|
|
IEEE Cipher's Calendar of Security and Privacy Related Events
|
|
Updated December 22, 2011
Date (Month/Day/Year), Event, Locations, e-mail for more info.
See also Cipher Calls for Papers file for
details on many of these listings.
Also worth a look are
the ICL calendar
and the IACR site, and several others
About submitting items to the Cipher calendar and CFP list, and information about email delivery failures.
An asterisk [*] points from the submission date entry to the conference
date entry.
The following notations indicate limitations on the distribution of
the event proceedings. The note is based on
the editor's reading of the event announcement. Contact the event
chairs if you have questions.
NP = No proceedings
AO = Proceedings are distributed to attendees only
BP = Only "best papers" will be published
? = Publication status uncertain
No notation means that the proceedings will be
published for distribution outside the conference.
- 12/15/11-12/19/11: ICISS, Kolkata India; info: aditya@isical.ac.in; Conf Web page
- 12/19/11: NTMS, Istanbul, Turkey; Conf Web page; Submissions are due; [*]
- 1/10/12: SEC, Crete, Greece; Conf Web page; Submissions are due; info: info@sec2012.org; [*]
- 1/13/12: SACMAT, Newark, NJ, Conf Web page; Submissions are due; info: jlobo@us.ibm.com; [*]
- 1/14/12: SI-SCN-CloudComputing, Journal Web page; Submissions are due
- 1/16/12: SI-IEEE-Comm-Mag-CyberSec-SmartGrid, ; Submissions are due; info: rosehu@ieee.org;
- 1/20/12: HOST, San Francisco, CA; Conf Web page; Submissions are due; [*]
- 1/21/12- 1/27/12: SOFSEM-CryptoTrack, Spindleruv Mlyn, Czech Republic; Conf Web page
- 1/22/12: SATIN, Teddington, London, UK; Conf Web page; Submissions are due; [*]
- 1/30/12- 2/ 4/12: CYBERLAWS, Valencia, Spain; Conf Web page
- 2/ 5/12- 2/ 8/12: NDSS, San Diego, CA; Conf Web page
- 2/ 5/12: ACNS, Singapore; Conf Web page; Submissions are due; [*]
- 2/ 9/12: CSF, Cambridge, MA; ; Submissions are due; info: csf2012@seas.upenn.edu; [*]
- 2/11/12: SHPCS, Madrid, Spain; Conf Web page; Submissions are due; info: spalazzi@dii.univpm.it; BP; [*]
- 2/13/12: DBSEC, Paris, France; Conf Web page; Submissions are due; [*]
- 2/13/12: HAISA, Crete, Greece; ; Submissions are due; Conf Web page; info: info@haisa.org; [*]
- 2/13/12: WDFIA, Crete, Greece; Conf Web page; Submissions are due; [*]
- 2/13/12: LEET12, San Jose, CA; Conf Web page; Submissions are due; info: leet12chair@usenix.org; [*]
- 2/14/12: ISARCS, Bertinoro, Italy; Conf Web page; Submissions are due; [*]
- 2/18/12: WSCS, San Francisco, CA; Conf Web page; Submissions are due; info: armando@fbk.eu; [*]
- 2/20/12: PETS, Vigo, Spain; Conf Web page; Submissions are due; [*]
- 2/24/12: MoST, San Francisco, CA; Conf Web page; Submissions are due; [*]
- 2/24/12: DIMVA, Crete; Conf Web page; Submissions are due; info: dimva2012-pc-chair@dimva.org
- 2/27/12- 3/ 2/12: FC, Divi Flamingo Beach Resort, Bonaire; info: fc12chair@ifca.ai; Conf Web page
- 2/27/12- 3/ 2/12: CT-RSA, San Francisco, CA; Conf Web page
- 3/ 1/12: SI-IEEE-SnP-Mag-Lost-Treasures, Web page; submissions are due
- 3/ 2/12: USEC, Divi Flamingo Beach Resort, Bonaire; Conf Web page
- 3/ 2/12: WECSR, Divi Flamingo Beach Resort, Bonaire; Conf Web page
- 3/ 2/12: W2SP, San Francisco, CA; Conf Web page; Submissions are due; info: mfredrik@cs.wisc.edu; [*]
- 3/ 5/12: CHES, Leuven, Belgium; Conf Web page; Submissions are due; [*]
- 3/ 5/12: SECRYPT, Rome, Italy; Conf Web page; Submissions are due; info: secrypt.secretariat@insticc.org; [*]
- 3/12/12- 3/16/12: DATE, Dresden, Germany; Conf Web page
- 3/18/12: PST, Paris, France; Conf Web page; Submissions are due; [*]
- 3/19/12- 3/21/12: PILATES, info: pilates@mmb2012.de; Conf Web page
- 3/22/12- 3/23/12: NIST-SHA3, Washington, DC; info: hash-function@nist.gov; Conf Web page
- 3/22/12- 3/23/12: SATIN, Teddington, London, UK; Conf Web page
- 3/23/12: Ch2Cl, Nice, France; Conf Web page; Submissions are due; info: contact@strategiestm.com; AO; [*]
- 3/31/12: ESORICS, Pisa, Italy; Conf Web page; Submissions are due; [*]
- 4/ 6/12: TrustBus, Vienna, Austria; Conf Web page; Submissions are due; [*]
- 4/16/12- 4/18/12: WiSec, Tucson, Arizona; Conf Web page
- 4/19/12: CSET, San Francisco, CA; Conf Web page; Submissions are due; info: cset12chairs@usenix.org; [*]
- 4/24/12: LEET12, San Jose, CA; info: leet12chair@usenix.org; Conf Web page
- 5/ 1/12- 5/ 3/12: ASIACCS, Korea, Seoul; Conf Web page
- 5/ 3/12- 5/04/12: COSADE, Darmstadt, Germany; info: cosade2012@cased.de; Conf Web page
- 5/ 7/12- 5/10/12: NTMS, Istanbul, Turkey; Conf Web page
- 5/20/12- 5/23/12: S&P, San Francisco Bay Area, CA; info: oakland12-pcchairs@ieee-security.org; Conf Web page
- 5/24/12- 5/25/12: S&P Workshops, (date is TBD), SF bay area, CA;
- 5/24/12: W2SP, San Francisco, CA; info: mfredrik@cs.wisc.edu; Conf Web page
- 5/24/12: MoST, San Francisco, CA; Conf Web page
- 5/24/12: WSCS, San Francisco, CA; info: armando@fbk.eu; Conf Web page
- 6/ 3/12- 6/ 4/12: HOST, San Francisco, CA; Conf Web page
- 6/ 4/12- 6/ 6/12: SEC, Crete, Greece; info: info@sec2012.org; Conf Web page
- 6/ 6/12- 6/ 8/12: HAISA, Crete, Greece; Conf Web page; info: info@haisa.org;
- 6/ 6/12- 6/ 8/12: WDFIA, Crete, Greece; Conf Web page
- 6/10/12- 6/15/12: SFCS, Ottawa, Canada; Conf Web page
- 6/15/12: NSS, Wu Yi Shan, Fujian, China; Conf Web page; Submissions are due; [*]
- 6/20/12- 6/22/12: Newark, NJ, SACMAT, info: jlobo@us.ibm.com; Conf Web page
- 6/25/12- 6/27/12: CSF, Cambridge, MA; info: csf2012@seas.upenn.edu;
- 6/26/12- 6/28/12: ISARCS, Bertinoro, Italy; Conf Web page
- 6/26/12- 6/29/12: ACNS, Singapore; Conf Web page
- 7/ 2/12- 7/ 6/12: SHPCS, Madrid, Spain; info: spalazzi@dii.univpm.it; Conf Web page, BP
- 7/11/12- 7/13/12: DBSEC, Paris, France; Conf Web page
- 7/11/12- 7/13/12: PETS, Vigo, Spain; Conf Web page
- 7/16/12- 7/18/12: PST, Paris, France; Conf Web page
- 7/24/12- 7/27/12: SECRYPT, Rome, Italy; info: secrypt.secretariat@insticc.org; Conf Web page
- 8/ 6/12: CSET, San Francisco, CA; info: cset12chairs@usenix.org; Conf Web page
- 9/ 3/12- 9/ 7/12: TrustBus, Vienna, Austria; Conf Web page
- 9/ 9/12- 9/12/12: CHES, Leuven, Belgium; Conf Web page
- 9/10/12- 9/12/12: ESORICS, Pisa, Italy; Conf Web page
- 9/19/12- 9/20/12: Ch2Cl, Nice, France; info: contact@strategiestm.com; Conf Web page
; AO
- 11/21/12-11/23/12: NSS, Wu Yi Shan, Fujian, China; Conf Web page
Key:
- ACISP = Australasian Conference on Information Security and Privacy
- ACM-MM = ACM International Multimedia Conference
- ACM-MOBILE = ACM Mobile Computing and Communications Review
