Security Conferences and Journals in Focus
	
		
			
			
			
			
			
			
		
		
			|   | 
			
			Security and Privacy Conferences | 
			  | 
			  | 
			  | 
			  | 
		 
		
			| 
			  | 
			
			Conference | 
			
			Submission | 
			
			Notification | 
			
			Venue | 
			
			Location | 
		 
		
			| 
			rank 1 | 
			
			Network and Distributed System Security (NDSS) | 
			
			6-Oct-13 | 
			
			22-Oct-13 | 
			
			Feb 23-26, 2014 | 
			
			San Diego, USA | 
		 
		
			| 
			rank 3 | 
			
			Financial Cryptography and Data Security (FC) | 
			
			25-Oct-13 | 
			
			22-Dec-13 | 
			
			March 3-7, 2014 | 
			
			Barbados | 
		 
		
			| 
			  | 
			
			ACM Symposium on Information, Computer and Communications Sec 
			(ASIACCS) | 
			
			6-Dec-13 | 
			
			27-Jan-14 | 
			
			Jun 4-6, 2014 | 
			
			Kyoto, Japan | 
		 
		
			| 
			  | 
			
			Information Security Practice and Experience Conference (ISPEC) | 
			
			2-Dec-13 | 
			
			3-Feb-14 | 
			
			May 12-14, 2014 | 
			
			Fuzhou, China | 
		 
		
			| 
			  | 
			
			IEEE Symposium on Hardware-oriented Security and Trust (HOST) | 
			
			- | 
			
			- | 
			
			- | 
			
			- | 
		 
		
			| 
			  | 
			
			International Conference on Critical Infrastructure Protection | 
			
			- | 
			
			- | 
			
			March 17-19, 2014 | 
			
			Virginia, USA | 
		 
		
			| 
			  | 
			
			Constructive Side-channel analysis and Secure Design (COSADE) | 
			
			14-Dec-13 | 
			
			10-Feb-14 | 
			
			April 14-15, 2014 | 
			
			Paris | 
		 
		
			| 
			  | 
			
			International Conference on Security Protocols (SPW) | 
			
			- | 
			
			- | 
			
			- | 
			
			- | 
		 
		
			| 
			  | 
			
			ACM Symposium on Access Control Models and Technologies (SACMAT) | 
			
			7-Feb-14 | 
			
			4-Apr-14 | 
			
			June 25-27, 2014 | 
			
			London, Ontario | 
		 
		
			| 
			  | 
			
			
			International Conference on Trust & Trustworthy Computing (TRUST) | 
			
			7-Mar-14 | 
			
			7-Apr-14 | 
			
			June 30 - July 2, 14 | 
			
			Crete, Greece | 
		 
		
			| 
			  | 
			
			International Information Security Conference (SEC) | 
			
			20-Jan-14 | 
			
			10-Mar-14 | 
			
			June 2-4, 2014 | 
			
			Marrakech, Morocco | 
		 
		
			| 
			rank 1 | 
			
			IEEE Symposium on Security and Privacy (SP) | 
			
			13-Nov-13 | 
			
			3-Feb-13 | 
			
			May 18-21, 2014 | 
			
			San Jose, USA | 
		 
		
			| 
			  | 
			
			Information Security Theory and Practice (WISTP) | 
			
			7-Mar-14 | 
			
			7-Apr-14 | 
			
			June 23-25, 2014 | 
			
			Crete, Greece | 
		 
		
			| 
			rank 2 | 
			
			Dependable Systems and Networks (DSN) | 
			
			1-Dec-13 | 
			
			25-Feb-14 | 
			
			June 23 - 26, 2014 | 
			
			Atlanta, USA | 
		 
		
			| 
			  | 
			
			International Conference on Trust Management (IFIP-TM) | 
			
			19-Feb-14 | 
			
			19-Mar-14 | 
			
			July 7-10, 2014 | 
			
			Singapore | 
		 
		
			| 
			  | 
			
			Information Hiding and Multimedia Security (IHMMSEC) | 
			
