2010-09-29 12:17
表格转自
http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htmRank 1
S&P (Oakland)
IEEE Symposium on Security and Privacy
CCSACM Conference on Computer and Communications Security
Crypto International Cryptology Conference
EurocryptEuropean Cryptology Conference
SecurityUsenix Security Symposium
NDSSISOC Network and Distributed System Security Symposium
Rank 2
ESORICS European Symposium on Research in Computer Security
RAIDInternational Symposium on Recent Advances in Intrusion Detection
ACSACAnnual Computer Security Applications ConferenceDSNThe International Conference on Dependable Systems and Networks
CSF (CSFW)IEEE Computer Security Foundations Symposium.
Supersedes CSFW (Computer Security Foundations Workshop)
TCCTheory of Cryptography Conference
AsiacryptInternational Conference on the Theory and Application of Cryptology and Information Security
IMCInternet Measurement Conference
Rank 3
SecureComm IEEE Communications Society/CreateNet Internation Conference on Security and Privacy for Emerging Areas in Communication Networks
DIMVAGI SIG SIDAR Conference on Detection of Intrusions and Malware and Vulnerability Assessment
AsiaCCSACM Symposium on Information, Computer and Communications Security
ACNSInternational Conference on Applied Cryptography and Network Security
FCInternational Conference on Financial Cryptography and Data Security
SACACM Symposium on Applied Computing
ACISPAustralasia Conference on Information Security and Privacy
ICICSInternational Conference on Information and Communications Security
ISCInformation Security Conference
ICISCInternational Conference on Information Security and Cryptology
SACMATACM Symposium on Access Control Models and Technologies
CT-RSARSA Conference, Cryptographers' Track
SECIFIP International Information Security Conference
WiSec(WiSe, SASN)ACM Conference on Wireless Network Security
Supersedes WiSe (ACM Workshop on Wireless Security) and SASN (ACM Workshop on Security of Ad-Hoc and Sensor Networks)
SOUPSSymposium On Usable Privacy and Security
IFIP WG 11.9IFIP WG 11.9 International Conference on Digital Forensics
-- Workshops below --
DFRWSDigital Forensic Research Workshop
FSEFast Software Encryption workshop
PKCInternational Workshop on Public-Key Cryptography
NSPWNew Security Paradigms Workshop
IHWorkshop on Information Hiding
WSPECWorkshop on Security and Privacy in E-commerce
DRMACM Workshop on Digital Rights Management
IWIAIEEE International Information Assurance Workshop
IAWIEEE SMC Information Assurance Workshop "The West Point Workshop"
CHESWorkshop on Cryptographic Hardware and Embedded Systems
SRUTIUSENIX Workshop on Steps to Reducing Unwanted Traffic on the Internet
HotSecUSENIX Workshop on Hot Topics in Security
LEET(HotBots,WORM)USENIX Workshop on Large-scale Exploits and Emergent Threats
Supersedes HotBots (USENIX Workshop on Hot Topics in Understanding Botnets) and WORM (ACM Workshop on Recurring/Rapid Malcode)
Others (not ranked) ISPECInformation Security Practice and Experience Conference
Oakland:95分,全称IEEE Symposium on Security & Privacy,每年都在Oakland召开。
之所以不简称S&P,是为了跟一个magazine----IEEE Security & Privacy区分开来。被认
为是计算机安全的最高会议,比ACM的CCS更受尊敬。该会自称接受一切与计算机安全的文
章,但我感觉其以应用型为主,对理论性的文章尤其crypto-flavor的文章非常排斥。
CCS:92分,ACM SIGSAC的年会。该会宣称只接受practical papers,然而事实上却是安全
方面最diversified的会议,从纯粹密码学的文章到非常应用性的文章都有。传统上该会议
的politics比较严重,但今年的program committee非常强大,有望使会议质量进一步提高
。
USENIX Security:91分。USENIX是systems research方面的重要组织,主办了systems方面的若干重要会议,如OSDI(操作系统的第二会议)等。USENIX Security Symposium则是systems security的著名会议,文章基本陷于hardcore systems类型。
NDSS:90分,很好的一个关于网络和分布式系统安全的会议,偏应用型。
ESORICS:88分,欧洲的计算机安全年会。跟CCS一样广泛的范围,包容性甚至更强。
CSFW:85分,一个小型的workshop,然而在安全方面有一定影响。算是为数不多的受到尊
敬的workshops之一。
ACSAC:82分?一个纯粹应用型的安全会议,纯粹到其文章大部分都很难算作传统意义上的
research papers。但其研究的问题都非常的实用和有趣。
SACMAT:82分?Access control方面的一个比较重要的会议。
SecureComm:今年刚刚办起来的网络安全会议。从其program commitee来看,起点很高。
但能有多大影响还要过一段时间才能知道。
***********************************
CRYPTO(95分),EUROCRYPT(94分),ASIACRYPT(90分):IACR的三大年会,在“我知
道的几个理论会议”里已经写过。
TCC(87分):一个新会议,focused on 密码学理论。起点很高,但能有多大影响还要过一段时间才能知道
ACNS(84分?):密码学与网络安全结合的会议。历史很短,但接受率颇低(百分之十五
以下)。
转自:
http://blog.csdn.net/lionzl/archive/2009/04/30/4139822.aspx