(2023年3月17号更新,其中标黄为升级A/B;标红为直接选为A/B/C。)
编号 | 会议简称 | 会议名称 | 出版社 | 截止时间 | 通知时间 | 会议时间 | (密码学会)推荐等级 |
---|---|---|---|---|---|---|---|
1 | Crypto | International Cryptology Conference | Springer | 2月 | 5月 | 8月 | A |
2 | Eurocrypt | European Cryptology Conference | Springer | 10月 | 1月底 | 4月 | A |
3 | Asiacrypt | Annual International Conferenceon the Theory and Application of Cryptology and Information Security | Springer | 5月底 | 8月底 | 12月 | A |
编号 | 会议简称 | 会议名称 | 出版社 | 截止时间 | 通知时间 | 会议时间 | (CCF)推荐等级 |
---|---|---|---|---|---|---|---|
1 | CCS | ACM Conference on Computer and Communications Security | ACM | 5月 | 月 | 11月 | A |
2 | S&P | IEEE Symposium on Security and Phivacy | IEEE | 12月 | 3月 | 5月 | A |
3 | Usenix Security | Usenix Security Symposium | USENIX Association | 2月 | 5月 | 8月 | A |
4 | NDSS | ISOC Network and Disthibuted System SecuritySyumposium | ISOC | 7月 | 10月 | 4月 | A |
编号 | 会议简称 | 会议名称 | 出版社 | 会议网址 | (CCF)推荐等级 |
---|---|---|---|---|---|
1 | CCS | ACM Conference on Computer and Communications Security | ACM | http://dblp.uni-trier.de/db/conf/ccs/ | A |
2 | S&P | IEEE Symposium on Security and Phivacy | IEEE | http://dblp.uni-trier.de/db/conf/sp/ | A |
3 | Usenix Security | Usenix Security Symposium | USENIX Association | http://dblp.uni-trier.de/db/conf/uss/ | A |
4 | EUROCRYPT | European Cryptology Conference | Springer | http://dblp.uni-trier.de/db/conf/eurocrypt/ | A |
5 | CRYPTO | International Cryptology Conference | Springer | http://dblp.uni-trier.de/db/conf/crypto/ | A |
6 | NDSS | ISOC Network and Distributed System Security Symposium | ISOC | http://dblp.uni-trier.de/db/conf/ndss/ | A |
编号 | 会议简称 | 会议名称 | 出版社 | 会议网址 | (CCF)推荐等级 |
---|---|---|---|---|---|
1 | ACSAC | Annual Computer Security Applications Conference | IEEE | http://dblp.uni-trier.de/db/conf/acsac/ | B |
2 | ASIACRYPT | Annual International Conference on the Theory and Application of Cryptology and Information Security | Springer | http://dblp.uni-trier.de/db/conf/asiacrypt/ | B |
3 | ESORICS | European Symposium on Research in Computer Security | Springer | https://esorics2022.compute.dtu.dk/index.html | B |
4 | FSE | Fast Software Encryption | Springer | http://dblp.uni-trier.de/db/conf/fse/ | B |
5 | CSFW | IEEE Computer Security Foundations Workshop | IEEE | http://dblp.uni-trier.de/db/conf/csfw/ | B |
6 | SRDS | IEEE International Symposium on Reliable Distributed Systems | IEEE | http://dblp.uni-trier.de/db/conf/srds/ | B |
7 | CHES | International Conference on Cryptographic Hardware and Embedded Systems | Springer | http://dblp.uni-trier.de/db/conf/ches/ | B |
8 | DSN | International Conference on Dependable Systems and Networks | IEEE/IFIP | http://dblp.uni-trier.de/db/conf/dsn/ | B |
9 | RAID | International Symposium on Recent Advances in Intrusion Detection | Springer | http://dblp.uni-trier.de/db/conf/raid/ | B |
10 | PKC | International Workshop on Practice and Theory in Public Key Cryptography | Springer | http://dblp.uni-trier.de/db/conf/pkc/ | B |
11 | TCC | Theory of Cryptography Conference | Springer | http://dblp.uni-trier.de/db/conf/tcc/ | B |
编号 | 会议简称 | 会议名称 | 出版社 | 会议网址 | (CCF)推荐等级 |
---|---|---|---|---|---|
1 | WiSec | ACM Conference on Security and Privacy in Wireless and Mobile Networks | ACM | http://dblp.uni-trier.de/db/conf/wisec/ | C |
2 | SACMAT | ACM Symposium on Access Control Models and Technologies | ACM | http://dblp.uni-trier.de/db/conf/sacmat/ | C |
3 | DRM | ACM Workshop on Digital Rights Management | ACM | http://dblp.uni-trier.de/db/conf/drm/ | C |
4 | IH&MMSec | ACM Workshop on Information Hiding and Multimedia Security | ACM | http://dblp.uni-trier.de/db/conf/ih/ | C |
5 | ACNS | Applied Cryptography and Network Security | Springer | http://dblp.uni-trier.de/db/conf/acns/ | C |
6 | AsiaCCS | Asia Conference on Computer and Communications Security | ACM | http://dblp.uni-trier.de/db/conf/ccs/ | C |
7 | ACISP | Australasia Conference on Information Security and Privacy | Springer | http://dblp.uni-trier.de/db/conf/acisp/ | C |
8 | CT-RSA | Cryptographer’s Track at RSA Conference | Springer | http://dblp.uni-trier.de/db/conf/ctrsa/ | C |
9 | DIMVA | Detection of Intrusions and Malware & Vulnerability Assessment | http://dblp.uni-trier.de/db/conf/dimva/ | C | |
