Leading Venues
This page is a collection of leading venues where security research
papers are published. If you are a student interested in doing
research in security, take a look at some of these papers to get an
idea of what cutting-edge research in security looks like. If you are
already a practising security researcher, you would do well to keep
yourself up-to-date with recent papers that have appeared in these venues.
Conferences
Cryptography
System security
- Usenix Security (for each conference, click on the "Technical
Sessions" link on the left to get to the proceedings).
- ACM CCS (for each item under "Computer and Communications Security", click on the "Table of Contents" tab), proceedings link
- IEEE S&P (aka "Oakland Conference"), proceedings link
- NDSS
(Proceedings are found behind the links under the "NDSS Symposium"
section on the left column)
Networking
- SIGCOMM, proceedings link
- INFOCOM, proceedings link
- Mobicom (Annual International Conference on Mobile Computing and Networking), proceedings link
- Mobisys (ACM Annual International Conference on Mobile Systems, Applications, and Services), proceedings link
- PerCom (IEEE International Conference on Pervasive Computing and Communications), proceedings link
Systems and applications
- WWW (International World Wide Web Conferences), proceedings link
- EuroSys (European Conference on Computer Systems), proceedings link
Usability of security
- SOUPS (Symposium On Usable Privacy and Security), proceedings link
- SIGCHI (Special Interest Group on Computer-Human Interaction), proceedings link
Second tier security venues
- ACSAC (Annual Computer Security Applications Conference), proceedings link
- ESORICS (European Symposium on Research in Computer Security)
- WiSec (ACM Special Interest Group on Security, Audit and Control), proceedings link
- FC (Financial Cryptography and Data Security), proceedings link
- TRUST (International Conference on Trust & Trustworthy Computing)