Home Page
Publications
Research Projects
Software
Talks and Tutorials
Professional Service
Teaching
Students & Postdocs
News
Bio
Links
Upcoming activities:
|
|
Computer Security Research Links
- Computer Security History and Organizations
- Computer Security Archives Project at UC Davis
- History of the Security and Privacy Symposium
- History, IEEE Security and Privacy Technical Committee
- Bletchley Park
- Multics Security
- National Cryptologic Museum
- NITRD Cyber Security
- Permissive Action Links (thanks to Steve Bellovin)
- Science of Security Virtual Organization
- Computer Security Newsletters
- Cipher (Computer Security CFPs, Academic Computer Security Job Listings)
- RISKS Digest
- Major Security and Privacy Research Journals and Technical Magazines
- ACM Transactions on Privacy and Security (TOPS; née ACM Transactions on Information and System Security - TISSEC)
- IEEE Security & Privacy (historical and visual index)
- IEEE Transactions on Dependable and Secure Computing (TDSC)
- Proceedings on Privacy-Enhancing Technologies (PoPETs)
- Other, Selected Journals
- ACM Digital Threats: Research and Practice
- International Journal of Information Security (IJIS; Springer)
- Journal of Computer Security (JCS; IOS Press)
- Journal of Cybersecurity (Oxford University Press)
- Journal of Sensitive Cyber Research and Engineering (JSCoRE)
- Transactions on Data Privacy (TDP)
- USENIX Computing Systems (defunct; 1988–1996)
- USENIX Journal of Election Technology and Systems (JETS) (defunct; 2013–2015)
- "Big 4" Security Research Conferences
- IEEE Symposium on Security and Privacy (also known as "Oakland"; since 1980)
- ACM Conference on Computer and Communications Security (CCS) (since 1993)
- Network and Distributed System Security Symposium (née Workshop; NDSS) (since 1997)
- USENIX Security Symposium (née "USENIX UNIX Security Workshop"; since 1989)
-
- Other, Selected, Important Security Research Conferences and Workshops
- Annual Computer Security Applications Conference (ACSAC) (since 1985)
- IEEE Computer Security Foundations Symposium (née Workshop; CSF) (since 1988)
- IEEE Cybersecurity Development Conference (SecDev) (since 2016)
- IEEE European Symposium on Security and Privacy (Euro S&P) (since 2016)
- IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (since 2008)
- Language-Theoretic Security Workshop (since 2014)
- National Information Systems Security Conference (NISSC) (also known as the "Seminar on the DOD Computer Security Initiative Program," "The National Conference," and "The Baltmore Conference"; defunct; 1979–2000)
- New Security Paradigms Workshop (NSPW) (since 1992)
- Privacy Enhancing Technologies Symposium (PETS) (since 2000)
- International Symposium on Recent Advances in Intrusion Detection (RAID) (since 1998)
- Symposium On Usable Privacy and Security (SOUPS) (since 2005)
- USENIX Annual Technical Conference (ATC) (since 1992)
- Security, Privacy, and Cryptography Textbooks and Reference Books
- Computer Security
- Matt Bishop, Computer Security: Art and Science, Second Edition, Addison-Wesley, 2018.
- Paul C. van Oorschot, Computer Security and the Internet: Tools and Jewels, Springer, 2021
- Ross Anderson, Security Engineering, Third Edition, Wiley, 2020.
- Mathias Payer, Software Security: Principles, Policies, and Protection (SS3P)
-
- Cryptography
- Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996.
-
- Differential Privacy
- Cynthia Dwork and Aaron Roth, The Algorithmic Foundations of Differential Privacy, now publishers, 2014.
-
- Formal Methods
- Adam Chlipala, Certified Programming with Dependent Types, MIT Press, 2013.
- Adam Chlipala, Formal Reasoning About Programs
- Benjamin C. Pierce, et al., Software Foundations
- Leslie Lamport, Specifying Systems
- Distinguished Security Papers
- Annual Science of Security Best Paper Competition
- ACM CCS Test of Time Awards
- ACSAC Test of Time Awards
- IEEE Symposium on Security and Privacy Inaugural Test of Time Awards
- IEEE Symposium on Security and Privacy Systemization of Knowledge Papers (thanks to David Evans)
- NDSS Test of Time Awards
- USENIX Test of Time Awards
- Influential Security Papers (thanks to Konrad Rieck)
- Computer Science / Computer Security Data
- Computer Science Rankings
- System Security Circus
- 10+ Years of the System Security Circus
- Security and Privacy Conference Deadlines
- TopResearcher
Computer Science Libraries
-
- Technical Reports / Open Access Repositories:
- arXiv Computing Research Repository (CoRR) (Cryptography and Security)
- eScholarship Open Access Library (my pubs)
-
- Find academic research papers with: Google Scholar, Microsoft Academic Search, DBLP,CSauthors, arXiv Computing Research Repository (CoRR), and/or SemanticScholar.
Research, Academia, Graduate School
- The Heilmeier Catechism
- How to Increase the Chances Your Paper is Accepted at ACM SIGCOMM
- Mihir Bellare's advice on graduate school and research
Oceanography
- Monterey Bay Aquarium Research Institute (MBARI)
- Naval Research Laboratory
- NSF Division of Ocean Sciences
- NOAA Ocean Exploration
- Office of Naval Research
- Scripps Institution of Oceanography (SIO)
- University-National Oceanographic Laboratory System (UNOLS) - U.S. Academic Research Fleet
- Woods Hole Oceanographic Institution (WHOI)
New Music
- Alex Ross: The Rest is Noise (blog)
- Empyrean Ensemble at UC Davis
- La Jolla Symphony & Chorus
- red fish blue fish
- Sacramento State Festival of New American Music (FeNAM)
- San Francisco Contemporary Music Players
- The Place Where You Go to Listen (John Luther Adams)
Other Links
- The Feynman Lectures on Physics (free, online)
- "The Character of Physical Law" (video)
- Rainbow's End, by Vernor Vinge
"The most important question we must ask ourselves is, 'Are we being good ancestors?'"
-Dr. Jonas Salk |
|
Last modified:
Tuesday, 10-Sep-2024 13:28:10 PDT
© 2005–2025 Sean Peisert
|