/db/conf/sec/
14IFIP WG 11.9IFIP WG 11.9 International Conference on Digital ForensicsSpringer*http://www.ifip119.org/Conferences/
15ISCInformation Security ConferenceSpringerhttp://dblp.uni-trier.de/db/conf/isw/
16ICDF2CInternational Conference on Digital Forensics & Cyber CrimeSpringerhttp://dblp.uni-trier.de/db/conf/icdf2c/
17ICICSInternational Conference on Information and Communications SecuritySpringerhttp://dblp.uni-trier.de/db/conf/icics/
18SecureCommInternational Conference on Security and Privacy in Communication NetworksACMhttp://dblp.unitrier.de/db/conf/securecomm/
19NSPWNew Security Paradigms WorkshopACMhttp://dblp.uni-trier.de/db/conf/nspw/
20PAMPassive and Active Measurement ConferenceSpringerhttp://dblp.uni-trier.de/db/conf/pam/
21PETSPrivacy Enhancing Technologies SymposiumSpringerhttp://dblp.uni-trier.de/db/conf/pet/
22SACSelected Areas in CryptographySpringerhttp://dblp.uni-trier.de/db/conf/sacrypt/
23SOUPSSymposium On Usable Privacy and SecurityUSENIXhttp://dblp.uni-trier.de/db/conf/soups/
24HotSecUSENIX Workshop on Hot Topics in SecurityUSENIX*http://www.usenix.org/events/

二、期刊


1、A类

序号刊物简称刊物全称出版社网址
1TDSCIEEE Transactions on Dependable and Secure ComputingIEEEhttp://dblp.uni-trier.de/db/journals/tdsc/
2TIFSIEEE Transactions on Information Forensics and SecurityIEEEhttp://dblp.uni-trier.de/db/journals/tifs/
3Journal of CryptologySpringerhttp://dblp.uni-trier.de/db/journals/joc/

2、B类

序号刊物简称刊物全称出版社网址
1TOPSACM Transactions on Privacy and SecurityACMhttps://tops.acm.org/
2Computers & SecurityElsevierhttp://dblp.uni-trier.de/db/journals/compsec/
3Designs, Codes and CryptographySpringerhttp://dblp.uni-trier.de/db/journals/dcc/
4JCSJournal of Computer SecurityIOS Presshttp://dblp.uni-trier.de/db/journals/jcs/

3、C类

序号刊物简称刊物全称出版社网址
1CLSRComputer Law and Security ReviewElsevierhttp://www.journals.elsevier.com/computer-law-and-security-review/
2EURASIP Journal on Information SecuritySpringerhttp://dblp.uni-trier.de/db/journals/ejisec/
3IET Information SecurityIEThttp://dblp.uni-trier.de/db/journals/iet-ifs/
4IMCSInformation Management & Computer SecurityEmeraldhttp://dblp.uni-trier.de/db/journals/imcs/
5IJICSInternational Journal of Information and Computer SecurityIndersciencehttp://dblp.uni-trier.de/db/journals/ijics/
6IJISPInternational Journal of Information Security and PrivacyIdea Group Inchttp://dblp.uni-trier.de/db/journals/ijisp/
7JISAJournal of Information Security and ApplicationElsevierhttps://dblp.uni-trier.de/db/journals/istr/
8SCNSecurity and Communication NetworksWileyhttp://dblp.uni-trier.de/db/journals/scn/

参考:(2019年发布)最新版《中国计算机学会推荐国际学术会议和期刊目录》正式发布 更多会议信息可在此处下载文件查看。

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值