LNCS Cryptography Volumes available via SpringerLINK

content auto-updated

A number of volumes related to cryptography have been published by Springer in the series Lecture Notes in Computer Science (LNCS). Using the links below you can browse the table of contents for these volumes. However, to view a paper contained in a particular volume requires a subscription to SpringerLINK content. Many academic institutions have subscriptions.

The links on this webpage are generated automatically from the volume information for LNCS which appears on the SpringerLINK website. This means, for example, that whenever the latest CRYPTO proceedings appear on the SpringerLINK website a link to it will appear here soon after.

If you have any suggestions on how to improve this page I would be glad to hear them.

-James
http://www.ccsl.carleton.ca/~jamuir

em

a note about linking to SpringerLINK content
change-log    (30-May-2018: This list is no longer being maintained.)


If you already know the LNCS volume number you are interested in, you can get to it using the following form:

Enter a volume number

Hitting the "submit" button should take you to the relevant SpringerLINK webpage. Note that some LNCS volumes are not available online.


last-generated-20:51-15-Dec-2013

Regular Conferences

Volumes Related to Cryptography and Security

VolumePub. YearTitle
83002013Cyberspace Safety and Security :: 5th International Symposium, CSS 2013, Zhangjiajie, China, Novembe
82632013Security Protocols XXI :: 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Sel
82622013Radio Frequency Identification :: Security and Privacy Issues 9th International Workshop, RFIDsec 2
82572013Cryptology and Network Security :: 12th International Conference, CANS 2013, Paraty, Brazil, Novembe
82552013Stabilization, Safety, and Security of Distributed Systems :: 15th International Symposium, SSS 2013
82522013Decision and Game Theory for Security :: 4th International Conference, GameSec 2013, Fort Worth, TX,
82332013Information and Communications Security :: 15th International Conference, ICICS 2013, Beijing, China
82092013Provable Security :: 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 20
82082013Secure IT Systems :: 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013
82042013Security, Privacy, and Applied Cryptography Engineering :: Third International Conference, SPACE 201
82032013Security and Trust Management :: 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2
81622013Lightweight Cryptography for Security and Privacy :: Second International Workshop, LightSec 2013, G
81532013Computer Safety, Reliability, and Security :: 32nd International Conference, SAFECOMP 2013, Toulouse
81342013Computer Security – ESORICS 2013 :: 18th European Symposium on Research in Computer Security, Egham,
81282013Security Engineering and Intelligence Informatics :: CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Re
81272013Availability, Reliability, and Security in Information Systems and HCI :: IFIP WG 8.4, 8.9, TC 5 Int
80992013Communications and Multimedia Security :: 14th IFIP TC 6/TC 11 International Conference, CMS 2013, M
80862013Cryptographic Hardware and Embedded Systems - CHES 2013 :: 15th International Workshop, Santa Barbar
80582013Trust, Privacy, and Security in Digital Business :: 10th International Conference, TrustBus 2013, Pr
80432013Advances in Cryptology – CRYPTO 2013 :: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, A
80422013Advances in Cryptology – CRYPTO 2013 :: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, A
80392013Intelligence and Security Informatics :: Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3
80302013Human Aspects of Information Security, Privacy, and Trust :: First International Conference, HAS 201
79812013Privacy Enhancing Technologies :: 13th International Symposium, PETS 2013, Bloomington, IN, USA, Jul
79642013Data and Applications Security and Privacy XXVII :: 27th Annual IFIP WG 11.3 Conference, DBSec 2013,
79592013Information Security and Privacy :: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, J
79542013Applied Cryptography and Network Security :: 11th International Conference, ACNS 2013, Banff, AB, Ca
79432013Emerging Management Mechanisms for the Future Internet :: 7th IFIP WG 6.6 International Conference o
79322013Post-Quantum Cryptography :: 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2
79252013Safe and Secure Software Reuse :: 13th International Conference on Software Reuse, ICSR 2013, Pisa,
79182013Progress in Cryptology – AFRICACRYPT 2013 :: 6th International Conference on Cryptology in Africa, C
78862013Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems :: 7th IFIP
78812013Advances in Cryptology – EUROCRYPT 2013 :: 32nd Annual International Conference on the Theory and Ap
78732013Network and System Security :: 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013
78682013Public Key Infrastructures, Services and Applications :: 9th European Workshop, EuroPKI 2012, Pisa,
78642013Constructive Side-Channel Analysis and Secure Design :: 4th International Workshop, COSADE 2013, Par
78632013Information Security Practice and Experience :: 9th International Conference, ISPEC 2013, Lanzhou, C
78622013Financial Cryptography and Data Security :: FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, A
78592013Financial Cryptography and Data Security :: 17th International Conference, FC 2013, Okinawa, Japan,
78392013Information Security and Cryptology – ICISC 2012 :: 15th International Conference, Seoul, Korea, Nov
78232013Smart Grid Security :: First International Workshop, SmartGridSec 2012, Berlin, Germany, December 3,
77962013Principles of Security and Trust :: Second International Conference, POST 2013, Held as Part of the
77852013Theory of Cryptography :: 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6,
77832013Security and Trust Management :: 8th International Workshop, STM 2012, Pisa, Italy, September 13-14,
77812013Engineering Secure Software and Systems :: 5th International Symposium, ESSoS 2013, Paris, France, F
77792013Topics in Cryptology – CT-RSA 2013 :: The Cryptographers’ Track at the RSA Conference 2013, San Fran
77782013Public-Key Cryptography – PKC 2013 :: 16th International Conference on Practice and Theory in Public
77632013Information Security and Cryptology :: 8th International Conference, Inscrypt 2012, Beijing, China,
77432013Foundations and Practice of Security :: 5th International Symposium, FPS 2012, Montreal, QC, Canada,
77392013Radio Frequency Identification. Security and Privacy Issues :: 8th International Workshop, RFIDSec 2
77312013Data Privacy Management and Autonomous Spontaneous Security :: 7th International Workshop, DPM 2012,
77222013Critical Information Infrastructures Security :: 7th International Workshop, CRITIS 2012, Lillehamme
77122012Cryptology and Network Security :: 11th International Conference, CANS 2012, Darmstadt, Germany, Dec
77082013Pairing-Based Cryptography – Pairing 2012 :: 5th International Conference, Cologne, Germany, May 16-
77072013Selected Areas in Cryptography :: 19th International Conference, SAC 2012, Windsor, ON, Canada, Augu
76902012Information Security Applications :: 13th International Workshop, WISA 2012, Jeju Island, Korea, Aug
76722012Cyberspace Safety and Security :: 4th International Symposium, CSS 2012, Melbourne, Australia, Decem
76712012Information Systems Security :: 8th International Conference, ICISS 2012, Guwahati, India, December
76682012Progress in Cryptology - INDOCRYPT 2012 :: 13th International Conference on Cryptology in India, Kol
76582012Advances in Cryptology – ASIACRYPT 2012 :: 18th International Conference on the Theory and Applicati
76452012Network and System Security :: 6th International Conference, NSS 2012, Wuyishan, Fujian, China, Nove
76442012Security, Privacy, and Applied Cryptography Engineering :: Second International Conference, SPACE 20
76382012Decision and Game Theory for Security :: Third International Conference, GameSec 2012, Budapest, Hun
76312012Advances in Information and Computer Security :: 7th International Workshop on Security, IWSEC 2012,
76222012Security Protocols XX :: 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Sele
76182012Information and Communications Security :: 14th International Conference, ICICS 2012, Hong Kong, Chi
76172012Secure IT Systems :: 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 – November
76132012Computer Safety, Reliability, and Security :: SAFECOMP 2012 Workshops: Sassur, ASCoMS, DESEC4LCCI, E
76122012Computer Safety, Reliability, and Security :: 31st International Conference, SAFECOMP 2012, Magdebur
75962012Stabilization, Safety, and Security of Distributed Systems :: 14th International Symposium, SSS 2012
75822013Theory of Quantum Computation, Communication, and Cryptography :: 7th Conference, TQC 2012, Tokyo, J
75562012Privacy in Statistical Databases :: UNESCO Chair in Data Privacy, International Conference, PSD 2012
75492012Fast Software Encryption :: 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21,
75372012Information Security and Cryptology :: 7th International Conference, Inscrypt 2011, Beijing, China,
75332012Progress in Cryptology – LATINCRYPT 2012 :: 2nd International Conference on Cryptology and Informati
75312012Computer Network Security :: 6th International Conference on Mathematical Methods, Models and Archit
74962012Provable Security :: 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 20
74852012Security and Cryptography for Networks :: 8th International Conference, SCN 2012, Amalfi, Italy, Sep
74832012Information Security :: 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2
74822012Secure Data Management :: 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012. Proceeding
74652012Multidisciplinary Research and Practice for Information Systems :: IFIP WG 8.4, 8.9/TC 5 Internation
74592012Computer Security – ESORICS 2012 :: 17th European Symposium on Research in Computer Security, Pisa,
74492012Trust, Privacy and Security in Digital Business :: 9th International Conference, TrustBus 2012, Vien
