中国计算机学会推荐的网络与信息安全类国际学术刊物与会议.doc_第1页
中国计算机学会推荐的网络与信息安全类国际学术刊物与会议.doc_第2页
中国计算机学会推荐的网络与信息安全类国际学术刊物与会议.doc_第3页
中国计算机学会推荐的网络与信息安全类国际学术刊物与会议.doc_第4页
中国计算机学会推荐的网络与信息安全类国际学术刊物与会议.doc_第5页
已阅读5页,还剩2页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

中国计算机学会推荐国际学术刊物(网络/信息安全)一、 A类序号刊物简称刊物全称出版社网址1.TIFSIEEE Transactions on Information Forensics and Security IEEE/organizations/society/sp/tifs.html2.TDSCIEEE Transactions on Dependable and Secure Computing IEEE/tdsc/3.TISSECACM Transactions on Information and System Security ACM/二、 B类序号刊物简称刊物全称出版社网址1.Journal of CryptologySpringer/jofc/jofc.html2.Journal of Computer SecurityIOS Press /jcs/3.IEEE Security & PrivacyIEEE/security/4.Computers & SecurityElsevierhttp:/www.elsevier.nl/inca/publications/store/4/0/5/8/7/7/5.JISecJournal of Internet SecurityNahum Goldmann./JiSec/index.asp6.Designs, Codes and CryptographySpringer/east/home/math/numbers?SGWID=5-10048-70-35730330-07.IET Information SecurityIET/IET-IFS8.EURASIP Journal on Information SecurityHindawi/journals/is三、C类序号刊物简称刊物全称出版社网址1.CISDAComputational Intelligence for Security and Defense ApplicationsIEEE/2.CLSRComputer Law and Security ReportsElsevier/science/journal/026736493.Information Management & Computer SecurityMCB University Press/info/journals/imcs/imcs.jsp4.Information Security Technical ReportElsevier/locate/istr中国计算机学会推荐国际学术会议(网络/信息安全方向)一、A类序号会议简称会议全称出版社网址1.S&PIEEESymposiumonSecurityandPrivacyIEEE/TC/SP-Index.html2.CCSACMConferenceonComputerandCommunicationsSecurityACM/sigs/sigsac/ccs/3.CRYPTOInternational Cryptology ConferenceSpringer-Verlag/conferences/二、B类序号会议简称会议全称出版社网址1.SecurityUSENIXSecuritySymposiumUSENIX/events/2.NDSSISOC Network and Distributed System Security SymposiumInternet Society/isoc/conferences/ndss/3.EurocryptAnnual International Conference on the Theory and Applications of Cryptographic TechniquesSpringer/conferences/eurocrypt2009/4.IHWorkshop on Information HidingSpringer-Verlaghttp:/www.cl.cam.ac.uk/rja14/ihws.html5.ESORICSEuropeanSymposiumonResearchinComputerSecuritySpringer-Verlaghttp:/www.laas.fr/%7Eesorics/6.RAIDInternational Symposium on Recent Advances in Intrusion DetectionSpringer-Verlag/7.ACSACAnnual Computer Security Applications ConferenceIEEE/8.DSNThe International Conference on Dependable Systems and NetworksIEEE/IFIP/9.CSFWIEEE Computer Security Foundations Workshop/CSFWweb/10.TCCTheory of Cryptography Conference Springer-Verlag/tcc08/11.ASIACRYPTAnnual International Conference on the Theory and Application of Cryptology and Information SecuritySpringer-Verlag/conferences/12.PKCInternational Workshop on Practice and Theory in Public Key CryptographySpringer-Verlag/workshops/pkc2008/三、 C类序号会议简称会议全称出版社网址1.SecureCommInternational Conference on Security and Privacy in Communication NetworksACM/2.ASIACCSACM Symposium on Information, Computer and Communications SecurityACM.tw/asiaccs/3.ACNSApplied Cryptography and Network SecuritySpringer-Verlag/acns_home/4.NSPWNew Security Paradigms WorkshopACM/current/5.FCFinancialCryptographySpringer-Verlaghttp:/fc08.ifca.ai/6.SACACM Symposium on Applied ComputingACM/conferences/sac/7.ICICSInternational Conference on Information and Communications SecuritySpringer/ICICS06/8.ISCInformation Security ConferenceSpringer/9.ICISCInternational Conference on Information Security and CryptologySpringer/10.FSEFast Software Encryption Springerhttp:/fse2008.epfl.ch/11.WiSeACM Workshop on Wireless SecurityACM/adrian/wise2004/12.SASNACM Workshop on Security of Ad-Hoc and Sensor NetworksACM/szhu/SASN2006/13.WORMACM Workshop on Rapid MalcodeACM/farnam/worm2006.html14.DRMACM Workshop on Digital Rights ManagementACM/drm2007/15.SECIFIP International Information Security ConferenceSpringerhttp:/sec2008.dti.unimi.it/16.IWIAIEEE International Information Assurance WorkshopIEEE/17.IAWIEEE SMC Information Assurance WorkshopIEEE/workshop18.SACMATACM Symposium on Access Control Models and TechnologiesACM/19.CHESWorkshop on Cryptographic Hardware and Embedded Systems Springer/20.CT-RSARSA Conference, Cryptographers TrackSpringer/21.DIMVASIG SIDAR Conference on Detection of Intrusions and Malware and Vulnerability AssessmentIEEE/dimva200622.SRUTISteps to Reducing Unwanted Traffic on the InternetUSENIXhttp:/www.usenix

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论