Rank1 | S&P(Oakland) | IEEE Symposium on Security and Privacy |
CCS | ACM Conference on Computer and Communications Security |
Crypto | InternationalCryptology Conference |
Eurocrypt | European CryptologyConference |
Security | Usenix Security Symposium |
NDSS | ISOC Network andDistributed System Security Symposium |
Rank2
| ESORICS | European Symposium on Research in Computer Security |
RAID | InternationalSymposium on Recent Advances in Intrusion Detection |
ACSAC | Annual Computer Security ApplicationsConference |
DSN | TheInternational Conference on Dependable Systems and Networks |
CSF(CSFW) | IEEE ComputerSecurity Foundations Symposium.
Supersedes CSFW(Computer Security Foundations Workshop) |
TCC | Theory ofCryptography Conference |
Asiacrypt | InternationalConference on the Theory and Application of Cryptology and InformationSecurity |
IMC | InternetMeasurement Conference |
Rank3 | SecureComm | IEEECommunications Society/CreateNet Internation Conference on Security andPrivacy for Emerging Areas in Communication Networks |
DIMVA | GI SIG SIDARConference on Detection of Intrusions and Malware and VulnerabilityAssessment |
AsiaCCS | ACM Symposium onInformation, Computer and Communications Security |
ACNS | InternationalConference on Applied Cryptography and Network Security |
FC | InternationalConference on Financial Cryptography and Data Security |
SAC | ACM Symposium onApplied Computing |
ACISP | Australasia Conference on Information Security and Privacy |
ICICS | InternationalConference on Information and Communications Security |
ISC | InformationSecurity Conference |
ICISC | InternationalConference on Information Security and Cryptology |
SACMAT | ACM Symposium onAccess Control Models and Technologies |
CT-RSA | RSA Conference,Cryptographers' Track |
SEC | IFIPInternational Information Security Conference |
WiSec
(WiSe, SASN) | ACM Conferenceon Wireless Network Security
Supersedes WiSe (ACM Workshop on Wireless Security) and SASN (ACMWorkshop on Security of Ad-Hoc and Sensor Networks) |
SOUPS | Symposium On Usable Privacy and Security |
IFIP WG 11.9 | IFIP WG 11.9 International Conference on DigitalForensics |
--Workshops below -- |
DFRWS | Digital Forensic Research Workshop |
FSE | Fast SoftwareEncryption workshop |
PKC | InternationalWorkshop on Public-Key Cryptography |
NSPW | New SecurityParadigms Workshop |
IH | Workshop on Information Hiding |
WSPEC | Workshop on Security and Privacy in E-commerce |
DRM | ACM Workshop onDigital Rights Management |
IWIA | IEEEInternational Information Assurance Workshop |
IAW | IEEE SMCInformation Assurance Workshop "The West Point Workshop" |
CHES | Workshop onCryptographic Hardware and Embedded Systems |
SRUTI | USENIX Workshopon Steps to Reducing Unwanted Traffic on the Internet |
HotSec | USENIX Workshopon Hot Topics in Security |
LEET
(HotBots,WORM) | USENIX Workshopon Large-scale Exploits and Emergent Threats
Supersedes HotBots (USENIX Workshop on Hot Topics in UnderstandingBotnets) and WORM (ACM Workshop on Recurring/Rapid Malcode) |
Others(not ranked) | ISPEC | InformationSecurity Practice and Experience Conference |