74282012Cryptographic Hardware and Embedded Systems – CHES 2012 :: 14th International Workshop, Leuven, Belg
74172012Advances in Cryptology – CRYPTO 2012 :: 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, A
74122012Information Theoretic Security :: 6th International Conference, ICITS 2012, Montreal, QC, Canada, Au
73982012Financial Cryptography and Data Security :: FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bona
73972012Financial Cryptography and Data Security :: 16th International Conference, FC 2012, Kralendijk, Bona
73942012Communications and Multimedia Security :: 13th IFIP TC 6/TC 11 International Conference, CMS 2012, C
73842012Privacy Enhancing Technologies :: 12th International Symposium, PETS 2012, Vigo, Spain, July 11-13,
73742012Progress in Cryptology - AFRICACRYPT 2012 :: 5th International Conference on Cryptology in Africa, I
73722012Information Security and Privacy :: 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Austr
73712012Data and Applications Security and Privacy XXVI :: 26th Annual IFIP WG 11.3 Conference, DBSec 2012,
73412012Applied Cryptography and Network Security :: 10th International Conference, ACNS 2012, Singapore, Ju
73222012Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambie
72992012Intelligence and Security Informatics :: Pacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia,
72932012Public Key Cryptography – PKC 2012 :: 15th International Conference on Practice and Theory in Public
72792012Dependable Networks and Services :: 6th IFIP WG 6.6 International Conference on Autonomous Infrastru
72752012Constructive Side-Channel Analysis and Secure Design :: Third International Workshop, COSADE 2012, D
72592012Information Security and Cryptology - ICISC 2011 :: 14th International Conference, Seoul, Korea, Nov
72422012Research in Cryptology :: 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2
72372012Advances in Cryptology – EUROCRYPT 2012 :: 31st Annual International Conference on the Theory and Ap
72322012Information Security Practice and Experience :: 8th International Conference, ISPEC 2012, Hangzhou,
72282012Transactions on Data Hiding and Multimedia Security VIII :: Special Issue on Pattern Recognition for
72152012Principles of Security and Trust :: First International Conference, POST 2012, Held as Part of the E
71942012Theory of Cryptography :: 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy,
71782012Topics in Cryptology – CT-RSA 2012 :: The Cryptographers’ Track at the RSA Conference 2012, San Fran
71702012Security and Trust Management :: 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-
71632012Public Key Infrastructures, Services and Applications :: 8th European Workshop, EuroPKI 2011, Leuven
71612012Information Security Technology for Applications :: 16th Nordic Conference on Secure IT Systems, Nor
71592012Engineering Secure Software and Systems :: 4th International Symposium, ESSoS 2012, Eindhoven, The N
71402012Formal Aspects of Security and Trust :: 8th International Workshop, FAST 2011, Leuven, Belgium, Sept
71352012Advanced Computing, Networking and Security :: International Conference, ADCONS 2011, Surathkal, Ind
71272012Information Security Technology for Applications :: 15th Nordic Conference on Secure IT Systems, Nor
71262012Financial Cryptography and Data Security :: FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St.
71222012Data Privacy Management and Autonomous Spontaneus Security :: 6th International Workshop, DPM 2011,
71182012Selected Areas in Cryptography :: 18th International Workshop, SAC 2011, Toronto, ON, Canada, August
71152012Information Security Applications :: 12th International Workshop, WISA 2011, Jeju Island, Korea, Aug
71142011Security Protocols XIX :: 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Sel
71102012Transactions on Data Hiding and Multimedia Security VII
71072011Progress in Cryptology – INDOCRYPT 2011 :: 12th International Conference on Cryptology in India, Che
70932011Information Systems Security :: 7th International Conference, ICISS 2011, Kolkata, India, December 1
70922011Cryptology and Network Security :: 10th International Conference, CANS 2011, Sanya, China, December
70892011Cryptography and Coding :: 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15
70732011Advances in Cryptology – ASIACRYPT 2011 :: 17th International Conference on the Theory and Applicati
70712011Post-Quantum Cryptography :: 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29
70552012RFID. Security and Privacy :: 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 20
70532012Security and Intelligent Information Systems :: International Joint Conferences, SIIS 2011, Warsaw,
70432011Information and Communications Security :: 13th International Conference, ICICS 2011, Beijing, China
70392012Open Problems in Network Security :: IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Swi
70382011Advances in Information and Computer Security :: 6th International Workshop, IWSEC 2011, Tokyo, Japa
70372011Decision and Game Theory for Security :: Second International Conference, GameSec 2011, College Park
70352012Financial Cryptography and Data Security :: 15th International Conference, FC 2011, Gros Islet, St.
70282013Security Protocols XVII :: 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Sele
70252011Communications and Multimedia Security :: 12th IFIP TC 6 / TC 11 International Conference, CMS 2011,
70112011Security Aspects in Information Technology :: First International Conference, InfoSecHiComNet 2011,
70012011Information Security :: 14th International Conference, ISC 2011, Xi’an, China, October 26-29, 2011.
69932012Theory of Security and Applications :: Joint Workshop, TOSCA 2011, Saarbrücken, Germany, March 31 -
69832013Critical Information Infrastructure Security :: 6th International Workshop, CRITIS 2011, Lucerne, Sw
69802011Provable Security :: 5th International Conference, ProvSec 2011, Xi’an, China, October 16-18, 2011.
69762011Stabilization, Safety, and Security of Distributed Systems :: 13th International Symposium, SSS 2011
69332011Secure Data Management :: 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, September 2, 2011, Proceedi
69172011Cryptographic Hardware and Embedded Systems – CHES 2011 :: 13th International Workshop, Nara, Japan,
69082011Availability, Reliability and Security for Business, Enterprise and Health Information Systems :: IF
68942011Computer Safety, Reliability, and Security :: 30th International Conference,SAFECOMP 2011, Naples, I
68882012Foundations and Practice of Security :: 4th Canada-France MITACS Workshop, FPS 2011, Paris, France,
68792011Computer Security – ESORICS 2011 :: 16th European Symposium on Research in Computer Security, Leuven
68632011Trust, Privacy and Security in Digital Business :: 8th International Conference, TrustBus 2011, Toul
68582011Foundations of Security Analysis and Design VI :: FOSAD Tutorial Lectures
68412011Advances in Cryptology – CRYPTO 2011 :: 31st Annual Cryptology Conference, Santa Barbara, CA, USA, A
68292011Information Security and Cryptology - ICISC 2010 :: 13th International Conference, Seoul, Korea, Dec
68182011Data and Applications Security and Privacy XXV :: 25th Annual IFIP WG 11.3 Conference, DBSec 2011, R
68122011Information Security and Privacy :: 16th Australasian Conference, ACISP 2011, Melbourne, Australia,
68052012Cryptography and Security: From Theory to Applications :: Essays Dedicated to Jean-Jacques Quisquate
67942011Privacy Enhancing Technologies :: 11th International Symposium, PETS 2011, Waterloo, ON, Canada, Jul
67492011Intelligence and Security Informatics :: Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9,
67372011Progress in Cryptology – AFRICACRYPT 2011 :: 4th International Conference on Cryptology in Africa, D
67342011Managing the Dynamics of Networks and Services :: 5th International Conference on Autonomous Infrast
67332011Fast Software Encryption :: 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16,
67302011Transactions on Data Hiding and Multimedia Security VI
67152011Applied Cryptography and Network Security :: 9th International Conference, ACNS 2011, Nerja, Spain,
67122011Critical Information Infrastructures Security :: 5th International Workshop, CRITIS 2010, Athens, Gr
67112011Public Key Infrastructures, Services and Applications :: 7th European Workshop, EuroPKI 2010, Athens
67102011Security and Trust Management :: 6th International Workshop, STM 2010, Athens, Greece, September 23-
66942011Computational Intelligence in Security for Information Systems :: 4th International Conference, CISI
66732011Information Theoretic Security :: 5th International Conference, ICITS 2011, Amsterdam, The Netherlan
66722011Information Security Practice and Experience :: 7th International Conference, ISPEC 2011, Guangzhou,
66502011Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computat
66392011Coding and Cryptology :: Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 201
66332011Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communi
66322011Advances in Cryptology – EUROCRYPT 2011 :: 30th Annual International Conference on the Theory and Ap
66152011Security Protocols XVI :: 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Sel
65972011Theory of Cryptography :: 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, Marc
65842011Information Security and Cryptology :: 6th International Conference, Inscrypt 2010, Shanghai, China,
65712011Public Key Cryptography – PKC 2011 :: 14th International Conference on Practice and Theory in Public
65612011Formal Aspects of Security and Trust :: 7th International Workshop, FAST 2010, Pisa, Italy, Septembe
65582011Topics in Cryptology – CT-RSA 2011 :: The Cryptographers’ Track at the RSA Conference 2011, San Fran
65552011Open Research Problems in Network Security :: IFIP WG 11.4 International Workshop, iNetSec 2010, Sof
65492011Privacy and Security Issues in Data Mining and Machine Learning :: International ECML/PKDD Workshop,
65452011Digital Privacy :: PRIME - Privacy and Identity Management for Europe
65442011Selected Areas in Cryptography :: 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada,