- ACM-MONET = Special Issue of the Journal on Special Topics in Mobile Networking and Applications
- ACM-TSEM-SEC = ACM Transactions on Software Engineering and Methodology, Special issue on Software Engineering and Security
- ACNS = Applied Cryptography and Network Security ACNS 2012, Singapore
- ACSAC = Annual Computer Security Applications Conference
- ACSF = Advances in Computer Security and Forensics
- ADAlgs = Summer Course in Advanced Distributed Algorithms
- ADCOM = Conference on Advanced Computing and Communications
- AES = Advanced Encryption Standard Candidate Conference
- AGENTS-EMCSR = From Agent Theory to Agent Implementation
- AINA = International Conference on Advanced Information Networking and Applications
- AIPA = Advanced Information Processing and Analysis
- AISec = Artificial Intelligence and Security
- AISW = Australasian Information Security Workshop On Digital Rights Management
- AISW-Pet = Australasian Information Security Workshop, (Privacy Enhancing Technologies)
- ALICS = Applications of Logic in Computer Security
- AMESP = Appropriate Methodology for Empirical Studies of Privacy
- AMOC = Asian International Mobile Computing Conference
- AMS = Active Middleware Services
- APE = Advances in Policy Enforcement
- APTC = Asia-Pacific Trusted Infrastructure Technologies Conference
- APWG = Anti-Phishing Working Group (APWG) eCrime Researchers Summit
- ARES = Availability, Reliability and Security
- ARSPA = Workshop on Automated Reasoning for Security Protocol Analysis
- ARSPA-WITS = Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security
- ASA = Analysis of Security APIs
- ASA-MA = Symposium on Agent Systems and Applications; Symposium on Mobile Agents
- ASAPIs = Analysis of Security APIs
- ASIACCS = 7th ACM Symposium on Information, Computer and Communications, Security ASIACCS 2012, Korea, Seoul
- ASIACRYPT = ASIACRYPT, Advances in Cryptology
- ASIAN = Asian Computing Science Conference, Focusing on Computer and Network Security
- ASWN = Applications and Services in Wireless Networks
- ASWN = IEEE Workshop On Applications And Services In Wireless Networks
- ASYNC = Asynchronous Circuits and Systems
- AT = Workshop on Agent Technologies
- ATC = Autonomic and Trusted Computing
- ATMA = Advanced Transaction Models and Architectures
- AusCERT = Asia Pacific Information Technology Security Conference
- AUTONOMICS = Autonomic Computing and Communication Systems
- AVoCS = Automated Verification of Critical Systems
- BADGERS = Building Analysis Datasets and Gathering Experience Returns for Security
- BDBIS = Baltic Workshop on DB and IS
- BIOSEC = Biometric Security
- BITE = Business Information Technology Ethics
- Book-ACCSD = Chapters for book on Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering
- Book-DCFS = A book on Digital Crime and Forensic Science in Cyberspace
- CACS = Conference on Computer Audit, Control and Security
- CaLC = Cryptography and Lattices Conference
- CANS = Cryptology and Network Security
- CARDIS = Smart Card Research and Advanced Application Conference
- CCCpyrt = Colleges, Code and Copyright
- CCJ = Computer Communications Journal special issue on network security
- CCS = ACM Computer and Communications Security Conference
- CCS-Workshops = Workshops for ACM Conference on Computer and Communications Security
- CCSS = Annual Canadian Computer Security Symposium (see CITSS)
- CCSW = Cloud Computing Security Workshop
- CCW = Computer Communications Workshop
- CEAS = Conference on Email and Anti-Spam
- CEC special session = Congress on Evolutionary Computation Special Session on Evolutionary Computation in Cryptology and Computer Security
- CEMNs = Issues in Computing over Emerging Mobile Networks
- CETA = NIST Workshop on Cryptography for Emerging Technologies and Applications CETA 2012, Gaithersburg MD
- CFP = Computers, Freedom, and Privacy
- Ch2Cl = Chip-to-Cloud Security Forum Ch2Cl 2012
, Nice, France (AO)
- CHES = Cryptographic Hardware and Embedded Systems CHES 2012, Leuven, Belgium
- CHINACOM = CHINACOM
- CIIW = Workshop on Critical Information Infrastructures
- CIKM = International Conference on Information and Knowledge Management
- CISMOD = International Conf. on Information Systems and Management of Data
- CITSS = Canadian Information Technology Security Sympsoium
- CLAT = Computer-aided Law and Advanced Technologies track of ACM Symposium on Applied Computing
- CLC = Workshop on Codes and Lattices in Cryptography
- ClusterSec = Workshop on Cluster Security
- CMS = Communications and Multimedia Security Conference
- CoALa = Workshop on Contract Architectures and Languages
- CODASPY = Data and Application Security and Privacy
- CODEBREAKERS = The New Codebreakers
- CollSec = Collaborative Methods for Security and Privacy
- COMAD = International Conference on Management of Data
- COMPASS = Conference on Computer Assurance (defunct)
- CompMag = Computer Magazine special issue, High-speed Internet Security
- COMPSAC = Int'l. Computer Software and Applications Conference
- CONTEMPCRYPT=Contemporary Methods in Cryptography
- CoopIS = IFCIS International Conference on Cooperative Information Systems
- CORBA SW = Workshop on Building and Using CORBASEC ORBS
- COSADE = Constructive Side-Channel Analysis and Secure Design COSADE 2012, Darmstadt, Germany
- CPAC = Cryptography - Policy and Algorithms Conference
- CPSRT = Cloud Privacy, Security, Risk and Trust
- CQRE = [Secure] Exhibition and Congress
- CRiSIS = Risks and Security of Internet and Systems
- CRITIS = Critical Information Infrastructure Security
- CRYPTO = IACR CRYPTO
- CSAW = Computer Security Architecture Workshop CSAW , Fairfax, Virginia
- CSAW = Computer Security Architecture Workshop
- CSET = Cyber Security Experimentation and Test CSET 2012, San Francisco, CA
- CSF = Computer Security Foundations Symposium CSF 2012, Cambridge, MA
- CSFW = Computer Security Foundations Workshop is now the CSF Symposium
- CSFS = Computer Security Foundations Symposum (see CSF)
- CSI = Computer Security Institute Conference
- CSIIRW = Cyber Security and Information Intelligence Research Workshop
- CSS = Communications Security Symposium (in conjunction with GLOBECOMM)
- CT-RSA = Cryptographers' Track of the RSA Conference CT-RSA 2012, San Francisco, CA
- CTC = Cybercrime and Trustworthy Computing Workshop
- CVDSWS = Invitational Workshop on Computer Vulnerability Data Sharing
- CW = Cyber Worlds: Theory and Practice
- CWCP = Cambridge Workshop on Cryptographic Protocols
- CWECS = Cloud, Wireless and e-Commerce Security
- CWEGSR = Ethical Guidelines for Security Research