10 | DFRWS | Digital Forensic Research Workshop | Elsevier | http://dblp.uni-trier.de/db/conf/dfrws/ | C |
11 | FC | Financial Cryptography and Data Security | ISOC | http://dblp.uni-trier.de/db/conf/ndss/ | C |
12 | TrustCom | IEEE International Conference on Trust, Security and Privacy in Computing and Communications | IEEE | http://dblp.uni-trier.de/db/conf/trustcom/ | C |
13 | SEC | IFIP International Information Security Conference | Springer | http://dblp.uni-trier.de/db/conf/sec/ | C |
14 | IFIP WG 11.9 | IFIP WG 11.9 International Conference on Digital Forensics | Springer | http://www.ifip119.org/Conferences/ | C |
15 | ISC | Information Security Conference | Springer | http://dblp.uni-trier.de/db/conf/isw/ | C |
16 | ICDF2C | International Conference on Digital Forensics & Cyber Crime | Springer | http://dblp.uni-trier.de/db/conf/icics/ | C |
17 | ICICS | International Conference on Information and Communications Security | Springer | http://dblp.uni-trier.de/db/conf/icics/ | C |
18 | SecureComm | International Conference on Security and Privacy in Communication Networks | ACM | http://dblp.uni-trier.de/db/conf/securecomm/ | C |
19 | NSPW | New Security Paradigms Workshop | ACM | http://dblp.uni-trier.de/db/conf/nspw/ | C |
20 | PAM | Passive and Active Measurement Conference | Springer | http://dblp.uni-trier.de/db/conf/pam/ | C |
21 | PETS | Privacy Enhancing Technologies Symposium | Springer | http://dblp.uni-trier.de/db/conf/pet/ | C |
22 | SAC | Selected Areas in Cryptography | Springer | http://dblp.uni-trier.de/db/conf/sacrypt/ | C |
23 | SOUPS | Symposium On Usable Privacy and Security | USENIX | http://dblp.uni-trier.de/db/conf/soups/ | C |
24 | HotSec | USENIX Workshop on Hot Topics in Security | USENIX | http://www.usenix.org/events/ | C |
25 | EuroS&P | IEEE European Symposium on Security and Privacy | IEEE | https://dblp.org/db/conf/eurosp/index.html | C |
26 | Inscrypt | International Conference on Information Security and Cryptology | Springer | https://dblp.org/db/conf/cisc/index.html | C |
编号 | 期刊简称 | 期刊名称 | 出版社 | 期刊网址 | (CCF)推荐等级 |
---|---|---|---|---|---|
1 | TDSC | IEEE Transactions on Dependable and Secure Computing | IEEE | http://dblp.uni-trier.de/db/journals/tdsc/ | A |
2 | TIFS | IEEE Transactions on Information Forensics and Security | IEEE | http://dblp.uni-trier.de/db/journals/tifs/ | A |
3 | Journal of Cryptology | Springer | http://dblp.uni-trier.de/db/journals/joc/ | A |
编号 | 期刊简称 | 期刊名称 | 出版社 | 期刊网址 | (CCF)推荐等级 |
---|---|---|---|---|---|
1 | TOPS | ACM Transactions on Privacy and Security | ACM | https://tops.acm.org/ | B |
2 | Computers & Security | Elsevier | http://dblp.uni-trier.de/db/journals/compsec/ | B | |
3 | Designs, Codes and Cryptography | Springer | http://dblp.uni-trier.de/db/journals/dcc/ | B | |
4 | JCS | Journal of Computer Security | IOS Press | http://dblp.uni-trier.de/db/journals/jcs/ | B |
编号 | 期刊简称 | 期刊名称 | 出版社 | 期刊网址 | (CCF)推荐等级 |
---|---|---|---|---|---|
1 | CLSR | Computer Law and Security Review | Elsevier | http://www.journals.elsevier.com/computer-law-and-security-review/ | C |
2 | EURASIP Journal on Information Security | Springer | http://dblp.uni-trier.de/db/journals/ejisec/ | C | |
3 | IET Information Security | IET | http://dblp.uni-trier.de/db/journals/iet-ifs/ | C | |
4 | IMCS | Information Management & Computer Security | Emerald | http://dblp.uni-trier.de/db/journals/imcs/ | C |
5 | IJICS | International Journal of Information and Computer Security | Inderscience | http://dblp.uni-trier.de/db/journals/ijics/ | C |
6 | IJISP | International Journal of Information Security and Privacy | Idea Group Inc | http://dblp.uni-trier.de/db/journals/ijisp/ | C |
7 | JISA | Journal of Information Security and Application | Elsevier | https://dblp.uni-trier.de/db/journals/istr/ | C |
8 | SCN (预警名单) | Security and Communication Networks | Wiley | http://dblp.uni-trier.de/db/journals/scn/ | C |
9 | Cybersecurity | Springer | https://dblp.uni-trier.de/db/journals/cybersec/index.html | C |
参考
中国计算机学会推荐国际学术会议和期刊目录(2022年)
文章浏览阅读122次。还是A+BTime Limit: 2000/1000 MS (Java/Others)Memory Limit: 65536/32768 K (Java/Others)Total Submission(s): 24568Accepted Submission(s): 11729Problem Description读入两个小于10000的正整数A和B,计算A+B。...