65422011Engineering Secure Software and Systems :: Third International Symposium, ESSoS 2011, Madrid, Spain,
65312011Information Security :: 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28,
65192011Theory of Quantum Computation, Communication, and Cryptography :: 5th Conference, TQC 2010, Leeds, U
65142011Data Privacy Management and Autonomous Spontaneous Security :: 5th International Workshop, DPM 2010
65132011Information Security Applications :: 11th International Workshop, WISA 2010, Jeju Island, Korea, Aug
65032011Information Systems Security :: 6th International Conference, ICISS 2010, Gandhinagar, India, Decemb
64982010Progress in Cryptology - INDOCRYPT 2010 :: 11th International Conference on Cryptology in India, Hyd
64872010Pairing-Based Cryptography - Pairing 2010 :: 4th International Conference, Yamanaka Hot Spring, Japa
64802010Transactions on Computational Science XI :: Special Issue on Security in Computing, Part II
64772010Advances in Cryptology - ASIACRYPT 2010 :: 16th International Conference on the Theory and Applicati
64762010Information and Communications Security :: 12th International Conference, ICICS 2010, Barcelona, Spa
64672010Cryptology and Network Security :: 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia,
64422010Decision and Game Theory for Security :: First International Conference, GameSec 2010, Berlin, Germa
64342010Advances in Information and Computer Security :: 5th International Workshop on Security, IWSEC 2010,
64022010Provable Security :: 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2
63912010Public Key Infrastructures, Services and Applications :: 6th European Workshop, EuroPKI 2009, Pisa,
63702010Radio Frequency Identification: Security and Privacy Issues :: 6th International Workshop, RFIDSec 2
63662010Stabilization, Safety, and Security of Distributed Systems :: 12th International Symposium, SSS 2010
63582010Secure Data Management :: 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010. Proceedings
63512010Computer Safety, Reliability, and Security :: 29th International Conference, SAFECOMP 2010, Vienna,
63452010Computer Security – ESORICS 2010 :: 15th European Symposium on Research in Computer Security, Athens
63442011Privacy in Statistical Databases :: UNESCO Chair in Data Privacy, International Conference, PSD 2010
63402010Transactions on Computational Science X :: Special Issue on Security in Computing, Part I
62802010Security and Cryptography for Networks :: 7th International Conference, SCN 2010, Amalfi, Italy, Sep
62642010Trust, Privacy and Security in Digital Business :: 7th International Conference, TrustBus 2010, Bilb
62582010Computer Network Security :: 5th International Conference on Mathematical Methods, Models and Archit
62252010Cryptographic Hardware and Embedded Systems, CHES 2010 :: 12th International Workshop, Santa Barbara
62232010Advances in Cryptology – CRYPTO 2010 :: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, A
62122010Progress in Cryptology – LATINCRYPT 2010 :: First International Conference on Cryptology and Informa
62052010Privacy Enhancing Technologies :: 10th International Symposium, PETS 2010, Berlin, Germany, July 21-
61972010Algorithmic Number Theory :: 9th International Symposium, ANTS-IX, Nancy, France, July 19-23, 2010.
61862011Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security :: Joint Wor
61682010Information Security and Privacy :: 15th Australasian Conference, ACISP 2010, Sydney, Australia, Jul
61662010Data and Applications Security and Privacy XXIV :: 24th Annual IFIP WG 11.3 Working Conference, Rome
61552010Mechanisms for Autonomous Management of Networks and Services :: 4th International Conference on Aut
61512011Information Security and Cryptology :: 5th International Conference, Inscrypt 2009, Beijing, China,
61472010Fast Software Encryption :: 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010
61232010Applied Cryptography and Network Security :: 8th International Conference, ACNS 2010, Beijing, China
61222010Intelligence and Security Informatics :: Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 2
61212012Data Security and Security Data :: 27th British National Conference on Databases, BNCOD 27, Dundee,
61102010Advances in Cryptology – EUROCRYPT 2010 :: 29th Annual International Conference on the Theory and Ap
61092010Communications and Multimedia Security :: 11th IFIP TC 6/TC 11 International Conference, CMS 2010, L
60612010Post-Quantum Cryptography :: Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25
60562010Public Key Cryptography – PKC 2010 :: 13th International Conference on Practice and Theory in Public
60552010Progress in Cryptology – AFRICACRYPT 2010 :: Third International Conference on Cryptology in Africa,
60542010Financial Cryptography and Data Security :: FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife,
60522010Financial Cryptography and Data Security :: 14th International Conference, FC 2010, Tenerife, Canary
60472010Information Security, Practice and Experience :: 6th International Conference, ISPEC 2010, Seoul, Ko
60332010Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devic
60272010Critical Information Infrastructures Security :: 4th International Workshop, CRITIS 2009, Bonn, Germ
60102010Transactions on Data Hiding and Multimedia Security V
59852010Topics in Cryptology - CT-RSA 2010 :: The Cryptographers’ Track at the RSA Conference 2010, San Fran
59842010Information, Security and Cryptology – ICISC 2009 :: 12th International Conference, Seoul, Korea, De
59832010Formal Aspects in Security and Trust :: 6th International Workshop, FAST 2009, Eindhoven, The Nether
59782010Theory of Cryptography :: 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, Febr
59732010Information Theoretic Security :: 4th International Conference, ICITS 2009, Shizuoka, Japan, Decembe
59652010Engineering Secure Software and Systems :: Second International Symposium, ESSoS 2010, Pisa, Italy,
59642010Security Protocols :: 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised
59392010Data Privacy Management and Autonomous Spontaneous Security :: 4th International Workshop, DPM 2009
59322009 Information Security Applications 10th International Workshop, WISA 2009, Busan, Korea, August
59272009 Information and Communications Security 11th International Conference, ICICS 2009, Beijing, Chi
59222009 Progress in Cryptology - INDOCRYPT 2009 10th International Conference on Cryptology in India, N
59212009 Cryptography and Coding 12th IMA International Conference, Cryptography and Coding 2009, Cire
59132009 Advances in Computer Science - ASIAN 2009. Information Security and Privacy 13th Asian Comput
59122009 Advances in Cryptology ASIACRYPT 2009 15th International Conference on the Theory and Applicat
59062009 Theory of Quantum Computation, Communication, and Cryptography 4th Workshop,TQC 2009, Waterloo,
59052009 Information Systems Security 5th International Conference, ICISS 2009 Kolkata, India, December
58882009 Cryptology and Network Security 8th International Conference, CANS 2009, Kanazawa, Japan, Decem
58732009 Stabilization, Safety, and Security of Distributed Systems 11th International Symposium, SSS 20
58672009 Selected Areas in Cryptography 16th Annual International Workshop, SAC 2009, Calgary, Alberta,
58482009 Provable Security Third International Conference, ProvSec 2009, Guangzhou, China, November 11
58382009 Identity and Privacy in the Internet Age 14th Nordic Conference on Secure IT Systems, NordSec 2
58242009 Advances in Information and Computer Security 4th International Workshop on Security, IWSEC 200
57892010 Computer Security ESORICS 2009 14th European Symposium on Research in Computer Security, Saint
57762009 Secure Data Management 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009. Proceedings
57752009 Computer Safety, Reliability, and Security 28th International Conference, SAFECOMP 2009, Hambur
57472009 Cryptographic Hardware and Embedded Systems - CHES 2009 11th International Workshop Lausanne, S
57462009 Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Netw
57352009 Information Security 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 200
57052009 Foundations of Security Analysis and Design V FOSAD 2007/2008/2009 Tutorial Lectures
56952009 Trust, Privacy and Security in Digital Business 6th International Conference, TrustBus 2009, Li
56772009 Advances in Cryptology - CRYPTO 2009 29th Annual International Cryptology Conference, Santa Bar
56722009 Privacy Enhancing Technologies 9th International Symposium, PETS 2009, Seattle, WA, USA, August
56712009 Pairing-Based Cryptography Pairing 2009 Third International Conference Palo Alto, CA, USA, Aug
56652009 Fast Software Encryption 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25,
56612009 Protecting Persons While Protecting the People Second Annual Workshop on Information Privacy an
56452009 Data and Applications Security XXIII 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Can
56372009 Scalability of Networks and Services Third International Conference on Autonomous Infrastructur
56282009 Financial Cryptography and Data Security 13th International Conference, FC 2009, Accra Beach, B
55992009 Privacy in Location-Based Applications Research Issues and Emerging Trends
55942009 Information Security and Privacy 14th Australasian Conference, ACISP 2009 Brisbane, Australia,
55802009 Progress in Cryptology AFRICACRYPT 2009 Second International Conference on Cryptology in Afric
55762009 Advances in Information Security and Assurance Third International Conference and Workshops, IS
55572009 Coding and Cryptology Second International Workshop, IWCC 2009, Zhangjiajie, China, June 1-5,
55362009 Applied Cryptography and Network Security 7th International Conference, ACNS 2009, Paris-Rocque
55112009 Foundations and Applications of Security Analysis Joint Workshop on Automated Reasoning for Sec
55102009 Transactions on Data Hiding and Multimedia Security IV
55082009 Critical Information Infrastructure Security Third International Workshop, CRITIS 2008, Rome, I
54912009 Formal Aspects in Security and Trust 5th International Workshop, FAST 2008 Malaga, Spain, Octob
