Skip to main content
. 2016 Oct 3;11(10):e0163477. doi: 10.1371/journal.pone.0163477

Table 2. Publication channels.

Canadian Conference on Electrical and Computer Engineering (CCECE) [15]
International Conference on Information Systems Security (ICISS) [16]
International Workshop on Security and Trust Management (STM) [17][18]
International Conference on Applied Cryptography and Network Security (ACNS) [19]
International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD) [20]
International Conference on Passive and Active Measurement (PAM) [21]
International Conference on Intelligence in Next Generation Networks (ICIN) [22]
International Conference on Financial Cryptography and Data Security (FC) [23][24][25][26][27][28][29][30][31][32][33][34][35]
European Symposium on Research in Computer Security (ESORICS) [36][37][38]
International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT) [39]
International Cryptology Conference (CRYPTO) [40]
International Conference on Trust & Trustworthy Computing (TRUST) [41][42]
International Conference on Network and System Security (NSS) [43][44]
Book: Programming Languages with Applications to Biology and Security [45]
ACM Conference on Computer and Communications Security (ACM CCS) [46]
ACM Conference on Data and Application Security and Privacy (CODASPY) [47]
International Conference on Computational Science and Applications (ICCSA) [48]
eCrime Researchers Summit (eCRS) [49]
International Conference on Big Data and Cloud Computing (BDCloud) [50]
IEEE Symposium on Visualization for Cyber Security (VizSec) [51]
International Conference on Peer-to-Peer Computing (P2P) [52]
International Workshop on Secure Peer-to-Peer Intelligent Networks & Systems (SPINS) [53]
IEEE Micro Magazine [54]
International Workshop on Data Privacy Management (DPM) [6]