Security Group
Security conference database
This is a list of some meetings on computer security, aimed to provide both an archive of links to proceedings of past conferences, as well as a list of upcoming events and submission deadlines.
Warning: This service here has not been routinely maintained since 2007. A replacement implemented and operated by Jonathan Anderson is now available at securityconferences.net.
- Sorted by submission deadline
- Sorted by event date
- Proceedings of past conferences
- All information in our database
- Raw database file
Sorted by submission deadline
Papers due | Event date | Event | Location |
---|---|---|---|
2023 | |||
Jun 25 | Nov 26–30 | Attacks and Solutions in Hardware Security (ASHES) | Copenhagen, DK |
Sorted by event date
Event date | Event | Location | |
---|---|---|---|
2023 | |||
Nov 26–30 | Attacks and Solutions in Hardware Security (ASHES) | Copenhagen, DK | |
Nov 26–30 | ACM Conference on Computer and Communications Security (CCS)P | Copenhagen, DK |
Proceedings of past meetings
ACM Conference on Computer and Communications Security (CCS)
1993 1994 1996 1997 1998 1999 2000 2001 2002 2003
ACM Symposium on Access Control Models and Technologies (SACMAT)
ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN)
ACM Workshop on Wireless Security (WISE)
Advances in Cryptology (ASIACRYPT)
Advances in Cryptology (CRYPTO)
1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004
Advances in Cryptology (EUROCRYPT)
1984 1985 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005
Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC)
1995 1996 1997 1998 1999 2000 2001 2002 2003 2004
Annual ACM Symposium on Applied Computing (SAC)
Annual Computer Security Applications Conference (ACSAC)
Annual International Conference on Mobile and Ubiquitous Systems (MOBIQUITOUS)
Annual PKI R&D Workshop (PKIRD)
Annual Workshop on Economics of Information Security (WEIS)
Annual Workshop on Selected Areas in Cryptography (WSAC)
Applied Cryptography and Network Security (ACNS)
Biometric Authentication Workshop (BioAW)
Chaos Communication Congress (CCC)
Computer Aided Verification (CAV)
Conference on Email and Anti-Spam (CEAS)
Digital Forensics Workshop (DFRWS)
European PKI Workshop Research and Applications (EUROPKI)
European Symposium on Research in Computer Security (ESORICS)
1992 1994 1996 1998 2000 2002 2003 2004 2005
European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (ESAS)
European Workshop on Wireless Sensor Networks (EWSN)
Fast Software Encryption Workshop (FSE)
Financial Cryptography (FC)
1997 1998 1999 2000 2001 2002 2003 2004 2005 2006
IEEE Computer Security Foundations Workshop (IEEE-CSFW)
1995 1996 1997 2000 2001 2002 2003 2004
IEEE International Conference on Pervasive Computing and Communications (IEEE-PERCOM)
IEEE International Conference on e-Technology, e-Commerce and e-Service (IEEE-EEE)
IEEE International Information Assurance Workshop (IEEE-IWIA)
IEEE International Workshop on Pervasive Computing and Communication Security (IEEE-PERSEC)
IEEE Security in Storage Workshop (IEEE-SISW)
IEEE Symposium on Computer and Communications (IEEE-SCC)
1997 1998 1999 2000 2001 2002 2003
IEEE Workshop on Security and Privacy (IEEE-SP)
1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003
IFIP Conference on Communications and Multimedia Security (CMS)
IFIP International Conference on Theoretical Computer Science (TCS)
IFIP International Information Security Conference (SEC)
IFIP WG 1.7 Workshop on Issues in the Theory of Security (WITS)
Information Hiding Workshop (IHW)
1996 1998 1999 2001 2002 2004 2005 2006 2007 2008 2009
Information Security Conference (ISC)
International Colloquium on Automata, Languages and Programming (CALP)
International Conference on Computer Safety, Reliability and Security (SAFECOMP)
1989 1990 1991 1992 1998 1999 2000 2001 2002 2003
International Conference on Cryptology in India (INDOCRYPT)
International Conference on Distributed Computing Systems (ICDCS)
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communications Security (ICICS)
International Conference on Mobile Systems, Applications, and Services (MOBISYS)
International Conference on New Methods, Tools & Technologies in International E-Business (EBUSINESS)
International Conference on Pervasive Computing (PERVASIVE)
International Conference on Research in Smart Cards (E-smart)
International Conference on Theorem Proving in Higher Order Logics (TPHOLS)
International Symposium on Recent Advances in Intrusion Detection (RAID)
1998 1999 2000 2001 2002 2003 2004
International Symposium on Theoretical Aspects of Computer Science (STACS)
International System Administration and Network Engineering Conference (SANE)
International Workshop in Wireless Security Technologies (IWWST)
International Workshop on Information Security Applications (WISA)
International Workshop on Practice and Theory in Public Key Cryptography (PKC)
1998 1999 2000 2001 2002 2003 2004 2005
International Workshop on Security Protocols (SP)
1996 1997 1998 1999 2000 2001 2002 2003 2004
International Workshop on Security in Information Systems (WOSIS)
Latin American Theoretical INformatics (LATIN)
Network and Distributed System Security Symposium (NDSS)
1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006
New Security Paradigms Workshop (NSPW)
1997 1998 1999 2000 2001 2002 2003
Optical Security and Counterfeit Deterrence Techniques (OSCDT)
RSA Conference (RSA)
Secure Mobile Ad-hoc Networks and Sensors (Secure-Madnes)
Smart Card Research and Advanced Application IFIP Conference (CARDIS)
Symposium on Operating System Design and Implementation (OSDI)
Theory of Cryptography Conference (TCC)
Third International Symposium on Foundations of Information and Knowledge Systems (FOIKS)
UK-UbiNet Workshop (UKUBINET)
USENIX Security Symposium (USENIX-SEC)
1993 1995 1996 1998 1999 2000 2001 2002 2003
USENIX Workshop on Electronic Commerce (USENIX-EC)
Wholes Workshop: A Multiple View of Individual Privacy in a Networked World (WHOLES)
Workshop on Cryptographic Algorithms and Their Uses (WCA)
Workshop on Cryptographic Hardware and Embedded Systems (CHES)
1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009