- CYBER-FRAUD = Cyber-Fraud
- CYBERLAWS = Technical and Legal Aspects of the e-Society CYBERLAWS 2012, Valencia, Spain
- CyberSecnTrustSoft = Cyber Security and Trustworthy Software
- DAMMCC = International Workshop on Discrete Algorithms and Methods for Mobile Computing & Communications
- DAPD-SEC = Distributed and Parallel Databases: Special Journal Issue on Security
- DART = Databases: Active & Real-Time
- DASC = Dependable, Autonomic and Secure Computing
- DASFAA = Database Systems For Advanced Applications
- DATANET = Datanet Security, Annual International Conference and Exhibition on Wide Area Network Security
- DATE = Design Automation and Test in Europe DATE 2012, Dresden, Germany
- DAWAM = Dependability Aspects on Data WArehousing and Mining applications
- DBSEC = Data and Applications Security and Privacy (WG 11.3 Conference) DBSEC 2012, Paris, France
- DCCA = Dependable Computing for Critical Applications
- DCCS = Dependable Computing and Communications Symposium
- DEST_SS_ICS = DEST Special Session on Interoperability of Communications and Security DEST_SS_ICS , Cairns, Australia
- DETER = Deter Laboratory Experimenters' Workshop
- DEXA = International Conference and Workshop on Database and Expert Systems Applications
- DEXA-ECS = Electronic Commerce and Security, A Workshop held in conjunction with DEXA
- DEXA-SIDIA = DEXA Workshop on Security and Integrity of Data Intensive Applications
- DFRWS = Digital Forensic Research Workshop
- DIM = Workshop on Digital Identity Management
- DIMACS Security Ver = DIMACS Workshop on Formal Verification of Security Protocols
- DIMACS-InfoSecEc = DIMACS Workshop on Information Security Economics
- DIMACS-SAP = DIMACS Workshop on Security Analysis of Protocols
- DIMACS-WISE = DIMACS Workshop on Information Security Economics
- DIMVA = Detection of Intrusions and Malware & Vulnerability Assessment DIMVA 2012, Crete
- DIREN = Disaster Recovery Networks
- DISC = International Symposium on DIStributed Computing
- DMKD = Data Mining and Knowledge Discovery Workshop
- DMSEC = Data Mining for Computer Security
- DOCSec = Distributed Objects and Components Security
- DOOD = Conference on Deductive and Object-Oriented Databases
- DPM = Data Privacy Management
- DRM = Digital Rights Management
- DRM-ICC = Workshop on Digital Rights Management Impact on Consumer Communications
- DRMTICS = Digital Rights Management: Technologies, Issues, Challenges and Systems
- DSN-WACS = Assurance Cases for Security: the Metrics Challenge
- DSOM = Distributed Systems: Operations & Management
- DSPAN = Data Security and PrivAcy in wireless Networks
- DSPCS = Digital Signal Processing for Communication Systems
- DSPSR = Data Management, Security and Privacy in Sensor Networks and RFID
- DSSC = Workshop on Dependable and Secure Services Computing
- EC = ACM Conference on Electronic Commerce
- EC2ND = European Conference on Computer Network Defense
- ECC = Workshop on Elliptic Curve Cryptography
- ECDLP = Workshop on the Elliptic Curve Discrete Logarithm Problem
- ECIW = European Conference on Information Warfare and Security
- ECML/PKDD = Workshop on Privacy and Security issues in Data Mining and Machine Learning
- ECOMM = Business Process Reegineering and Supporting Technologies for Electronic Commerce
- eCRS = APWG eCrime Researchers Summit
- ECRYPT-HASH = ECRYPT Workshop on Hash Functions
- EDOC = Enterprise Distributed Object Computing Conference
- EFECE = Edinburgh Financial Cryptography Financial Conference
- EIT = Enabling Worldwide Communication and Progress Utilizing Information Technology
- Electronic Commerce for Content II = Forum on Technology-Based Intellectual Property Management
- ELS = E-Learning Security
- ENCXCS = Engineering Complex Computer Systems Minitrack of HICSS
- ENM = Enterprise Networking
- ENTRSEC = International Workshop on Enterprise Security
- ESAS = Engineering Semantic Agent Systems
- ESCS = Embedded Systems and Communications Security
- ESORICS = European Symposium on Research in Computer Security ESORICS 2012, Pisa, Italy
- ESSoS = Engineering Secure Software and Systems
- ETAPS = European Joint Conferences on Theory and Practice of Software
- ETFA = Emerging Technologies and Factory Automation
- ETRICS = Emerging Trends in Information and Communication Security
- Euro PKI = European PKI Workshop
- Euro-PDS = European Conference on Parallel and Distributed Systems
- EUROCRYPT = IACR Annual European Cryptography Conference
- EUROMED-NET = The Role of Internet and the World Wide Web in Developing the Euro-Mediterranean Information Society
- EuroPKI = European Workshop on Public Key Services, Applications and Infrastructures
- Eurosec = Eurosys European Workshop on System Security
- EVT/WOTE = Electronic Voting Technology Workshop/Workshop on Trustworthy Elections
- F2GC = Forensics for Future Generation Communication Environments
- FARES = Frontiers in Availability, Reliability and Security
- FAST = Formal Aspects of Security and Trust
- FC = Financial Cryptography and Data Security FC 2012, Divi Flamingo Beach Resort, Bonaire
- FCC = Formal and Computational Cryptography
- FCS = Foundations of Computer Security
- FDTC = Fault Diagnosis and Tolerance in Cryptography
- FIRST = FIRST
- FISP = Federal Internet Security Plan Workshop
- FISSEA = Federal Information Systems Security Educators' Association
- FloCon = FloCon
- FM = Symposium on formal methods
- FMC = Foundations of Mobile Computation
- FME = Formal Methods Europe
- FMLDO = Foundations of Models and Languages for Data and Objects
- FMP = Formal Methods Pacific
- FMSC = Workshop on Formal Methods and Computer Security
- FMSE = Formal Methods in Security Engineering: From Specifications to Code
- FMSP = Formal Methods in Software Practice; See WFMSP
- FOSAD = School on Foundations of Security Analysis and Design
- FOUNDATIONS = Verification and Validation Research in the Coming Decade
- FPS = Foundations & Practice of Security
- FPS = France-Canada Workshop on Foundations & Practice of Security
- FSE = Fast Software Encryption
- FST-TCS = Foundations of Software Technology and Theoretical Computer Science
- GameSec = Decision and Game Theory for Security
- GBN = Gigabit Networking Workshop
- GENI-Sec = Workshop on GENI and Security GENI-Sec , California, USA
- Globecom = IEEE Computer and Communications Network Security Symposium
- GPCS = Grid and Pervasive Computing Security
- GRAND = CRA Conference on Grand Research Challenges in Information Security and Assurance
- GTIP = Governance of Technology, Information, and Policies
