Computer & Communications Security Abstracts
Computer & Communications Security Abstracts
Computer & Communications Security Abstracts
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
CCSA Accredited Journal list<br />
ACM Computing Surveys<br />
ACM Trans on <strong>Computer</strong> Systems<br />
ACM Transactions on Information and<br />
System <strong>Security</strong><br />
ACM Trans on Information Systems<br />
ACM Trans on Programming<br />
Languages and Systems<br />
ACM Trans on Software Engineering<br />
and Methodology<br />
Ad Hoc Networks<br />
Advances in Mathematics of<br />
<strong>Communications</strong><br />
Applicable Algebra in Engineering:<br />
Communication and Computing<br />
Bell Labs Technical Journal<br />
BT Technology Journal<br />
<strong>Communications</strong> of the ACM<br />
Complexity<br />
<strong>Computer</strong> Communication Review<br />
<strong>Computer</strong> <strong>Communications</strong><br />
<strong>Computer</strong> Fraud & <strong>Security</strong><br />
<strong>Computer</strong> Journal, The<br />
<strong>Computer</strong> Law and <strong>Security</strong> Review<br />
<strong>Computer</strong> Networks<br />
<strong>Computer</strong>s & <strong>Security</strong><br />
Cryptologia<br />
Designs, Codes and Cryptography<br />
Discrete Applied Mathematics<br />
Electronic Commerce Research<br />
Electronics Letters<br />
Ethics and Information Technology<br />
EURASIP Journal on Applied Signal<br />
Processing<br />
EURASIP Journal on Information<br />
<strong>Security</strong><br />
Formal Methods in System Design<br />
IET <strong>Communications</strong><br />
IET <strong>Computer</strong>s and Digital Techniques<br />
IET Information <strong>Security</strong><br />
IET Software<br />
IEEE/ACM Trans. on Networking<br />
IEEE <strong>Communications</strong> Letters<br />
IEEE <strong>Communications</strong> Magazine<br />
IEEE <strong>Computer</strong> Magazine<br />
IEEE Internet Computing<br />
IEEE Journal of Selected Areas in<br />
<strong>Communications</strong><br />
IEEE Network<br />
IEEE Pervasive Computing<br />
IEEE <strong>Security</strong> & Privacy Magazine<br />
IEEE Spectrum<br />
IEEE Trans. on <strong>Communications</strong><br />
IEEE Trans. on <strong>Computer</strong>s<br />
IEEE Transactions on Dependable and<br />
Secure Computing<br />
IEEE Trans. on Information Theory<br />
IEEE Transactions on Mobile<br />
Computing<br />
IEEE Transactions on Signal<br />
Processing<br />
IEEE Trans. on Software Engineering<br />
IEEE Transactions on Vehicular<br />
Technology<br />
IEEE Transactions on Wireless<br />
<strong>Communications</strong><br />
IEEE Wireless <strong>Communications</strong><br />
Information & <strong>Communications</strong><br />
Technology Law<br />
Information and Computation<br />
Information Management & <strong>Computer</strong><br />
<strong>Security</strong><br />
Information Processing Letters<br />
Information <strong>Security</strong><br />
Information <strong>Security</strong> Technical Report<br />
Information Systems Management<br />
Information Systems <strong>Security</strong><br />
Intelligence & National <strong>Security</strong><br />
International Journal of Information<br />
<strong>Security</strong><br />
Internet Research<br />
Journal of the ACM<br />
Journal of Algorithms<br />
Journal of Combinatorial Theory Series<br />
A<br />
Journal of <strong>Computer</strong> <strong>Security</strong><br />
Journal of <strong>Computer</strong> and System<br />
Sciences<br />
Journal of Cryptology<br />
Journal of Information Technology<br />
Journal of Information Warfare<br />
Journal of Internet Banking and<br />
Commerce<br />
Journal of Network and <strong>Computer</strong><br />
