根据Guofei Gu的Computer Security Conference Ranking为主排名, 列出了部分会议的中国计算机协会(CCF)2019年版会议分级和中国密码协会(CACR)2018年版会议分级, 其中CCF分级以网络与信息安全为基准.
级别 | 会议全称 | 会议简称 | 会议类型 | CCF分级 | CACR分级 |
---|---|---|---|---|---|
1 | IEEE Symposium on Security and Privacy | S&P | 安全 | A | A |
1 | ACM Conference on Computer and Communications Security | CCS | 安全 | A | A |
1 | USENIX Security Symposium | USENIX Security | 安全 | A | |
1 | ISOC Network and Distributed System Security Symposium | NDSS | 安全 | B | |
1 | International Cryptology Conference | Crypto | 密码 | A | A |
1 | European Cryptology Conference | Eurocrypt | 密码 | A | A |
2 | European Symposium on Research in Computer Security | ESORICS | 安全 | B | |
2 | International Symposium on Recent Advances in Intrusion Detection | RAID | 安全 | B | |
2 | Annual Computer Security Applications Conference | ACSAC | 安全 | B | |
2 | The International Conference on Dependable Systems and Networks | DSN | 安全 | B | |
2 | Internet Measurement Conference | IMC | 安全 | ||
2 | ACM Symposium on Information, Computer and Communications Security | ASIACCS | 安全 | C | B |
2 | Privacy Enhancing Technologies Symposium | PETS | 安全 | C | |
2 | IEEE European Symposium on Security and Privacy | EuroS&P | 安全 | ||
2 | EEE Computer Security Foundations Symposium. Supersedes CSFW (Computer Security Foundations Workshop) |
CSF (CSFW) |
安全 | B | |
2 | International Conference on the Theory and Application of Cryptology and Information Security | Asiacrypt | 密码 | B | A |
2 | Theory of Cryptography Conference | TCC | 密码 | B | B |
2 | Conference on Cryptographic Hardware and Embedded Systems | CHES | 密码 | B | B |
3 | Internation Conference on Security and Privacy in Communication Networks | SecureComm | 安全 | C | |
3 | IEEE Conference on Communications and Network Security | CNS | 安全 | ||
3 | GI SIG SIDAR Conference on Detection of Intrusions and Malware and Vulnerability Assessment | DIMVA | 安全 | C | |
3 | International Conference on Applied Cryptography and Network Security | ACNS | 安全 | C | C |
3 | ACM Symposium on Applied Computing | SAC | 安全 | C | |
3 | Australasia Conference on Information Security and Privacy | ACISP | 安全 | C | C |
3 | International Conference on Information and Communications Security | ICICS | 安全 | C | |
3 | Information Security Conference | ISC | 安全 | C | C |
3 | International Conference on Information Security and Cryptology | ICISC | 安全 | C | |
3 | ACM Symposium on Access Control Models and Technologies | SACMAT | 安全 | C | |
3 | IFIP International Information Security Conference | SEC | 安全 | C | |
3 | ACM Conference on Wireless Network Security Supersedes WiSe (ACM Workshop on Wireless Security) and SASN (ACM Workshop on Security of Ad-Hoc and Sensor Networks) | WiSec (WiSe, SASN) |
安全 | C | |
3 | Symposium On Usable Privacy and Security | SOUPS | 安全 | C | |
3 | IFIP WG 11.9 International Conference on Digital Forensics | IFIP WG 11.9 | 安全 | C | |
3 | Digital Forensic Research Conference | DFRWS | 安全 | C | |
3 | ACM Conference on Data and Application Security and Privacy | CODASPY | 安全 | ||
3 | International Conference on Malicious and Unwanted Software | MALCON | 安全 | ||
3 | Conference on Fast Software Encryption | FSE | 密码 | B | B |
3 | International Conference on Practice and Theory in Public Key Cryptography | PKC | 密码 | B | B |
3 | International Conference on Financial Cryptography and Data Security | FC | 密码 | C | B |
3 | RSA Conference, Cryptographers' Track | CT-RSA | 密码 | C | B |
3 | IEEE International Symposium on Hardware Oriented Security and Trust | HOST | 密码 | ||
3 | USENIX Summit on Hot Topics in Security | HotSec | 研讨会 | C | |
3 | New Security Paradigms Workshop | NSPW | 研讨会 | C | |
3 | Workshop on Information Hiding and Multimedia Security | IH&MMSec | 研讨会 | C | |
3 | IEEE International Information Assurance Workshop | IWIA | 研讨会 | ||
4 | IEEE Secure Development Conference | SecDev | 安全 | ||
4 | Information Security Practice and Experience Conference | ISPEC | 安全 | C | |
4 | Nordic Conference on Secure IT Systems | NordSec | 安全 | ||
4 | International Conference on Information Theoretic Security | ICITS | 安全 |
本文标题: 安全与密码会议排名
本文作者: 云中雨雾
本文链接: https://weiviming.github.io/16425853998520.html
本站文章采用 知识共享署名4.0 国际许可协议进行许可
除注明转载/出处外,均为本站原创或翻译,转载前请务必署名
最后编辑时间: 2022-01-19T17:43:19+08:00