==Security Conferences== * [http://www.ieee-security.org/cipher.html Cipher Newsletter] (see calendar of events and call for papers) * [http://www.ieee-security.org/TC/SP-Index.html IEEE Symposium on Security and Privacy (SSP)] * [http://www.acm.org/sigs/sigsac/ccs/ ACM Conference on Computer and Communications Security (CCS)] * [http://www.isoc.org/isoc/conferences/ndss/ Network and Distributed System Security Symposium (NDSS)] * [https://www.usenix.org/conference/usenixsecurity16 USENIX Security Symposium] * [http://www.acsac.org/ Annual Computer Security Applications Conference] (ACSAC) * [http://www.sacmat.org/ ACM Symposium on Access Control Models and Technologies (SACMAT)] * [http://cups.cs.cmu.edu/soups Symposium On Usable Privacy and Security (SOUPS)] ==Journals and Magazines== * [http://www.computer.org/portal/site/security/ IEEE Security and Privacy] * [http://www.acm.org/tissec/ ACM Transactions on Information and System Security] * [http://www.computer.org/portal/web/tdsc IEEE Transactions on Dependable and Secure Computing] ==Literature Search== * [https://google.com/ Google Search] * [http://scholar.google.com/ Google Scholar] * [http://portal.acm.org/dl.cfm ACM Digital Library] * [http://ieeexplore.ieee.org/ IEEE Xplore] * MISC (low priority) ** [http://citeseer.ist.psu.edu/ CiteSeer] ** [http://www.ietf.org/html.charters/wg-dir.html IETF] ** [http://rfc.sunsite.dk/main.html RFC Archive]