54872009 Information Security and Cryptology 4th International Conference, Inscrypt 2008, Beijing, China
54792009 Advances in Cryptology - EUROCRYPT 2009 28th Annual International Conference on the Theory and
54772009 Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, Apr
54732009 Topics in Cryptology CT-RSA 2009 The Cryptographers Track at the RSA Conference 2009, San Fran
54612009 Information Security and Cryptology ICISC 2008 11th International Conference, Seoul, Korea, De
54582009 Formal to Practical Security Papers Issued from the 2005-2008 French-Japanese Collaboration
54562009 Privacy, Security, and Trust in KDD Second ACM SIGKDD International Workshop, PinKDD 2008, Las
54512009 Information Security Practice and Experience 5th International Conference, ISPEC 2009 Xian, Chi
54442009 Theory of Cryptography 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, US
54432009 Public Key Cryptography PKC 2009 12th International Conference on Practice and Theory in Publi
54302009 Transactions on Computational Science IV Special Issue on Security in Computing
54292009 Engineering Secure Software and Systems First International Symposium ESSoS 2009, Leuven, Belgi
53812009 Selected Areas in Cryptography 15th International Workshop, SAC 2008, Sackville, New Brunswick,
53792009 Information Security Applications 9th International Workshop, WISA 2008, Jeju Island, Korea, Se
53762008 Intelligence and Security Informatics First European Conference, EuroISI 2008, Esbjerg, Denmark
53652008 Progress in Cryptology - INDOCRYPT 2008 9th International Conference on Cryptology in India, Kh
53542008 Biosurveillance and Biosecurity International Workshop, BioSecure 2008, Raleigh, NC, USA, Decem
53522008 Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, Decemb
53502008 Advances in Cryptology - ASIACRYPT 2008 14th International Conference on the Theory and Applica
53402008 Stabilization, Safety, and Security of Distributed Systems 10th International Symposium, SSS 20
53392008 Cryptology and Network Security 7th International Conference, CANS 2008, Hong-Kong, China, Dece
53242008 Provable Security Second International Conference, ProvSec 2008, Shanghai, China, October 30
53122008 Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2
53102008 Principles, Systems and Applications of IP Telecommunications. Services and Security for Next G
53082008 Information and Communications Security 10th International Conference, ICICS 2008 Birmingham, U
52992008 Post-Quantum Cryptography Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, O
52832008 Computer Security - ESORICS 2008 13th European Symposium on Research in Computer Security, Mála
52622008 Privacy in Statistical Databases UNESCO Chair in Data Privacy International Conference, PSD 200
52292008 Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, S
52222008 Information Security 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18
52192008 Computer Safety, Reliability, and Security 27th International Conference, SAFECOMP 2008 Newcast
52102008 Visualization for Computer Security 5th International Workshop, VizSec 2008, Cambridge, MA, USA
52092008 Pairing-Based Cryptography Pairing 2008 Second International Conference, Egham, UK, September
51852008 Trust, Privacy and Security in Digital Business 5th International Conference, TrustBus 2008 Tur
51592008 Secure Data Management 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. P
51572008 Advances in Cryptology CRYPTO 2008 28th Annual International Cryptology Conference, Santa Barb
51552008 Information Theoretic Security Third International Conference, ICITS 2008, Calgary, Canada, Aug
51542008 Cryptographic Hardware and Embedded Systems CHES 2008 10th International Workshop, Washington,
51432008 Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexic
51342008 Privacy Enhancing Technologies 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-
51272008 Resilient Networks and Services Second International Conference on Autonomous Infrastructure,
51112008 Secure Transaction Protocol Analysis Models and Applications Qingfeng Chen, Chengqi Zhang and
51072008 Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australi
51062008 Theory of Quantum Computation, Communication, and Cryptography Third Workshop, TQC 2008 Tokyo,
50942008 Data and Applications Security XXII 22nd Annual IFIP WG 11.3 Working Conference on Data and App
50862008 Fast Software Encryption 15th International Workshop, FSE 2008, Lausanne, Switzerland, February
50752008 Intelligence and Security Informatics IEEE ISI 2008 International Workshops: PAISI, PACCF, and
50572008 Public Key Infrastructure 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondhei
50452008 Reliable Implementation of Real Number Algorithms: Theory and Practice International Seminar Da
50372008 Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY
50232008 Progress in Cryptology AFRICACRYPT 2008 First International Conference on Cryptology in Africa
50192008 Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Netwo
50112008 Algorithmic Number Theory 8th International Symposium, ANTS-VIII Banff, Canada, May 17-22, 2008
49912008 Information Security Practice and Experience 4th International Conference, ISPEC 2008 Sydney, A
49902008 Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, Augu
49862008 New Stream Cipher Designs The eSTREAM Finalists [spacer.gif] Add to marked items
49652008 Advances in Cryptology EUROCRYPT 2008 27th Annual International Conference on the Theory and A
49642008 Topics in Cryptology CT-RSA 2008 The Cryptographers Track at the RSA Conference 2008, San Fran
49482008 Theory of Cryptography Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March
49452008 Research in Cryptology Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4
49392008 Public Key Cryptography PKC 2008 11th International Workshop on Practice and Theory in Public-
49202008 Transactions on Data Hiding and Multimedia Security III [spacer.gif] Add to marked items
48902008 Privacy, Security, and Trust in KDD First ACM SIGKDD International Workshop, PinKDD 2007, San J
48872007 Cryptography and Coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2
48862008 Financial Cryptography and Data Security 11th International Conference, FC 2007, and 1st Intern
48762007 Selected Areas in Cryptography 14th International Workshop, SAC 2007, Ottawa, Canada, August 16
48672008 Information Security Applications 8th International Workshop, WISA 2007, Jeju Island, Korea, Au
48612008 Information and Communications Security 9th International Conference, ICICS 2007, Zhengzhou, Ch
48592007 Progress in Cryptology INDOCRYPT 2007 8th International Conference on Cryptology in India, Che
48562007 Cryptology and Network Security 6th International Conference, CANS 2007, Singapore, December 8-
48462008 Advances in Computer Science ASIAN 2007. Computer and Network Security 12th Asian Computing
48382007 Stabilization, Safety, and Security of Distributed Systems 9th International Symposium, SSS 200
48332008 Advances in Cryptology ASIACRYPT 2007 13th International Conference on the Theory and Applicat
48172007 Information Security and Cryptology - ICISC 2007 10th International Conference, Seoul, Korea, N
48122007 Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December
47842007 Provable Security First International Conference, ProvSec 2007, Wollongong, Australia, Novemb
47792007 Information Security 10th International Conference, ISC 2007, Valparaso, Chile, October 9-12,
47762007 Privacy Enhancing Technologies 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22
47522007 Advances in Information and Computer Security Second International Workshop on Security, IWSEC
47342008 Computer Security ESORICS 2007 12th European Symposium On Research In Computer Security, Dresd
47272007 Cryptographic Hardware and Embedded Systems - CHES 2007 9th International Workshop, Vienna, Aus
47212007 Secure Data Management 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007. P
46912007 Formal Aspects in Security and Trust Fourth International Workshop, FAST 2006, Hamilton, Ontari
46802008 Computer Safety, Reliability, and Security 26th International Conference, SAFECOMP 2007, Nuremb
46772007 Foundations of Security Analysis and Design IV FOSAD 2006/2007 Tutorial Lectures [spacer.gif]
46572007 Trust, Privacy and Security in Digital Business 4th International Conference, TrustBus 2007, Re
46312007 Security Protocols 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Sel
46222007 Advances in Cryptology - CRYPTO 2007 27th Annual International Cryptology Conference, Santa Bar
46022007 Data and Applications Security XXI 21st Annual IFIP WG 11.3 Working Conference on Data and Appl
45932007 Fast Software Encryption 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March
45862007 Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australi
45822007 Public Key Infrastructure 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma d
45752007 Pairing-Based Cryptography Pairing 2007 First International Conference, Tokyo, Japan, July 2-4
45722007 Security and Privacy in Ad-hoc and Sensor Networks 4th European Workshop, ESAS 2007, Cambridge,
45432007 Inter-Domain Management First International Conference on Autonomous Infrastructure, Manageme
45212007 Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, Chin
45152007 Advances in Cryptology - EUROCRYPT 2007 26th Annual International Conference on the Theory and
45062007 Intelligence and Security Informatics: Biosurveillance Second NSF Workshop, BioSurveillance 200
44992007 Transactions on Data Hiding and Multimedia Security II No Access to content Add to marked ite
44642007 Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong K
44622007 Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems
44562007 Computational Intelligence and Security International Conference, CIS 2006, Guangzhou, China, N
44502007 Public Key Cryptography PKC 2007 10th International Conference on Practice and Theory in Publi
44352008 Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues 11th Asian Comp
44302007 Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2007, Chengdu, China, April