- HAISA = Human Aspects of Information Security and Assurance HAISA 2012, Crete, Greece
- Handbook-Research-on-Information-Assurance-and-Security = Handbook of Research on Information Assurance and Security
- Handbook-Secure-Multimedia = Handbook of Research on Secure Multimedia Distribution Handbook-Secure-Multimedia
- HASE = IEEE Symposium on High Assurance Systems Engineering
- HealthSec = Health Security and Privacy
- HealthSec = USENIX Workshop on Health Security and Privacy
- HICSS = Hawaii International Conference on Systems Sciences
- HICSS-HTC = HICSS Highly Trustworthy Computing Mini-Track
- HICSS-SSADIA = HICSS Mini-Track: Secure Software Architecture, Design, Implementation and Assurance
- HiPC = Conference on High Performance Computing
- HM-HC = History of Cryptography
- HOST = Hardware-Oriented Security and Trust HOST 2012, San Francisco, CA
- HotDep = Hot Topics in System Dependability
- HOTI = Hot Interconnects, A Symposium on High Performance Interconnects
- HotNets = HotNets - Workshop on Hot Topics in Networks
- HotSec = Hot Topics in Security
- HotSec = Hot Topics in Security
- HotWeb = Workshop on Hot Topics in Web Systems and Technologies
- HPCNCS = High Performance Computing, Networking, and Communication Systems
- HPTS = Workshop on High Performance Transaction Systems
- HSN = High-speed Networks Symposium at Globecom
- HST = Technologies for Homeland Security
- HT-CHES = Hot Topic Session: Hardware Trojans and Trusted ICs
- HUC = International Symposium on Handheld and Ubiquitous Computing
- I3PFellows = Institute for Information Infrastructure Protection (I3P) Research Fellowships for postdoctoral researchers, junior faculty and research scientists
- IAMCOM = Information Assurance Middleware for Communications
- IAS = Information Assurance and Security
- IASTED = Communication Systems and Networks
- IASTED-specsession = Session on Architectures and Languages for Digital Rights Management and Access Control
- IAIW = IEEE International Workshop on Information Assurance
- IASymp = Symposium on Information Assurance
- IAW = Information Assurance Workshop
- IAWS = Workshop on Information Assurance
- IC3N = International Conference on Computer Communications and Networks
- ICAST = Conference on Advanced Science and Technology
- ICATM = International IEEE Conference on ATM
- ICCC = Internation Conference on Computer Communications
- ICCC = International Common Criteria Conference
- ICCCN = International Conference on Computer Communications and Networks
- ICCSA = International Conference On Computational Science And Its Applications
- ICDCS = International Conference on Distributed Computing Systems
- ICDE = Int. Conf. on Data Engineering
- ICDM-PSA = Workshop on Privacy and Security Aspects of Data Mining (in conjunction with ICDM)
- ICDT = International Conference on Database Theory
- ICECCS = International Conference on Engineering of Complex Computer Systems
- ICEIS = International Conference on Enterprise Information Systems
- ICET = International Conference on Emerging Technologies
- ICFEM = International Conference on Formal Engineering Methods
- ICI = International Cryptography Institute
- ICICS = International Conference on Information and Communications Systems
- ICISP = Internet Surveillance and Protection
- ICISS = Information Systems Security
- ICIW = Information Warfare and Security
- ICNP = International Conference on Network Protocols
- ICOIN = International Conference on Information Networking
- ICON = IEEE Conference on Networks
- ICS = Information and Computer Security
- ICSECS = International Conference on Software Engineering and Computer Systems
- ICSSDBM = Int. Conf. on Scientific and Statistical Database Management
- IC-WDISS = Special Issue, Internet Computing, Widely Deployed Internet Security Solutions
- ICTAC = ICTAC Special Track on the Grand Challenge on Verified Software
- ICWN = International Conference on Wireless Networks
- ICWS = Conference on Web Services
- IDEAS = International Database Engineering and Applications Symposium
- IDtrust = Symposium on Identity and Trust on the Internet
- IDW = Information Domain Workshop
- IEEE-ANETS = IEEE Network Magazine Special Issue on Active and Programmable Networks
- IEEE-COMP-NETSEC = IEEE Computer - Special Issue on Networking Security
- IEEE-INETCOMP = Special Issue IEEE: Internet Security in the Age of Mobile Code
- IEEE-INFOCOMM Infocomm home page
- IEEE-InetComp-SI = IEEE Internet Computing theme issue on Homeland Security, Nov/dec IEEE-InetComp-SI
- IEEE-Internet-Comp-SI-p2padhocnets = Ieee Internet Computing Special Issue on Security for P2P and Ad Hoc Networks
- IEEE-LCN = IEEE Conference on Local Computer Networks
- IEEE-NetMag = IEEE Network Magazine: Middleware Technologies for Future Communication Networks
- IEEE-NetMag-NetSec = IEEE Network Magazine Special Issue on Network Security
- IEEE NM = IEEE Network Magazine Special Issue on PCS Network Management
- IEEE S&P = Symposium on Security & Privacy
- IEEE-PCM-MOBILE = Special Issue on IP-based Mobile Telecommunications Networks
- IEEESW-SI = IEEE Software Special Issue
- IEEECOMHYB = IEEE Communications Magazine Special Issue on Hybrid Networks
- IEEE_COMM_INET_TECH = IEEE Communications Magazine, Internet Technology Series
- IESS = International Symposium on Software Engineering Standards
- IETF = Internet Engineering Task Force IETF
- IFIP Mobile Commns
- IFIP WG11.3 = Working Conference on Data and Applications Security IFIP WG11.3 , Redondo Beach Marina, California
- IFIP-NSS = IFIP International Conference on Network and Service Security
- IFIP-SEC = Information Security Conference
- IFIP WG11.3 = IFIP WG 11.3 Working Conference on Data and Applications Security
- IFIPTM = IFIP Conference on Trust Management
- IH = Information Hiding
- IICIS = IFIP WG 11.5 working conference on Integrity and Internal Control in Information Systems
- IIIS = Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results
- IJCSSE = Journal of Computer Systems: Science & Engineering. Special Issue on Developing Fault-Tolerant Systems with Ada
- IJICS-Special-Nature-Computation = Special Issue of the International Journal on Information and Computer Security (IJICS), "Nature-Inspired Computation in Cryptology and Computer Security"
- IMACCC = IMA Conference on Cryptography and Coding
- IMACS-IEEE99 = Special Session on Applied Coding, Cryptology and Security
- IMC = IMC Information Visualization and Mobile Computing
- IMCS = International Multiconferences in Computer Science
- INC = International Network Conference
