This page provides links to various journals and conference proceedings on topics related to computer and information security. The list, which has been culled from several sources, is by no means comprehensive or exclusive. Please help me to make it better and let me know if there are publications that should or should not be here.
Journal of Cryptology: The official journal of the International Association for Cryptologic Research which provides a forum for publication of original results in all areas of modern information security
Computers & Security: The official journal of Technical Committee 11 (computer security) of the International Federation for Information Processing.
Designs, Codes, and Cryptography: Designs, Codes and Cryptography provides a forum for high quality papers of both a theoretical and a practical nature which bridge design theory, coding theory, and cryptography, encouraging interaction between them.
International Journal of Information Security: The International Journal of Information Security is an English language periodical on research in information security which offers prompt publication of important technical work, whether theoretical, applicable, or related to implementation.
IET Information Security: IET Information Security publishes original research papers in numerous areas of information security and cryptography.
Journal of Computer Security: The Journal of Computer Security presents research and development results of lasting significance in the theory, design, implementation, analysis, and application of secure computer systems
Journal of Computer Virology and Hacking Techniques: The Journal of Computer Virology and Hacking Techniques is an independent academic and technical journal dedicated to viral and antiviral computer technologies and hacking techniques (software and hardware).
Journal of Cybersecurity: Journal of Cybersecurity publishes accessible articles describing original research in the inherently interdisciplinary cyber domain. Journal of Cybersecurity is premised on the belief that computer science-based approaches, while necessary, are not sufficient to tackle cybersecurity challenges. Instead, scholarly contributions from a range of disciplines are needed to understand the varied aspects of cybersecurity.
Information and Computer Security:Information and Computer Security (ICS) contributes to the advance of knowledge directly related to the theory and practice of the management and security of information and information systems.
The ACM Conference on Computer and Communications Security (CCS) is the flagship annual conference of the Special Interest Group on Security, Audit and Control (SIGSAC) of the Association for Computing Machinery (ACM).
Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.
The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks
ACSAC brings together cutting edge researchers, with a broad cross-section of security professionals drawn from industry, government and academia, gathered to present and discuss the latest security results and topics.
To build on the success of ACM Conference on Computer and Communications Security (CCS) and ACM Transactions on Information and System Security (TISSEC), the ACM Special Interest Group on Security, Audit, and Control (SIGSAC) formally established the annual ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS).
We respectfully acknowledge the University of Arizona is on the land and territories of Indigenous peoples. Today, Arizona is home to 22 federally recognized tribes, with Tucson being
home to the O’odham and the Yaqui. Committed to diversity and inclusion, the University strives to build sustainable relationships with sovereign Native Nations and Indigenous
communities through education offerings, partnerships, and community service
Unless an exception applies, certain textual content on this web page is subject to a Creative Commons Attribution 4.0 International License. To learn more, see the University of Arizona Libraries CC BY copyright policy. This license allows anyone to share and adapt that content as long as proper attribution is given and the license terms are followed.