43922007 Theory of Cryptography 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Nether
43772006 Topics in Cryptology CT-RSA 2007 The Cryptographers Track at the RSA Conference 2007, San Fran
43572006 Security and Privacy in Ad-Hoc and Sensor Networks Third European Workshop, ESAS 2006, Hamburg,
43562007 Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August
43472006 Critical Information Infrastructures Security First International Workshop, CRITIS 2006, Samos,
43412006 Progress in Cryptology - VIETCRYPT 2006 First International Conference on Cryptology in Vietnam
43322006 Information Systems Security Second International Conference, ICISS 2006, Kolkata, India, Decem
43292006 Progress in Cryptology - INDOCRYPT 2006 7th International Conference on Cryptology in India, Ko
43182006 Information Security and Cryptology Second SKLOIS Conference, Inscrypt 2006, Beijing, China, No
43072006 Information and Communications Security 8th International Conference, ICICS 2006, Raleigh, NC,
43022006 Privacy in Statistical Databases CENEX-SDC Project International Conference, PSD 2006, Rome, It
43012006 Cryptology and Network Security 5th International Conference, CANS 2006, Suzhou, China, Decembe
43002006 Transactions on Data Hiding and Multimedia Security I
42982007 Information Security Applications 7th International Workshop, WISA 2006, Jeju Island, Korea, Au
42962006 Information Security and Cryptology ICISC 2006 9th International Conference, Busan, Korea, Nov
42842006 Advances in Cryptology ASIACRYPT 2006 12th International Conference on the Theory and Applicat
42802006 Stabilization, Safety, and Security of Distributed Systems 8th International Symposium, SSS 200
42662006 Advances in Information and Computer Security First International Workshop on Security, IWSEC 2
42582006 Privacy Enhancing Technologies 6th International Workshop, PET 2006, Cambridge, UK, June 28-30,
42492006 Cryptographic Hardware and Embedded Systems - CHES 2006 8th International Workshop, Yokohama, J
42372006 Communications and Multimedia Security 10th IFIP TC-6 TC-11 International Conference, CMS 2006,
42362006 Fault Diagnosis and Tolerance in Cryptography Third International Workshop, FDTC 2006, Yokohama
41892006 Computer Security ESORICS 2006 11th European Symposium on Research in Computer Security, Hambu
41762006 Information Security 9th International Conference, ISC 2006, Samos Island, Greece, August 30
41662006 Computer Safety, Reliability, and Security 25th International Conference, SAFECOMP 2006, Gdansk
41652006 Secure Data Management Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006. Pr
41272006 Data and Applications Security XX 20th Annual IFIP WG 11.3 Working Conference on Data and Appli
41172006 Advances in Cryptology - CRYPTO 2006 26th Annual International Cryptology Conference, Santa Bar
41162006 Security and Cryptography for Networks 5th International Conference, SCN 2006, Maiori, Italy, S
41072006 Financial Cryptography and Data Security 10th International Conference, FC 2006 Anguilla, Briti
41052006 Multimedia Content Representation, Classification and Security International Workshop, MRCS 200
40832006 Trust and Privacy in Digital Business Third International Conference, TrustBus 2006, Krakow, Po
40762006 Algorithmic Number Theory 7th International Symposium, ANTS-VII, Berlin, Germany, July 23-28,
40742006 Secure Mobile Ad-hoc Networks and Sensors First International Workshop, MADNES 2005, Singapore,
40582006 Information Security and Privacy 11th Australasian Conference, ACISP 2006, Melbourne, Australia
40472006 Fast Software Encryption 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2
40432006 Public Key Infrastructure Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin
40042006 Advances in Cryptology - EUROCRYPT 2006 24th Annual International Conference on the Theory and
39952006 Emerging Trends in Information and Communication Security International Conference, ETRICS 2006
39892006 Applied Cryptography and Network Security 4th International Conference, ACNS 2006, Singapore, J
39752006 Intelligence and Security Informatics IEEE International Conference on Intelligence and Securit
39692006 Coding and Cryptography International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005.
39582006 Public Key Cryptography - PKC 2006 9th International Conference on Theory and Practice in Publi
39572006 Security Protocols 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Sel
39562006 Construction and Analysis of Safe, Secure, and Interoperable Smart Devices Second Internation
39352006 Information Security and Cryptology - ICISC 2005 8th International Conference, Seoul, Korea, De
39342006 Security in Pervasive Computing Third International Conference, SPC 2006, York, UK, April 18-21
39172006 Intelligence and Security Informatics International Workshop, WISI 2006, Singapore, April 9, 20
39032006 Information Security Practice and Experience Second International Conference, ISPEC 2006, Hangz
38972006 Selected Areas in Cryptography 12th International Workshop, SAC 2005, Kingston, ON, Canada, Aug
38952006 Theoretical Computer Science Essays in Memory of Shimon Even
38762006 Theory of Cryptography Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA,
38662006 Formal Aspects in Security and Trust Thrid International Workshop, FAST 2005, Newcastle upon Ty
38602006 Topics in Cryptology CT-RSA 2006 The Cryptographers Track at the RSA Conference 2006, San Jose
38562006 Privacy Enhancing Technologies 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-Ju
38222005 Information Security and Cryptology First SKLOIS Conference, CISC 2005, Beijing, China, Decembe
38132005 Security and Privacy in Ad-hoc and Sensor Networks Second European Workshop, ESAS 2005, Visegra
38102005 Cryptology and Network Security 4th International Conference, CANS 2005, Xiamen, China, Decembe
38032005 Information Systems Security First International Conference, ICISS 2005, Kolkata, India, Decemb
38022005 Computational Intelligence and Security International Conference, CIS 2005, Xian, China, Decemb
38012005 Computational Intelligence and Security International Conference, CIS 2005, Xian, China, Decemb
37972005 Progress in Cryptology - INDOCRYPT 2005 6th International Conference on Cryptology in India, Ba
37962005 Cryptography and Coding 10th IMA International Conference, Cirencester, UK, December 19-21, 2
37882005 Advances in Cryptology - ASIACRYPT 2005 11th International Conference on the Theory and Applica
37862006 Information Security Applications 6th International Workshop, WISA 2005, Jeju Island, Korea, Au
37832005 Information and Communications Security 7th International Conference, ICICS 2005, Beijing, Chin
37152005 Progress in Cryptology Mycrypt 2005 First International Conference on Cryptology in Malaysia,
36882005 Computer Safety, Reliability, and Security 24th International Conference, SAFECOMP 2005, Fredri
36852005 Computer Network Security Third International Workshop on Mathematical Methods, Models, and A
36792005 Computer Security ESORICS 2005 10th European Symposium on Research in Computer Security, Milan
36772005 Communications and Multimedia Security 9th IFIP TC-6 TC-11International Conference, CMS 2005, S
36742005 Secure Data Management Second VLDB Workshop, SDM 2005, Trondheim, Norway, August 30 Septembe
36592005 Cryptographic Hardware and Embedded Systems CHES 2005 7th International Workshop, Edinburgh, U
36552005 Foundations of Security Analysis and Design III FOSAD 2004/2005 Tutorial Lectures
36542005 Data and Applications Security XIX 19th Annual IFIP WG 11.3 Working Conference on Data and Appl
36502005 Information Security 8th International Conference, ISC 2005, Singapore, September 20-23, 2005
36212005 Advances in Cryptology CRYPTO 2005 25th Annual International Cryptology Conference, Santa Barb
35922005 Trust, Privacy and Security in Digital Business Second International Conference, TrustBus 2005,
35742005 Information Security and Privacy 10th Australasian Conference, ACISP 2005, Brisbane, Australia,
35702005 Financial Cryptography and Data Security 9th International Conference, FC 2005, Roseau, The Com
35572005 Fast Software Encryption 12th International Workshop, FSE 2005, Paris, France, February 21-23,
35452005 Public Key Infrastructure Second European PKI Workshop: Research and Applications, EuroPKI 2005
35312005 Applied Cryptography and Network Security Third International Conference, ACNS 2005, New York,
35062005 Information Security and Cryptology ICISC 2004 7th International Conference, Seoul, Korea, Dec
34952005 Intelligence and Security Informatics IEEE International Conference on Intelligence and Securit
34942005 Advances in Cryptology EUROCRYPT 2005 24th Annual International Conference on the Theory and A
34502005 Security in Pervasive Computing Second International Conference, SPC 2005, Boppard, Germany, Ap
34392005 Information Security Practice and Experience First International Conference, ISPEC 2005, Singap
34242005 Privacy Enhancing Technologies 4th International Workshop, PET 2004, Toronto, Canada, May 26-28
33862005 Public Key Cryptography - PKC 2005 8th International Workshop on Theory and Practice in Public
33782005 Theory of Cryptography Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA
33762005 Topics in Cryptology CT-RSA 2005 The Cryptographers Track at the RSA Conference 2005, San Fran
33732005 Advanced Encryption Standard AES 4th International Conference, AES 2004, Bonn, Germany, May 10
33642005 Security Protocols 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selec
33622005 Construction and Analysis of Safe, Secure, and Interoperable Smart Devices International Work
33572004 Selected Areas in Cryptography 11th International Workshop, SAC 2004, Waterloo, Canada, August
33522005 Security in Communication Networks 4th International Conference, SCN 2004, Amalfi, Italy, Septe
33482004 Progress in Cryptology - INDOCRYPT 2004 5th International Conference on Cryptology in India, Ch
33292004 Advances in Cryptology - ASIACRYPT 2004 10th International Conference on the Theory and Applica