- INDOCRYPT = International Conference on Cryptology in India
- INET = Internet Society Annual Conference
- InfoAssur = Information Assurance
- InfraSec = Infrastructure Security Conference
- InSAgentBased = Information & Security: An International Journal, Special Issue on Agent-based Technologies
- Inscrypt = Information Security and Cryptology
- InSPEC = Security and Privacy in Enterprise Computing
- Inspec = Workshop on Security and Privacy in Enterprise Computing
- INTRA-FORA = International Conference on INTRANET: Foundation, Research, and Applications
- INTRUST = Trusted Systems
- INTRUST = International Conference on Trusted Systems
- IPIC = Integration of Enterprise Information and Processes
- IPICS = Intensive Program on Information and Communication Security, Privacy Technology
- IPIPTM = Trust Management (IFIP Internation Conference on)
- IPSWG = Internet Privacy and Security Workshop
- IRISH = Irish Workshop on Formal Methods
- IRMA = Information Resources Management Association International Conference
- IRW-FMP = International Refinement Workshop and Formal Methods Pacific
- IPSEC = IPSec Global Summit
- IS = Information Systems (journal)
- ISA = Information Security and Assurance
- ISADS = Symposium on Autonomous Decentralized Systems
- ISARCS = Architecting Critical Systems ISARCS 2012, Bertinoro, Italy
- ISC = Information Security Conference
- ISCC = IEEE Symposium on Computers and Communications
- ISCIS = International Symposium on Computer and Information Sciences
- ISCOM = International Symposium on Communications
- ISCTURKEY = Information Security and Cryptology
- ISH = Workshop on Information Security and Hiding
- ISIPS = Interdisciplinary Studies in Information Privacy and Security
- ISOC-SF-Trust = Internet trust, challenges and the next 10 years
- ISP = Information Security and Privacy
- ISPEC = Information Security Practice and Experience
- ISPEC = Security Practice and Experience Conference
- ISSA = Information Security South Africa
- ISSE = Information Security Solutions Europe
- ISSEA = International Systems Security Engineering Association Conference
- ISSR = Security in e-Science and e-Research
- ISSRE = Software Reliability Engineering
- ISSSE = International Symposium on Secure Software Engineering
- ISTCS = Israeli Symposium on Theory of Computing and Systems
- ISW = Information Survivability Workshop
- ISW = Information Security Workshop
- IT-Sicherheit = Communications and Multimedia Security: Joint Working conference of IFIP TC-6 and TC-11 and Austrian Computer Society
- ITCC = International Conference on Information Technology Coding and Computing
- ITLIT = CSTB Workshop on Information Technology Literacy
- iTrust = Conference on Trust Management
- ITW = Information Theory Workshop On Theory and Practice in Information-theoretic Security
- IWACO = Workshop on Aliasing, Confinement and Ownership
- IWAN = International Working Conference on Active Networks
- IWCS = Convergence Security in Pervasive Environments
- IWDW = Workshop on Digital Watermarking
- IWFM = (See IRISH)
- IWES = International Workshop on Enterprise Security
- IWIA = Information Assurance Workshop
- IWNS = Network Steganography
- IWSEC = International Workshop on Security
- IWSecP = International Workshop on Security Protocols
- IWSSC = Securing Services on the Cloud
- JBCS = Journal of the Brazilian Computer Society
- JCMS = Journal of Computer Mediated Communication
- JCN-SI-Secure-Wireless = JCN Special Issue on Secure Wireless Networking JCN-SI-Secure-Wirless ,
- JDSE = Journal of Distributed Systems Engineering; Future Directions for Internet Technology
- JHSN-SpecialIssue-Policy = Journal of High Speed Networking, Special issue on Managing Security Polices: Modeling, Verification and Configuration
- JOCS = Journal of Computer Security
- JOCSIDS = JCS Special Issue on Research in Intrusion Detection
- JOFC = Journal of Cryptology JOFC
- JOPT = Journal of Privacy Technology JOPT
- JSAC-WDM = IEEE JSAC Special Issue on Protocols and Architectures for Next Generation Optical WDM Networks
- JSAC_SI-DnA-SecAsr = IEEE JSAC Special Issue, Design And Analysis Techniques For Security Assurance
- JSS = Journal of Systems and Software (North-Holland)
- JTS = Journal of Telecommunications Systems, special multimedia issue
- JWWW = World Wide Web Journal
- KDD = International Conference on Knowledge Discovery and Data Mining
- LADIS = Large Scale Distributed Systems and Middleware (part of SOSP)
- LAFT = Logical Aspects of Fault Tolerance
- LAW = Layered Assurance Workshop
- LBFCM = Workshop on the link between formal and computational models
- LCN = Conference on Local Computer Networks
- LEET = Large-Scale Exploits and Emergent Threats LEET 12, San Jose, CA
- LFM = Logical Frameworks and Meta-languages
- LISA = Large Installation System Administration Conference
- LiSec = Logics in Security
- Malware = Malicious and Unwanted Software
- MCDA = Australian Workshop on Mobile Computing & Databases & Applications
- MCN = ACM Int. Conf. on Mobile Computing and Networking. See MOBICOM
- MCNCS = Mobile Commerce, Cloud Computing, Network and Communication Security
- MCP = Workshop on Models for Cryptographic Protocols
- MDDS = Mobility in Databases and Distributed Systems
- MDS = Conference on the Mathematics of Dependable Systems
- METAD = IEEE Metadata Conference
- MetricSec = Security Measurements and Metrics, (Formerly the Workshop on Quality of Protection - QoP)
- MetriSec = Security Measurements and Metrics
- MFPS = Mathematical Foundations of Programming Semantics
- MidSec = Middleware Security
- MCP = Workshop on Models for Cryptographic Protocols
- MDDS = Mobility in Databases and Distributed Systems
- MDS = Conference on the Mathematics of Dependable Systems
- METAD = IEEE Metadata Conference
- MetricSec = Security Measurements and Metrics, (Formerly the Workshop on Quality of Protection - QoP)
- MFPS = Mathematical Foundations of Programming Semantics
- MidSec = Middleware Security
- MINES = Multimedia Information NEtworking and Security
- MLCS = Machine Learning for Computer Security, Special Issue in Journal of Machine Learning Research
- MMD = Multimedia Data Security
- MMDMS = Workshop on Multi-Media Database Management Systems
- MMM-ACNS- = Mathematical Methods, Models, and Architectures for Computer Networks Security
- MOBICOM = MobiCom = Mobile Computing and Networking = Conference on Mobile Computing and Networking
- MMM-ACNS = Mathematical Methods, Models and Architectures for Computer Network Security
