Canadian Conference on Electrical and Computer Engineering (CCECE) |
[15] |
International Conference on Information Systems Security (ICISS) |
[16] |
International Workshop on Security and Trust Management (STM) |
[17][18] |
International Conference on Applied Cryptography and Network Security (ACNS) |
[19] |
International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD) |
[20] |
International Conference on Passive and Active Measurement (PAM) |
[21] |
International Conference on Intelligence in Next Generation Networks (ICIN) |
[22] |
International Conference on Financial Cryptography and Data Security (FC) |
[23][24][25][26][27][28][29][30][31][32][33][34][35] |
European Symposium on Research in Computer Security (ESORICS) |
[36][37][38] |
International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT) |
[39] |
International Cryptology Conference (CRYPTO) |
[40] |
International Conference on Trust & Trustworthy Computing (TRUST) |
[41][42] |
International Conference on Network and System Security (NSS) |
[43][44] |
Book: Programming Languages with Applications to Biology and Security |
[45] |
ACM Conference on Computer and Communications Security (ACM CCS) |
[46] |
ACM Conference on Data and Application Security and Privacy (CODASPY) |
[47] |
International Conference on Computational Science and Applications (ICCSA) |
[48] |
eCrime Researchers Summit (eCRS) |
[49] |
International Conference on Big Data and Cloud Computing (BDCloud) |
[50] |
IEEE Symposium on Visualization for Cyber Security (VizSec) |
[51] |
International Conference on Peer-to-Peer Computing (P2P) |
[52] |
International Workshop on Secure Peer-to-Peer Intelligent Networks & Systems (SPINS) |
[53] |
IEEE Micro Magazine |
[54] |
International Workshop on Data Privacy Management (DPM) |
[6] |