国内最全IT社区平台 联系我们 | 收藏本站
华晨云阿里云优惠2
您当前位置:首页 > php开源 > 综合技术 > 【汇总】国际会议 信息安全相关 -- 2014-9更新

【汇总】国际会议 信息安全相关 -- 2014-9更新

来源:程序员人生   发布时间:2014-10-15 07:16:49 阅读次数:5574次

想要了解最新的学术研究动态,时刻track顶级的会议,顶级的workshop,顶级的researcher都是必要的。

添加了自己需要的会议最新日期,以及最新结束会议。并收集它们的论文集。

下面就是参考别人的表格,自己汇总的一个表格,根据会议的CIF( Conference Impact Factor )进行排列,不一定权威。将不定期更新

RK

Conference

Lasted updated

R1

1、IEEE S&P

IEEE Symposium on Security and Privacy

http://www.ieee-security.org/TC/SP-Index.html


2015 5.18-5.20

http://www.ieee-security.org/TC/SP2015/index.html

2、Usenix Sec

Usenix Security Symposium

https://www.usenix.org/conferences/byname/108

2015 5.18-5.20

https://www.usenix.org/conference/hotos15

3、ACM CCS

ACM Conference on Computer 

and Communications Security

http://www.sigsac.org/ccs.html

2014 11.3-11.7

http://www.sigsac.org/ccs/CCS2014/

4、Crypto 

International Cryptology Conference

http://www.iacr.org/conferences/

2014 8.17-21【done】

http://www.iacr.org/conferences/crypto2014/

论文集下载

5、Eurocrypt

European Cryptology Conference

http://www.iacr.org/conferences/

2015 4.26-30

Eurocrypt 2015

6、NDSS

ISOC Network and Distributed 

System Security Symposium

http://www.internetsociety.org/events/ndss-symposium

2015 2.8-11

NDSS 2015

R2

7、ESORICS

European Symposium on 

Research in Computer Security

http://homepages.laas.fr/esorics/

2014 9.7-11【done】

http://esorics2014.pwr.wroc.pl/

论文集下载

8、RAID

International Symposium on Recent 

Advances in Intrusion Detection

http://www.raid-symposium.org/

2014 9.17-19【done】

http://www.raid2014.eu/

论文集下载

9、ACSAC

Annual Computer Security Applications Conference

http://www.acsac.org/

2014 11.8-12

http://www.acsac.org/

10、DSN

The International Conference on 

Dependable Systems and Networks

http://www.ft.unicamp.br/dsn2015/

2015 6.22-25

http://www.ft.unicamp.br/dsn2015/

11、CSF(CSFW)

IEEE Computer Security Foundations Symposium
Supersedes CSFW 

(Computer Security Foundations Workshop)

http://www.ieee-security.org/CSFWweb/

2014 7.19-22【done】

http://csf2014.di.univr.it/index

12、TCC

Theory of Cryptography Conference

http://www.iacr.org/workshops/tcc/

2014 2.24-26【done】

http://www.iacr.org/workshops/tcc2014/

13、Asiacrypt

International Conference on the Theory and Application 

of Cryptology and Information Security

http://www.iacr.org/conferences/


2014 12.7-11

http://des.cse.nsysu.edu.tw/asiacrypt2014/

14、IMC

Internet Measurement Conference

http://www.sigcomm.org/events/imc-conference


2014 11.5-7

http://www.sigcomm.org/events/imc-conference

R3

15、SecureComm

IEEE Communications Society/CreateNet 

Internation Conference 

on Security and Privacy for Emerging 

Areas in Communication Networks

http://securecomm.org/2014/show/home

2014 9.24-26【done】

http://securecomm.org/2014/show/home

16、DIMVA

GISIG SIDAR Conference on Detection of Intrusions 

and Malware and VulnerabilityAssessment

http://www1.gi-ev.de/fachbereiche/sicherheit/fg/sidar/dimva/

2014 7.10-11【done】

http://dimva2014.isg.rhul.ac.uk/

17、AsiaCCS

ACM Symposium on Information, 

Computer and Communications Security

http://dsns.csie.nctu.edu.tw/asiaccs/

2015 4.14-17

http://icsd.i2r.a-star.edu.sg/asiaccs15/

18、ACNS

International Conference on Applied 

Cryptography and Network Security

http://icsd.i2r.a-star.edu.sg/staff/jianying/acns_home/

2015 6.2-5

http://acns2015.cs.columbia.edu/

19、FC

International Conference on 

Financial Cryptography and Data Security

http://fc15.ifca.ai/

2015 1.26-30

http://fc15.ifca.ai/


 

20、SAC

ACM Symposium on Applied Computing

http://www.acm.org/conferences/sac/

2015 4.13-17

http://www.acm.org/conferences/sac/sac2015/

21、ACISP

Australasia Conference on 

Information Security and Privacy 

2014 7.7-9【done】

https://ssl.informatics.uow.edu.au/acisp2014/

22、ICICS

International Conference on Information 

and Communications Security

2014 12.16-17

http://www.cs.hku.hk/icics2014/

23、ICISC

InternationalConference on

Information Security and Cryptology

http://www.icisc.org/icisc14/asp/index.html

2014 12.3-5

http://www.icisc.org/icisc14/asp/index.html

24、SACMAT

ACM Symposium on Access 

Control Models and Technologies

http://www.sacmat.org/2015/index.php

2015 6.1-3

http://www.sacmat.org/2015/index.php

25、WiSec

ACM Conference on Wireless Network Security
Supersedes WiSe (ACM Workshop on Wireless Security) 

and SASN (ACM Workshop on Security of 

Ad-Hoc and Sensor Networks)

http://www.sigsac.org/wisec/WiSec2014/


2014 7.23-25【done】

http://www.sigsac.org/wisec/WiSec2014/

26、SOUPS

Symposium On Usable Privacy and Security

http://cups.cs.cmu.edu/soups/2014/

2015 7.22-24

http://cups.cs.cmu.edu/soups/2014/

27、MALWARE

International Conference on 

Malicious and Unwanted Software

http://www.malwareconference.org/


2014 10.28-30

http://www.malwareconference.org/

28、CODASPY

ACM Conference on Data and 

Application Security and Privacy

http://codaspy.utsa.edu/cfp.html

2015 3.2-4

http://codaspy.utsa.edu/cfp.html

Workshop

 

1、CHES

Workshop on Cryptographic Hardware and Embedded Systems


2014 9.23-26【done】

http://www.chesworkshop.org/ches2014/start.php


 

2、LEET

USENIX Workshop on Large-scale Exploits and Emergent Threats
Supersedes HotBots (USENIX Workshop on Hot Topics in Understanding Botnets) 

and WORM (ACM Workshop on Recurring/Rapid Malcode)


 

 

 

CIF  Reference:

http://icsd.i2r.a-star.edu.sg/staff/jianying/conference-ranking.html

Reference Ranking:

http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm


生活不易,码农辛苦
如果您觉得本网站对您的学习有所帮助,可以手机扫描二维码进行捐赠
程序员人生
------分隔线----------------------------
分享到:
------分隔线----------------------------
关闭
程序员人生