| Rank1 | S&P(Oakland) | IEEE Symposium on Security and Privacy |
| CCS | ACM Conference on Computer and Communications Security |
| Crypto | InternationalCryptology Conference |
| Eurocrypt | European CryptologyConference |
Security | Usenix Security Symposium |
| NDSS | ISOC Network andDistributed System Security Symposium |
Rank2
| ESORICS | European Symposium on Research in Computer Security |
| RAID | InternationalSymposium on Recent Advances in Intrusion Detection |
| ACSAC | Annual Computer Security ApplicationsConference |
| DSN | TheInternational Conference on Dependable Systems and Networks |
| CSF(CSFW) | IEEE ComputerSecurity Foundations Symposium.
Supersedes CSFW(Computer Security Foundations Workshop) |
| TCC | Theory ofCryptography Conference |
| Asiacrypt | InternationalConference on the Theory and Application of Cryptology and InformationSecurity |
| IMC | InternetMeasurement Conference |
| Rank3 | SecureComm | IEEECommunications Society/CreateNet Internation Conference on Security andPrivacy for Emerging Areas in Communication Networks |
| DIMVA | GI SIG SIDARConference on Detection of Intrusions and Malware and VulnerabilityAssessment |
| AsiaCCS | ACM Symposium onInformation, Computer and Communications Security |
| ACNS | InternationalConference on Applied Cryptography and Network Security |
| FC | InternationalConference on Financial Cryptography and Data Security |
| SAC | ACM Symposium onApplied Computing |
| ACISP | Australasia Conference on Information Security and Privacy |
| ICICS | InternationalConference on Information and Communications Security |
| ISC | InformationSecurity Conference |
| ICISC | InternationalConference on Information Security and Cryptology |
| SACMAT | ACM Symposium onAccess Control Models and Technologies |
| CT-RSA | RSA Conference,Cryptographers' Track |
| SEC | IFIPInternational Information Security Conference |
WiSec
(WiSe, SASN) | ACM Conferenceon Wireless Network Security
Supersedes WiSe (ACM Workshop on Wireless Security) and SASN (ACMWorkshop on Security of Ad-Hoc and Sensor Networks) |
| SOUPS | Symposium On Usable Privacy and Security |
| IFIP WG 11.9 | IFIP WG 11.9 International Conference on DigitalForensics |
| --Workshops below -- |
| DFRWS | Digital Forensic Research Workshop |
| FSE | Fast SoftwareEncryption workshop |
| PKC | InternationalWorkshop on Public-Key Cryptography |
| NSPW | New SecurityParadigms Workshop |
| IH | Workshop on Information Hiding |
| WSPEC | Workshop on Security and Privacy in E-commerce |
| DRM | ACM Workshop onDigital Rights Management |
| IWIA | IEEEInternational Information Assurance Workshop |
| IAW | IEEE SMCInformation Assurance Workshop "The West Point Workshop" |
| CHES | Workshop onCryptographic Hardware and Embedded Systems |
| SRUTI | USENIX Workshopon Steps to Reducing Unwanted Traffic on the Internet |
| HotSec | USENIX Workshopon Hot Topics in Security |
LEET
(HotBots,WORM) | USENIX Workshopon Large-scale Exploits and Emergent Threats
Supersedes HotBots (USENIX Workshop on Hot Topics in UnderstandingBotnets) and WORM (ACM Workshop on Recurring/Rapid Malcode) |
| Others(not ranked) | ISPEC | InformationSecurity Practice and Experience Conference |