Applications<br />
Journal of Research and Practice in<br />
Information Technology<br />
Journal of Symbolic Computation<br />
Mathematics of Computation<br />
Mobile Networks and Applications<br />
Network <strong>Security</strong><br />
Operating Systems Review<br />
Pattern Recognition<br />
Pattern Recognition Letters<br />
Proceedings of the IEEE<br />
Random Structures and Algorithms<br />
SIAM Journal on Computing<br />
SIAM Journal on Discrete Mathematics<br />
Software Engineering Notes<br />
Telecommunication Systems<br />
Theoretical <strong>Computer</strong> Science<br />
Wireless Networks<br />
World Wide Web: Internet and Web<br />
Information Systems Journal<br />
Accredited Conferences<br />
ACISP: Australasian Conference on<br />
Information <strong>Security</strong> and Privacy<br />
ACSAC - Annual <strong>Computer</strong> <strong>Security</strong><br />
Applications Conference<br />
Asiacrypt<br />
CCS: ACM Conference on <strong>Computer</strong><br />
and <strong>Communications</strong> <strong>Security</strong><br />
CHES: Workshop on Cryptographic<br />
Hardware and Embedded Systems<br />
Cirencester: Cryptography and Coding<br />
IMA International Conference<br />
Crypto<br />
CSFW: <strong>Computer</strong> <strong>Security</strong><br />
Foundations Workshop<br />
ECC - Workshop on Elliptic Curve<br />
Cryptography<br />
e-SMART<br />
ESORICS: annual European<br />
Symposium on Research in <strong>Computer</strong><br />
<strong>Security</strong><br />
Eurocrypt<br />
Financial Cryptography<br />
FOCS: IEEE Annual Symposium on<br />
Foundations of <strong>Computer</strong> Science<br />
FSE: International Workshop on Fast<br />
Software Encryption<br />
GLOBECOM: IEEE Global<br />
Telecommunications Conference<br />
ICDCS: IEEE International Conference<br />
on Distributed Computing Systems<br />
ICICS: Information and<br />
<strong>Communications</strong> <strong>Security</strong><br />
ICISC: Information <strong>Security</strong> and<br />
Cryptology<br />
IEEE Symposium on <strong>Security</strong> and<br />
Privacy<br />
IFIP: International Information <strong>Security</strong><br />
Conference (IFIP)<br />
Indocrypt<br />
INFOCOM: IEEE Conference on<br />
<strong>Computer</strong> <strong>Communications</strong><br />
ISIT - IEEE International Symposium<br />
on Information Theory<br />
ISOC: Internet Society Symposium on<br />
Network and Distributed System<br />
<strong>Security</strong><br />
ISSE: Information <strong>Security</strong> Solutions<br />
Europe<br />
LCN: IEEE Annual Conference on<br />
Local <strong>Computer</strong> Networks<br />
NDSS: Network and Distributed<br />
Systems <strong>Security</strong> Symposium<br />
NSP: New <strong>Security</strong> Paradigms<br />
Workshop<br />
Provable <strong>Security</strong> Conference<br />
PKC: International Workshop on<br />
Practice and Theory in Public-Key<br />
Cryptography, Japan<br />
RAID - International Symposium on<br />
Recent Advances in Intrusion Detection<br />
RSA <strong>Security</strong>: Progress in Cryptology<br />
(The Cryptographers' Track at RSA)<br />
SAC: Workshop on Selected Areas in<br />
Cryptography<br />
SREIS - Symposium on Requirements<br />
Engineering for Information <strong>Security</strong><br />
STACS - Annual Symposium on<br />
Theoretical Aspects of <strong>Computer</strong><br />
Science<br />
STOC - ACM Annual Symposium on<br />
Theory of Computing<br />
USENIX <strong>Security</strong> Symposium<br />
WETICE - IEEE International<br />
Workshops on Enabling Technologies:<br />
Infrastructure for Collaborative<br />
Enterprises<br />
WISA - International Workshop on<br />
Information <strong>Security</strong> Applications<br />
Workshop on Information Hiding