| Rank | Name | Publication | Citation | Rate |
| 1 | S&P - IEEE Symposium on Security and Privacy | 443 | 5728 | 12.93 |
| 2 | CCS - Computer and Communications Security | 484 | 4796 | 9.91 |
| 3 | USENIX Security Symposium - USENIX Security Symposium | 55 | 471 | 8.56 |
| 4 | CRYPTO - CRYPTO | 971 | 8281 | 8.53 |
| 5 | CSFW - Computer Security Foundations Workshop | 346 | 2836 | 8.20 |
| 6 | NDSS - Network and Distributed System Security Symposium | 172 | 1253 | 7.28 |
| 7 | EUROCRYPT - Theory and Application of Cryptographic Techniques | 947 | 6430 | 6.79 |
| 8 | Information Hiding - Information Hiding | 201 | 1044 | 5.19 |
| 9 | ESORICS - European Symposium on Research in Computer Security | 215 | 1030 | 4.79 |
| 10 | FSE - Fast Software Encryption | 307 | 1254 | 4.08 |
| 11 | ASIACRYPT - ASIACRYPT | 502 | 1949 | 3.88 |
| 12 | Financial Cryptography - Financial Cryptography | 235 | 861 | 3.66 |
| 13 | Security Protocols Workshop - Security Protocols Workshop | 207 | 758 | 3.66 |
| 14 | RAID - Recent Advances in Intrusion Detection | 127 | 421 | 3.31 |
| 15 | CT-RSA - The Cryptographer's Track at RSA Conference | 162 | 511 | 3.15 |
| 16 | POLICY - IEEE International Workshop on Policies for Distributed Systems and Networks | 136 | 414 | 3.04 |
| 17 | SACMAT - Symposium on Access Control Models and Technologies | 158 | 462 | 2.92 |
| 18 | PKC - Public Key Cryptography | 264 | 763 | 2.89 |
| 19 | CHES - Cryptographic Hardware and Embedded Systems | 236 | 675 | 2.86 |
| 20 | NSPW - Workshop on New Security Paradigms | 192 | 516 | 2.69 |
| 21 | ACSAC - Annual Computer Security Applications Conference | 400 | 925 | 2.31 |
| 22 | PET - Privacy Enhancing Technologies | 74 | 168 | 2.27 |
| 23 | DSN - Dependable Systems and Networks Publication | 547 | 1092 | 2.00 |
| 24 | Theory of Cryptography - Theory of Cryptography | 94 | 154 | 1.64 |
| 25 | DBSEC - IFIP Workshop on Database Security | 467 | 665 | 1.42 |
| 26 | iTrust - International Conference on Trust Management | 90 | 113 | 1.26 |
| 27 | IMA Conference on Cryptography and Coding | 202 | 250 | 1.24 |
| 28 | ISC(ISW) - Information Security Conference/Information Security Workshop | 267 | 324 | 1.21 |
| 29 | SCN - Security in Communication Networks | 83 | 95 | 1.14 |
| 30 | ACISP - Australasian Conference on Information Security and Privacy | 415 | 468 | 1.13 |
| 31 | ICICS - International Conference on Information and Communication Security | 297 | 312 | 1.05 |
| 32 | SPC - International Conference on Security in Pervasive Computing | 66 | 67 | 1.02 |
| 33 | SAC - Selected Areas in Cryptography | 614 | 543 | 0.88 |
| 34 | Communications and Multimedia Security - Communications and Multimedia Security | 177 | 154 | 0.87 |
| 35 | INDOCRYPT - International Conference on Cryptology in India | 191 | 118 | 0.62 |
| 36 | DRM - ACM Digital Rights Management Workshop | 85 | 51 | 0.60 |
| 37 | SEC - Information Security | 419 | 248 | 0.59 |
| 38 | ICISC - Information Security and Cryptology | 236 | 124 | 0.53 |
| 39 | MMM-ACNS - Mathematical Methods, Models, and Architectures for Network Security Systems | 121 | 54 | 0.45 |
| 40 | ACNS - Applied Cryptography and Network Security | 139 | 61 | 0.44 |
| 41 | IEEE International Workshop on Information Assurance | 38 | 13 | 0.34 |
| 42 | ISI - Intelligence and Security Informatics | 268 | 27 | 0.10 |
| 43 | WISA - Workshop on Information Security Applications | 103 | 10 | 0.10 |
| 44 | SAM - Security and Management | 252 | 14 | 0.06 |
| 45 | WOSIS - International Workshop on Security in Information Systems | 105 | 3 | 0.03 |
| 46 | WORM - workshop on rapid malcode | 7 | 0.00 | |
| 47 | SASN - workshop on security of ad hoc and sensor networks | 24 | 0.00 | |
| Ranked
by citation/publication rate. Last updated: 10/05/2007 |
||||
| Data Source: Microsoft Libra Academic Search |