33252005 Information Security Applications 5th International Workshop, WISA 2004, Jeju Island, Korea, Au
33132005 Security in Ad-hoc and Sensor Networks First European Workshop, ESAS 2004, Heidelberg, Germany,
32692004 Information and Communications Security 6th International Conference, ICICS 2004, Malaga, Spain
32332004 Software Security - Theories and Systems Second Mext-NSF-JSPS International Symposium, ISSS 200
32252004 Information Security 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27
32192004 Computer Safety, Reliability, and Security 23rd International Conference, SAFECOMP 2004, Potsda
31932004 Computer Security ESORICS 2004 9th European Symposium on Research in Computer Security, Sophia
31842004 Trust and Privacy in Digital Business First International Conference, TrustBus 2004, Zaragoza,
31782004 Secure Data Management VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004. Procee
31562004 Cryptographic Hardware and Embedded Systems - CHES 2004 6th International Workshop Cambridge, M
31522004 Advances in Cryptology CRYPTO 2004 24th Annual International Cryptology Conference, Santa Barb
31102004 Financial Cryptography 8th International Conference, FC 2004, Key West, FL, USA, February 9-1
31082004 Information Security and Privacy 9th Australasian Conference, ACISP 2004, Sydney, Australia, Ju
30932004 Public Key Infrastructure First European PKI Workshop: Research and Applications, EuroPKI 2004,
30892004 Applied Cryptography and Network Security Second International Conference, ACNS 2004, Yellow Mo
30762004 Algorithmic Number Theory 6th International Symposium, ANTS-VI, Burlington, VT, USA, June 13-18
30732004 Intelligence and Security Informatics Second Symposium on Intelligence and Security Informatics
30502004 Privacy in Statistical Databases CASC Project International Workshop, PSD 2004, Barcelona, Spai
30282004 Probabilistic and Statistical Methods in Cryptology An Introduction by Selected Topics
30272004 Advances in Cryptology - EUROCRYPT 2004 International Conference on the Theory and Applications
30172004 Fast Software Encryption 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2
30062004 Selected Areas in Cryptography 10th Annual International Workshop, SAC 2003, Ottawa, Canada, Au
29712004 Information Security and Cryptology -ICISC 2003 6th International Conference, Seoul, Korea, Nov
29642004 Topics in Cryptology CT-RSA 2004
29512004 Theory of Cryptography First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA,
29472004 Public Key Cryptography PKC 2004 7th International Workshop on Theory and Practice in Public K
29462004 Foundations of Security Analysis and Design II FOSAD 2001/2002 Tutorial Lectures
29082003 Information Security Applications
29042003 Progress in Cryptology - INDOCRYPT 2003 4th International Conference on Cryptology in India, Ne
28982003 Cryptography and Coding
28942003 Advances in Cryptology - ASIACRYPT 2003 9th International Conference on the Theory and Applicat
28872003Fast Software Encryption :: 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 200
28742003 Global Computing Programming Environments, Languages, , Security, and Analysis of Systems, IS
28512003 Information Security 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003.
28462003 Applied Cryptography and Network Security
28452003 Security Protocols 10th International Workshop, Cambridge, UK, April 17-19, 2002. Revised Pap
28362003 Information and Communications Security
28282003 Communications and Multimedia Security
28152003 Composition of Secure Multi-Party Protocols A Comprehensive Study
28082003 Computer Security ESORICS 2003 8th European Symposium on Research in Computer Security, Gjøvik
28022004 Security in Pervasive Computing First International Conference, Boppard, Germany, March 12-14,
27882003 Computer Safety, Reliability, and Security
27792003 Cryptographic Hardware and Embedded Systems - CHES 2003 5th International Workshop, Colo
27762003 Computer Network Security Second International Workshop on Mathematical Methods, Models, and
27602003 Privacy Enhancing Technologies Third International Workshop, PET 2003, Dresden, Germany, March
27542003Security Engineering with Patterns :: Origins, Theoretical Model, and New Applications
2742xxxx Financial Cryptography
27292003 Advances in Cryptology - CRYPTO 2003
27272003 Information Security and Privacy 8th Australasian Conference, ACISP 2003 Wollongong, Australia,
26652003 Intelligence and Security Informatics: First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June
26562003 Advances in Cryptology - EUROCRPYT 2003: International Conference on the Theory and Application
26312003 Trust, Reputation, and Security: Theories and Practice AAMAS 2002 InternationalWorkshop Bologna
26292003 Formal Aspects of Security First International Conference, FASec 2002, London, UK, December 1
26122003 Topics in Cryptology - CT-RSA 2003: The Cryptographers' Track at the RSA Conference 2003, San F
26092003 Software Security - Theories and Systems Mext-NSF-JSPS International Symposium, ISSS 2002 Tokyo
25952003 Selected Areas in Cryptography: 9th Annual International Workshop, SAC 2002, St. John's, Newfou
25872003 Information Security and Cryptology - ICISC 2002: 5th International Conference, Seoul, Korea, N
25762003 Security in Communication Networks: Third International Conference, SCN 2002, Amalfi, Italy, Se
25672003 Public Key Cryptography - PKC 2003: 6th International Workshop on Practice and Theory in Public
25512002 Progress in Cryptology - INDOCRYPT 2002: Third International Conference on Cryptology in India
25232003 Cryptographic Hardware and Embedded Systems - CHES 2002: 4th International Workshop Redwood Sho
25132002 Information and Communications Security: 4th International Conference, ICICS 2002, Singapore, D
25022002 Computer Security - ESORICS 2002: 7th European Symposium on Research in Computer Security Zuric
25012002 Advances in Cryptology - ASIACRYPT 2002: 8th International Conference on the Theory and Applica
24822003 Privacy Enhancing Technologies Second InternationalWorkshop, PET 2002 San Francisco, CA, USA, A
24672002 Security Protocols: 9th International Workshop Cambridge, UK, April 25-27, 2001. Revised Papers
24422002 Advances in Cryptology - CRYPTO 2002: 22nd Annual International Cryptology Conference Santa Bar
24372002 Infrastructure Security: International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002
24342002 Computer Safety, Reliability and Security: 21st International Conference, SAFECOMP 2002, Catani
24332002 Information Security 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 -
23842002 Information Security and Privacy: 7th Australasian Conference, ACISP 2002 Melbourne, Australia,
23692002 Algorithmic Number Theory: 5th International Symposium, ANTS-V, Sydney, Australia, July 7-12, 2
23652002Fast Software Encryption :: 9th International Workshop, FSE 2002 Leuven, Belgium, February 4–6, 2002
23572003 Financial Cryptography 6th International Conference, FC 2002 Southampton, Bermuda, March 2002 Re
23552002 Fast Software Encryption: 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001
23392002 Financial Cryptography : 5th International Conference, FC 2001, Grand Cayman, British West Indi
23322002 Advances in Cryptology - EUROCRYPT 2002: International Conference on the Theory and Application
23202002 Security and Privacy in Digital Rights Management : ACM CCS-8 Workshop DRM 2001, Philadelphia,
22882002 Information Security and Cryptology - ICISC 2001: 4th International Conference Seoul, Korea, De
22742002 Public Key Cryptography: 5th International Workshop on Practice and Theory in Public Key Crypto
22712002 Topics in Cryptology - CT-RSA 2002: The Cryptographer's Track at the RSA Conference 2002, San J
22602001 Cryptography and Coding: 8th IMA International Conference Cirencester, UK, December 17-19, 2001
22592001 Selected Areas in Cryptography: 8th Annual International Workshop, SAC 2001 Toronto, Ontario, C
22482001 Advances in Cryptology - ASIACRYPT 2001 : 7th International Conference on the Theory and Applic
22472001 Progress in Cryptology - INDOCRYPT 2001 : Second International Conference on Cryptology in Indi
22292001 Information and Communications Security: Third International Conference, ICICS 2001, Xian, Chin
22002001 Information Security 4th International Conference, ISC 2001 Malaga, Spain, October 1-3, 2001
21872001 Computer Safety, Reliability and Security: 20th International Conference, SAFECOMP 2001, Budape
21712001 Foundations of Security Analysis and Design : Tutorial Lectures
21622001 Cryptographic Hardware and Embedded Systems CHES 2001: Third International Workshop, Paris, Fra
21462001Cryptography and Lattices :: International Conference, CaLC 2001 Providence, RI, USA, March 29–30, 2
21402001 Smart Card Programming and Security International Conference on Research in Smart Cards, E-smar
21392001 Advances in Cryptology - CRYPTO 2001: 21st Annual International Cryptology Conference, Santa Ba
21332001 Security Protocols : 8th International Workshops Cambridge, UK, April 3-5, 2000, Revised Papers
21192001 Information Security and Privacy : 6th Australasian Conference, ACISP 2001, Sydney, Australia,
20532001 Program as Data Objects: International Conference on the Theory and Application of Cryptographi
20522001 Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Secu
20452001 Advances in Cryptology - EUROCRYPT 2001: Second Symposium, PADO 2001, Aarhus, Denmark, May 21-2
20412001 Java on Smart Cards: Programming and Security: First International Workshop, Java Card 2000, Ca
20332001 E-Commerce Agents: Marketplace Solutions, Security Issues, and Supply and Demand:
20202001 Progress in Cryptology - CT-RSA 2001: The Cryptographers' Track at RSA Conference 2001 San Fran
20152001 Information Security and Cryptology - ICISC 2000 : Third International Conference, Seoul, Korea
20122001 Selected Areas in Cryptography: 7th Annual International Workshop, SAC 2000, Waterloo, Ontario,
20092001 Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity
19922000 Public Key Cryptography: 4th International Workshop on Practice and Theory in Public Key Crypto
19782001 Fast Software Encryption: 7th International Workshop, FSE 2000, New York, NY, USA, April 2000.