			17-Jan-14 | 
			
			31-Mar-14 | 
			
			June 11-13, 2014 | 
			
			Salzburg, Austria | 
		 
		
			| 
			rank 3 | 
			
			Applied Cryptography and Network Security (ACNS)  | 
			
			10-Jan-14 | 
			
			14-Mar-14 | 
			
			June 10-14, 2014 | 
			
			Switzerland | 
		 
		
			| 
			  | 
			
			International Conference on Security and Cryptography (SECRYPT) | 
			
			15-Apr-14 | 
			
			16-Jun-14 | 
			
			Aug 28-30, 2014 | 
			
			Vienna, Austria | 
		 
		
			| 
			rank 1 | 
			
			Usenix Security | 
			
			27-Feb-14 | 
			
			9-May-14 | 
			
			Aug 20-22, 2014 | 
			
			San Diego, USA | 
		 
		
			| 
			  | 
			
			Privacy Enhancing Technologies Symposium (PETS)  | 
			
			10-Feb-14 | 
			
			13-Apr-14 | 
			
			July 16-18, 2014 | 
			
			Amsterdam | 
		 
		
			| 
			  | 
			
			Symposium on 
			Usable Privacy and Security (SOUPS) | 
			
			28-Feb-14 | 
			
			5-May-14 | 
			
			July 9-11, 2014 | 
			
			CA, USA | 
		 
		
			| 
			not-ranked | 
			
			Conference on Computer Safety, Reliability and Security (SAFECOMP) | 
			
			28-Feb-14 | 
			
			20-May-14 | 
			
			Sep 10-12, 2014 | 
			
			Firenze, Italy | 
		 
		
			| 
			  | 
			
			8th International Conference on Privacy, Security and Trust (PST) | 
			
			24-Mar-14 | 
			
			12-May-14 | 
			
			July 23-24, 2014 | 
			
			Toronto | 
		 
		
			| 
			  | 
			
			International workshop on Peer-To-Peer Systems - Usenix (IPTPS) | 
			
			--- | 
			
			--- | 
			
			--- | 
			
			--- | 
		 
		
			| 
			  | 
			
			IEEE Conference on Communications and Network Security (CNS) | 
			
			1-Mar-14 | 
			
			15-Jun-14 | 
			
			Oct 29-31, 2014 | 
			
			San Francisco, USA | 
		 
		
			| 
			  | 
			
			Mathematical Foundations of Programming Semantics (MFPS) | 
			
			- | 
			
			- | 
			
			- | 
			
			- | 
		 
		
			| 
			rank 2 | 
			
			IEEE Computer Security Foundation Symposium (CSF) | 
			
			4-Feb-14 | 
			
			11-Apr-14 | 
			
			July 20-22,2014 | 
			
			Vienna, Austria | 
		 
		
			| 
			rank 3 | 
			
			Usenix LEET | 
			
			--- | 
			
			--- | 
			
			-- | 
			
			--- | 
		 
		
			| 
			  | 
			
			Workshop on Foundations of Security and Privacy (FCS-PrivMod)  | 
			
			--- | 
			
			--- | 
			
			--- | 
			
			--- | 
		 
		
			| 
			rank 2 | 
			
			Symposium on Research in Computer Security (ESORICS) | 
			
			31-Mar-14 | 
			
			10-Jun-14 | 
			
			Sep 7-11, 2014 | 
			
			Worclaw, Poland | 
		 
		
			| 
			  | 
			
			International Conference on Network and System Security (NSS) | 
			
			8-Apr-14 | 
			
			10-Jun-14 | 
			
			Oct 15-17, 2014 | 
			
			China | 
		 
		
			| 
			  | 
			
			IEEE International Conference on Network Protocols (ICNP) | 
			
			--- | 
			
			--- | 
			
			---- | 
			
			--- | 
		 
		
			| 
			rank 1 | 
			
			ACM Conference on Computer and Communications Security (CCS) | 
			
			16-May-14 | 
			
			22-Jul-14 | 
			
			Nov 3-7, 2014 | 
			
			Arizona, USA | 
		 
		
			| 
