2021年 网络与安全 顶级会议 截稿时间
更多会议截稿信息,期刊Special Issue,以及盛会的讨论qun,请移步gzh查看。


以下为近期截稿的CCF推荐,网络与安全领域会议,按照时间排序。
个别会议因为没有公布截稿信息而不在所列时间线内。
录取率信息为网络上可获得的最近年份数据,不一定是上一年的,文中尽量选择同时带有投稿量的数据年份供大家参考.
Core Ranking会排除Not primarily CS,regional或者是national的会议,个别未上榜会议不代表会议水平差。
具体列表如下:
| CHES |
|---|
| 会议全称:International Conference on Cryptographic Hardware and Embedded Systems 会议网址:https://ches.iacr.org/2021/ 会议地点:Beijing, China CCF分类:B 类 Core分类:A 类 H5指数:36 影响力值:2.81 录取率: CHES'20 26.8% (60/224) |
| IMPORTANT DATES: Schedule for TCHES Volume 2021/4 15 April 2021: Submission deadline 17–21 May 2021: Rebuttal phase 15 June 2021: Notification 14 July 2021: Final version due |
| SPECIFIC AREAS OF INTEREST: Cryptographic implementations: Hardware architectures Cryptographic processors and co-processors True and pseudorandom number generators Physical unclonable functions (PUFs) Efficient software implementations Attacks against implementations, and countermeasures: Side-channel attacks and countermeasures Micro-architectural side-channel attacks Fault attacks and countermeasures Hardware tampering and tamper-resistance White-box cryptography and code obfuscation Hardware and software reverse engineering Tools and methodologies: Computer-aided cryptographic engineering High-assurance crypto Verification methods and tools for secure design Domain-specific languages for cryptographic systems Metrics for the security of embedded systems Secure programming techniques FPGA design security Interactions between cryptographic theory and implementation issues: New and emerging cryptographic algorithms and protocols targeting embedded devices Special-purpose hardware for cryptanalysis Leakage resilient cryptography Applications: Cryptography and security for the Internet of Things (RFID, sensor networks, smart devices, smart meters, etc.) Hardware IP protection and anti-counterfeiting Reconfigurable hardware for cryptography Smartcard processors, systems and applications Security for cyberphysical systems (home automation, medical implants, industrial--control systems, etc.) Automotive security Secure storage devices (memories, disks, etc.) Technologies and hardware for content protection Trusted computing platforms |
| SRDS |
|---|
| 会议全称:IEEE International Symposium on Reliable Distributed Systems 会议网址:https://srds-conference.org/ 会议地点:Chicago, USA CCF分类:B 类 Core分类:A 类 H5指数:14 影响力值:2.31 录取率:SRDS'20 24.4% (32/131) |
| IMPORTANT DATES: Abstract Submission: April 9th, 2021 Full Paper Submission: April 16th, 2021 Rebuttal: May 20th to May 21st, 2021 Notification to Authors: June 18th, 2021 Camera-Ready: July 5th, 2021 |
| SPECIFIC AREAS OF INTEREST: Dependability, security and privacy of distributed systems including, but not limited to, cloud, high-performance, fog, and edge computing; distributed data storage and processing; distributed machine learning and AI; safety-critical distributed systems; Internet of Things, vehicular, robotic, cyber-physical and mobile systems. Techniques and algorithms advancing the state-of-the-art in fault tolerance, fault recovery, robustness, self-stabilization, self-healing, scalability, and real-time for distributed systems. These include, but are not limited to, coordination, replication, failure prediction and detection, micro-services, transactions, and blockchains. Methods and tools for the design, implementation, verification, validation, and operation of dependable and secure distributed applications, middleware, operating systems and hardware. Analytical, simulative and experimental assessment of dependable and secure distributed systems, in particular, when in real-world settings or with real-world data and in large scale and complex environments. |
| CCS |
|---|
| 会议全称:ACM Conference on Computer and Communications Security 会议网址:https://www.sigsac.org/ccs/CCS2021/ 会议地点:Seoul, South Korea CCF分类:A 类 Core分类:A* 类 H5指数:88 影响力值:12.54 录取率:CCS'20 17% (121/715) |
| IMPORTANT DATES: Paper submission deadline: May 6, 2021 Rebuttal period: June 29-July 20, 2021 Author notification: July 20, 2021 Resubmission of revised papers: August 20, 2021 Decisions on revised papers: September 4, 2021 Camera-ready deadline: September 20, 2021 |
