Top conferences in security & privacy 1–100 of 138 results
Conferences Publications
 
1
CRYPTO - International Crytology Conference 1257 117
2
EUROCRYPT - Theory and Application of Cryptographic Techniques 1164 104
3
S&P - IEEE Symposium on Security and Privacy 798 101
4
CCS - ACM Conference on Computer and Communications Security 1163 90
5
USENIX Security Symposium 515 74
6
NDSS - Network and Distributed System Security Symposium 337 65
7
CSFW - Computer Security Foundations Workshop 574 59
8
ASIACRYPT - International Conference on the Theory and Application of Cryptology and Information Security 724 54
9
CHES - Cryptographic Hardware and Embedded Systems 427 53
10
Information Hiding 326 52
11
DSN - Dependable Systems and Networks 1042 51
12
ACSAC - Annual Computer Security Applications Conference 925 47
13
IAS - Information Assurance and Security 1180 46
14
FSE - Fast Software Encryption 476 46
15
SACMAT - Symposium on Access Control Models and Technologies 261 45
16
PKC - Public Key Cryptography 425 42
17
RAID - Recent Advances in Intrusion Detection 301 41
18
Financial Cryptography 450 40
19
CT-RSA - The Cryptographer's Track at RSA Conference 301 38
20
ESORICS - European Symposium on Research in Computer Security 503 37
21
NSPW - Workshop on New Security Paradigms 273 36
22
LISA - USENIX Systems Administration Conference 738 35
23
DISCEX - DARPA Information Survivability Conference and Exposition 253 35
24
SAC - Selected Areas in Cryptography 589 32
25
Theory of Cryptography 277 32
26
ACISP - Australasian Conference on Information Security and Privacy 546 29
27
ICISC - Information Security and Cryptology 357 29
28
ACM Workshop on Role-Based Access Control 91 29
29
ISC(ISW) - Information Security Conference/Information Security Workshop 438 28
30
SASN - workshop on security of ad hoc and sensor networks 66 28
31
PETS - Privacy Enhancing Technologies 169 27
32
Security Protocols Workshop 355 25
33
ANTS - Algorithmic Number Theory Symposium 355 25
34
WPES - Workshop On Privacy In The Electronic Society 150 25
35
ICICS - International Conference on Information and Communication Security 495 24
36
IWSEC - International Workshop on Security 311 24
37
WORM - workshop on rapid malcode 50 24
38
Applied Cryptography and Network Security 269 21
39
IMA Conference on Cryptography and Coding 257 21
40
CARDIS - Tenth Smart Card Research and Advanced Application Conference 191 21
41
IMF - IT-Incidents Management & IT-Forensics 152 21
42
AES Candidate Conference 75 21
43
SEC - Information Security 611 20
44
INDOCRYPT - International Conference on Cryptology 353 20
45
WITS - Workshop on Issues in the Theory of Security 200 20
46
IAW - IEEE Information Assurance Workshop 314 19
47
DRM - ACM Digital Rights Management Workshop 137 19
48
Intelligence and Security Informatics 750 18
49
SAFECOMP - International Conference on Computer Safety, Reliability and Security 471 18
50
CMS - Communications and Multimedia Security 235 18
51
IEEEARES - Availability, Reliability and Security 883 17
52
SOUPS - Symposium On Usable Privacy and Security 131 17
53
DIMVA - Detection of Intrusions and Malware & Vulnerability Assessment 91 17
54
ICNSC - International Conference on Networking, Sensing and Control 1768 16
55
CSE - IEEE International Conference on Computational Science and Engineering 809 16
56
WS - Wireless Security 23 16
57
WISA - Workshop on Information Security Applications 243 13
58
MMM-ACNS - Mathematical Methods, Models, and Architectures for Network Security Systems 148 13
59
Pairing - Pairing-Based Cryptography 90 13
60
WISEC - Wireless Network Security 81 13
61
SCS - Australian Workshop on Safety Critical Systems and Software 67 13
62
ISSS - International Symposium on Software Security 49 13
63
Foundations of Security Analysis and Design 47 13
64
IEEE Security in Storage Workshop 37 13
65
ACM Workshop on Wireless Security 33 13
66
ITNG - International Conference on Information Technology: New Generations 1392 12
67
ACSW - ACSW Frontiers 89 12
68
IEEE International Workshop on Information Assurance 55 12
69
Workshop on Design Issues in Anonymity and Unobservability 16 12
70
CIS - Computational and Information Science 664 11
71
PST - Conference on Privacy, Security and Trust 233 11
72
CANS - Cryptology and Network Security 160 11
73
FDTC - Fault Diagnosis and Tolerance in Cryptography 90 11
74
SWS - Secure Web Services 79 11
75
StorageSS - Storage Security And Survivability 47 11
76
Mobile Agents and Security 20 11
77
EUROPKI - European Public Key Infrastructure Workshop 139 10
78
AFRICACRYPT - International Conference on Progress in Cryptology in Africa 81 10
79
ETRICS - Emerging Trends in Information and Communication Security 37 10
80
ISPEC - Information Security Practice and Experience 224 9
81
TRUSTBUS - Trust and Privacy in Digital Business 178 9
82
Inscrypt - Conference on Information Security and Cryptology 166 9
83
TRUST - Trusted Computing - Challenges and Applications 64 9
84
DFRWS - Digital Forensic Research Workshop 25 9
85
MYCRYPT - Inf. Conf. on Cryptology in Malaysia 25 9
86
CaLC - Cryptography and Lattices 16 9
87
Workshop on Intrusion Detection and Network Monitoring 15 9
88
SAM - Security and Management 767 8
89
Infrastructure Security 25 8
90
Formal Aspects of Security 23 8
91
E-smart - Research in Smart Cards 22 8
92
ICETET - International Conference on Emerging Trends in Engineering & Technology 712 7
93
ICISS - International Conference on Information Systems Security 161 7
94
CFP - Computers, Freedom and Privacy 121 7
95
CRITIS - Critical Information Infrastructures Security 110 7
96
SADFE - Systematic Approaches to Digital Forensic Engineering 101 7
97
WISTP - Workshop in Information Security Theory and Practice 75 7
98
VIZSEC - IEEE Workshop on Visualization for Computer Security 60 7
99
Cryptography: Policy and Algorithms 30 7
100
SECPERU - Security, Privacy and Trust in Pervasive and Ubiquitous Computing 29 7