Network and Information Security
A CLASS
NUMBER | ABBREVIATION | CONFERENCE |
1 | CCS | ACM Conference on Computer and Communications Security |
2 | EUROCRYPT | European Cryptology Conference |
3 | S&P | IEEE Symposium on Security and Privacy |
4 | CRYPTO | International Cryptology Conference |
5 | USENIX Security | Usenix Security Symposium |
6 | NDSS | ISOC Network and Distributed System Security Symposium |
B CLASS
NUMBER | ABBREVIATION | CONFERENCE |
1 | ACSAC | Annual Computer Security Applications Conference |
2 | ASIACRYPT | Annual International Conference on the Theory and Application of Cryptology and Information Security |
3 | ESORICS | European Symposium on Research in Computer Security |
4 | FSE | Fast Software Encryption |
5 | CSFW | IEEE Computer Security Foundations Workshop |
6 | SRDS | IEEE International Symposium on Reliable Distributed Systems |
7 | CHES | International Conference on Cryptographic Hardware and Embedded Systems |
8 | DSN | International Conference on Dependable Systems and Networks |
9 | RAID | International Symposium on Recent Advances in Intrusion Detection |
10 | PKC | International Workshop on Practice and Theory in Public Key Cryptography |
11 | TCC | Theory of Cryptography Conference |
C CLASS
NUMBER | ABBREVIATION | CONFERENCE |
1 | WiSec | ACM Conference on Security and Privacy in Wireless and Mobile Networks |
2 | SACMAT | ACM Symposium on Access Control Models and Technologies |
3 | DRM | ACM Workshop on Digital Rights Management |
4 |
IH&MMSec | ACM Workshop on Information Hiding and Multimedia Security |
5 | ACNS | Applied Cryptography and Network Security |
6 | AsiaCCS | Asia Conference on Computer and Communications Security |
7 | ACISP | Australasia Conference on Information Security and Privacy |
8 | CT-RSA | Cryptographer's Track at RSA Conference |
9 | DIMVA | Detection of Intrusions and Malware & Vulnerability Assessment |
10 | DFRWS | Digital Forensic Research Workshop |
11 | FC | Financial Cryptography and Data Security |
12 | TrustCom | IEEE International Conference on Trust, Security and Privacy in Computing and Communications |
13 | SEC | IFIP International Information Security Conference |
14 | IFIP WG 11.9 | IFIP WG 11.9 International Conference on Digital Forensics |
15 | ISC | Information Security Conference |
16 | ICDF2C | International Conference on Digital Forensics & Cyber Crime |
17 | ICICS | International Conference on Information and Communications Security |
18 | SecureComm | International Conference on Security and Privacy in Communication Networks |
19 | NSPW | New Security Paradigms Workshop |
20 | PAM | Passive and Active Measurement Conference |
21 | PETS | Privacy Enhancing Technologies Symposium |
22 | SAC | Selected Areas in Cryptography |
23 | SOUPS | Symposium On Usable Privacy and Security |
24 | HotSec | USENIX Workshop on Hot Topics in Security |
25 | EuroS&P | IEEE European Symposium on Security and Privacy |
26 | Inscrypt | International Conference on Information Security and Cryptology |
This article is reproduced from the official website of the conference, reproduced contact the author and indicate the source:http://confobserver.com/Resources/313.html