| SPECIFIC AREAS OF INTEREST: Software Security Web Security Network Security Formal Methods and Programming Languages Hardware, Side Channels, and CyberPhysical Systems Applied Cryptography Machine Learning and Security Security Usability and Measurement Blockchain and Distributed Systems Privacy and Anonymity |
| ICICS |
|---|
| 会议全称:International Conference on Information and Communications Security 会议网址:https://icics.cn/ 会议地点:Chongqing, China CCF分类:C 类 Core分类:B 类 H5指数:NA 影响力值:NA 录取率:ICICS'20 23.7% (33/139) |
| IMPORTANT DATES: Conference date: Sep 17-19 2021
Camera ready: Jul 13 2021
Acceptance notification: Jun 29 2021
Paper submission deadline: May 11 2021 |
|SPECIFIC AREAS OF INTEREST: Access control and authorization Anonymity Applied cryptography Attacks and defenses Authentication Biometrics security Blockchains and distributed ledger security Censorship resistance Cloud security Cyber physical systems security Distributed systems security Economics of security and privacy Embedded systems security Forensics Hardware security Intrusion detection and prevention Malware and unwanted software Mobile and Web security and privacy Language-based security Machine learning and AI security Network and systems security Privacy-preserving data mining Privacy technologies and mechanisms Protocol security Secure information flow Security and privacy for the Internet of Things Security and privacy metrics and policies Security architectures Social networks security, privacy and trust Software and application security Usable security and privacy Trustworthy computing|
| ICDF2C |
|---|
| 会议全称:International Conference on Digital Forensics & Cyber Crime 会议网址:https://icdf2c.eai-conferences.org/2021/ 会议地点:Virtual CCF分类:C 类 Core分类:NA H5指数:NA 影响力值:NA 录取率:ICDF2C'20 42.85% (15/35) |
| IMPORTANT DATES: Full Paper Submission deadline: 16 May 2021
Notification deadline: 16 July 2021
Camera-ready deadline: 23 August 2021
Start of Conference: 7 December 2021
End of Conference: 9 December 2021 |
|SPECIFIC AREAS OF INTEREST: Digital and Multimedia Evidence and Forensics Novel Digital Forensic Techniques and Tools; Multimedia Forensics (including but not limited to Image-, Audio-, and Video Analysis, Biometrics, Linguistic Analysis of Texts); Chip-off Forensics; Mobile & Network Forensics; ICS/SCADA Forensics; Live Data Forensics; Forensic Lab Management and Accreditation Legal Applications E-Discovery; Investigations of Cybercrime, Terrorism, Computer-Related Fraud, Computer-Related Forgery, Content-Related offences (Child abuse materials, Promotion of extremism), Copyright Infringement; Other Legal Aspects of Digital Evidence Procedure and Applications. Applications in Technological Security Cloud Computing Security; Web Application Security; Database Security; Intrusion Detection/Prevention; Network Security; Mobile Device Security; Smart Grid Security; Self-Organized Resilient Systems; Critical Infrastructure Security; ICS/SCADA Security; Security of “Internet of Things”; Quantum Computing Security; Digital Currency Security Security of Wearable Devices; Digital Rights Management. Applications / Issues in National and International Security Issues, Human Rights Trans-National Cybercrime Investigations and Mutual Legal Assistance; Internet-based Espionage & Advanced Persistent Threats; State-Sponsored Cyber Warfare & Terrorism; International Cyber Conflicts; Government Surveillance; Censorship and Control of the Internet; International Cyber Laws and Confidence Building Measures. Applications in Organizational Security and Incident Response Incident Response; Disaster Recovery; Insider Threat Management; Risk Management; Business Continuity; Security Policies; Security Auditing; Regulatory Compliance; Economics of Security; Behavioral Information Security. Security and Forensics Education Accreditation of Security and Forensics Training; Innovative Pedagogic Techniques; Certifications; Hands-on Security Laboratories and Tabletop Exercises; Education Infrastructure; Diversity in Security/Forensics Education; Online Security/Forensics Education.|
| NSPW |
|---|
| 会议全称:New Security Paradigms Workshop 会议网址:https://www.nspw.org/2021 会议地点:North Conway, New Hampshire, USA CCF分类:C 类 Core分类:C 类 H5指数:NA 影响力值:NA 录取率:NSPW'20 41.7% (10/24) |
| IMPORTANT DATES: Submission deadline: May 21, 2021 23:59 (UTC -11)
Workshop: October 25 - 28, 2021
Location: White Mountain Hotel and Resort in North Conway, New Hampshire, USA
Final version: November 24, 2021 |
|SPECIFIC AREAS OF INTEREST: Technological accessibility is an extension of usable security and central to the principle of availability. Protection of data and technology must always be a public good. Informed consent is no longer possible in societies dependent on ubiquitous digital technologies. The security of an emerging technology is dependent on a common understanding of the benefits of that technology. Security for one party always results in insecurity for another party—whether at the policy, technology or societal level.|
| TCC |
|---|
| 会议全称:Theory of Cryptography Conference 会议网址:https://www.nspw.org/2021 会议地点:Raleigh, United States CCF分类:B 类 Core分类:A 类 H5指数:38 影响力值:2.97 录取率:TCC'20 42.5% (71/167) |
| IMPORTANT DATES: May 25 2021 Submission deadline at 21:00 UTC Aug 27 2021 TCC notification Sep 17 2021 Camera ready Nov 8 2021 Conference begins |
| SPECIFIC AREAS OF INTEREST: study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones formulation and treatment of new cryptographic problems study of notions of security and relations among them modeling and analysis of cryptographic algorithms study of the complexity assumptions used in cryptography |
| FSE |
|---|
| 会议全称:Fast Software Encryption 会议网址:https://tosc.iacr.org/public/journals/6/cfp_21.pdf 会议地点:Athens, Greece CCF分类:B 类 Core分类:B 类 H5指数:53 影响力值:6.76 录取率:journal/conference hybrid model |
| IMPORTANT DATES: Submission: 1 June 2021 Rebuttal: 6-9 July 2021 Decision: 1 August 2021 Camera-ready deadline for accepted papers (and conditionally accepted): 28 August 2021 |
| SPECIFIC AREAS OF INTEREST: The scope of FSE concentrates on fast and secure primitives for symmetric cryptography, including the design and analysis of block ciphers, stream ciphers, encryption schemes, hash functions, message authentication codes, (cryptographic) permutations, authenticated encryption schemes, cryptanalysis and evaluation tools, and security issues and solutions regarding their implementation. |
| USENIX Security |
|---|
| 会议全称:Usenix Security Symposium 会议网址:https://tosc.iacr.org/public/journals/6/cfp_21.pdf 会议地点:Virtual CCF分类:A 类 Core分类:A* 类 H5指数:80 影响力值:13.04 录取率:USENIX Security’20 16.1% (157/977) |
| IMPORTANT DATES: Refereed paper submissions due: Tuesday, June 8, 2021, 11:59 pm AoE Early reject notification: July 15, 2021 Rebuttal Period: August 23–25, 2021 Notification to authors: September 3, 2021 Final paper files due: October 5, 2021 |
| SPECIFIC AREAS OF INTEREST: Refereed paper submissions are solicited in all areas relating to systems research in security and privacy, including but not limited to: System security Operating systems security Web security Mobile systems security Distributed systems security Cloud computing security Network security Intrusion and anomaly detection and prevention Network infrastructure security Denial-of-service attacks and countermeasures Wireless security Security analysis Malware analysis Analysis of network and security protocols Attacks with novel insights, techniques, or results Forensics and diagnostics for security Automated security analysis of hardware designs and implementation Automated security analysis of source code and binaries Program analysis Machine learning security and privacy Data-driven security and measurement studies Measurements of fraud, malware, spam Measurements of human behavior and security Privacy-enhancing technologies and anonymity Usable security and privacy Language-based security Hardware security Secure computer architectures Embedded systems security Methods for detection of malicious or counterfeit hardware Side channels Research on surveillance and censorship Social issues and security Research on computer security law and policy Ethics of computer security research Research on security education and training Information manipulation, misinformation, and disinformation Protecting and understanding at-risk users Emerging threats, harassment, extremism, and online abuse Applications of cryptography Analysis of deployed cryptography and cryptographic protocols Cryptographic implementation analysis New cryptographic protocols with real-world applications |
