Ranking
Rank 1 | S&P (Oakland) | IEEE |
ACM | ||
International Cryptology Conference | ||
European | ||
Usenix | ||
ISOC Network and Distributed System Security Symposium | ||
Rank 2
| European | |
International Symposium on Recent Advances in Intrusion Detection | ||
The International Conference on Dependable Systems and Networks | ||
CSF (CSFW) | IEEE | |
Theory of Cryptography Conference | ||
International Conference on the Theory and Application of Cryptology and Information Security | ||
Internet Measurement Conference | ||
Rank 3 | IEEE Communications Society/CreateNet Internation Conference on Security and Privacy for Emerging Areas in Communication Networks | |
GI SIG SIDAR Conference on Detection of Intrusions and Malware and Vulnerability Assessment | ||
ACM Symposium on Information, Computer and Communications Security | ||
International Conference on Applied Cryptography and Network Security | ||
International Conference on Financial Cryptography and Data Security | ||
ACM Symposium on Applied Computing | ||
ACISP | Australasia | |
International Conference on Information and Communications Security | ||
ISC | Information Security Conference | |
International Conference on Information Security and Cryptology | ||
ACM Symposium on Access Control Models and Technologies | ||
CT-RSA | RSA Conference, Cryptographers' Track | |
SEC | IFIP International Information Security Conference | |
WiSec | ACM Conference on Wireless Network Security | |
Symposium On Usable Privacy and Security | ||
IFIP WG 11.9 International Conference on Digital Forensics | ||
-- Workshops below -- | ||
Digital Forensic Research Workshop | ||
Fast Software Encryption workshop | ||
International Workshop on Public-Key Cryptography | ||
New Security Paradigms Workshop | ||
IH | Workshop | |
WSPEC | Workshop | |
DRM | ACM Workshop on Digital Rights Management | |
IEEE International Information Assurance Workshop | ||
IEEE SMC Information Assurance Workshop "The West Point Workshop" | ||
Workshop on Cryptographic Hardware and Embedded Systems | ||
USENIX Workshop on Steps to Reducing Unwanted Traffic on the Internet | ||
USENIX Workshop on Hot Topics in Security | ||
LEET | USENIX Workshop on Large-scale Exploits and Emergent Threats | |
Others (not ranked) | ISPEC | Information Security Practice and Experience Conference |
Oakland:95分,全称IEEE Symposium on Security & Privacy,每年都在Oakland召开。之所以不简称S&P,是为了跟一个magazine----IEEE Security & Privacy区分开来。被认为是计算机安全的最高会议,比ACM的CCS更受尊敬。该会自称接受一切与计算机安全的文章,以应用型为主,对理论性的文章尤其crypto-flavor的文章非常排斥。
CCS:92分,ACM SIGSAC的年会。该会宣称只接受practical papers,然而事实上却是安全方面最diversified的会议,从纯粹密码学的文章到非常应用性的文章都有。传统上该会议的politics比较严重,但今年的program committee非常强大,有望使会议质量进一步提高。
USENIX Security:91分。USENIX是systems research方面的重要组织,主办了systems方面的若干重要会议,如OSDI(操作系统的第二会议)等。USENIX Security Symposium则是systems security的著名会议,文章基本陷于hardcore systems类型。
NDSS:90分,很好的一个关于网络和分布式系统安全的会议,偏应用型。
ESORICS:88分,欧洲的计算机安全年会。跟CCS一样广泛的范围,包容性甚至更强。
CSFW:85分,一个小型的workshop,然而在安全方面有一定影响。算是为数不多的受到尊敬的workshops之一。
ACSAC:82分,一个纯粹应用型的安全会议,纯粹到其文章大部分都很难算作传统意义上的research papers。但其研究的问题都非常的实用和有趣。
SACMAT:82分,Access control方面的一个比较重要的会议。
SecureComm:今年刚刚办起来的网络安全会议。从其program commitee来看,起点很高。
CRYPTO,95分;EUROCRYPT,94分:密码学最好的两个会议。密码学跟其它领域不太一样, n,V4s�UC]X
它有自己独立的组织IACR---international association of cryptological research。 k@{ E6n&kHe(W
密码学的三大会议CRYPTO,EUROCRYPT,ASIACRYPT和最主要的journal---JOURNAL of CRYPT
OLOGY都是IACR主办的。在三大会议中,ASIACRYPT资历最浅,所以比另外两个要差一些;
虽然近年ASIACRYPT上升很快,但要完全赶上还需要一段时间。 p4^E&D?mF#S$R
TCC(87分):一个新会议,focused on 密码学理论。起点很高,但能有多大影响还要过一段时间才能知道
ACNS(84分):密码学与网络安全结合的会议。历史很短,但接受率颇低(百分之十五以下)。
http://pan.bhttp://hi.baidu.com/lvbcterseabblnq/item/461860cc8d98eb250931c6cfaidu.com/s/1mgCziek