ConferenceCORECCFguide2research
ACM Conference on Computer and Communications Security(ACM CCS) A* A 12
CRYPTO A* A 53
EUROCRYPT A* A 46
IEEE Symposium on Security and Privacy(S&P) A* A 85
IEEE International Conference on Computer Communications(INFOCOM) A* A 19
Usenix Security Symposium(USENIX Security) A* A 11
Annual Computer Security Applications Conference (ACSAC) A B 129
ASIACRYPT A B 168
European Symposium on Research in Computer Security(ESORICS) A B 80
IEEE International Symposium on Reliable Distributed Systems(SRDS) A B 374
Usenix Network and Distributed System Security Symposium (NDSS) A B 32
IEEE Computer Security Foundations Symposium(CSF) A B 228
International Symposium on Research in Attacks, Intrusions and Defenses(RAID) A B 119
International Conference on Dependable Systems and Networks(DSN) A B 143
Theory of Cryptography Conference (TCC) A B 249
International Conference on Security and Privacy in Communication Networks(SecureCom) A C 486
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TRUSTCOM) A C 288
Fast Software Encryption(FSE) B B -
International Conference/Workshop on Practice and Theory in Public Key Cryptography(PKC) B B -
ACM Symposium on Information, Computer and Communications Security (AsiaCCS) B C 74
International Conference on Applied Cryptography and Network Security (ACNS) B C 134
IEEE International Conference on Communications(ICC) B - 23
Information Security Practice and Experience Conference (ISPEC) B - 735
International Conference on Provable Security (ProvSec) B - 745
International Conference on Information Security and Cryptology (ICISC) B - 584
International Conference on Cryptology and Network Security (CANS) B - 805
Workshop on Cryptographic Hardware and Embedded Systems(CHES) C B 272
Top