07.08.2012 Views

Computer & Communications Security Abstracts

Computer & Communications Security Abstracts

Computer & Communications Security Abstracts

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CCSA Accredited Journal list<br />

ACM Computing Surveys<br />

ACM Trans on <strong>Computer</strong> Systems<br />

ACM Transactions on Information and<br />

System <strong>Security</strong><br />

ACM Trans on Information Systems<br />

ACM Trans on Programming<br />

Languages and Systems<br />

ACM Trans on Software Engineering<br />

and Methodology<br />

Ad Hoc Networks<br />

Advances in Mathematics of<br />

<strong>Communications</strong><br />

Applicable Algebra in Engineering:<br />

Communication and Computing<br />

Bell Labs Technical Journal<br />

BT Technology Journal<br />

<strong>Communications</strong> of the ACM<br />

Complexity<br />

<strong>Computer</strong> Communication Review<br />

<strong>Computer</strong> <strong>Communications</strong><br />

<strong>Computer</strong> Fraud & <strong>Security</strong><br />

<strong>Computer</strong> Journal, The<br />

<strong>Computer</strong> Law and <strong>Security</strong> Review<br />

<strong>Computer</strong> Networks<br />

<strong>Computer</strong>s & <strong>Security</strong><br />

Cryptologia<br />

Designs, Codes and Cryptography<br />

Discrete Applied Mathematics<br />

Electronic Commerce Research<br />

Electronics Letters<br />

Ethics and Information Technology<br />

EURASIP Journal on Applied Signal<br />

Processing<br />

EURASIP Journal on Information<br />

<strong>Security</strong><br />

Formal Methods in System Design<br />

IET <strong>Communications</strong><br />

IET <strong>Computer</strong>s and Digital Techniques<br />

IET Information <strong>Security</strong><br />

IET Software<br />

IEEE/ACM Trans. on Networking<br />

IEEE <strong>Communications</strong> Letters<br />

IEEE <strong>Communications</strong> Magazine<br />

IEEE <strong>Computer</strong> Magazine<br />

IEEE Internet Computing<br />

IEEE Journal of Selected Areas in<br />

<strong>Communications</strong><br />

IEEE Network<br />

IEEE Pervasive Computing<br />

IEEE <strong>Security</strong> & Privacy Magazine<br />

IEEE Spectrum<br />

IEEE Trans. on <strong>Communications</strong><br />

IEEE Trans. on <strong>Computer</strong>s<br />

IEEE Transactions on Dependable and<br />

Secure Computing<br />

IEEE Trans. on Information Theory<br />

IEEE Transactions on Mobile<br />

Computing<br />

IEEE Transactions on Signal<br />

Processing<br />

IEEE Trans. on Software Engineering<br />

IEEE Transactions on Vehicular<br />

Technology<br />

IEEE Transactions on Wireless<br />

<strong>Communications</strong><br />

IEEE Wireless <strong>Communications</strong><br />

Information & <strong>Communications</strong><br />

Technology Law<br />

Information and Computation<br />

Information Management & <strong>Computer</strong><br />

<strong>Security</strong><br />

Information Processing Letters<br />

Information <strong>Security</strong><br />

Information <strong>Security</strong> Technical Report<br />

Information Systems Management<br />

Information Systems <strong>Security</strong><br />

Intelligence & National <strong>Security</strong><br />

International Journal of Information<br />

<strong>Security</strong><br />

Internet Research<br />

Journal of the ACM<br />

Journal of Algorithms<br />

Journal of Combinatorial Theory Series<br />

A<br />

Journal of <strong>Computer</strong> <strong>Security</strong><br />

Journal of <strong>Computer</strong> and System<br />

Sciences<br />

Journal of Cryptology<br />

Journal of Information Technology<br />

Journal of Information Warfare<br />

Journal of Internet Banking and<br />

Commerce<br />

Journal of Network and <strong>Computer</strong><br />

Applications<br />

