All-in-oneConferenceJournal
See By Area:
Algorithm&TheoryAIBioinformaticsEducationDMDatabasesHardwareHCIML&PR
Multmedia,image,videoNetworkNLPOSPL,SERobosticsSecurity,PrivacySW,LogicWWW,IR
2008 Conference/Journal ranking list. It was generated by combining difference information including impact factor, "conference pagerank" score, etc. Click here to see ranks in other years.

The Impact Factor score is calculated according to the algorithm proposed in [Garfield, 72].

Specifically, let y be the current year, thus (y-1) and (y-2) denote the previous year and the previous previous year. Further let #article_{y-1} be the number of papers published at a venue in (y-1) and #article_{y-2} for (y-2);

#citations_{y-1} be the number of citations to papers published at the venue in (y-1) and # citations _{y-2} for (y-2).

Then the impact factor if for the venue is calculated by

if[i]=(#citations_{y-1} + #citations_{y-2})/(#article_{y-1}+#article_{y-2})

Rank of 97 Conferences. ( 102 ms.)
Rank Conference Full Name
Conference:
13CCSACM Conference on Computer and Communications Security
28USENIX Security SymposiumUSENIX Security Symposium
30NDSSNetwork and Distributed System Security Symposium
33CSFWComputer Security Foundations Workshop
35CRYPTOInternational Cryptology Conference
63PETPrivacy Enhancing Technologies
74S&PIEEE Symposium on Security and Privacy
79RAIDInternational Symposium On Recent Advances in Intrusion Detection
88PKCPublic Key Cryptography
96EUROCRYPTTheory and Application of Cryptographic Techniques
125ESORICSEuropean Symposium on Research in Computer Security
131ASIACRYPTThe Annual International Conference on the Theory and Application of Cryptology & Information Security
139SACMATSymposium on Access Control Models and Technologies
160Financial CryptographyFinancial Cryptography
186Information HidingInformation Hiding
224DSNDependable Systems and Networks
225ACSACAnnual Computer Security Applications Conference
276FSEFast Software Encryption
279ACISPAustralasian Conference on Information Security and Privacy
283CHESCryptographic Hardware and Embedded Systems
350ISSSInternational Symposium on Systems Synthesis
359NSPWWorkshop on New Security Paradigms
389SACACM Symposium on Applied Computing
421AESCCAES Candidate Conference
449CARDISInternational Conference on Smart Card Research and Advanced Applications
456LISAUSENIX Large Installation Systems Administration Conference
496ISC(ISW)Information Security Conference/Information Security Workshop
542Security Protocols WorkshopSecurity Protocols Workshop
579SAMSecurity and Management
611ICISCInternational Calendar of Information Science Conferences
612DISCEXDARPA Information Survivability Conference and Exposition
646SECInformation Security
685CMSCommunications and Multimedia Security
712ICICSInternational Conference on Information and Communication Security
785INDOCRYPTINDOCRYPT
910PSTConference on Privacy, Security and Trust
928IAWIEEE Information Assurance Workshop
980DIMVADetection of Intrusions and Malware & Vulnerability Assessment
987ISIIntelligence and Security Informatics
1102ACNSApplied Cryptography and Network Security
1121TrustBusTrust and Privacy in Digital Business
1218ACSWACSW Frontiers
1254MMMAnnual Conference on Magnetism and Magnetic Materials
1259DRMACM Digital Rights Management Workshop
1267EUROPKIEuropean Public Key Infrastructure Workshop
1273IWIAIEEE International Workshop on Information Assurance
1274WISAWorkshop on Information Security Applications
1340CISInternational Conference on Computational Intelligence and Security
1390WITSWorkshop on Issues in the Theory of Security
1409Security in Information SystemsSecurity in Information Systems
1474CANSCryptology and Network Security
1477DRMTICSDigital Rights Management: Technology, Issues, Challenges and Systems
1502VIZSECIEEE Workshop on Visualization for Computer Security
-ANTSInternational Workshop on Ant Algorithms
-WDIAUWorkshop on Design Issues in Anonymity and Unobservability
-Mobile Agents and SecurityMobile Agents and Security
-TCCTheory of Cryptography
-ISPECInformation Security Practice and Experience
-ITNGInternational Conference on Information Technology: New Generations
-SicherheitSicherheit
-IEEEARESAvailability, Reliability and Security
-ICEBInternational Conference on Electronic Business
-IMA Conference on Cryptography and CodingIMA Conference on Cryptography and Coding
-ICISSInternational Conference on Information Systems Security
-CISCConference on Information Security and Cryptology
-WIDNMWorkshop on Intrusion Detection and Network Monitoring
-ECIWEuropean Conference on Information Warfare and Security
-AUSFORENSICSAustralian Computer, Network & Information Forensics Conference
-ETRICSEmerging Trends in Information and Communication Security
-WPESWorkshop on Privacy in the Electronic Society
-WISIWorkshop on Intelligence and Security Informatics
-AISMAustralian Information Security Management Conference
-WSWireless Security
-IWSECInternational Workshop on Security
-CaLCCryptography and Lattices
-TCGOVTED Conference on e-Government
-VIETCRYPTVIETCRYPT
-IFIP TC11 PublicationsIFIP TC11 Publications
-MYCRYPTInternational Conference on Cryptology in Malaysia
-CRITISInternational Workshop on Critical Information Infrastructures Security
-FDTCFault Diagnosis and Tolerance in Cryptography
-WISTPWorkshop in Information Security Theory and Practice
-SADFESystematic Approaches to Digital Forensic Engineering
-MADNESSecure Mobile Ad-hoc Networks and Sensors
-IFIP WG11.8 PublicationsIFIP WG11.8 Publications
-Infrastructure SecurityInfrastructure Security
-SECPERUSecurity, Privacy and Trust in Pervasive and Ubiquitous Computing
-CFPComputers, Freedom and Privacy
-WEWoRCWestern European Workshop on Research in Cryptology 聽
-DFRWSDigital Forensic Research Workshop
-IEEE Security in Storage WorkshopIEEE Security in Storage Workshop
-FASecFormal Aspects of Security
-CAUCryptographic Algorithms and their Uses
-ODRLOpen Digital Rights Language
Journal:
-DuDDatenschutz und Datensicherheit