文章浏览阅读419次。HEADERS:在BASIC的基础上,额外记录了请求和响应的头信息。FULL:记录所有请求和响应的明细,包括头信息、请求体、元数据。BASIC:仅记录请求的方法,URL以及响应状态码和执行时间。NONE:不记录任何日志信息,这是默认值。配置Feign日志有两种方式;方式二:java代码实现。注解中声明则代表某服务。方式一:配置文件方式。_feign 日志设置
文章浏览阅读155次。将容器管理的持久性 Bean 用于面向服务的体系结构本文将介绍如何使用 IBM WebSphere Process Server 对容器管理的持久性 (CMP) Bean的连接和持久性逻辑加以控制,使其可以存储在非关系数据库..._javax.ejb.objectnotfoundexception: no such entity!
文章浏览阅读1.5k次。基础java练习题一、递归实现跳台阶从第一级跳到第n级,有多少种跳法一次可跳一级,也可跳两级。还能跳三级import java.math.BigDecimal;import java.util.Scanner;public class Main{ public static void main(String[]args){ Scanner reader=new Scanner(System.in); while(reader.hasNext()){ _java 递归例题
文章浏览阅读1.5k次,点赞6次,收藏6次。目录1.串应用- 计算一个串的最长的真前后缀题目描述输入输出样例输入样例输出题解2.字符串替换(string)题目描述输入输出样例输入样例输出题解3.可重叠子串 (Ver. I)题目描述输入输出样例输入样例输出题解4.字符串操作(string)题目描述输入输出样例输入样例输出题解1.串应用- 计算一个串的最长的真前后缀题目描述给定一个串,如ABCDAB,则ABCDAB的真前缀有:{ A, AB,ABC, ABCD, ABCDA }ABCDAB的真后缀有:{ B, AB,DAB, CDAB, BCDAB_对存储在string数组内的所有以字符‘a’开始并以字符‘e’结尾的单词做加密处理。
文章浏览阅读68次。西安交通大学/算法设计与问题求解/树与二叉树/MOOC_算法设计与问题求解西安交通大学
文章浏览阅读1.6k次。问题:在Vue项目中出现如下错误提示:[Vue warn]: Computed property "totalPrice" was assigned to but it has no setter. (found in <Anonymous>)代码:<input v-model="totalPrice"/>原因:v-model命令,因Vue 的双向数据绑定原理 , 会自动操作 totalPrice, 对其进行set 操作而 totalPrice 作为计..._computed property "totalprice" was assigned to but it has no setter.
文章浏览阅读60次。十分暴力而简洁的解决方式:读取P和T的位置并自动生成唯一正确答案,将题给测点与之对比,不一样就给我爬!_basic 1003 case 1
文章浏览阅读422次。原标题:详解将Web项目War包部署到Tomcat服务器基本步骤详解将Web项目War包部署到Tomcat服务器基本步骤1 War包War包一般是在进行Web开发时,通常是一个网站Project下的所有源码的集合,里面包含前台HTML/CSS/JS的代码,也包含Java的代码。当开发人员在自己的开发机器上调试所有代码并通过后,为了交给测试人员测试和未来进行产品发布,都需要将开发人员的源码打包成Wa..._/opt/bosssoft/war/medical-web.war/web-inf/web.xml of module medical-web.war.
文章浏览阅读3k次,点赞3次,收藏13次。# -*- coding: utf-8 -*-# 简述:这里有四个数字,分别是:1、2、3、4#提问:能组成多少个互不相同且无重复数字的三位数?各是多少?def f(n):list=[]count=0for i in range(1,n+1):for j in range(1, n+1):for k in range(1, n+1):if i!=j and j!=k and i!=k:list.a..._python求从0到9任意组合成三位数数字不能重复并输出
文章浏览阅读1k次,点赞3次,收藏2次。<el-table-column prop="studentSex" label="性别" :formatter="sex"></el-table-column>然后就在vue的methods中写方法就OK了methods: { sex(row,index){ if(row.studentSex == 1){ return '男'; }else{ return '女'; }..._elementui table 性别
文章浏览阅读1.1k次。java文件操作之移动文件到指定的目录_java中怎么将pro.txt移动到design_mode_code根目录下