Journal of Research and Practice in<br />

Information Technology<br />

Journal of Symbolic Computation<br />

Mathematics of Computation<br />

Mobile Networks and Applications<br />

Network <strong>Security</strong><br />

Operating Systems Review<br />

Pattern Recognition<br />

Pattern Recognition Letters<br />

Proceedings of the IEEE<br />

Random Structures and Algorithms<br />

SIAM Journal on Computing<br />

SIAM Journal on Discrete Mathematics<br />

Software Engineering Notes<br />

Telecommunication Systems<br />

Theoretical <strong>Computer</strong> Science<br />

Wireless Networks<br />

World Wide Web: Internet and Web<br />

Information Systems Journal<br />

Accredited Conferences<br />

ACISP: Australasian Conference on<br />

Information <strong>Security</strong> and Privacy<br />

ACSAC - Annual <strong>Computer</strong> <strong>Security</strong><br />

Applications Conference<br />

Asiacrypt<br />

CCS: ACM Conference on <strong>Computer</strong><br />

and <strong>Communications</strong> <strong>Security</strong><br />

CHES: Workshop on Cryptographic<br />

Hardware and Embedded Systems<br />

Cirencester: Cryptography and Coding<br />

IMA International Conference<br />

Crypto<br />

CSFW: <strong>Computer</strong> <strong>Security</strong><br />

Foundations Workshop<br />

ECC - Workshop on Elliptic Curve<br />

Cryptography<br />

e-SMART<br />

ESORICS: annual European<br />

Symposium on Research in <strong>Computer</strong><br />

<strong>Security</strong><br />

Eurocrypt<br />

Financial Cryptography<br />

FOCS: IEEE Annual Symposium on<br />

Foundations of <strong>Computer</strong> Science<br />

FSE: International Workshop on Fast<br />

Software Encryption<br />

GLOBECOM: IEEE Global<br />

Telecommunications Conference<br />

ICDCS: IEEE International Conference<br />

on Distributed Computing Systems<br />

ICICS: Information and<br />

<strong>Communications</strong> <strong>Security</strong><br />

ICISC: Information <strong>Security</strong> and<br />

Cryptology<br />

IEEE Symposium on <strong>Security</strong> and<br />

Privacy<br />

IFIP: International Information <strong>Security</strong><br />

Conference (IFIP)<br />

Indocrypt<br />

INFOCOM: IEEE Conference on<br />

<strong>Computer</strong> <strong>Communications</strong><br />

ISIT - IEEE International Symposium<br />

on Information Theory<br />

ISOC: Internet Society Symposium on<br />

Network and Distributed System<br />

<strong>Security</strong><br />

ISSE: Information <strong>Security</strong> Solutions<br />

Europe<br />

LCN: IEEE Annual Conference on<br />

Local <strong>Computer</strong> Networks<br />

NDSS: Network and Distributed<br />

Systems <strong>Security</strong> Symposium<br />

NSP: New <strong>Security</strong> Paradigms<br />

Workshop<br />

Provable <strong>Security</strong> Conference<br />

PKC: International Workshop on<br />

Practice and Theory in Public-Key<br />

Cryptography, Japan<br />

RAID - International Symposium on<br />

Recent Advances in Intrusion Detection<br />

RSA <strong>Security</strong>: Progress in Cryptology<br />

(The Cryptographers' Track at RSA)<br />

SAC: Workshop on Selected Areas in<br />

Cryptography<br />

SREIS - Symposium on Requirements<br />

Engineering for Information <strong>Security</strong><br />

STACS - Annual Symposium on<br />

Theoretical Aspects of <strong>Computer</strong><br />

Science<br />

STOC - ACM Annual Symposium on<br />

Theory of Computing<br />

USENIX <strong>Security</strong> Symposium<br />

WETICE - IEEE International<br />

Workshops on Enabling Technologies:<br />

Infrastructure for Collaborative<br />

Enterprises<br />

WISA - International Workshop on<br />

Information <strong>Security</strong> Applications<br />

Workshop on Information Hiding

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!