- MobiPST = Privacy, Security and Trust in Mobile and Wireless Systems
- MonAM = Monitoring, Attack Detection and Mitigation
- MoST = Mobile Security Technologies Workshop MoST 2012, San Francisco, CA
- MSRI-NTCW = MSRI Number Theoretic Cryptography Workshop
- MSWiM = Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems
- MWNS = Mobile and Wireless Networks Security
- Mycrypt = International Conference on Cryptology in Malaysia
- NBIS = Workshop on Network-Based Information Systems
- NCSC = National Computer Security Conference; no longer held 23rd NCSC, past conferences
- NDSS = Network and Distributed System Security Symposium NDSS 2012, San Diego, CA
- NetCompApp = Symposium on Network Computing and Applications
- NetCri = Workshop on Research Challenges in Next Generation Networks for First Responders and Critical Infrastructures
- NetDB = Workshop on Networking Meets Databases (with SOSP)
- NetSec = CSI Network Security
- NETWORK = combination HPN (High Performance Networking), BC (Broadband Communications), and PCN (Performance of Communication Networks)
- NGC = Networked Group Communication
- NGITS = World Conference of the WWW, Internet, and Intranet
- NICSSE = National Colloquium for Information Systems Security Education
- NIST-CHW = NIST Cryptographic Hash Workshop
- NIST-CHW2 = NIST Cryptographic Hash Workshop NIST-CHW2, Santa Barbara, CA
- NIST-IBE = Applications of Pairing-Based Cryptography: IBE and Beyond
- NIST-KMW = NIST Key Management Workshop
- NIST-PKI = PKI R&D Workshop
- NIST-SHA3 = NIST SHA-3 Candidate Conference NIST-SHA3 , Washington, DC
- NISTCKM = NIST Cryptographic Key Management Workshop
- NordSec = Nordic Workshop on Secure IT-Systems
- NISSC = National Information Systems Security Conference (see NCSC)
- NPSec = Secure Network Protocols
- NSPW = New Security Paradigms Workshop
- NSS = Network and System Security NSS 2012, Wu Yi Shan, Fujian, China
- NTMS = New Technologies, Mobility and Security NTMS 2012, Istanbul, Turkey
- OWASP = Open Web Application Security Project,
- P2P = Peer-to-Peer Computing
- Pairing = Pairing-based Cryptography
- PBD = Privacy by Design
- PETS = Privacy Enhancing Technologies Symposium PETS 2012, Vigo, Spain
- PETSE = Privacy Enhanced Technology and Security Engineering
- PIIPES = Personal Identifiable Information: Privacy, Ethics, and Security
- PILATES = Workshop on Physically-augmented Security for Wireless Networks
- PLSec = Workshop on Physical Layer Security
- POLICY = Policies for Distributed Systems and Networks
- PPCloud = Privacy and Provenance in the Cloud
- PSDML = Privacy and Security issues in Data Mining and Machine Learning
- PST = Privacy, Security, and Trust
- PUMP = Privacy and Usability Methods Pow-wow
- RAID = Recent Advances in Intrusion Detection
- RBAC = ACM Workshop on Role-based Access Control
- ReConFig = ReConFigurable Computing and FPGAs, Special track on Reconfigurable Computing for Security and Cryptography
- RECSI = Spanish Meeting on Cryptology and Information Security
- RFIDPriv = RFID Privacy Workshop
- RFIDSec = RFID Security
- RFIDsec = RFID Security, Asia
- RIDE = High Performance Database Management for Large Scale Applications
- RLCPS = Real-Life Cryptographic Protocols and Standardization
- ROADS = Real Overlays and Distributed Systems (part of SOSP)
- RTDB = International Workshop on Real-Time Databases: Issues and Applications
- RTEE = Risk and Trust in Extended Enterprises
- RV = Runtime Verification
- S&P = Security & Privacy Symposium
- S&PW = Security and Privacy Workshops (co-located with the Security & Privacy Symposium);
- SAC = Symposium on Applied Computing
- SAC = Selected Areas in Cryptography
- SAC-ISRA = Symposium on Applied Computing, Information Security Research and Applications Track
- SAC-TRECK = Trust, Reputation, Evidence and other Collaboration Know-how (a track of ACM SAC)
- SAC-TRUSTCOLLAB = ACM SAC, Track on Trust, Recommendations, Evidence and other Collaboration Know-how
- SACMAT = ACM Symposium on Access Control Models and Technologies
- SADFE = Systematic Approaches to Digital Forensic Engineering
- SAFECOMP = Computer Safety, Reliability and Security
- SafeConfig = Assurable & Usable Security Configuration
- SAppC = ACM Symposium on Applied Computing - Special Track on Computer Security
- SAPS = Specification and Automated Processing of Security Requirements
- SAPSE = Security Aspects of Process and Services Engineering
- SAR-SSI = Network and Information Systems Security
- SASN = Security of Ad Hoc and Sensor Networks
- SATIN = Securing and Trusting Internet Names
- SCI = Multi Conference on Systemics, Cybernetics and Informatics, special session on Complexity and Algorithmic Information Theory With Application to Systems, Networks, and Information Assurance
- SCIS = Symposium on Cryptography and Information Security
- SCITS = Security and Control of IT in Society, sponsored by IFIP WG 9.6/11.7
- SCN = Security and Cryptography for Networks
- SCRAPC = Smart Card Research and Advanced Application Conference
- SDCS = Workshop on Security in Distributed Computing Systems
- SDM = VLDB Workshop on Secure Data Management
- SDSP = UK/Australian International Symposium On DSP For Communication Systems
- SEC = IFIP International Information Security and Privacy Conference
- SecCo = Security Issues in Concurrency
- SecConf = Security Conference
- SECI = Security of Communications on the Internet
- SECOVAL = Workshop on the Value of Security through Collaboration
- SecPri_WiMob = Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications
- SECRYPT = Security and Cryptography
- SECRYPT = Security and Cryptography
- SecReT = Security and Rewriting Techniques
- SecSE = Secure Software Engineering
- SECTEST = Security Testing
- SecUbiq = Workshop on Security in Ubiquitous Computing Systems
- SecureComm = Network Security & Privacy
- SECURECOMM = Security and Privacy in Communication Networks
- SECURICOM = World Congress on the Security of Information Systems and Telecommunication
- Security and Privacy = IEEE Symposium on Security and Privacy
- SecWmMMC = Security and Watermarking of Multimedia Contents
- SEMAS = Security Of Mobile Multiagent Systems
- SeMIC = Workshop on Security for Mobile Wireless Communications
- SenSys = Conference on Embedded Networked Sensor Systems
- SESOC = SECurity and SOCial Networking (part of PerCom 2011)
- SETA = Sequences and their Applications
- SETOP = Autonomous and Spontaneous Security
- SEWCN = Security in Emerging Wireless Communication and Networking Systems
- SFC = Society and the Future of Computing