			  | 
			
			Conference on Security and Privacy in Communication Networks 
			(SECURECOMM) | 
			
			21-Apr-14 | 
			
			30-Jun-14 | 
			
			Sep 24-26, 2014 | 
			
			Beijing, China | 
		 
		
			| 
			  | 
			
			Internl Conference on Security of Information and Networks (SIN) | 
			
			  | 
			
			  | 
			
			  | 
			
			  | 
		 
		
			| 
			  | 
			
			International Workshop on Security Measurements and Metrics | 
			
			  | 
			
			  | 
			
			  | 
			
			  | 
		 
		
			| 
			rank 2 | 
			
			Annual Computer Security Applications Conference (ACSAC) | 
			
			--- | 
			
			--- | 
			
			--- | 
			
			--- | 
		 
		
			| 
			  | 
			
			ACM Workshop on Privacy in Electronic Society (WPES) | 
			
			--- | 
			
			--- | 
			
			--- | 
			
			-- | 
		 
		
			| 
			  | 
			
			European Workshop on System Security (EuroSec) | 
			
			18-Feb-14 | 
			
			5-Mar-14 | 
			
			April 13, 204 | 
			
			Amsterdam | 
		 
		
			| 
			  | 
			
			Symposium on Recent Advances in Intrusion Detection (RAID) | 
			
			1-Apr-14 | 
			
			1-Jun-14 | 
			
			Sep 24-24,2014 | 
			
			Gothenburg, Germany | 
		 
		
			| 
			  | 
			
			Virus Bulletin Conference (VB2013) | 
			
			7-Mar-14 | 
			
			  | 
			
			Sep 24-26, 2014 | 
			
			Seattle, USA | 
		 
		
			| 
			  | 
			
			The Second Workshop on Information Hiding Techniques for Internet 
			Anonymity and Privacy | 
			
			- | 
			
			- | 
			
			- | 
			
			- | 
		 
		
			|   | 
			  | 
			  | 
			  | 
			  | 
			  | 
		 
		
			|   | 
			  | 
			  | 
			  | 
			  | 
			  | 
		 
		
			|   | 
			  | 
			  | 
			  | 
			  | 
			  | 
		 
		
			| 
			  | 
			
			Hacking Conferences | 
			
			  | 
			
			  | 
			
			  | 
			
			  | 
		 
		
			| 
			  | 
			
			Black Hat | 
			
			  | 
			
			  | 
			
			Aug 2-7, 2014 | 
			
			Las Vegas, USA | 
		 
		
			| 
			  | 
			
			Black Hat Asia | 
			
			--- | 
			
			--- | 
			
			March 25-28, 2014 | 
			
			Singapore | 
		 
		
			| 
			  | 
			
			Black Hat Europe | 
			
			  | 
			
			  | 
			
			Oct 14-17, 2014 | 
			
			  | 
		 
		
			| 
			  | 
			
			Defcon  | 
			
			  | 
			
			  | 
			
			Aug 7-10, 2014 | 
			
			Las Vegas, USA | 
		 
		
			| 
			  | 
			
			  | 
			
			  | 
			
			  | 
			
			  | 
			
			  | 
		 
	 
	  
	ISI indexed Security Journals (2012 Data) 
	
	
	Other Security Journals 
	
		- Journal of Privacy Technology (JOPT), Editor-in-Chief: Latanya 
		Sweeney
 
		This online-only Journal, started in 2004 and operated by Carnegie 
		Mellon University, is a forum for the publication of original current 
		research in privacy technology. It encourages the submission of any 
		material dealing primarily with the technological aspects of privacy or 
		with the privacy aspects of technology, which may include analysis of 
		the interaction between policy and technology or the technological 
		implications of legal decisions. More information can be found at
		http://www.jopt.org/.  
	 