19772000 Progress in Cryptology - INDOCRYPT 2000: First International Conference in Cryptology in India,
19762000 Advances in Cryptology - ASIACRYPT 2000: 6th International Conference on the Theory and Applica
19752000 Information Security: Third International Workshop, ISW 2000, Wollongong, Australia, December 2
19652000 Cryptographic Hardware and Embedded Systems - CHES 2000: Second International Workshop, Worcest
19622001 Financial Cryptography: 4th International Conference, FC 2000, Anguilla, British West Indies, F
19582001 Natural Language Processing and Information Systems: 5th International Conference on Applicatio
19432000 Computer Safety, Reliability and Security: 19th International Conference, SAFECOMP 2000, Rotter
18952000 Computer Security - ESORICS 2000 6th European Symposium on Research in Computer Security, Toulo
18802000 Advances in Cryptology - CRYPTO 2000: 20th Annual International Cryptology Conference, Santa Ba
18542004 SEMPER - Secure Electronic Marketplace for Europe
18412000 Information Security and Privacy 5th Australasian Conference, ACISP 2000, Brisbane, Australia,
18382000 Algorithmic Number Theory 4th International Symposium, ANTS-IV Leiden, The Netherlands, July
18072000 Advances in Cryptology - EUROCRYPT 2000: International Conference on the Theory and Application
17582000 Selected Areas in Cryptography: 6th Annual International Workshop, SAC'99, Kingston, Ontario, C
17512004 Public Key Cryptography Third International Workshop on Practice and Theory in Public Key Cry
17461999 Cryptography and Coding: 7th IMA International Conference, Cirencester, UK, December 1999. Proc
17401999 Secure Networking - CQRE [Secure] '99: International Exhibition and Congress, Düsseldorf, Germa
17291999 Information Security: Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1
17262004 Information and Communication Security Second International Conference, ICICS99, Sydney, Austra
17171999 Cryptographic Hardware and Embedded Systems: First International Workshop, CHES'99, Worcester,
17162004 Advances in Cryptology - ASIACRYPT99 International Conference on the Theory and Application of
16981999 Computer Safety, Reliability and Security: 18th International Conference, SAFECOMP'99, Toulouse
16661999 Advances in Cryptology - CRYPTO'99: 19th Annual International Cryptology Conference, Santa Barb
16481999 Financial Cryptography: Third International Conference, FC'99, Anguilla, British West Indies, F
16361999Fast Software Encryption :: 6th International Workshop, FSE’99 Rome, Italy, March 24–26, 1999 Procee
15921999 Advances in Cryptology - EUROCRYPT '99 International Conference on the Theory and Application o
15871999 Information Security and Privacy: 4th Australasian Conference, ACISP'99, Wollongong, NSW, Austr
15611999 Lectures on Data Security: Modern Cryptology in Theory and Practice
15601999 Public Key Cryptography: Second International Workshop on Practice and Theory in Public Key Cry
15561999 Selected Areas in Cryptography: 5th Annual International Workshop, SAC'98, Kingston, Ontario, C
15501998 Security Protocols: 6th International Workshop, Cambridge, UK, April 1998. Proceedings
15281998 State of the Art in Applied Cryptography: Course on Computer Security and Industrial Cryptograp
15161998 Computer Safety, Reliability and Security: 17th International Conference, SAFECOMP'98, Heidelbe
15141998 Advances in Cryptology - ASIACRYPT'98: International Conference on the Theory and Application o
14851998 Computer Security ESORICS 98 5th European Symposium on Research in Computer Security Louvain
14651998 Financial Cryptography Second International Conference, FC '98 Anguilla, British West Indies
14621998 Advances in Cryptology CRYPTO '98 18th Annual International Cryptology Conference Santa Barbar
14401999Advances in Cryptology 1981 – 1997 :: Electronic Proceedings and Index of the CRYPTO and EUROCRYPT C
14381998 Information Security and Privacy Third Australasian Conference, ACISP98 Brisbane, Australia, Ju
14311998 Public Key Cryptography First International Workshop on Practice and Theory in Public Key Cry
14231998 Algorithmic Number Theory Third International Symposiun, ANTS-III Portland, Oregon, USA, June
14191998 Mobile Agents and Security
14031998 Advances in Cryptology EUROCRYPT'98 International Conference on the Theory and Application of
13961998 Information Security First International Workshop, ISW'97 Tatsunokuchi, Ishikawa, Japan Septe
13721998 Fast Software Encryption: 5th International Workshop, FSE'98, Paris, France, March 1998. Procee
13611998 Security Protocols 5th International Workshop Paris, France, April 79, 1997 Proceedings
13551997 Cryptography and Coding 6th IMA International Conference Cirencester, UK, December 1719, 1997
13341997 Information and Communications Security First International Conference, ICIS '97 Beijing, China
13181997 Financial Cryptography First International Conference, FC '97 Anguilla, British West Indies F
12941997 Advances in Cryptology CRYPTO '97 17th Annual International Cryptology Conference Santa Barbar
12701997 Information Security and Privacy Second Australasian Conference, ACISP'97 Sydney, NSW, Australi
12671997 Fast Software Encryption 4th International Workshop, FSE97 Haifa, Israel, January 2022 1997 P
12331997 Advances in Cryptology - EUROCRYPT '97: International Conference on the Theory and Application
11891997 Security Protocols International Workshop Cambridge, United Kingdom, April 1012, 1996 Proceed
11791996 Concurrency and Parallelism, Programming, Networking, and Security Second Asian Computing Scien
11721996 Information Security and Privacy First Australasian Conference, ACISP'96 Wollongong, NSW, Austr
11631996 Advances in Cryptology ASIACRYPT '96 International Conference on the Theory and Applications o
11461996 Computer Security ESORICS 96 4th European Symposium on Research in Computer Security Rome, Ita
11221996 Algorithmic Number Theory Second International Symposium, ANTS-II Talence, France, May 1823,
11091996 Advances in Cryptology - CRYPTO '96: 16th Annual International Cryptology Conference, Santa Bar
10701996 Advances in Cryptology - EUROCRYPT '96: International Conference on the Theory and Application
10391996 Fast Software Encryption Third International Workshop Cambridge, UK, February 2123 1996 Proce
10291996 Cryptography: Policy and Algorithms International Conference Brisbane, Queensland, Australia, J
10251995 Cryptography and Coding 5th IMA Conference Cirencester, UK, December 1820, 1995 Proceedings
10081995 Fast Software Encryption Second International Workshop Leuven, Belgium, December 1416, 1994 P
10071995 Integrity Primitives for Secure Information Systems Final Report of RACE Integrity Primitives E
9631995 Advances in Cryptology - CRYPTO '95: 15th Annual International Cryptology Conference, Santa Bar
9501995 Advances in Cryptology EUROCRYPT'94 Workshop on the Theory and Application of Cryptographic Te
9211995 Advances in Cryptology - EUROCRYPT '95: International Conference on the Theory and Application
9171995 Advances in Cryptology ASIACRYPT'94 4th International Conferences on the Theory and Applicatio
8771994 Algorithmic Number Theory First International Symposium, ANTS-I Ithaca, NY, USA, May 69, 1994
8751994 Computer Security ESORICS 94 Third European Symposium on Research in Computer Security Brighto
8701994 Distributed Programming Paradigms with Cryptography Applications
8391994 Advances in Cryptology - CRYPTO '94: 14th Annual International Cryptology Conference, Santa Bar
8291994 Error Control, Cryptology, and Speech Compression Workshop on Information Protection Moscow, Ru
8091994 Fast Software Encryption Cambridge Security Workshop Cambridge, U. K., December 911,1993 Proc
7731994 Advances in Cryptology - CRYPTO '93: 13th Annual International Cryptology Conference, Santa Bar
7651994 Advances in Cryptology - EUROCRYPT '93: Workshop on the Theory and Application of Cryptographic
7411993 Computer Security and Industrial Cryptography State of the Art and Evolution ESAT Course, Leuve
7401993 Advances in Cryptology - CRYPTO '92: 12th Annual International Cryptology Conference, Santa Bar
7391993 Advances in Cryptology ASIACRYPT '91 International Conference on the Theory and Application of
7181993 Advances in Cryptology AUSCRYPT '92 Workshop on the Theory and Application of Cryptographic Te
6581993 Advances in Cryptology - EUROCRYPT '92: Workshop on the Theory and Application of Cryptographic
6481992 Computer Security ESORICS 92 Second European Symposium on Research in Computer Security Toulou
5781992 Public-Key Cryptography: State of the Art and Future Directions E.I.S.S.Workshop Oberwolfach, G
5761992 Advances in Cryptology - CRYPTO '91: Proceedings
5471991 Advances in Cryptology - EUROCRYPT '91: Workshop on the Theory and Application of Cryptographic
5371991Advances in Cryptology-CRYPTO '90 :: Proceedings
4731991 Advances in Cryptology - EUROCRYPT '90: Workshop on the Theory and Application of Cryptographic
4531990 Advances in Cryptology AUSCRYPT '90 International Conference on Cryptology Sydney, Australia,
4351990 Advances in Cryptology - CRYPTO '89: Proceedings
4341990 Advances in Cryptology - EUROCRYPT '89: Workshop on the Theory and Application of Cryptographic
4031990 Advances in Cryptology - CRYPTO '88: Proceedings
3961989 Local Area Network Security Workshop LANSEC '89 European Institute for System Security (E.I.S.S
3301988 Advances in Cryptology - EUROCRYPT '88: Workshop on the Theory and Application of Cryptographic
3041988 Advances in Cryptology - EUROCRYPT '87: Workshop on the Theory and Application of Cryptographic
2931988 Advances in Cryptology - CRYPTO '87: Proceedings
2631987 Advances in Cryptology - CRYPTO '86: Proceedings
2191986 Advances in Cryptology - EUROCRYPT '85: Proceedings of a Workshop on the Theory and Application
2181986Advances in Cryptology — CRYPTO ’85 Proceedings
2091985 Advances in Cryptology: Proceedings of EUROCRYPT 84 - A Workshop on the Theory and Application
1961985 Advances in Cryptology: Proceedings of CRYPTO 84
1491983 Cryptography: Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29 -