- SFCS = Security and Forensics in Communication Systems SFCS 2012, Ottawa, Canada
- SFTC-VI = Symposium on Fault Tolerant Computing - VI (Brazil)
- SHA-3-2nd = Second SHA-3 Candidate Conference
- SHPCS = Security and High Performance Computing Systems SHPCS 2012, Madrid, Spain
- SHPCS = Security and High Performance Computing Systems
- SI-AdHocNetSec = International Journal of Computer Research, Special Issue on Advances in Ad Hoc Network Security
- SI-CC-MNSCN = Special Issue of Computer Communications on Multimedia Networking and Security in Convergent Networks
- SI-CEE-SP-DISTRIB = Recent Advances in Security and Privacy in Distributed Communications
- SI-COMP-SECREST = Computer Magazine Special Issue, Security for the Rest of Us
- SI-ECN-Botnets = Elsevier Computer Networks, Special Issue on Botnet Activity: Analysis, Detection and Shutdown SI-ECN-Botnets 2012
- SI-EJSSR = Special Issue, 'Privacy and Technology', European Journal of Social Science Research
- SI-Eurasip-NetwkIntrus = EURASIP Journal on Advances in Signal Processing, Special Issue on Advances in Signal Processing in Network Intrusion Detection Systems
- SI-FGCS-Trust = Future Generation Computer System: Special Section on Trusting Software Behavior
- SI-IEEE-Comm-Mag-CyberSec-SmartGrid = IEEE Communications Magazine, Feature Topic on Cyber Security for Smart Grid Communications 2012
- SI-IEEE-COMP-SecSocNets = IEEE Internet Computing: Special Issue on Security and Privacy in Social Networks
- SI-IEEE-Forensics-Security = IEEE Transactions on Information Forensics and Security, Special Issue on Using the Physical Layer for Securing the Next Generation of Communication Systems SI-IEEE-Forensics-Security
- SI-IEEE-NetTraffMon = IEEE Network, Special Issue on Network Traffic Monitoring and Analysis
- SI-IEEE-NM-ID = IEEE Network Magazine, Special Issue on Recent Developments in Network Intrusion Detection
- SI-IEEE-SJ-SnP-Complex = Special Issue on Security and Privacy in Complex Systems, IEEE SYSTEMS JOURNAL
- SI-IEEE-SnP-Mag-Lost-Treasures = Lost Treasures of Computer Security & Privacy (IEEE Security & Privacy Magazine special issue September/October 2012) SI-IEEE-SnP-Mag-Lost-Treasures 2012
- SI-IEEE-TIM-Biometrics = IEEE Transactions on Instrumentation and Measurement, Special Issue on Biometric Instrumentation and Measurement SI-IEEE-TIM-Biometrics ,
- SI-IEEE-TransIFS-Voting = IEEE Transactions on Information Forensics and Security: Special Issue
- SI-IJCNIS = International Journal of Communication Networks and Information Security,Special Issue on Composite and Integrated Security Solutions for Wireless Sensor Networks
- SI-IJIS-SCADA = Special Issue of International Journal of Information Security: SCADA and Control System Security SI-IJIS-SCADA
- SI-IJSSE-Trustworthy = Special Issue of IJSSE, Software Safety & Dependability - the Art of Engineering Trustworthy Software SI-IJSSE-Trustworthy
- SI-Inet-Comp-Crime = Track Articles on Computer Crime in IEEE Internet Computing SI-Inet-Comp-Crime
- SI-JAR-OSVERIF = Journal of Automated Reasoning: Special Issue On Operating Systems Verification
- SI-JICS-SPADM = International Journal of Information and Computer Security, Special Issue on Security and Privacy Aspects of Data Mining
- SI-JNCA-T = Special Issue of Journal of Network and Computer Applications on Trusted Computing and Communications
- SI-SCN-CloudComputing = Special Issue of Security and Communication Networks: Trust and Security in Cloud Computing
- SI-SCN-MACHLRN-FORENSICS = Security and Communication Networks, Special Issue on "Applications of machine learning techniques to intrusion detection and digital forensics",
- SI-SNPMag = IEEE Security & Privacy Magazine Special Issue on Privacy-Preserving Sharing of Sensitive Information
- SI-SYSJ-SnPComplex = IEEE Systems Journal, Special Issue on Security and Privacy in Complex Systems
- SI-TIS-TrustSecPriv = Special issue of IEICE Transactions on Information and System on "Trust, Security and Privacy in Computing and Communication Systems"
- SIADS = Security Issues in Adaptive Distributed Systems
- SICHERHEIT = Sicherheit, Schutz und Zuverlässigkeit
- SICON = IEEE Singapore International Conference on Networks
- SIGMOD/PODS - ACM SIGMOD International Conference on Management of Data / ACM SIGACT SIGMOD-SIGART Symposium on Principles of Database Systems
- SIGCOMM = ACM Special Interest Group on Data Communication
- SIGSAC-Awards = SIGSAC Annual Awards
- SIN = Security of Information and Networks
- SIntelProp = Symposium on Intellectual Property
- SIS = Secure Information Systems
- SISW = Security in Storage Workshop
- SI_JAR_PCC = Special Issue of Journal of Automated Reasoning, Proof-carrying Code
- SI_SCN-Ubi = Special Issue of Security and Communication Networks (SCN) on "Security and Privacy in Ubiquitous Computing"
- SKLOIS = Conference on Information Security and Cryptology
- SKM = Secure Knowledge Management Workshop
- SMPE = Security and Multimodality in Pervasive Environments
- SNPA = IEEEE Workshop on Sensor Network Protocols and Applications
- SOC = Biennial Symposium on Communications
- SOFSEM-CryptoTrack = Cryptography, Security, and Verification Track, SOFtware SEMinar of the Conference on Current Trends in Theory and, Practice of Computer Science SOFSEM-CryptoTrack 2012, Spindleruv Mlyn, Czech Republic
- SoftCOM = Mobile Wireless Networks
- SoftCOM = International Conference On Software, Telecommunications And Computer Networks
- SOSOC = Security in Opportunistic and SOCial Networks
- SOSP = ACM Symposium on Operating Systems Principles
- SOUPS = Usable Privacy and Security
- SPC = Security in Pervasive Computing
- SPECNS = Software Practices and Engineering, Special Issue on Experiences with Computer and Network Security
- SPECOMM = Workshop on Security and Privacy in E-Commerce
- SPI = Security and Protection of Information
- SPIEDSS = SPIE Defense, Sensing, and Security
- SRDS = IEEE Symposium on Reliable Distributed Systems
- SREIS = Requirements Engineering for Information Security
- SRUTI = Steps to Reducing Unwanted Traffic on the Internet
- SSDU = Service, Security and its Data management technologies in Ubi-comp
- SSIRI = Secure Software Integration and Reliability Improvement
- SSNDS = Symposium on Security in Networks and Distributed Systems
- SSS = Stabilization, Safety, and Security of Distributed Systems
- StaR_SEC = Information and Communications Security Standards and Regulations
- STC = Scalable Trusted Computing
- STEG = Pacific Rim Workshop on Digital Steganography
- STM = Security and Trust Management
