Conferences

Cryptography

System security

  • Usenix Security (for each conference, click on the “Technical Sessions” link on the left to get to the proceedings).
  • ACM CCS (for each item under “Computer and Communications Security”, click on the “Table of Contents” tab), proceedings link
  • IEEE S&P (aka “Oakland Conference”), proceedings link
  • NDSS (Proceedings are found behind the links under the “NDSS Symposium” section on the left column)

Networking

  • SIGCOMM, proceedings link
  • INFOCOM, proceedings link
  • Mobicom (Annual International Conference on Mobile Computing and Networking), proceedings link
  • Mobisys (ACM Annual International Conference on Mobile Systems, Applications, and Services), proceedings link

Ubiquitous computing

  • UbiComp (ACM International Conference on Ubiquitous Computing), proceedings link
  • PerCom (IEEE International Conference on Pervasive Computing and Communications), proceedings link

Systems and applications

  • WWW (International World Wide Web Conferences), proceedings link
  • EuroSys (European Conference on Computer Systems), proceedings link
  • ICDCS (International Conference on Distributed Computing Systems), proceedings link
  • OSDI (USENIX Symposium on Operating Systems Design and Implementations), proceedings link
  • NSDI (Symposium on Network System Design and Implementation), proceedings link
  • Usenix FAST (Conference on File and Storage Technologies), proceedings link

Venues specific to sub-areas

  • Usability of security
    • SOUPS (Symposium On Usable Privacy and Security), proceedings link
    • SIGCHI (Special Interest Group on Computer-Human Interaction), proceedings link
  • Machine learning and security
    • AISEC,(Workshop on Artificial Intelligence and Security) proceedings link
  • (Mobile) platform security
    • SPSM (Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices) link
    • TRUST (International Conference on Trust & Trustworthy Computing)
  • Embedded systems
    • DAC (Design Automation Conference), proceedings link

Second tier security venues

  • ACSAC (Annual Computer Security Applications Conference), proceedings link
  • ESORICS (European Symposium on Research in Computer Security)
  • WiSec (ACM Special Interest Group on Security, Audit and Control), proceedings link
  • FC (Financial Cryptography and Data Security), proceedings link
  • Euro S & P link
  • RAID (International Symposium on Recent Advances in Intrusion Detection), proceedings link
  • PETS (Privacy Enhancing Technologies Symposium), proceedings link
  • ASIACCS (ACM Symposium on Information, Computer and Communications Security), proceedings link

Conference and Journal Ranking