A Note about Linking to SpringerLINK content

Springer has implemented two schemes for linking to SpringerLINK content. One of the schemes is based on the OpenURL standard and it has some nice properties. A periodical published in print usually has an ISSN (International Standard Serial Number). You can use the ISSNs of Springer's publications to build links to their online versions. Here are some examples:

Journal of Cryptology	
ISSN:  0933-2790
http://www.springerlink.com/openurl.asp?genre=journal&issn=0933-2790

Lecture Notes in Computer Science
ISSN:  0302-9743
http://www.springerlink.com/openurl.asp?genre=journal&issn=0302-9743

Proceedings for the conferences listed above are published in the series Lecture Notes in Computer Science. To build a link to a particular proceedings you can use its volume number. For example, here is how to build a link to AsiaCrypt 2003:

Lecture Notes in Computer Science 
ISSN:  0302-9743
Volume: 2894
Title: Advances in Cryptology - ASIACRYPT 2003
http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2894
Notice, in this last URL, the "genre" field has changed from "journal" to "issue".

Change Log

30-May-2018   As you may have guessed, this webpage is no longer being maintained. Thanks goes to the Carleton Computer Security Lab, the Saint Mary's University Dept of Mathematics and Computer Science, and the University of Waterloo Faculty of Mathematics for hosting over the last 14 years. Unfortunately, some infrastructure changes inside the Carleton Computer Security Lab made maintaining this webpage difficult. However, I was very happy that so many people found the content here useful, and that a number of people cared enough about the webpage to send me corrections and suggestions.
10-Mar-2013   The new SpringerLink web-site is a great improvement. The search interface works very well and the html used to encode each LNCS volume is fairly easy to parse (sensibile identifiers and structures are used). Although Springer web-site updates usually break my scripts (and this update was no exception), I have to say that I really like this new design :-)

My updated scripts now parse the LNCS RSS feed and use its content to trigger updates (I mentioned that I wanted to start using the RSS feed back in 2011). The feed is read and checked for new urls. If any are found, then they are visited and the content is parsed. This method is nice because it doesn't pester the Springer web server unnecessarily -- a new url published in the RSS feed will be visited just once. Because this new method is light-weight, I will increase the frequency of auto updates to every 2 hours.
4-Mar-2013   I received a message from RW that some LNCS volumes are missing from the list above (e.g. CT-RSA 2013, SAC 2012). This is because Springer has recently updated their web-site, and so my scripts no longer work. I will work on an update. I should have something ready in a few days. Stay tuned :-)
8-Sep-2012   SC let me know that the table of "Volumes Related to Cryptography and Security" contained some stray strings picked up from the LNCS webpage (there were lots of "Book Chapter" strings hanging around). This was caused by the SpringerLink web server -- it no longer seems to be interpreting the following url correctly, http://www.springerlink.com/openurl.asp?genre=journal&issn=0302-9743. This url should point to the LNCS main web page, but, when I follow it, the server responds with another page that lists the book chapters inside an LNCS volume. It looks like Springer broke their OpenURL interpreter (this has happened a few times). In any case, I've found a way to work around it.
18-May-2012   The Financial Cryptography listing was incorrect because the workshop proceedings were thrown in with the FC proceedings. I've updated the filter rule, which should fix the problem.
9-May-2012   An error in the ICICS listing was reported by NZ. The WISTP 2011 proceedings were mistakenly caught by the ICICS filter. I've updated the filter so this hopefully will not happen again.
28-April-2011   JH let me know that there was an error in the listing for ICISC. There was a fictitious "ICISC 2010" link that actually pointed to LATINCRYPT 2010; the proceedings for ICISC 2010 have not yet been published.
8-Feb-2011   RW noticed that some recent LNCS volumes were not being picked up by my script. This was due to changes on the LNCS webpage. The information for LNCS volumes is now displayed in a new format. This required some updates to my scripts, but it should be back to normal now.

Sometime soon, I will change how the automatic updates are done. Rather than parse SpringerLINK html directly, I will use their RSS feed. This will simplify some things for me.
14-June-2010   I've added regular conference entries for "Africacrypt", "Provable Security", "Pairing-Based Cryptography" and "Cryptography and Coding"; these entries were suggested by AM.
10-June-2010   Springer seems to have corrected the problem with their OpenURL interpreter. The URLs above are now functioning properly.
9-June-2010   DS reported yesterday (8 June) that the URLs above are no longer linking to the appropriate LNCS volumes. Instead, they all point to the main LNCS page. Unfortunately, this happens from time to time (see the log entries below) and is due to some change on Springer's end (e.g. a database update that wipes out their OpenURL interpreter). I've just sent an email to their support group requesting that they restore OpenURL functionality. Stay tuned.
13-May-2010   AM observed that a number of 2010 lncs volumes were missing from the list above. This was true even though auto updates were being carried out. The issue, which has now been resolved, was that Springer has banned http requests that carry a "Wget" user agent string. Wget is the utility that I use to fetch web pages from SpringerLINK. I suspect Springer made this change in January or February 2010.
24-June-2009   JH noticed that one of the proceedings for the newly formed Inscrypt conference was incorrectly grouped with the ICISC proceedings. This was due to the fact that both ICISC and Inscrypt use the phrase "Information Security and Cryptology" in the title of their proceedings. This has now been corrected.
22-Dec-2007   MN just pointed out that the urls to EUROCRYPT 94 and EUROCRYPT 95 were swapped (i.e. the EUROCRYPT 94 url pointed to EUROCRYPT 95, and the EUROCRYPT 95 url pointed to EUROCRYPT 94). This was due to the surprising fact that the volume number for EUROCRYPT 94 comes after the volume number for EUROCRYPT 95. The two urls have now been corrected.
2-Nov-2007   Another previously "missing" lncs volume has appeared on-line. Financial Cryptography 2002 is now accessible through a url above. Note that the machine which hosts this web page has changed. This page now lives on a machine in the Department of Mathematics and Computing Science at Saint Mary's University. I've just begun a limited term position there this fall.
27-Apr-2007   This morning, DS noticed that all my links were broken. I emailed Springer and their reply informed me that this was due to some database issues on their end. This afternoon, everything is working again.
7-Jan-2007   Springer has added some the previously "missing" LNCS volumes to their on-line library. In particular, ACISP 2000 (vol. 1841) and Information Hiding 1999 (vol. 1768) are now available. I've added the appropriate links to the listing of regular conferences. Unfortunately, Financial Cryptography 2002 (vol. 2357) is still "missing" (note: if you try entering "2357" in the "Enter a volume number" form above, then the SpringerLINK server replies with "Bad Request".)
3-Jan-2007   By request, I've included ESORICS in the list of regular conferences.
17-Oct-2006   I've changed the way that updates are done (again). My last change made it that so only the first two pages of Springer's LNCS collection were pulled down each update. The problem with that approach was that many newly added LNCS volumes first appear farther back in Springer's LNCS collection (e.g. on page 7, say, rather than on page 1 or 2). So now my script pulls down the first 50 pages of the LNCS database to look for new volumes. This should catch proceedings which are assigned volume numbers but are not published until many months later (e.g. this is usually the case for the SAC proceedings).
10-Oct-2006   By request, a regular conference entry for Information Hiding has been added. Note that the LNCS volume for Information Hiding 1999 (vol. 1768) is not available in SpringerLINK.
1-Oct-2006   Added a regular conference entry for PET - Privacy Enhancing Technologies. Also, some new volumes which match the key word "privacy" have been added.
14-Sep-2006   My scripts are now adjusted to handle the content on the new SpringerLINK website. Doing this turned out to be easier than I thought. One advantage of the change-over is that the data listed for each LNCS volume on the Springer website is more complete; previously there were several LNCS volumes (20-30) that did not have titles listed. I now have a more complete database of all the LNCS volumes. Also, the way I update the links above is done differently now. Before my scripts pulled down several SpringerLINK webpages and built an LNCS database from scratch each week. Now I am just pulling down just two webpages. Because of this change I think it is safe to increase the update frequency to three times a week (4am Sunday, Tuesday, Thurday).
16-Aug-2006   Springer recently redesigned their SpringerLINK online library. After the initial change-over, urls which used the OpenURL standard were not being interpretted correctly. This caused the urls above to stop working. However, the problem seems to have been quickly fixed on Springer's end and my urls appear to be functional now. The new SpringerLINK website poses one other problem -- my auto-update script will no longer work correctly. I will have to temporarily disable auto-updates until I get a chance to have a look at the new data format.
17-July-2006   The listing for ACISP has been corrected to include all the volumes back to 1996. Note that ACISP 2000 (vol. 1841) is not in the SpringerLINK archive so it is not included in the list.
18-June-2006   By request, a regular conference entry has been added for ACNS (Applied Cryptography and Network Security) -- note that the fourth ACNS just took place. Also, some errors in links to FSE, ICICS and ICISC proceedings were fixed (did you know that FSE 1997 is listed in Springer's LNCS database three times?). Finally, some new volumes which match the key phrase "public key" have been added.
25-May-2006   Added some new volumes to the list, including "Composition of Secure Multi-Party Protocols" (2815) and others with the word "secure" in their titles.
07-Mar-2006   Added a regular conference entry for TCC - Theory of Cryptography.
05-Feb-2006   The saga continues... Springer has now apparently scratched its "historical archive". This means that all the pre-1997 LNCS volumes are now back with the more recent LNCS volumes. This happened sometime in the week prior to 29-Jan-2006. I've updated my script (again!) and I think everything is OK now. Thank-you to those people who pointed out some unusual links (e.g. CRYPTO 2018) after last week's update.
14-Jan-2006   I emailed Springer in early December and asked what happened to the pre-1997 LNCS volumes. They responded promptly and explained that the volumes are still available on-line, it's just that they have been moved into their historical archive.
2-Dec-2005   It appears that Springer has removed all LNCS volumes published prior to 1997 from their online database! The urls that I had previously constructed no longer work. This appears to have happened in the week 20-27 November 2005. I wonder why they did this...
21-July-2005   I've moved the site to a machine inside the School of Computer Science at Carleton University. I started a postdoctoral fellowship at Carleton in late June.
18-July-2005   Due to an OS upgrade on one of the university machines, the crontab file which was automatically updating this webpage was dropped from its queue. This happened about a month ago but I didn't notice until now. I've restored the crontab file and updated the links. Weekly updates should continue to work as they did previously.
6-May-2005   Added a regular conference entry for ACISP.
24-March-2005   In late January 2005, Springer updated their LNCS webpage. This caused one of the scripts which I use to update the links above to stop working. I have finally found time to fix things and so the automatic updates should continue as before.
19-June-2004   Created web page.


back to James Muir's home page
last-updated-10-Mar-2013