- StorageSS = Workshop on Storage Security and Survivability
- SUTC = Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
- SWING = School for PhD and Researchers on Security for Wireless Networking
- SWS = Secure Web Services
- SysSecWk = Systems Security Workshop
- TAPOS = Theory and Applications of Object Systems, special issue Objects, Databases, and the WWW
- TAPSOFT = Theory and Practice of Software Development
- TCC = Theory of Cryptography
- TFI = ISOC's study group on Trust and the Future of the Internet
- TGC = Trustworthy Global Computing
- TheSecConf = The Security Conference
- TISC = The Internet Security Conference
- TIW = Trusted Infrastructure Workshop: Advanced Summer School on Architectures for Trustworthy Computing
- TPHOLs = Theorem Proving in Higher Order Logics
- TRPC = Research Conference on Communication, Information and Internet Policy
- TRUST = Trust and Trustworthy Computing
- TrustBus = Trust, Privacy and Security in Digital Business TrustBus 2012, Vienna, Austria
- TrustCol = Trusted Collaboration
- TrustCom = Trust, Security and Privacy in Computing and Communications
- TrustED = Trustworthy Embedded Devices
- TSMA = International Conference on Telecommunication Systems - Modeling and Analysis
- TSP = Trust, Security, and Privacy for Emerging Applications
- TSPUC = Workshop on Trust, Security and Privacy for Ubiquitous Computing
- TSRSW = Trust, Security, and Reputation on the Semantic Web
- TV = Thread Verification
- UbiComp = UbiComp, Privacy in Context
- UPSEC = Usability, Psychology, and Security
- USEC = Workshop on Usable Security USEC 2012, Divi Flamingo Beach Resort, Bonaire
- USEC = Usable Security
- USENIX = USENIX Annual Technical Conference
- USENIX-ATC = USENIX Annual Technical Conference
- USENIXIDS = USENIX Workshop on Intrusion Detection and Network Monitoring
- USENIXSec = USENIX Security Symposium
- USM = Workshop on Usable IT Security Management
- VETO = Security and Electronic Voting
- VIETCRYPT = Cryptology in Vietnam
- VISSAS = Verification of Infinite State Systems with Application to Security
- VizSec = Visualization for Cyber Security
- VLDB = International Conference on Very Large Data Bases
- VMSEC = Workshop on Virtual Machine Security
- W2SP = Web 2.0 Security and Privacy W2SP 2012
, San Francisco, CA
- W2SP = Web 2.0 Security and Privacy
- W2Trust = Web 2.0 Trust W2Trust , Trondheim, Norway
- WASA = Wireless Algorithms, Systems and Applications
- WATC = Workshop on Advances in Trusted Computing
- WATERMARKING = WATERMARKING
- WCAN = Workshop on Cryptography for Ad hoc Networks
- WCSC = Cryptography and Security in Clouds
- WCW = Workshop on Web Content Caching and Distribution
- WDAG = Int. Workshop on Distributed Algorithms
- WDFIA = Digital Forensics and Incident Analysis WDFIA 2012, Crete, Greece
- WebDB = International Workshop on the Web and Databases
- WebNet = World Conference of the Web Society
- WEC = Workshop on Electronic Contracting
- WECS = Workshop on Education in Computer Security (formerly WISE)
- WECSR = Ethics in Computer Security Research WECSR 2012, Divi Flamingo Beach Resort, Bonaire
- WEIS = Workshop on the Economics of Information Security
- WECWIS = Workshop on Advanced Issues of E-Commerce and Web-based Information Systems
- WENS = Workshop on Enterprise Network Security
- WESII = The Workshop on the Economics of Securing the Information Infrastructure
- WESS = Workshop on Embedded Systems Security
- WETICE = IEEE Workshops on Enabling Technologies, Infrastructure for Collaborative Enterprises
- WFMSP = Workshop on Formal Methods and Security Protocols
- WFCC = Workshop on Formal and Computational Cryptography
- WHOLES = A Multiple View of Individual Privacy in a Networked World
- WIA = Workshop on Information Assurance
- WIAPP = Workshop on Internet Applications
- WICOW = Workshop on Information Credibility on the Web
- WICS = Workshop on Internet Communications Security
- WICT-IDS-F = Intrusion Detection and Forensics, World Congress on Information and Communication Technologies WICT-IDS-F 2012, Mumbai, India
- WICT_IDF = Intrusion Detection and Forensics (Track 17) of the World Congress on Information and Communication Technologies
- WIISe = Web Intelligence for Information Security Workshop
- WISA = Workshop on Information Security Applications
- WISAC = Workshop on Innovations in Strong Access Control
- WiSe = Workshop on Wireless Security
- WiSec = Wireless Network Security WiSec 2012, Tucson, Arizona
- WiSec = Wireless Network Security
- WISP = Workshop on Wireless Security and Privacy
- WISP = Security Issues with Petri Nets and other Computational Models
- WISTP = Workshop in Information Security Theory and Practice
- WITAT = Workshop on Information Technology - Assurance and Trustworthiness
- WITS = Workshop on Issues in the Theory of Security
- WLACPV = Workshop on Logical Aspects of Cryptographic Protocol Verification
- WLC = Lightweight Cryptography for Resource-Constrained Devices
- WMN = Special Session of Pacific Rim Conference on Multimedia - Wireless Multimedia Networks
- WNano = NIST Workshop on Nanosecurity
- WOBIS = Workshop on Satellite-based Information Services
- WOIH = Workshop on Information Hiding, see Information Hiding
- WOLFASI = Workshop on Logical Foundations of an Adaptive Security Infrastructure
- WOOT = USENIX Workshop on Offensive Technologies
- WorkshopMV = Workshop on Modelling and Verification
- WORM = Workshop on Recurring Malcode
- WORM = Workshop on Rapid Malcode
- WOSIS = Workshop on Security In Information Systems
- WPES = Workshop on Privacy in the Electronic Society
- WPET = Workshop on Privacy Enhancing Technologies
- WRAITS = Workshop on Recent Advances on Intrusion-Tolerant Systems
- WSCS = Workshop on Semantic Computing and Security WSCS 2012, San Francisco, CA
- WSCSP = Semantic Computing for Security and Privacy, (2012 event is WSCS above)
- WSLSDS = Workshop on Security in Large-Scale Distributed Systems
- WSNA = Wireless Sensor Networks and Applications
- WSNS = Wireless and Sensor Networks Security
- WSRS = Workshop on Safety, Reliability, and Security of Industrial Computer Systems
- WSS = Workshop on Self-Stabilizing Systems
- WSSEET = Workshop on Secure Software Engineering Education and Training
- WSSS = Workshop on Web Services Security
- WSStandz = Workshop on Security Standardization
- WSTI = Workshop on Security of Information Technologies
- WWV = Automated Specification and Verification of Web Systems
- WWW = World Wide Web Conference
- WWW-SPAE = World Wide Web Conference, Security, Privacy, Reliability and Ethics Track