default search action
Nicolas Christin
Person information
- affiliation: Carnegie Mellon University, Pittsburgh, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Jenny Tang, Léo Alvarez, Arjun Brar, Nguyen Phong Hoang, Nicolas Christin:
Automatic Generation of Web Censorship Probe Lists. Proc. Priv. Enhancing Technol. 2024(4): 44-60 (2024) - [c113]Daisuke Kawai, Kyle Soska, Bryan R. Routledge, Ariel Zetlin-Jones, Nicolas Christin:
Stranger Danger? Investor Behavior and Incentives on Cryptocurrency Copy-Trading Platforms. CHI 2024: 355:1-355:20 - [c112]Daniela Lopes, Jin-Dong Dong, Pedro Medeiros, Daniel Castro, Diogo Barradas, Bernardo Portela, João Vinagre, Bernardo Ferreira, Nicolas Christin, Nuno Santos:
Flow Correlation Attacks on Tor Onion Service Sessions with Sliding Subset Sum. NDSS 2024 - [c111]Elijah Robert Bouma-Sims, Hiba Hassan, Alexandra Nisenoff, Lorrie Faith Cranor, Nicolas Christin:
"It was honestly just gambling": Investigating the Experiences of Teenage Cryptocurrency Users on Reddit. SOUPS @ USENIX Security Symposium 2024: 333-352 - [c110]Alejandro Cuevas, Nicolas Christin:
Does Online Anonymous Market Vendor Reputation Matter? USENIX Security Symposium 2024 - [c109]Nguyen Phong Hoang, Jakub Dalek, Masashi Crete-Nishihata, Nicolas Christin, Vinod Yegneswaran, Michalis Polychronakis, Nick Feamster:
GFWeb: Measuring the Great Firewall's Web Censorship at Scale. USENIX Security Symposium 2024 - [c108]Nicolas Christin:
What I Learned from Spending a Dozen Years in the Dark Web. WSDM 2024: 2-3 - [c107]Taro Tsuchiya, Alejandro Cuevas, Nicolas Christin:
Identifying Risky Vendors in Cryptocurrency P2P Marketplaces. WWW 2024: 99-110 - [c106]Anton Wahrstätter, Jens Ernstberger, Aviv Yaish, Liyi Zhou, Kaihua Qin, Taro Tsuchiya, Sebastian Steinhorst, Davor Svetinovic, Nicolas Christin, Mikolaj Barczentewicz, Arthur Gervais:
Blockchain Censorship. WWW 2024: 1632-1643 - [i15]Jenny Tang, Léo Alvarez, Arjun Brar, Nguyen Phong Hoang, Nicolas Christin:
Automatic Generation of Web Censorship Probe Lists. CoRR abs/2407.08185 (2024) - [i14]Taro Tsuchiya, Liyi Zhou, Kaihua Qin, Arthur Gervais, Nicolas Christin:
Blockchain Economic Denial of Sustainability Attack: Exploiting Latency Optimization in Ethereum Transaction Forwarding. CoRR abs/2408.01508 (2024) - 2023
- [c105]Daisuke Kawai, Bryan R. Routledge, Kyle Soska, Ariel Zetlin-Jones, Nicolas Christin:
User Participation in Cryptocurrency Derivative Markets. AFT 2023: 8:1-8:24 - [c104]Dominic Deuber, Michael Keuchen, Nicolas Christin:
Assessing Anonymity Techniques Employed in German Court Decisions: A De-Anonymization Experiment. USENIX Security Symposium 2023: 5199-5216 - [c103]Taro Tsuchiya, Alejandro Cuevas, Thomas Magelinski, Nicolas Christin:
Misbehavior and Account Suspension in an Online Financial Communication Platform. WWW 2023: 2686-2697 - [c102]Daisuke Kawai, Alejandro Cuevas, Bryan R. Routledge, Kyle Soska, Ariel Zetlin-Jones, Nicolas Christin:
Is your digital neighbor a reliable investment advisor? WWW 2023: 3581-3591 - [i13]Anton Wahrstätter, Jens Ernstberger, Aviv Yaish, Liyi Zhou, Kaihua Qin, Taro Tsuchiya, Sebastian Steinhorst, Davor Svetinovic, Nicolas Christin, Mikolaj Barczentewicz, Arthur Gervais:
Blockchain Censorship. CoRR abs/2305.18545 (2023) - 2022
- [j18]Nicolas Christin:
The effectiveness of security measures: technical perspective. Commun. ACM 65(9): 92 (2022) - [j17]Kyle Crichton, Nicolas Christin, Lorrie Faith Cranor:
How Do Home Computer Users Browse the Web? ACM Trans. Web 16(1): 3:1-3:27 (2022) - [c101]Daniela Lopes, Pedro Medeiros, Jin-Dong Dong, Diogo Barradas, Bernardo Portela, João Vinagre, Bernardo Ferreira, Nicolas Christin, Nuno Santos:
Poster: User Sessions on Tor Onion Services: Can Colluding ISPs Deanonymize Them at Scale? CCS 2022: 3399-3401 - [c100]Akira Yamada, Kyle Crichton, Yukiko Sawaya, Jin-Dong Dong, Sarah Pearman, Ayumu Kubota, Nicolas Christin:
On recruiting and retaining users for security-sensitive longitudinal measurement panels. SOUPS @ USENIX Security Symposium 2022: 347-366 - [c99]Alejandro Cuevas, Fieke Miedema, Kyle Soska, Nicolas Christin, Rolf van Wegberg:
Measurement by Proxy: On the Accuracy of Online Marketplace Measurements. USENIX Security Symposium 2022: 2153-2170 - [i12]Alejandro Cuevas, Emma Hogan, Hanan Hibshi, Nicolas Christin:
Observations From an Online Security Competition and Its Implications on Crowdsourced Security. CoRR abs/2204.12601 (2022) - 2021
- [c98]Mathew Vermeer, Jonathan West, Alejandro Cuevas, Shuonan Niu, Nicolas Christin, Michel van Eeten, Tobias Fiebig, Carlos Gañán, Tyler Moore:
SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations. EuroS&P 2021: 440-456 - [c97]Wanzheng Zhu, Hongyu Gong, Rohan Bansal, Zachary Weinberg, Nicolas Christin, Giulia Fanti, Suma Bhat:
Self-Supervised Euphemism Detection and Identification for Content Moderation. SP 2021: 229-246 - [c96]Kyle Soska, Jin-Dong Dong, Alex Khodaverdian, Ariel Zetlin-Jones, Bryan R. Routledge, Nicolas Christin:
Towards Understanding Cryptocurrency Derivatives: A Case Study of BitMEX. WWW 2021: 45-57 - [c95]Zachary Weinberg, Diogo Barradas, Nicolas Christin:
Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China. WWW 2021: 472-483 - [c94]Janos Szurdi, Meng Luo, Brian Kondracki, Nick Nikiforakis, Nicolas Christin:
Where are you taking me?Understanding Abusive Traffic Distribution Systems. WWW 2021: 3613-3624 - [c93]Carolina Carreira, João F. Ferreira, Alexandra Mendes, Nicolas Christin:
Exploring Usable Security to Improve the Impact of Formal Verification: A Research Agenda. AppFM@FM 2021: 77-84 - [i11]Wanzheng Zhu, Hongyu Gong, Rohan Bansal, Zachary Weinberg, Nicolas Christin, Giulia Fanti, Suma Bhat:
Self-Supervised Euphemism Detection and Identification for Content Moderation. CoRR abs/2103.16808 (2021) - 2020
- [c92]Joshua Tan, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Practical Recommendations for Stronger, More Usable Passwords Combining Minimum-strength, Minimum-length, and Blocklist Requirements. CCS 2020: 1407-1426 - [c91]James E. Arps, Nicolas Christin:
Open Market or Ghost Town? The Curious Case of OpenBazaar. Financial Cryptography 2020: 561-577 - [c90]Arian Akhavan Niaki, Shinyoung Cho, Zachary Weinberg, Nguyen Phong Hoang, Abbas Razaghpanah, Nicolas Christin, Phillipa Gill:
ICLab: A Global, Longitudinal Internet Censorship Measurement Platform. SP 2020: 135-151
2010 – 2019
- 2019
- [c89]Mahmood Sharif, Kevin A. Roundy, Matteo Dell'Amico, Christopher Gates, Daniel Kats, Lujo Bauer, Nicolas Christin:
A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support Chats. CHI 2019: 78 - [c88]Xiao Hui Tai, Kyle Soska, Nicolas Christin:
Adversarial Matching of Dark Net Market Vendor Accounts. KDD 2019: 1871-1880 - [c87]Shikun Zhang, Sarah Pearman, Lujo Bauer, Nicolas Christin:
Why people (don't) use password managers effectively. SOUPS @ USENIX Security Symposium 2019 - [i10]Arian Akhavan Niaki, Shinyoung Cho, Zachary Weinberg, Nguyen Phong Hoang, Abbas Razaghpanah, Nicolas Christin, Phillipa Gill:
ICLab: A Global, Longitudinal Internet Censorship Measurement Platform. CoRR abs/1907.04245 (2019) - 2018
- [j16]Malte Möser, Kyle Soska, Ethan Heilman, Kevin Lee, Henry Heffan, Shashvat Srivastava, Kyle Hogan, Jason Hennessey, Andrew Miller, Arvind Narayanan, Nicolas Christin:
An Empirical Analysis of Traceability in the Monero Blockchain. Proc. Priv. Enhancing Technol. 2018(3): 143-163 (2018) - [j15]Tyler Moore, Nicolas Christin, Janos Szurdi:
Revisiting the Risks of Bitcoin Currency Exchange Closure. ACM Trans. Internet Techn. 18(4): 50:1-50:18 (2018) - [j14]James T. Graves, Alessandro Acquisti, Nicolas Christin:
Should Credit Card Issuers Reissue Cards in Response to a Data Breach?: Uncertainty and Transparency in Metrics for Data Security Policymaking. ACM Trans. Internet Techn. 18(4): 54:1-54:19 (2018) - [c86]Mahmood Sharif, Jumpei Urakawa, Nicolas Christin, Ayumu Kubota, Akira Yamada:
Predicting Impending Exposure to Malicious Content from User Behavior. CCS 2018: 1487-1501 - [c85]Jessica Colnago, Summer Devlin, Maggie Oates, Chelse Swoopes, Lujo Bauer, Lorrie Faith Cranor, Nicolas Christin:
"It's not actually that horrible": Exploring Adoption of Two-Factor Authentication at a University. CHI 2018: 456 - [c84]Zachary Weinberg, Shinyoung Cho, Nicolas Christin, Vyas Sekar, Phillipa Gill:
How to Catch when Proxies Lie: Verifying the Physical Locations of Network Proxies with Active Geolocation. Internet Measurement Conference 2018: 203-217 - [c83]Hana Habib, Pardis Emami Naeini, Summer Devlin, Maggie Oates, Chelse Swoopes, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
User Behaviors and Attitudes Under Password Expiration Policies. SOUPS @ USENIX Security Symposium 2018: 13-30 - [c82]Hana Habib, Jessica Colnago, Vidya Gopalakrishnan, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor:
Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing. SOUPS @ USENIX Security Symposium 2018: 159-175 - [c81]Rolf van Wegberg, Samaneh Tajalizadehkhoob, Kyle Soska, Ugur Akyazi, Carlos Hernandez Gañán, Bram Klievink, Nicolas Christin, Michel van Eeten:
Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets. USENIX Security Symposium 2018: 1009-1026 - 2017
- [j13]Zachary Weinberg, Mahmood Sharif, Janos Szurdi, Nicolas Christin:
Topics of Controversy: An Empirical Analysis of Web Censorship Lists. Proc. Priv. Enhancing Technol. 2017(1): 42-61 (2017) - [j12]William Melicher, Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Better Passwords through Science (and Neural Networks). login Usenix Mag. 42(4) (2017) - [c80]Sarah Pearman, Jeremy Thomas, Pardis Emami Naeini, Hana Habib, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Alain Forget:
Let's Go in for a Closer Look: Observing Passwords in Their Natural Habitat. CCS 2017: 295-310 - [c79]Yukiko Sawaya, Mahmood Sharif, Nicolas Christin, Ayumu Kubota, Akihiro Nakarai, Akira Yamada:
Self-Confidence Trumps Knowledge: A Cross-Cultural Study of Security Behavior. CHI 2017: 2202-2214 - [c78]Blase Ur, Felicia Alfieri, Maung Aung, Lujo Bauer, Nicolas Christin, Jessica Colnago, Lorrie Faith Cranor, Henry Dixon, Pardis Emami Naeini, Hana Habib, Noah Johnson, William Melicher:
Design and Evaluation of a Data-Driven Password Meter. CHI 2017: 3775-3786 - [c77]Janos Szurdi, Nicolas Christin:
Email typosquatting. Internet Measurement Conference 2017: 419-431 - [c76]Kyle Soska, Christopher S. Gates, Kevin A. Roundy, Nicolas Christin:
Automatic Application Identification from Billions of Files. KDD 2017: 2021-2030 - [c75]Sean M. Segreti, William Melicher, Saranga Komanduri, Darya Melicher, Richard Shay, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Michelle L. Mazurek:
Diversify to Survive: Making Passwords Stronger with Adaptive Policies. SOUPS 2017: 1-12 - [c74]William Melicher, Blase Ur, Saranga Komanduri, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks. USENIX ATC 2017 - [c73]Helgi Sigurbjarnarson, James Bornholt, Nicolas Christin, Lorrie Faith Cranor:
Push-Button Verification of File Systems via Crash Refinement. USENIX ATC 2017 - 2016
- [j11]Richard Shay, Saranga Komanduri, Adam L. Durity, Phillip (Seyoung) Huh, Michelle L. Mazurek, Sean M. Segreti, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Designing Password Policies for Strength and Usability. ACM Trans. Inf. Syst. Secur. 18(4): 13:1-13:34 (2016) - [c72]William Melicher, Darya Kurilova, Sean M. Segreti, Pranshu Kalvani, Richard Shay, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Michelle L. Mazurek:
Usability and Security of Text Passwords on Mobile Devices. CHI 2016: 527-539 - [c71]Blase Ur, Jonathan Bees, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Do Users' Perceptions of Password Security Match Reality? CHI 2016: 3748-3760 - [c70]Alain Forget, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Marian Harbach, Rahul Telang:
Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes. SOUPS 2016: 97-111 - [c69]William Melicher, Blase Ur, Sean M. Segreti, Saranga Komanduri, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks. USENIX Security Symposium 2016: 175-191 - [i9]Luís T. A. N. Brandão, Nicolas Christin, George Danezis:
A Public Comment on NCCoE's White Paper on Privacy-Enhancing Identity Brokers. CoRR abs/1611.02968 (2016) - [i8]Kyle Soska, Albert Kwon, Nicolas Christin, Srinivas Devadas:
Beaver: A Decentralized Anonymous Marketplace with Secure Reputation. IACR Cryptol. ePrint Arch. 2016: 464 (2016) - 2015
- [j10]Luís T. A. N. Brandão, Nicolas Christin, George Danezis, anonymous:
Toward Mending Two Nation-Scale Brokered Identification Systems. Proc. Priv. Enhancing Technol. 2015(2): 135-155 (2015) - [c68]Jeremiah Blocki, Nicolas Christin, Anupam Datta, Ariel D. Procaccia, Arunesh Sinha:
Audit Games with Multiple Defender Resources. AAAI 2015: 791-797 - [c67]Richard Shay, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Alain Forget, Saranga Komanduri, Michelle L. Mazurek, William Melicher, Sean M. Segreti, Blase Ur:
A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior. CHI 2015: 2903-2912 - [c66]Blase Ur, Fumiko Noma, Jonathan Bees, Sean M. Segreti, Richard Shay, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
"I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab. SOUPS 2015: 123-140 - [c65]Kyle Soska, Nicolas Christin:
Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem. USENIX Security Symposium 2015: 33-48 - [c64]Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Saranga Komanduri, Darya Kurilova, Michelle L. Mazurek, William Melicher, Richard Shay:
Measuring Real-World Accuracies and Biases in Modeling Password Guessability. USENIX Security Symposium 2015: 463-481 - [c63]Richard Clayton, Tyler Moore, Nicolas Christin:
Concentrating Correctly on Cybercrime Concentration. WEIS 2015 - [c62]Benjamin Johnson, Paul Laskowski, Thomas Maillart, John C.-I. Chuang, Nicolas Christin:
Caviar and Yachts: How Your Purchase Data May Come Back to Haunt You. WEIS 2015 - [e2]Michael Brenner, Nicolas Christin, Benjamin Johnson, Kurt Rohloff:
Financial Cryptography and Data Security - FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers. Lecture Notes in Computer Science 8976, Springer 2015, ISBN 978-3-662-48050-2 [contents] - 2014
- [c61]Timothy Vidas, Jiaqi Tan, Jay Nahata, Chaur Lih Tan, Nicolas Christin, Patrick Tague:
A5: Automated Analysis of Adversarial Android Applications. SPSM@CCS 2014: 39-50 - [c60]Timothy Vidas, Nicolas Christin:
Evading android runtime analysis via sandbox detection. AsiaCCS 2014: 447-458 - [c59]Nektarios Leontiadis, Tyler Moore, Nicolas Christin:
A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning. CCS 2014: 930-941 - [c58]Richard Shay, Saranga Komanduri, Adam L. Durity, Phillip (Seyoung) Huh, Michelle L. Mazurek, Sean M. Segreti, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Can long passwords be secure and usable? CHI 2014: 2927-2936 - [c57]Nektarios Leontiadis, Nicolas Christin:
Empirically Measuring WHOIS Misuse. ESORICS (1) 2014: 19-36 - [c56]Alain Forget, Saranga Komanduri, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor, Rahul Telang:
Building the security behavior observatory: an infrastructure for long-term monitoring of client machines. HotSoS 2014: 24 - [c55]Alessandro Oltramari, Noam Ben-Asher, Lorrie Faith Cranor, Lujo Bauer, Nicolas Christin:
General Requirements of a Hybrid-Modeling Framework for Cyber Security. MILCOM 2014: 129-135 - [c54]Kyle Soska, Nicolas Christin:
Automatically Detecting Vulnerable Websites Before They Turn Malicious. USENIX Security Symposium 2014: 625-640 - [e1]Nicolas Christin, Reihaneh Safavi-Naini:
Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8437, Springer 2014, ISBN 978-3-662-45471-8 [contents] - [i7]Jeremiah Blocki, Nicolas Christin, Anupam Datta, Ariel D. Procaccia, Arunesh Sinha:
Audit Games with Multiple Defender Resources. CoRR abs/1409.4503 (2014) - 2013
- [j9]Daniel Votipka, Timothy Vidas, Nicolas Christin:
Passe-Partout: A General Collection Methodology for Android Devices. IEEE Trans. Inf. Forensics Secur. 8(12): 1937-1946 (2013) - [c53]Michelle L. Mazurek, Saranga Komanduri, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Patrick Gage Kelley, Richard Shay, Blase Ur:
Measuring password guessability for an entire university. CCS 2013: 173-186 - [c52]Timothy Vidas, Nicolas Christin:
Sweetening android lemon markets: measuring and combating malware in application marketplaces. CODASPY 2013: 197-208 - [c51]Tyler Moore, Nicolas Christin:
Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk. Financial Cryptography 2013: 25-33 - [c50]Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs. Financial Cryptography Workshops 2013: 34-51 - [c49]Timothy Vidas, Emmanuel Owusu, Shuai Wang, Cheng Zeng, Lorrie Faith Cranor, Nicolas Christin:
QRishing: The Susceptibility of Smartphone Users to QR Code Phishing Attacks. Financial Cryptography Workshops 2013: 52-69 - [c48]Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha:
Adaptive Regret Minimization in Bounded-Memory Games. GameSec 2013: 65-84 - [c47]Jeremiah Blocki, Nicolas Christin, Anupam Datta, Ariel D. Procaccia, Arunesh Sinha:
Audit Games. IJCAI 2013: 41-47 - [c46]Nektarios Leontiadis, Tyler Moore, Nicolas Christin:
Pick your poison: pricing and inventories at unlicensed online pharmacies. EC 2013: 621-638 - [c45]Nicolas Christin:
Traveling the silk road: a measurement analysis of a large anonymous online marketplace. WWW 2013: 213-224 - [i6]Jeremiah Blocki, Nicolas Christin, Anupam Datta, Ariel D. Procaccia, Arunesh Sinha:
Audit Games. CoRR abs/1303.0356 (2013) - 2012
- [j8]Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Julio C. López:
Helping Users Create Better Passwords. login Usenix Mag. 37(6) (2012) - [c44]Benjamin Johnson, John Chuang, Jens Grossklags, Nicolas Christin:
Metrics for Measuring ISP Badness: The Case of Spam - (Short Paper). Financial Cryptography 2012: 89-97 - [c43]Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha:
Audit Mechanisms for Provable Risk Management and Accountable Data Governance. GameSec 2012: 38-59 - [c42]Richard Shay, Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Blase Ur, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Correct horse battery staple: exploring the usability of system-assigned passphrases. SOUPS 2012: 7 - [c41]Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Julio C. López:
Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms. IEEE Symposium on Security and Privacy 2012: 523-537 - [c40]Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation. USENIX Security Symposium 2012: 65-80 - [i5]Nicolas Christin:
Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace. CoRR abs/1207.7139 (2012) - 2011
- [j7]Timothy Vidas, Chengye Zhang, Nicolas Christin:
Toward a general collection methodology for Android devices. Digit. Investig. 8(Supplement): S14-S24 (2011) - [c39]Tyler Moore, Nektarios Leontiadis, Nicolas Christin:
Fashion crimes: trending-term exploitation on the web. CCS 2011: 455-466 - [c38]Eiji Hayashi, Jason I. Hong, Nicolas Christin:
Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes. CHI 2011: 2055-2064 - [c37]Saranga Komanduri, Richard Shay, Patrick Gage Kelley, Michelle L. Mazurek, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman:
Of passwords and people: measuring the effect of password-composition policies. CHI 2011: 2595-2604 - [c36]Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha:
Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection. CSF 2011: 312-327 - [c35]Nicolas Christin, Serge Egelman, Timothy Vidas, Jens Grossklags:
It's All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice. Financial Cryptography 2011: 16-30 - [c34]Erin Kenneally, Angelos Stavrou, John McHugh, Nicolas Christin:
Moving Forward, Building an Ethics Community (Panel Statements). Financial Cryptography Workshops 2011: 178-183 - [c33]Benjamin Johnson, Jens Grossklags, Nicolas Christin, John Chuang:
Nash Equilibria for Weakest Target Security Games with Heterogeneous Agents. GAMENETS 2011: 444-458 - [c32]Nicolas Christin:
Network Security Games: Combining Game Theory, Behavioral Economics, and Network Measurements. GameSec 2011: 4-6 - [c31]Anupam Datta, Jeremiah Blocki, Nicolas Christin, Henry DeYoung, Deepak Garg, Limin Jia, Dilsun Kirli Kaynar, Arunesh Sinha:
Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms. ICISS 2011: 1-27 - [c30]Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha:
Audit Mechanisms for Privacy Protection in Healthcare Environments. HealthSec 2011 - [c29]Nektarios Leontiadis, Tyler Moore, Nicolas Christin:
Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade. USENIX Security Symposium 2011 - [c28]Timothy Vidas, Daniel Votipka, Nicolas Christin:
All Your Droid Are Belong to Us: A Survey of Current Android Attacks. WOOT 2011: 81-90 - [i4]Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha:
Adaptive Regret Minimization in Bounded-Memory Games. CoRR abs/1111.2888 (2011) - 2010
- [c27]Nicolas Christin, Sally S. Yanagihara, Keisuke Kamataki:
Dissecting one click frauds. CCS 2010: 15-26 - [c26]Benjamin Johnson, Jens Grossklags, Nicolas Christin, John Chuang:
Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information. ESORICS 2010: 588-606 - [c25]Jens Grossklags, Benjamin Johnson, Nicolas Christin:
When Information Improves Information Security. Financial Cryptography 2010: 416-423 - [c24]Benjamin Johnson, Jens Grossklags, Nicolas Christin, John Chuang:
Uncertainty in Interdependent Security Games. GameSec 2010: 234-244 - [c23]Ambarish Karole, Nitesh Saxena, Nicolas Christin:
A Comparative Usability Evaluation of Traditional Password Managers. ICISC 2010: 233-251 - [c22]David Molnar, Serge Egelman, Nicolas Christin:
This is your data on drugs: lessons computer security can learn from the drug war. NSPW 2010: 143-149 - [c21]Richard Shay, Saranga Komanduri, Patrick Gage Kelley, Pedro Giovanni Leon, Michelle L. Mazurek, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Encountering stronger password requirements: user attitudes and behaviors. SOUPS 2010 - [c20]Serge Egelman, David Molnar, Nicolas Christin, Alessandro Acquisti, Cormac Herley, Shriram Krishnamurthi:
Please Continue to Hold: An Empirical Study on User Tolerance of Security Delays. WEIS 2010
2000 – 2009
- 2009
- [c19]Rajesh Krishna Balan, Narayan Ramasubbu, Komsit Prakobphol, Nicolas Christin, Jason I. Hong:
mFerio: the design and evaluation of a peer-to-peer mobile payment system. MobiSys 2009: 291-304 - [c18]Madoka Hasegawa, Nicolas Christin, Eiji Hayashi:
New directions in multisensory authentication. SOUPS 2009 - [c17]Eiji Hayashi, Jason I. Hong, Nicolas Christin:
Educated guess on graphical authentication schemes: vulnerabilities and countermeasures. SOUPS 2009 - [c16]Jens Grossklags, Benjamin Johnson, Nicolas Christin:
The Price of Uncertainty in Security Games. WEIS 2009 - 2008
- [c15]Hirokazu Sasamoto, Nicolas Christin, Eiji Hayashi:
Undercover: authentication usable in front of prying eyes. CHI 2008: 183-192 - [c14]Alessandro Acquisti, Nicolas Christin, Bryan Parno, Adrian Perrig:
Countermeasures against Government-Scale Monetary Forgery. Financial Cryptography 2008: 262-266 - [c13]Jens Grossklags, Nicolas Christin, John Chuang:
Predicted and Observed User Behavior in the Weakest-link Security Game. UPSEC 2008 - [c12]Jens Grossklags, Nicolas Christin, John Chuang:
Security and insurance management in networks with heterogeneous agents. EC 2008: 160-169 - [c11]Eiji Hayashi, Rachna Dhamija, Nicolas Christin, Adrian Perrig:
Use Your Illusion: secure authentication usable anywhere. SOUPS 2008: 35-45 - [c10]Jens Grossklags, Nicolas Christin, John Chuang:
Security Investment (Failures) in Five Economic Environments: A Comparison of Homogeneous and Heterogeneous User Agents. WEIS 2008 - [c9]Jens Grossklags, Nicolas Christin, John Chuang:
Secure or insure?: a game-theoretic analysis of information security games. WWW 2008: 209-218 - 2007
- [j6]Nicolas Christin, Jörg Liebeherr, Tarek F. Abdelzaher:
Enhancing class-based service architectures with adaptive rate allocation and dropping mechanisms. IEEE/ACM Trans. Netw. 15(3): 669-682 (2007) - [c8]Ahsan Habib, Nicolas Christin, John C.-I. Chuang:
On the Feasibility of Switching ISPs in Residential Multihoming. IWQoS 2007: 91-99 - [c7]Soon Hin Khor, Nicolas Christin, Tina Wong, Akihiro Nakao:
Power to the people: securing the internet one edge at a time. LSAD@SIGCOMM 2007: 89-96 - 2006
- [j5]Nicolas Christin, Jörg Liebeherr:
The QoSbox: Quantitative service differentiation in BSD routers. Comput. Networks 50(17): 3353-3374 (2006) - [j4]Victor Firoiu, Xiaohui Zhang, Emre Gündüzhan, Nicolas Christin:
Providing Service Guarantees in High-Speed Switching Systems with Feedback Output Queuing. IEEE Trans. Parallel Distributed Syst. 17(5): 434-447 (2006) - [c6]Ahsan Habib, Nicolas Christin, John Chuang:
Taking Advantage of Multihoming with Session Layer Striping. INFOCOM 2006 - 2005
- [j3]Nicolas Christin, Jörg Liebeherr:
Marking algorithms for service differentiation of TCP traffic. Comput. Commun. 28(18): 2058-2069 (2005) - [c5]Nicolas Christin, John Chuang:
A cost-based analysis of overlay routing geometries. INFOCOM 2005: 2566-2577 - [c4]Nicolas Christin, Andreas S. Weigend, John Chuang:
Content availability, pollution and poisoning in file sharing peer-to-peer networks. EC 2005: 68-77 - 2004
- [c3]Nicolas Christin, John Chuang:
On the Cost of Participating in a Peer-to-Peer Network. IPTPS 2004: 22-32 - [i3]Nicolas Christin, Jens Grossklags, John Chuang:
Near Rationality and Competitive Equilibria in Networked Systems. CoRR cs.GT/0404040 (2004) - [i2]Nicolas Christin, John Chuang:
On the Cost of Participating in a Peer-to-Peer Network. CoRR cs.NI/0401010 (2004) - [i1]Victor Firoiu, Xiaohui Zhang, Emre Gündüzhan, Nicolas Christin:
Providing Service Guarantees in High-Speed Switching Systems with Feedback Output Queuing. CoRR cs.NI/0406019 (2004) - 2003
- [j2]Nicolas Christin, Jörg Liebeherr:
A QoS architecture for quantitative service differentiation. IEEE Commun. Mag. 41(6): 38-45 (2003) - 2002
- [j1]Jörg Liebeherr, Nicolas Christin:
Rate allocation and buffer management for differentiated services. Comput. Networks 40(1): 89-110 (2002) - [c2]Nicolas Christin, Jörg Liebeherr, Tarek F. Abdelzaher:
A Quantitative Assured Forwarding Service. INFOCOM 2002: 864-873 - 2001
- [c1]Jörg Liebeherr, Nicolas Christin:
JoBS: Joint Buffer Management and Scheduling for Differentiated Services. IWQoS 2001: 404-418
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint