
|
|
IEEE Cipher's Calendar of Security and Privacy Related Events
|
|
Updated March 2, 2010
Date (Month/Day/Year), Event, Locations, e-mail for more info.
See also Cipher Calls for Papers file for
details on many of these listings.
Also worth a look are
the ICL calendar
and the IACR site, and several others
About submitting items to the Cipher calendar and CFP list, and information about email delivery failures.
An asterisk [*] points from the submission date entry to the conference
date entry.
The following notations indicate limitations on the distribution of
the event proceedings. The note is based on
the editor's reading of the event announcement. Contact the event
chairs if you have questions.
NP = No proceedings
AO = Proceedings are distributed to attendees only
BP = Only "best papers" will be published
No notation means that the proceedings will be
published for distribution outside the conference.
- 2/26/10: TSP, Bradford, UK; Conf Web page; Submissions are due; [*]
- 2/28/10- 3/ 3/10: NDSS, San Diego CA; Conf Web page
- 3/ 5/10: SOUPS Redmond WA; Conf Web page; Submissions are due; [*]
- 3/ 7/10: MMM-ACNS- St. Petersburg, Russia; Conf Web page; Submissions are due; info: mmmacns@comsec.spb.ru; [*]
- 3/ 7/10: MINES Nanjing China; Conf Web page; Submissions are due; info: ieeemines@gmail.com; [*]
- 3/ 8/10: ICTAC, Natal, Rio Grande do Norte, Brazil; Conf Web page; Submissions are due; info: ictac2010@iist.unu.edu; [*]
- 3/10/10: ELS London UK; Conf Web page; Submissions are due; info: els-2010@i-society.eu; AO; [*]
- 3/12/10: TrustBus Bilbao, Spain; Conf Web page; Submissions are due; [*]
- 3/13/10: IH Alberta Canada; Web page; Submissions are due; info: ih2010@ucalgary.ca; [*]
- 3/19/10: HOST Anaheim California; Conf Web page; Submissions are due; [*]
- 3/22/10- 3/26/10: SAC, Sierre Switzerland; Conf Web page
- 3/22/10- 3/26/10: SAC-ISRA, Sierre Switzerland; Conf Web page
- 3/22/10- 3/24/10: WiSec, Hoboken NJ; Conf Web page
- 3/27/10- 3/28/10: ARSPA-WITS, Paphos Cyprus; Conf Web page
- 3/27/10: PIIPES, Novi Sad, Serbia; Conf Web page; Submissions are due; NP; [*]
- 3/28/10: FDTC Santa Barbara CA; Conf Web page; Submissions are due; [*]
- 3/29/10: SICHERHEIT Berlin, Germany ; Conf Web page; Submissions are due; [*]
- 4/ 1/10: IDMAN Oslo Norway; Conf Web page; Submissions are due; NP; [*]
- 4/ 1/10: ISCTURKEY Ankara Turkey; Conf Web page; Submissions are due; [*]
- 4/ 3/10: PST Ottawa, Ontario, Canada; Conf Web page; Submissions are due; [*]
- 4/ 4/10: RAID Ottawa Canada; Conf Web page; Submissions are due; [*]
- 4/ 5/10- 4/ 9/10: SPIEDSS, Orlando FL; Conf Web page
- 4/ 5/10: SECURECOMM Singapore; Conf Web page; Submissions are due; [*]
- 4/ 7/10: SCN Amalfi Italy; Conf Web page; Submissions are due; info: scn@dia.unisa.it; [*]
- 4/13/10- 4/16/10: ASIACCS, Beijing China; info: jing@is.ac.cn; Conf Web page
- 4/13/10- 4/14/10: WISTP, Passau Germany; info: damien.sauveron@unilim.fr; Conf Web page
- 4/13/10- 4/15/10: IDtrust, Gaithersburg Maryland; Conf Web page
- 4/20/10- 4/23/10: SMPE-10, Perth Australia; info: ssyeo@msn.com; Conf Web page
- 4/20/10: RFIDSec Istanbul Turkey; Conf Web page; Submissions are due; info: siddika.ors@itu.edu.tr; [*]
- 4/20/10: CTC Brisbane nil; Conf Web page; Submissions are due; info: p.watters@ballarat.edu.au; [*]
- 4/21/10- 4/23/10: CSIIRW, Oak Ridge, TN; Conf Web page
- 4/24/10: HST Waltham MA; Conf Web page; Submissions are due; info: information@ieee-hst.org; AO; [*]
- 4/30/10: VizSec Ottawa Ontario, Canada; Conf Web page; Submissions are due; [*]
- 5/ 3/10: HotSec, Washington DC; Conf Web page; Submissions are due; info: hotsec10chair@usenix.org; [*]
- 5/ 6/10- 5/ 7/10: ISCTURKEY, Ankara Turkey; Conf Web page
- 5/10/10: SHA-3-2nd Santa Barbara CA; Conf Web page; Submissions are due; info: hash-function@nist.gov; [*]
- 5/15/10: ICTCI Shanghai China; Conf Web page; Submissions are due; [*]
- 5/16/10- 5/19/10: SP, Berkeley/Oakland, CA; Conf Web page
- 5/16/10: SADFE, Oakland/Berkeley, CA; info: endicott@u.washington.edu; Conf Web page
- 5/30/10: eCRS, Dallas TX; Conf Web page; Submissions are due; [*]
- 6/ 1/10: RV Sliema Malta; Conf Web page; Submissions are due; [*]
- 6/ 4/10: NPSec, Kyoto Japan; Conf Web page; Submissions are due; AO; [*]
- 6/ 7/10- 6/ 8/10: WEIS, Cambridge MA; Conf Web page; AO
- 6/ 8/10- 6/10/10: RFIDSec, Istanbul Turkey; info: siddika.ors@itu.edu.tr; Conf Web page
- 6/ 9/10- 6/11/10: SACMAT, Pittsburgh, PA; info: barbara.carminati@uninsubria.it; Conf Web page
- 6/ 9/10- 6/11/10: SSIRI, Singapore; info: dongjs@comp.nus.edu.sg; Conf Web page
- 6/13/10- 6/14/10: HOST, Anaheim California; Conf Web page
- 6/14/10: DSPAN, Montreal, Canada; info: dspan2010@ieee.org; Conf Web page
- 6/14/10: ACSAC Austin Texas; http://www.acsac.org.Conf Web page; Submissions are due; [*]
- 6/15/10: ISC Boca Raton, Florida; Conf Web page; Submissions are due; [*]
- 6/16/10- 6/18/10: IPIPTM, Morioka Japan; Conf Web page
- 6/21/10- 6/24/10: OWASP, Stockholm Sweden; info: john.wilander@owasp.org; Conf Web page
- 6/21/10- 6/23/10: DBSec, Rome Italy; info: dbsec2010@unimi.it; Conf Web page
- 6/25/10: ICDCS-SPCC, Genoa Italy; Conf Web page
- 6/28/10- 6/30/10: IH, Alberta Canada; info: ih2010@ucalgary.ca; Conf Web page
- 6/28/10- 6/30/10: ELS, London UK; info: els-2010@i-society.eu; Conf Web page; AO
- 6/29/10- 7/ 1/10: TSP, Bradford, UK; Conf Web page
- 7/ 6/10- 7/ 8/10: INC, Heidelberg Germany; info: info@inc2010.org; Conf Web page
- 7/ 8/10- 7/ 9/10: DIMVA, Bonn Germany; info: info@dimva.org; Conf Web page
- 7/12/10- 7/14/10: ISP, Orlando Florida; info: contact(at)promoteresearch.org; Conf Web page; AO
- 7/14/10- 7/16/10: SOUPS, Redmond WA; Conf Web page
- 7/19/10- 7/20/10: CTC, Brisbane nil; info: p.watters@ballarat.edu.au; Conf Web page
- 7/21/10- 7/23/10: POLICYGMU, Fairfax, VA; Conf Web page
- 7/26/10- 7/28/10: SECRYPT, Athens Greece; info: secrypt2010@unimi.it; Conf Web page
- 8/10/10: HotSec, Washington DC; info: hotsec10chair@usenix.org; Conf Web page
- 8/17/10- 8/19/10: PST, Ottawa, Ontario, Canada; Conf Web page
- 8/21/10: FDTC, Santa Barbara CA; Conf Web page
- 8/23/10- 8/24/10: SHA-3-2nd, Santa Barbara CA; info: hash-function@nist.gov; Conf Web page
- 8/30/10- 9/ 3/10: SIGCOMM, New Delhi, India; ; Conf Web page
- 8/30/10- 9/ 3/10: TrustBus, Bilbao, Spain; Conf Web page
- 9/ 1/10- 9/ 3/10: ICTAC, Natal, Rio Grande do Norte, Brazil; info: ictac2010@iist.unu.edu; Conf Web page
- 9/ 7/10- 9/10/10: SECURECOMM, Singapore; Conf Web page
- 9/ 8/10- 9/11/10: MMM-ACNS, St. Petersburg, Russia; info: mmmacns@comsec.spb.ru; Conf Web page
- 9/13/10- 9/15/10: SCN, Amalfi Italy; info: scn@dia.unisa.it; Conf Web page
- 9/14/10: VizSec, Ottawa, Ontario, Canada; Conf Web page
- 9/15/10- 9/17/10: RAID, Ottawa, Ontario, Canada; Conf Web page
- 9/20/10- 9/23/10: SEC, Brisbane Australia; Conf Web page
- 9/20/10- 9/24/10: PIIPES, Novi Sad, Serbia; Conf Web page; NP
- 10/ 4/10-10/ 8/10: CCS, Chicago IL; Conf Web page
- 10/ 5/10-10/ 7/10: SICHERHEIT, Berlin, Germany ; Conf Web page
- 10/ 5/10: NPSec, Kyoto Japan; Conf Web page; AO
- 10/18/10-10/20/10: ICTCI, Shanghai China; Conf Web page
- 10/18/10-10/20/10: eCRS, Dallas TX; Conf Web page
- 10/25/10-10/28/10: ISC, Boca Raton, Florida; Conf Web page
- 11/ 1/10-11/ 4/10: RV, Sliema Malta; Conf Web page
- 11/ 4/10-11/ 6/10: MINES, Nanjing China; info: ieeemines@gmail.com; Conf Web page
- 11/ 8/10-11/10/10: HST, Waltham MA; info: information@ieee-hst.org; Conf Web page
- 11/18/10-11/19/10: IDMAN, Oslo Norway; Conf Web page; NP
- 12/ 6/10-12/10/10: ACSAC, Austin Texas; http://www.acsac.org.Conf Web page
- 5/22/11- 5/25/11: Security and Privacy, Berkeley/Oakland, CA
Key:
- ACISP = Australasian Conference on Information Security and Privacy
- ACM-MM = ACM International Multimedia Conference
- ACM-MOBILE = ACM Mobile Computing and Communications Review
- ACM-MONET = Special Issue of the Journal on Special Topics in Mobile Networking and Applications
- ACM-TSEM-SEC = ACM Transactions on Software Engineering and Methodology, Special issue on Software Engineering and Security
- ACNS = Applied Cryptography and Network Security
- ACSAC = Annual Computer Security Applications Conference ACSAC 2010, Austin Texas
- ACSF = Advances in Computer Security and Forensics
- ADAlgs = Summer Course in Advanced Distributed Algorithms
- ADCOM = Conference on Advanced Computing and Communications
- AES = Advanced Encryption Standard Candidate Conference
- AGENTS-EMCSR = From Agent Theory to Agent Implementation
- AINA = International Conference on Advanced Information Networking and Applications
- AIPA = Advanced Information Processing and Analysis
- AISec = Workshop on Artificial Intelligence for Security
- AISW = Australasian Information Security Workshop On Digital Rights Management
- AISW-Pet = Australasian Information Security Workshop, (Privacy Enhancing Technologies)
- ALICS = Applications of Logic in Computer Security
- AMESP = Appropriate Methodology for Empirical Studies of Privacy
- AMOC = Asian International Mobile Computing Conference
- AMS = Active Middleware Services
- APE = Advances in Policy Enforcement
- APTC = Asia-Pacific Trusted Infrastructure Technologies Conference
- APWG = Anti-Phishing Working Group (APWG) eCrime Researchers Summit
- ARES = Availability, Reliability and Security
- ARSPA = Workshop on Automated Reasoning for Security Protocol Analysis
- ARSPA-WITS = Automated Reasoning for Security Protocol Analysis, and Issues in the Theory of Security ARSPA-WITS 2010, Paphos Cyprus
- ASA = Analysis of Security APIs
- ASA-MA = Symposium on Agent Systems and Applications; Symposium on Mobile Agents
- ASIACCS = Information, Computer and Communications Security ASIACCS 2010, Beijing China
- ASIACRYPT = ASIACRYPT, Advances in Cryptology
- ASIAN = Asian Computing Science Conference, Focusing on Computer and Network Security
- ASWN = Applications and Services in Wireless Networks
- ASWN = IEEE Workshop On Applications And Services In Wireless Networks
- ASYNC = Asynchronous Circuits and Systems
- AT = Workshop on Agent Technologies
- ATC = Autonomic and Trusted Computing
- ATMA = Advanced Transaction Models and Architectures
- AusCERT = Asia Pacific Information Technology Security Conference
- AUTONOMICS = Autonomic Computing and Communication Systems
- AVoCS = Automated Verification of Critical Systems
- BDBIS = Baltic Workshop on DB and IS
- BIOSEC = Biometric Security
- BITE = Business Information Technology Ethics
- Book-ACCSD = Chapters for book on Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering
- Book-DCFS = A book on Digital Crime and Forensic Science in Cyberspace
- CACS = Conference on Computer Audit, Control and Security
- CaLC = Cryptography and Lattices Conference
- CANS = Cryptology and Network Security
- CARDIS = Smart Card Research and Advanced Application Conference
- CCCpyrt = Colleges, Code and Copyright
- CCJ = Computer Communications Journal special issue on network security
- CCS = ACM Computer and Communications Security Conference CCS 2010, Chicago IL
- CCS-Wkps = Workshops to be held in conjunction with ACM CCS 2010 CCS-Wkps 2010, Chicago, Il
- CCSS = Annual Canadian Computer Security Symposium (see CITSS)
- CCSW = Cloud Computing Security Workshop
- CEAS = Conference on Email and Anti-Spam
- CEC special session = Congress on Evolutionary Computation Special Session on Evolutionary Computation in Cryptology and Computer Security
- CFP = Computers, Freedom, and Privacy
- CHES = Workshop on Cryptographic Hardware and Embedded Systems
- CHINACOM = CHINACOM
- CIIW = Workshop on Critical Information Infrastructures
- CIKM = International Conference on Information and Knowledge Management
- CISMOD = International Conf. on Information Systems and Management of Data
- CITSS = Canadian Information Technology Security Sympsoium
- CLAT = Computer-aided Law and Advanced Technologies track of ACM Symposium on Applied Computing
- CLC = Workshop on Codes and Lattices in Cryptography
- ClusterSec = Workshop on Cluster Security
- CMS = Communications and Multimedia Security Conference
- CoALa = Workshop on Contract Architectures and Languages
- COMAD = International Conference on Management of Data
- COMPASS = Conference on Computer Assurance (defunct)
- CompMag = Computer Magazine special issue, High-speed Internet Security
- COMPSAC = Int'l. Computer Software and Applications Conference
- CONTEMPCRYPT=Contemporary Methods in Cryptography
- CoopIS = IFCIS International Conference on Cooperative Information Systems
- CORBA SW = Workshop on Building and Using CORBASEC ORBS
- CPAC = Cryptography - Policy and Algorithms Conference
- CQRE = [Secure] Exhibition and Congress
- CRiSIS = Conference on Risks and Security of Internet and Systems
- CRiSIS = Conference on Risks and Security of Internet and Systems
- CRYPTO = IACR CRYPTO
- CSAW = Computer Security Architecture Workshop CSAW , Fairfax, Virginia
- CSAW = Computer Security Architecture Workshop
- CSET = Cyber Security Experimentation and Test
- CSF = Computer Security Foundations Symposium
- CSFW = Computer Security Foundations Workshop is now the CSF Symposium
- CSFS = Computer Security Foundations Symposum (see CSF)
- CSI = Computer Security Institute Conference
- CSIIRW = Cyber Security and Information Intelligence Research Workshop CSIIRW 2010, Oak Ridge, TN
- CSS = Communications Security Symposium (in conjunction with GLOBECOMM)
- CT-RSA = RSA Conference, Cryptographers' Track
- CTC = Cybercrime and Trustworthy Computing Workshop CTC 2010, Brisbane nil
- CVDSWS = Invitational Workshop on Computer Vulnerability Data Sharing
- CW = Cyber Worlds: Theory and Practice
- CWCP = Cambridge Workshop on Cryptographic Protocols
- CYBER-FRAUD = Cyber-Fraud
- CyberSecnTrustSoft = Cyber Security and Trustworthy Software
- DAMMCC = International Workshop on Discrete Algorithms and Methods for Mobile Computing & Communications
- DAPD-SEC = Distributed and Parallel Databases: Special Journal Issue on Security
- DART = Databases: Active & Real-Time
- DASC = Dependable, Autonomic and Secure Computing
- DASFAA = Database Systems For Advanced Applications
- DATANET = Datanet Security, Annual International Conference and Exhibition on Wide Area Network Security
- DAWAM = Dependability Aspects on Data WArehousing and Mining applications
- DBSec = Data and Applications Security DBSec 2010, Rome Italy
- DCCA = Dependable Computing for Critical Applications
- DCCS = Dependable Computing and Communications Symposium
- DEST_SS_ICS = DEST Special Session on Interoperability of Communications and Security DEST_SS_ICS , Cairns, Australia
- DETER = Deter Laboratory Experimenters' Workshop
- DEXA = International Conference and Workshop on Database and Expert Systems Applications
- DEXA-ECS = Electronic Commerce and Security, A Workshop held in conjunction with DEXA
- DEXA-SIDIA = DEXA Workshop on Security and Integrity of Data Intensive Applications
- DFRWS = Digital Forensic Research Workshop
- DIM = Workshop on Digital Identity Management
- DIMACS Security Ver = DIMACS Workshop on Formal Verification of Security Protocols
- DIMACS-InfoSecEc = DIMACS Workshop on Information Security Economics
- DIMACS-SAP = DIMACS Workshop on Security Analysis of Protocols
- DIMACS-WISE = DIMACS Workshop on Information Security Economics
- DIMVA = Detection of Intrusions and Malware & Vulnerability Assessment DIMVA 2010, Bonn Germany
- DIREN = Disaster Recovery Networks
- DISC = International Symposium on DIStributed Computing
- DMKD = Data Mining and Knowledge Discovery Workshop
- DMSEC = Data Mining for Computer Security
- DOCSec = Distributed Objects and Components Security
- DOOD = Conference on Deductive and Object-Oriented Databases
- DPM = Data Privacy Management
- DRM = Digital Rights Management Workshop
- DRM-ICC = Workshop on Digital Rights Management Impact on Consumer Communications
- DRMTICS = Digital Rights Management: Technologies, Issues, Challenges and Systems
- DSN-WACS = Assurance Cases for Security: the Metrics Challenge
- DSOM = Distributed Systems: Operations & Management
- DSPAN = Data Security and PrivAcy in wireless Networks DSPAN 2010, Montreal, Canada
- DSPCS = Digital Signal Processing for Communication Systems
- DSSC = Workshop on Dependable and Secure Services Computing
- EC = ACM Conference on Electronic Commerce
- EC2ND = European Conference on Computer Network Defence
- ECC = Workshop on Elliptic Curve Cryptography
- ECDLP = Workshop on the Elliptic Curve Discrete Logarithm Problem
- ECIW = European Conference on Information Warfare and Security
- ECOMM = Business Process Reegineering and Supporting Technologies for Electronic Commerce
- eCRS = APWG eCrime Researchers Summit eCRS 2010, Dallas TX
- ECRYPT-HASH = ECRYPT Workshop on Hash Functions
- EC2ND = European Conference on Computer Network Defence
- EDOC = Enterprise Distributed Object Computing Conference
- EFECE = Edinburgh Financial Cryptography Financial Conference
- EIT = Enabling Worldwide Communication and Progress Utilizing Information Technology
- Electronic Commerce for Content II = Forum on Technology-Based Intellectual Property Management
- ELS = E-Learning Security ELS 2010, London UK
- ENCXCS = Engineering Complex Computer Systems Minitrack of HICSS
- ENM = Enterprise Networking
- ENTRSEC = International Workshop on Enterprise Security
- ESAS = Security and Privacy in Ad hoc and Sensor Networks
- ESCS = Embedded Systems and Communications Security
- ESSoS = Engineering Secure Software and Systems ESSoS 2010, Pisa Italy
- ETAPS = European Joint Conferences on Theory and Practice of Software
- ETFA = Emerging Technologies and Factory Automation
- ETRICS = Emerging Trends in Information and Communication Security
- Euro PKI = European PKI Workshop
- Euro-PDS = European Conference on Parallel and Distributed Systems
- EUROCRYPT = IACR Annual European Cryptography Conference
- EUROMED-NET = The Role of Internet and the World Wide Web in Developing the Euro-Mediterranean Information Society
- EUROPKI = Public Key Services, Applications and Infrastructures
- EVT = USENIX/ACCURATE Electronic Voting Technology Workshop
- EVT-WOTE- = Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections
- FAST = Formal Aspects in Security and Trust
- FC = Financial Cryptography and Data Security FC 2010, Tenerife, Canary Islands, Spain
- FC = Financial Cryptography and Data Security
- FCC = Formal and Computational Cryptography
- FCS = Foundations of Computer Security
- FDTC = Fault Diagnosis and Tolerance in Cryptography FDTC 2010, Santa Barbara CA
- FIRST = FIRST
- FISP = Federal Internet Security Plan Workshop
- FISSEA = Federal Information Systems Security Educators' Association
- FloCon = FloCon
- FM = Symposium on formal methods
- FMC = Foundations of Mobile Computation
- FME = Formal Methods Europe
- FMLDO = Foundations of Models and Languages for Data and Objects
- FMP = Formal Methods Pacific
- FMSC = Workshop on Formal Methods and Computer Security
- FMSE = Formal Methods in Security Engineering: From Specifications to Code
- FMSP = Formal Methods in Software Practice; See WFMSP
- FOSAD = School on Foundations of Security Analysis and Design
- FOUNDATIONS = Verification and Validation Research in the Coming Decade
- FPS = France-Canada Workshop on Foundations & Practice of Security
- FSE = Fast Software Encryption
- FST-TCS = Foundations of Software Technology and Theoretical Computer Science
- GBN = Gigabit Networking Workshop
- GENI-Sec = Workshop on GENI and Security GENI-Sec , California, USA
- Globecom = IEEE Computer and Communications Network Security Symposium
- GPCS = Grid and Pervasive Computing Security
- GRAND = CRA Conference on Grand Research Challenges in Information Security and Assurance
- HAISA = Human Aspects of Information Security & Assurance
- Handbook-Research-on-Information-Assurance-and-Security = Handbook of Research on Information Assurance and Security
- Handbook-Secure-Multimedia = Handbook of Research on Secure Multimedia Distribution Handbook-Secure-Multimedia
- HASE = IEEE Symposium on High Assurance Systems Engineering
- HICSS = Hawaii International Conference on Systems Sciences
- HICSS-HTC = HICSS Highly Trustworthy Computing Mini-Track
- HICSS-SSADIA = HICSS Mini-Track: Secure Software Architecture, Design, Implementation and Assurance
- HiPC = Conference on High Performance Computing
- HM-HC = History of Cryptography
- HOST = Hardware-Oriented Security and Trust HOST 2010, Anaheim California
- HotDep = Hot Topics in System Dependability
- HOTI = Hot Interconnects, A Symposium on High Performance Interconnects
- HotNets = HotNets - Workshop on Hot Topics in Networks
- HotSec = Hot Topics in Security HotSec 2010, Washington DC
- HotWeb = Workshop on Hot Topics in Web Systems and Technologies
- HPCNCS = High Performance Computing, Networking, and Communication Systems
- HPTS = Workshop on High Performance Transaction Systems
- HSN = High-speed Networks Symposium at Globecom
- HST = Technologies for Homeland Security HST 2010, Waltham MA
- HT-CHES = Hot Topic Session: Hardware Trojans and Trusted ICs
- HUC = International Symposium on Handheld and Ubiquitous Computing
- I3PFellows = Institute for Information Infrastructure Protection (I3P) Research Fellowships for postdoctoral researchers, junior faculty and research scientists
- IAMCOM = Information Assurance Middleware for Communications
- IAS = Information Assurance and Security
- IASTED = Communication Systems and Networks
- IASTED-specsession = Session on Architectures and Languages for Digital Rights Management and Access Control
- IAIW = IEEE International Workshop on Information Assurance
- IASymp = Symposium on Information Assurance
- IAW = Information Assurance Workshop
- IAWS = Workshop on Information Assurance
- IC3N = International Conference on Computer Communications and Networks
- ICAST = Conference on Advanced Science and Technology
- ICATM = International IEEE Conference on ATM
- ICCC = Internation Conference on Computer Communications
- ICCC = International Common Criteria Conference
- ICCCN = International Conference on Computer Communications and Networks
- ICCSA = International Conference On Computational Science And Its Applications
- ICDCS = International Conference on Distributed Computing Systems
- ICDE = Int. Conf. on Data Engineering
- ICDM-PSA = Workshop on Privacy and Security Aspects of Data Mining (in conjunction with ICDM)
- ICDT = International Conference on Database Theory
- ICECCS = International Conference on Engineering of Complex Computer Systems
- ICEIS = International Conference on Enterprise Information Systems
- ICET = International Conference on Emerging Technologies
- ICFEM = International Conference on Formal Engineering Methods
- ICI = International Cryptography Institute
- ICICS = International Conference on Information and Communications Systems
- ICISP = Internet Surveillance and Protection
- ICISS = Information Systems Security
- ICIW = Information Warfare and Security
- ICNP = International Conference on Network Protocols
- ICOIN = International Conference on Information Networking
- ICON = IEEE Conference on Networks
- ICS = Information and Computer Security
- ICSSDBM = Int. Conf. on Scientific and Statistical Database Management
- IC-WDISS = Special Issue, Internet Computing, Widely Deployed Internet Security Solutions
- ICTAC = ICTAC Special Track on the Grand Challenge on Verified Software ICTAC 2010, Natal, Rio Grande do Norte, Brazil
- ICWN = International Conference on Wireless Networks
- ICWS = Conference on Web Services
- IDEAS = International Database Engineering and Applications Symposium
- IDtrust = Symposium on Identity and Trust on the Internet
- IDW = Information Domain Workshop
- IEEE-ANETS = IEEE Network Magazine Special Issue on Active and Programmable Networks
- IEEE-COMP-NETSEC = IEEE Computer - Special Issue on Networking Security
- IEEE-INETCOMP = Special Issue IEEE: Internet Security in the Age of Mobile Code
- IEEE-INFOCOMM Infocomm home page
- IEEE-InetComp-SI = IEEE Internet Computing theme issue on Homeland Security, Nov/dec IEEE-InetComp-SI
- IEEE-Internet-Comp-SI-p2padhocnets = Ieee Internet Computing Special Issue on Security for P2P and Ad Hoc Networks
- IEEE-LCN = IEEE Conference on Local Computer Networks
- IEEE-NetMag = IEEE Network Magazine: Middleware Technologies for Future Communication Networks
- IEEE-NetMag-NetSec = IEEE Network Magazine Special Issue on Network Security
- IEEE NM = IEEE Network Magazine Special Issue on PCS Network Management
- IEEE-PCM-MOBILE = Special Issue on IP-based Mobile Telecommunications Networks
- IEEE S&P = Symposium on Security and Privacy SP 2010, Oakland/Berkeley, California
- IEEESW-SI = IEEE Software Special Issue
- IEEECOMHYB = IEEE Communications Magazine Special Issue on Hybrid Networks
- IEEE_COMM_INET_TECH = IEEE Communications Magazine, Internet Technology Series
- IESS = International Symposium on Software Engineering Standards
- IETF = Internet Engineering Task Force IETF
- IFIP Mobile Commns
- IFIP WG11.3 = Working Conference on Data and Applications Security IFIP WG11.3 , Redondo Beach Marina, California
- IFIP-NSS = IFIP International Conference on Network and Service Security
- IFIP-Sec = Conference on Information Security
- IFIP WG11.3 = IFIP WG 11.3 Working Conference on Data and Applications Security
- IH = Information Hiding
- IICIS = IFIP WG 11.5 working conference on Integrity and Internal Control in Information Systems
- IIIS = Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results
- IJCSSE = Journal of Computer Systems: Science & Engineering. Special Issue on Developing Fault-Tolerant Systems with Ada
- IJICS-Special-Nature-Computation = Special Issue of the International Journal on Information and Computer Security (IJICS), "Nature-Inspired Computation in Cryptology and Computer Security"
- IMACCC = IMA Conference on Cryptography and Coding
- IMACS-IEEE99 = Special Session on Applied Coding, Cryptology and Security
- IMC = IMC Information Visualization and Mobile Computing
- IMCS = International Multiconferences in Computer Science
- INC = International Network Conference INC 2010, Heidelberg Germany
- INDOCRYPT = International Conference on Cryptology in India
- INET = Internet Society Annual Conference
- InfoAssur = Information Assurance
- InfraSec = Infrastructure Security Conference
- InSAgentBased = Information & Security: An International Journal, Special Issue on Agent-based Technologies
- Inscrypt = Information Security and Cryptology
- InSPEC = Security and Privacy in Enterprise Computing
- Inspec = Workshop on Security and Privacy in Enterprise Computing
- INTRA-FORA = International Conference on INTRANET: Foundation, Research, and Applications
- INTRUST = International Conference on Trusted Systems
- IPIC = Integration of Enterprise Information and Processes
- IPICS = Intensive Program on Information and Communication Security, Privacy Technology
- IPIPTM = Trust Management (IFIP Internation Conference on) IPIPTM 2010, Morioka Japan
- IPSWG = Internet Privacy and Security Workshop
- IRISH = Irish Workshop on Formal Methods
- IRMA = Information Resources Management Association International Conference
- IRW-FMP = International Refinement Workshop and Formal Methods Pacific
- IPSEC = IPSec Global Summit
- IS = Information Security
- IS = Information Systems (journal)
- ISA = Information Security and Assurance
- ISADS = Symposium on Autonomous Decentralized Systems
- ISC = Information Security Conference ISC 2010, Boca Raton, FL
- ISCC = IEEE Symposium on Computers and Communications
- ISCIS = International Symposium on Computer and Information Sciences
- ISCOM = International Symposium on Communications
- ISCTURKEY = Information Security and Cryptology ISCTURKEY 2010, Ankara Turkey
- ISH = Workshop on Information Security and Hiding
- ISIPS = Interdisciplinary Studies in Information Privacy and Security
- ISP = Information Security and Privacy ISP 2010, Orlando, FL
- ISPEC = Security Practice and Experience Conference
- ISSA = Information Security South Africa
- ISSE = Information Security Solutions Europe
- ISSEA = International Systems Security Engineering Association Conference
- ISSRE = Software Reliability Engineering
- ISSSE = International Symposium on Secure Software Engineering
- ISTCS = Israeli Symposium on Theory of Computing and Systems
- ISW = Information Survivability Workshop
- ISW = Information Security Workshop
- IT-Sicherheit = Communications and Multimedia Security: Joint Working conference of IFIP TC-6 and TC-11 and Austrian Computer Society
- ITCC = International Conference on Information Technology Coding and Computing
- ITLIT = CSTB Workshop on Information Technology Literacy
- iTrust = Conference on Trust Management
- ITW = Information Theory Workshop On Theory and Practice in Information-theoretic Security
- IWACO = Workshop on Aliasing, Confinement and Ownership
- IWAN = International Working Conference on Active Networks
- IWDW = Workshop on Digital Watermarking
- IWFM = (See IRISH)
- IWES = International Workshop on Enterprise Security
- IWIA = Information Assurance Workshop
- IWNS = Network Steganography
- IWSEC = Workshop on Security
- IWSecP = International Workshop on Security Protocols
- JBCS = Journal of the Brazilian Computer Society
- JCMS = Journal of Computer Mediated Communication
- JCN-SI-Secure-Wireless = JCN Special Issue on Secure Wireless Networking JCN-SI-Secure-Wirless ,
- JDSE = Journal of Distributed Systems Engineering; Future Directions for Internet Technology
- JHSN-SpecialIssue-Policy = Journal of High Speed Networking, Special issue on Managing Security Polices: Modeling, Verification and Configuration
- JOCS = Journal of Computer Security
- JOCSIDS = JCS Special Issue on Research in Intrusion Detection
- JOFC = Journal of Cryptology JOFC
- JOPT = Journal of Privacy Technology JOPT
- JSAC-WDM = IEEE JSAC Special Issue on Protocols and Architectures for Next Generation Optical WDM Networks
- JSAC_SI-DnA-SecAsr = IEEE JSAC Special Issue, Design And Analysis Techniques For Security Assurance
- JSS = Journal of Systems and Software (North-Holland)
- JTS = Journal of Telecommunications Systems, special multimedia issue
- JWWW = World Wide Web Journal
- KDD = International Conference on Knowledge Discovery and Data Mining
- LADIS = Large Scale Distributed Systems and Middleware (part of SOSP)
- LAFT = Logical Aspects of Fault Tolerance
- LBFCM = Workshop on the link between formal and computational models
- LCN = Conference on Local Computer Networks
- LFM = Logical Frameworks and Meta-languages
- LISA = Large Installation System Administration Conference
- MALWARE = Malicious and Unwanted Software
- MCDA = Australian Workshop on Mobile Computing & Databases & Applications
- MCN = ACM Int. Conf. on Mobile Computing and Networking. See MOBICOM
- MCP = Workshop on Models for Cryptographic Protocols
- MDDS = Mobility in Databases and Distributed Systems
- MDS = Conference on the Mathematics of Dependable Systems
- METAD = IEEE Metadata Conference
- MetricSec = Security Measurements and Metrics, (Formerly the Workshop on Quality of Protection - QoP)
- MFPS = Mathematical Foundations of Programming Semantics
- MidSec = Middleware Security
- MCP = Workshop on Models for Cryptographic Protocols
- MDDS = Mobility in Databases and Distributed Systems
- MDS = Conference on the Mathematics of Dependable Systems
- METAD = IEEE Metadata Conference
- MetricSec = Security Measurements and Metrics, (Formerly the Workshop on Quality of Protection - QoP)
- MFPS = Mathematical Foundations of Programming Semantics
- MidSec = Middleware Security
- MINES = Multimedia Information NEtworking and Security MINES 2010, Nanjing China
- MLCS = Machine Learning for Computer Security, Special Issue in Journal of Machine Learning Research
- MMD = Multimedia Data Security
- MMDMS = Workshop on Multi-Media Database Management Systems
- MMM-ACNS- = Mathematical Methods, Models, and Architectures for Computer Networks Security MMM-ACNS- 2010, St. Petersburg, Russia
- MOBICOM = MobiCom = Mobile Computing and Networking = Conference on Mobile Computing and Networking
- MMM-ACNS = Mathematical Methods, Models and Architectures for Computer Network Security
- MonAM = Monitoring, Attack Detection and Mitigation
- MSRI-NTCW = MSRI Number Theoretic Cryptography Workshop
- MSWiM = Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems
- MWNS = Mobile and Wireless Networks Security MWNS 2009, Aachen, Germany
- Mycrypt = International Conference on Cryptology in Malaysia
- NBIS = Workshop on Network-Based Information Systems
- NCSC = National Computer Security Conference; no longer held 23rd NCSC, past conferences
- NDSS = Network and Distributed System Security Symposium NDSS 2010, San Diego CA
- NetCompApp = Symposium on Network Computing and Applications
- NetCri = Workshop on Research Challenges in Next Generation Networks for First Responders and Critical Infrastructures
- NetDB = Workshop on Networking Meets Databases (with SOSP)
- NetSec = CSI Network Security
- NETWORK = combination HPN (High Performance Networking), BC (Broadband Communications), and PCN (Performance of Communication Networks)
- NGC = Networked Group Communication
- NGITS = World Conference of the WWW, Internet, and Intranet
- NICSSE = National Colloquium for Information Systems Security Education
- NIST-CHW = NIST Cryptographic Hash Workshop
- NIST-CHW2 = NIST Cryptographic Hash Workshop NIST-CHW2, Santa Barbara, CA
- NIST-IBE = Applications of Pairing-Based Cryptography: IBE and Beyond
- NIST-KMW = NIST Key Management Workshop
- NIST-PKI = PKI R&D Workshop
- NIST-SHA3 = NIST SHA3 Hash Function Competition NIST-SHA3
- NIST-SHA3 = SHA-3 Candidate Conference
- NordSec = Nordic Conference on Secure IT Systems
- NISSC = National Information Systems Security Conference (see NCSC)
- NPSec = Secure Network Protocols NPSec 2010, Kyoto, Japan
- PIIPES = Personal Identifiable Information: Privacy, Ethics, and Security PIIPES 2010, Novi Sad, Serbia
- PST = Privacy, Security, and Trust PST 2010, Ottawa, Ontario, Canada
- RBAC = ACM Workshop on Role-based Access Control
- ReConFig = ReConFigurable Computing and FPGAs, Special track on Reconfigurable Computing for Security and Cryptography
- RECSI = Spanish Meeting on Cryptology and Information Security
- RFIDPriv = RFID Privacy Workshop
- RFIDsec = RFID Security, Asia RFIDsec 2010, Singapore
- RFIDSec = RFID Security RFIDSec 2010, Istanbul, Turkey
- RIDE = High Performance Database Management for Large Scale Applications
- RLCPS = Real-Life Cryptographic Protocols and Standardization RLCPS 2010, Tenerife, Canary Islands, Spain
- ROADS = Real Overlays and Distributed Systems (part of SOSP)
- RTDB = International Workshop on Real-Time Databases: Issues and Applications
- RV = Runtime Verification RV 2010, Sliema Malta
- SAC = Symposium on Applied Computing SAC 2010, Sierre Switzerland
- SAC = Selected Areas in Cryptography
- SAC-ISRA = Symposium on Applied Computing, Information Security Research and Applications Track SAC-ISRA 2010, Sierre Switzerland
- SAC-TRECK = Symposium on Applied Computing, Track on Trust, Recommendations, Evidence and other Collaboration Know-how
- SAC-TRUSTCOLLAB = ACM SAC, Track on Trust, Recommendations, Evidence and other Collaboration Know-how
- SACMAT = Access Control Models and Technologies SACMAT 2010,
- SADFE = Systematic Approaches to Digital Forensic Engineering SADFE 2010, Oakland/Berkeley, CA
- SAFECOMP = Safety, Reliability, and Security of Computer Systems
- SafeConfig = Assurable & Usable Security Configuration
- SAppC = ACM Symposium on Applied Computing - Special Track on Computer Security
- SAPS = Specification and Automated Processing of Security Requirements
- SASN = Security of Ad Hoc and Sensor Networks
- SCI = Multi Conference on Systemics, Cybernetics and Informatics, special session on Complexity and Algorithmic Information Theory With Application to Systems, Networks, and Information Assurance
- SCIS = Symposium on Cryptography and Information Security
- SCITS = Security and Control of IT in Society, sponsored by IFIP WG 9.6/11.7
- SCN = Security and Cryptography for Networks SCN 2010, Amalfi Italy
- SCRAPC = Smart Card Research and Advanced Application Conference
- SDCS = Workshop on Security in Distributed Computing Systems
- SDM = VLDB Workshop on Secure Data Management
- SDSP = UK/Australian International Symposium On DSP For Communication Systems
- SEC = IFIP International Information Security Conference SEC 2010, Brisbane Australia
- SecCo = Security Issues in Concurrency
- SecConf = Security Conference
- SECI = Security of Communications on the Internet
- SECOVAL = Workshop on the Value of Security through Collaboration
- SecPri_WiMob = Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications
- SECRYPT = Security and Cryptography SECRYPT 2010, Athens Greece
- SecReT = Security and Rewriting Techniques
- SecSE = Secure Software Engineering SecSE 2010, Krakow Poland
- SecUbiq = Workshop on Security in Ubiquitous Computing Systems
- SECURECOMM = Security and Privacy in Communication Networks SECURECOMM 2010, Singapore
- SECURICOM = World Congress on the Security of Information Systems and Telecommunication
- Security and Privacy = IEEE Symposium on Security and Privacy
- SecWmMMC = Security and Watermarking of Multimedia Contents
- SEMAS = Security Of Mobile Multiagent Systems
- SeMIC = Workshop on Security for Mobile Wireless Communications
- SenSys = Conference on Embedded Networked Sensor Systems
- SETA = Sequences and their Applications
- SETOP = Autonomous and Spontaneous Security
- SEWCN = Security in Emerging Wireless Communication and Networking Systems
- SFC = Society and the Future of Computing
- SFTC-VI = Symposium on Fault Tolerant Computing - VI (Brazil)
- SHA-3-2nd = Second SHA-3 Candidate Conference SHA-3-2nd , Santa Barbara CA
- SHPCS = Security and High Performance Computing Systems
- SI-AdHocNetSec = International Journal of Computer Research, Special Issue on Advances in Ad Hoc Network Security
- SI-CC-MNSCN = Special Issue of Computer Communications on Multimedia Networking and Security in Convergent Networks
- SI-COMP-SECREST = Computer Magazine Special Issue, Security for the Rest of Us
- SI-Eurasip-NetwkIntrus = EURASIP Journal on Advances in Signal Processing, Special Issue on Advances in Signal Processing in Network Intrusion Detection Systems
- SI-IEEE-NM-ID = IEEE Network Magazine, Special Issue on, Recent Developments in Network Intrusion Detection
- SI-IEEE-TIM-Biometrics = IEEE Transactions on Instrumentation and Measurement, Special Issue on Biometric Instrumentation and Measurement SI-IEEE-TIM-Biometrics ,
- SI-IEEE-TransIFS-Voting = IEEE Transactions on Information Forensics and Security: Special Issue
- SI-IJCNIS = International Journal of Communication Networks and Information Security,Special Issue on Composite and Integrated Security Solutions for Wireless Sensor Networks
- SI-IJSSE-Trustworthy = Special Issue of IJSSE, Software Safety & Dependability - the Art of Engineering Trustworthy Software SI-IJSSE-Trustworthy
- SI-JAR-OSVERIF = Journal of Automated Reasoning: Special Issue On Operating Systems Verification SI-JAR-OSVERIF
- SI-JICS-SPADM = International Journal of Information and Computer Security, Special Issue on Security and Privacy Aspects of Data Mining
- SI-SNPMag- = IEEE Security & Privacy Magazine Special Issue on Privacy-Preserving Sharing of Sensitive Information SI-SNPMag- 2010,
- SI-SPMag-DNS = IEEE Security and Privacy Magazine, Special Issue on Securing the Domain Name System SI-SPMag-DNS
- SIADS = Security Issues in Adaptive Distributed Systems
- SICHERHEIT = Sicherheit, Schutz und Zuverlässigkeit SICHERHEIT 2010, Berlin, Germany
- SICON = IEEE Singapore International Conference on Networks
- SIGMOD/PODS - ACM SIGMOD International Conference on Management of Data / ACM SIGACT SIGMOD-SIGART Symposium on Principles of Database Systems
- SIGCOMM = ACM Special Interest Group on Data Communication SIGCOMM 2010, New Delhi, India
- SIGSAC-Awards = SIGSAC Annual Awards
- SIN = Security of Information and Networks
- SIntelProp = Symposium on Intellectual Property
- SIS = Secure Information Systems
- SISW = Security in Storage Workshop
- SI_JAR_PCC = Special Issue of Journal of Automated Reasoning, Proof-carrying Code
- SKLOIS = Conference on Information Security and Cryptology
- SKM = Secure Knowledge Management Workshop
- SMPE = Security and Multimodality in Pervasive Environments SMPE-10 , Perth Australia
- SNDS = Security in Networked and Distributed Systems (Special Session of PDP 2010) SNDS 2010, Pisa Italy
- SNPA = IEEEE Workshop on Sensor Network Protocols and Applications
- SOC = Biennial Symposium on Communications
- SoftCOM = Mobile Wireless Networks
- SoftCOM = International Conference On Software, Telecommunications And Computer Networks
- SOSOC = Security in Opportunistic and SOCial Networks
- SOSP = ACM Symposium on Operating Systems Principles
- SOUPS = Usable Privacy and Security SOUPS 2010, Redmond WA
- SPC = Security in Pervasive Computing
- SPECNS = Software Practices and Engineering, Special Issue on Experiences with Computer and Network Security
- SPECOMM = Workshop on Security and Privacy in E-Commerce
- SPI = Security and Protection of Information
- SPIEDSS = SPIE Defense, Sensing, and Security SPIEDSS 2010, Orlando FL
- SRDS = IEEE Symposium on Reliable Distributed Systems
- SREIS = Requirements Engineering for Information Security
- SRUTI = Steps to Reducing Unwanted Traffic on the Internet
- SSDU = Service, Security and its Data management technologies in Ubi-comp
- SSIRI = Secure Software Integration and Reliability Improvement SSIRI 2010, Singapore
- SSNDS = Symposium on Security in Networks and Distributed Systems
- SSS = Stabilization, Safety, and Security of Distributed Systems
- StaR_SEC = Information and Communications Security Standards and Regulations
- STC = Scalable Trusted Computing
- STEG = Pacific Rim Workshop on Digital Steganography
- STM = Workshop on Security and Trust Management
- StorageSS = Workshop on Storage Security and Survivability
- SUTC = Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
- SWING = School for PhD and Researchers on Security for Wireless Networking
- SWS = Secure Web Services
- TAPOS = Theory and Applications of Object Systems, special issue Objects, Databases, and the WWW
- TAPSOFT = Theory and Practice of Software Development
- TCC = Theory of Cryptography
- TFI = ISOC's study group on Trust and the Future of the Internet
- TGC = Trustworthy Global Computing
- TheSecConf = The Security Conference
- TISC = The Internet Security Conference
- TPHOLs = Theorem Proving in Higher Order Logics
- TRPC = Research Conference on Communication, Information and Internet Policy
- TrustBus = Trust, Privacy, and Security in Digital Business TrustBus 2010, Bilbao Spain
- TrustCol = Workshop on Trusted Collaboration
- TrustCom = Symposium on Trusted Computing
- TSMA = International Conference on Telecommunication Systems - Modeling and Analysis
- TSP = Trust, Security, and Privacy for Emerging Applications TSP 2010, Bradford, UK
- TSPUC = Workshop on Trust, Security and Privacy for Ubiquitous Computing
- TSRSW = Trust, Security, and Reputation on the Semantic Web
- TV = Thread Verification
- UbiComp = UbiComp, Privacy in Context
- UPSEC = Usability, Psychology, and Security
- USEC = Usable Security
- USENIX = USENIX Annual Technical Conference
- USENIXIDS = USENIX Workshop on Intrusion Detection and Network Monitoring
- USENIXSec = USENIX Security Symposium
- USM = Workshop on Usable IT Security Management
- VETO = Security and Electronic Voting
- VIETCRYPT = Cryptology in Vietnam
- VISSAS = Verification of Infinite State Systems with Application to Security
- VizSec = Visualization for Cyber Security VizSec 2010, Ottawa, Ontario, Canada
- VLDB = International Conference on Very Large Data Bases
- VMSEC = Workshop on Virtual Machine Security
- W2SP = Web 2.0 Security and Privacy
- W2Trust = Web 2.0 Trust W2Trust , Trondheim, Norway
- WASA = Wireless Algorithms, Systems and Applications
- WATC = Workshop on Advances in Trusted Computing
- WATERMARKING = WATERMARKING
- WCAN = Workshop on Cryptography for Ad hoc Networks
- WCW = Workshop on Web Content Caching and Distribution
- WDAG = Int. Workshop on Distributed Algorithms
- WDFIA = Digital Forensics and Incident Analysis
- WebDB = International Workshop on the Web and Databases
- WebNet = World Conference of the Web Society
- WEC = Workshop on Electronic Contracting
- WECS = Workshop on Education in Computer Security (formerly WISE)
- WECSR = Ethics in Computer Security Research 2010 WECSR 2010, Tenerife, Canary Islands, Spain
- WEIS = Workshop on the Economics of Information Security WEIS 2010, Cambridge MA
- WECWIS = Workshop on Advanced Issues of E-Commerce and Web-based Information Systems
- WENS = Workshop on Enterprise Network Security
- WESII = The Workshop on the Economics of Securing the Information Infrastructure
- WESS = Workshop on Embedded Systems Security
- WETICE = IEEE Workshops on Enabling Technologies, Infrastructure for Collaborative Enterprises
- WFMSP = Workshop on Formal Methods and Security Protocols
- WFCC = Workshop on Formal and Computational Cryptography
- WHOLES = A Multiple View of Individual Privacy in a Networked World
- WIA = Workshop on Information Assurance
- WIAPP = Workshop on Internet Applications
- WICOW = Workshop on Information Credibility on the Web
- WICS = Workshop on Internet Communications Security
- WISA = Workshop on Information Security Applications
- WISAC = Workshop on Innovations in Strong Access Control
- WiSe = Workshop on Wireless Security
- WiSec = Wireless Network Security WiSec 2010, Hoboken NJ
- WISP = Workshop on Wireless Security and Privacy
- WISP = Security Issues with Petri Nets and other Computational Models
- WISTP = Information Security Theory and Practice WISTP , Passau Germany
- WITAT = Workshop on Information Technology - Assurance and Trustworthiness
- WITS = Workshop on Issues in the Theory of Security
- WLACPV = Workshop on Logical Aspects of Cryptographic Protocol Verification
- WLC = Lightweight Cryptography for Resource-Constrained Devices WLC 2010, Tenerife, Canary Islands, Spain
- WMN = Special Session of Pacific Rim Conference on Multimedia - Wireless Multimedia Networks
- WNano = NIST Workshop on Nanosecurity
- WOBIS = Workshop on Satellite-based Information Services
- WOIH = Workshop on Information Hiding, see Information Hiding
- WOLFASI = Workshop on Logical Foundations of an Adaptive Security Infrastructure
- WorkshopMV = Workshop on Modelling and Verification
- WORM = Workshop on Recurring Malcode
- WORM = Workshop on Rapid Malcode
- WOSIS = Workshop on Security In Information Systems
- WPES = Workshop on Privacy in the Electronic Society
- WPET = Workshop on Privacy Enhancing Technologies
- WRAITS = Workshop on Recent Advances on Intrusion-Tolerant Systems
- WSEG = Brazilian Workshop On Security Of Computing Systems
- WSLSDS = Workshop on Security in Large-Scale Distributed Systems
- WSNA = Wireless Sensor Networks and Applications
- WSNS = Wireless and Sensor Networks Security
- WSRS = Workshop on Safety, Reliability, and Security of Industrial Computer Systems
- WSS = Workshop on Self-Stabilizing Systems
- WSSEET = Workshop on Secure Software Engineering Education and Training
- WSSS = Workshop on Web Services Security
- WSStandz = Workshop on Security Standardization
- WSTI = Workshop on Security of Information Technologies
- WWV = Automated Specification and Verification of Web Systems
- WWW = World Wide Web Conference
- WWW-SPAE = World Wide Web Conference, Security, Privacy, Reliability and Ethics Track