Semantic search

Jump to: navigation, search
Query Additional data to display
(add one property name per line)

Format as:
Sorting
[Add sorting condition]
Other options
limit:
The maximum number of results to return
offset:
The offset of the first result
link:
Show values as links
sort:
Property to sort the query by
order: descending desc asc ascending rand random
Order of the query sort
headers:
Display the headers/property names
mainlabel:
The label to give to the main page name
intro:
The text to display before the query results, if there are any
outro:
The text to display after the query results, if there are any
searchlabel:
Text for continuing the search
default:
The text to display if there are no query results
class:
An additional CSS class to set for the table
transpose:
Display table headers vertically and results horizontally
sep:
The separator for values
Search

Hide query Show embed code

The query [[Category:Event series]] [[Category:Computer security and reliability]] was answered by the SMWSQLStore3 in 0.0106 seconds.


Results 1 – 34    (Previous 50 | Next 50)   (20 | 50 | 100 | 250 | 500)   (JSON | CSV | RSS | RDF)
AcronymTitleCORE2017Avg. acc. rate
ACNSInternational Conference on Applied Cryptography and Network SecurityB19.6
ACSACAnnual Computer Security Applications ConferenceA22.3
ARESInternational Conference on Availability, Reliability and SecurityB22.1
ASIACRYPTInternational Conference on the Theory and Application of Cryptology and Information SecurityA
AsiaCCSACM ASIA Conference on Computer and Communications SecurityB17.0
AsiacryptInternational Conference on the Theory and Application of Cryptology and Information SecurityA25.5
CANSInternational Conference on Cryptology and Network SecurityB25.4
CARDISSmart Card Research and Advanced Application ConferenceB42.6
CCSConference on Computer and Communications Security20.9
CHESWorkshop on Cryptographic Hardware and Embedded SystemsA87.6
CRYPTOAdvances in CryptologyA*21.6
CWInternational Conference on CyberworldsB
DBSECIFIP WG 11.3 Working Conference on Data and Applications SecurityB34.1
DSNIEEE/IFIP International Conference on Dependable Systems22.9
ESORICSEuropean Symposium On Research In Computer SecurityA19.7
EuroCryptAdvances in Cryptology26.9
FCFinancial Cryptography and Data SecurityB24.2
ICICSInternational Conference on Information and Communications SecurityB21.5
IFIP SECIFIP Information Security & Privacy Conference27.9
IMACCIMA International Conference on Cryptography and Coding57.1
ISCInformation Security ConferenceB32.2
ISPECInformation Security Practice and Experience Conference42.2
NDSSUsenix Network and Distributed System Security SymposiumA*19.3
PETSPrivacy Enhancing Technologies Symposium (was International Workshop of Privacy Enhancing Technologies)B
PKCIACR International Conference on Practice and Theory of Public-Key Cryptography (PKC)B25.3
PRDCPacific Rim International Symposium on Dependable ComputingB
ProvSecInternational Conference on Provable SecurityB39.6
RSARSA ConferenceB
S&PIEEE Symposium on Security and PrivacyA*11.5
SCNConference on Security and Cryptography for NetworksB45.2
SOUPSSymposium On Usable Privacy and SecurityB
SafeCompInternational Conference on Computer Safety, Reliability and Security34.7
SecureCommInternational Conference on Security and Privacy for Communication Networks36.1
TCCTheory of Cryptography ConferenceA29.6