	
	
		- The Kluwer International Series on ADVANCES IN INFORMATION SECURITY.
		
 The purpose of the Advances in Information Security book series is to 
		establish the state of the art and set the course for future research in 
		information security. The scope of this series includes not only all 
		aspects of computer and network security, but related areas such as 
		fault tolerance and software assurance. The series will serve as a 
		central source of reference for information security research and 
		developments. The series aims to publish thorough and cohesive overviews 
		on specific topics in Information Security, as well as works that are 
		larger in scope than survey articles and that will contain more detailed 
		background information. The series also provides a single point of 
		coverage of advanced and timely topics and a forum for topics that may 
		not have reached a level of maturity to warrant a comprehensive textbook. 
		Prospective Authors or Editors: If you have an idea for a book that 
		would fit in this series, we would welcome the opportunity to review 
		your proposal. Should you wish to discuss any potential project further 
		or receive specific information regarding book proposal requirements, 
		please contact either Sushil Jajodia (jajodia@gmu.edu,703-993-1653) or 
		Lance Wobus (lance.wobus@wkap.com, 
		781-681-0602)  
	 
	
		- International Journal of Network Security, Editors-in-Chief: Min-Shiang 
		Hwang 
 
		International Journal of Network Security is an international official 
		journal of Science Publications, publishing original articles, reviews 
		and short communications of a high scientific and technology in network 
		security. Subjects covered include: access control, computer security, 
		cryptography, communications security, data security, database security, 
		electronic commerce security, information security, multimedia security, 
		and network security. Authors are strongly encouraged to submit their 
		papers electronically by using online manuscript submission at 
		http://ijns.nchu.edu.tw/, or submit their Word, ps or pdf file to the 
		editor-in-chief (via Email: mshwang@isrc.nchu.edu.tw): Min-Shiang Hwang, 
		at the Department of Management Information Systems, National Chung 
		Hsing University, Taiwan, R.O.C. More information can be found at
		http://ijns.nchu.edu.tw/.  
	 
	
		- International Journal of Security and Networks, Editors-in-Chief: 
		Yang Xiao 
 
		International Journal of Security and Networks is an archival research 
		journal for significant advances in network security. Subject areas 
		include attack models, security mechanisms, security services, 
		authentication, authorization, access control, multicast security, data 
		confidentiality, data integrity, non-repudiation, forensics, privacy 
		protection, secure protocols, formal analyses, intrusion detection, key 
		management, trust establishment, revocation of malicious parties, 
		security policies, fraudulent usage, dependability and reliability, 
		prevention of traffic analysis, network security performance evaluation, 
		tradeoff analysis between performance and security, security standards, 
		etc. All papers must be submitted online at http://www.inderscience.com/ijsn/. 
		More information is given on the journal web page at
		
		http://www.inderscience.com/ijsn/.  
	 
	
		- Information Security Technical Report : (B)
 
	 
	
		- Digital Forensics, Security and Law Journal : (C)
 
	 
	
		- Information Management and Computer Security : (C)
 
	 
	
		- Information Security Journal: A global Perspective (C)
 
	 
	
		- International Journal of Electronic Security and Digital Forensics 
		(C)
 
	 
	
		- International Journal of Computer Science and Network Security (C)
 
	 
	
		- International Journal of Information and Computer Security (C)
 
	 
	
		- International Journal of Information Security and Privacy (C)
 
	 
	
		- International Journal of Security and Networks (C)
 
	 
	
		- Journal of Information Privacy and Security C
 
	 
	
		- Journal of Information System Security
 
	 
	 
	Other Research and Ranking Links: 
  
	
	 
  
	Compiled by Dr. Sami Zhioua (October 2013) 
 
 
  |