全部博文(180)
分类: 网络与安全
2010-08-11 18:25:11
Guofei Gu
Note:
How to judge how good a conference is? In my opinion, here are several criterias:
Rank 1 |
S&P(Oakland) |
IEEE Symposium on Security and Privacy |
|
ACM Conference on Computer and Communications Security | |
|
International Cryptology Conference | |
|
European Cryptology Conference | |
Usenix Security Symposium | ||
|
ISOC Network and Distributed System Security Symposium | |
Rank 2 |
|
European Symposium on Research in Computer Security |
|
International Symposium on Recent Advances in Intrusion Detection | |
|
||
|
The International Conference on Dependable Systems and Networks | |
IEEE Computer Security Foundations Workshop | ||
|
International Conference on the Theory and Application of Cryptology and Information Security | |
Rank 3 |
||
|
Theory of Cryptography Conference | |
IEEE Communications Society/CreateNet Internation Conference on Security and Privacy for Emerging Areas in Communication Networks | ||
|
ACM Symposium on Information, Computer and Communications Security | |
|
International Conference on Applied Cryptography and Network Security | |
New Security Paradigms Workshop | ||
|
International Workshop on Public-Key Cryptography | |
|
Financial Cryptography | |
|
ACM Symposium on Applied Computing | |
|
Australasia Conference on Information Security and Privacy | |
|
International Conference on Information and Communications Security | |
ISC |
Information Security Conference | |
|
International Conference on Information Security and Cryptology | |
FSE |
Fast Software Encryption | |
IH |
Workshop on Information Hiding | |
WSPEC |
Workshop on Security and Privacy in E-commerce | |
WiSe |
ACM Workshop on Wireless Security | |
SASN |
ACM Workshop on Security of Ad-Hoc and Sensor Networks | |
WORM |
ACM Workshop on Rapid Malcode | |
DRM |
ACM Workshop on Digital Rights Management | |
SEC |
IFIP International Information Security Conference | |
|
ACM Symposium on Access Control Models and Technologies | |
|
Workshop on Cryptographic Hardware and Embedded Systems | |
CT-RSA |
RSA Conference, Cryptographers' Track | |
DIMVA |
GI SIG SIDAR Conference on Detection of Intrusions and Malware and Vulnerability Assessment | |
|
USENIX Workshop on Steps to Reducing Unwanted Traffic on the Internet | |
|
USENIX Workshop on Hot Topics in Security |
TCC(87分):一个新会议,focused on 密码学理论。起点很高,但能有多大影响还要过一段时间才能知道