default search action
Nicolas Christin
Person information
- affiliation: Carnegie Mellon University, Pittsburgh, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j19]Jenny Tang, Léo Alvarez, Arjun Brar, Nguyen Phong Hoang, Nicolas Christin:
Automatic Generation of Web Censorship Probe Lists. Proc. Priv. Enhancing Technol. 2024(4): 44-60 (2024) - [c114]Daisuke Kawai, Kyle Soska, Bryan R. Routledge, Ariel Zetlin-Jones, Nicolas Christin:
Stranger Danger? Investor Behavior and Incentives on Cryptocurrency Copy-Trading Platforms. CHI 2024: 355:1-355:20 - [c113]Daniela Lopes, Jin-Dong Dong, Pedro Medeiros, Daniel Castro, Diogo Barradas, Bernardo Portela, João Vinagre, Bernardo Ferreira, Nicolas Christin, Nuno Santos:
Flow Correlation Attacks on Tor Onion Service Sessions with Sliding Subset Sum. NDSS 2024 - [c112]Diana Vieira Fernandes, Nicolas Christin, Soummya Kar:
Peer-to-Peer (P2P) Electricity Markets for Low Voltage Networks. SmartGridComm 2024: 485-491 - [c111]Elijah Robert Bouma-Sims, Hiba Hassan, Alexandra Nisenoff, Lorrie Faith Cranor, Nicolas Christin:
"It was honestly just gambling": Investigating the Experiences of Teenage Cryptocurrency Users on Reddit. SOUPS @ USENIX Security Symposium 2024: 333-352 - [c110]Alejandro Cuevas, Nicolas Christin:
Does Online Anonymous Market Vendor Reputation Matter? USENIX Security Symposium 2024 - [c109]Nguyen Phong Hoang, Jakub Dalek, Masashi Crete-Nishihata, Nicolas Christin, Vinod Yegneswaran, Michalis Polychronakis, Nick Feamster:
GFWeb: Measuring the Great Firewall's Web Censorship at Scale. USENIX Security Symposium 2024 - [c108]Nicolas Christin:
What I Learned from Spending a Dozen Years in the Dark Web. WSDM 2024: 2-3 - [c107]Taro Tsuchiya, Alejandro Cuevas, Nicolas Christin:
Identifying Risky Vendors in Cryptocurrency P2P Marketplaces. WWW 2024: 99-110 - [c106]Anton Wahrstätter, Jens Ernstberger, Aviv Yaish, Liyi Zhou, Kaihua Qin, Taro Tsuchiya, Sebastian Steinhorst, Davor Svetinovic, Nicolas Christin, Mikolaj Barczentewicz, Arthur Gervais:
Blockchain Censorship. WWW 2024: 1632-1643 - [i15]Jenny Tang, Léo Alvarez, Arjun Brar, Nguyen Phong Hoang, Nicolas Christin:
Automatic Generation of Web Censorship Probe Lists. CoRR abs/2407.08185 (2024) - [i14]Taro Tsuchiya, Liyi Zhou, Kaihua Qin, Arthur Gervais, Nicolas Christin:
Blockchain Economic Denial of Sustainability Attack: Exploiting Latency Optimization in Ethereum Transaction Forwarding. CoRR abs/2408.01508 (2024) - 2023
- [c105]Daisuke Kawai, Bryan R. Routledge, Kyle Soska, Ariel Zetlin-Jones, Nicolas Christin:
User Participation in Cryptocurrency Derivative Markets. AFT 2023: 8:1-8:24 - [c104]Dominic Deuber, Michael Keuchen, Nicolas Christin:
Assessing Anonymity Techniques Employed in German Court Decisions: A De-Anonymization Experiment. USENIX Security Symposium 2023: 5199-5216 - [c103]Taro Tsuchiya, Alejandro Cuevas, Thomas Magelinski, Nicolas Christin:
Misbehavior and Account Suspension in an Online Financial Communication Platform. WWW 2023: 2686-2697 - [c102]Daisuke Kawai, Alejandro Cuevas, Bryan R. Routledge, Kyle Soska, Ariel Zetlin-Jones, Nicolas Christin:
Is your digital neighbor a reliable investment advisor? WWW 2023: 3581-3591 - [i13]Anton Wahrstätter, Jens Ernstberger, Aviv Yaish, Liyi Zhou, Kaihua Qin, Taro Tsuchiya, Sebastian Steinhorst, Davor Svetinovic, Nicolas Christin, Mikolaj Barczentewicz, Arthur Gervais:
Blockchain Censorship. CoRR abs/2305.18545 (2023) - 2022
- [j18]Nicolas Christin:
The effectiveness of security measures: technical perspective. Commun. ACM 65(9): 92 (2022) - [j17]Kyle Crichton, Nicolas Christin, Lorrie Faith Cranor:
How Do Home Computer Users Browse the Web? ACM Trans. Web 16(1): 3:1-3:27 (2022) - [c101]Daniela Lopes, Pedro Medeiros, Jin-Dong Dong, Diogo Barradas, Bernardo Portela, João Vinagre, Bernardo Ferreira, Nicolas Christin, Nuno Santos:
Poster: User Sessions on Tor Onion Services: Can Colluding ISPs Deanonymize Them at Scale? CCS 2022: 3399-3401 - [c100]Akira Yamada, Kyle Crichton, Yukiko Sawaya, Jin-Dong Dong, Sarah Pearman, Ayumu Kubota, Nicolas Christin:
On recruiting and retaining users for security-sensitive longitudinal measurement panels. SOUPS @ USENIX Security Symposium 2022: 347-366 - [c99]Alejandro Cuevas, Fieke Miedema, Kyle Soska, Nicolas Christin, Rolf van Wegberg:
Measurement by Proxy: On the Accuracy of Online Marketplace Measurements. USENIX Security Symposium 2022: 2153-2170 - [i12]Alejandro Cuevas, Emma Hogan, Hanan Hibshi, Nicolas Christin:
Observations From an Online Security Competition and Its Implications on Crowdsourced Security. CoRR abs/2204.12601 (2022) - 2021
- [c98]Mathew Vermeer, Jonathan West, Alejandro Cuevas, Shuonan Niu, Nicolas Christin, Michel van Eeten, Tobias Fiebig, Carlos Gañán, Tyler Moore:
SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations. EuroS&P 2021: 440-456 - [c97]Wanzheng Zhu, Hongyu Gong, Rohan Bansal, Zachary Weinberg, Nicolas Christin, Giulia Fanti, Suma Bhat:
Self-Supervised Euphemism Detection and Identification for Content Moderation. SP 2021: 229-246 - [c96]Kyle Soska, Jin-Dong Dong, Alex Khodaverdian, Ariel Zetlin-Jones, Bryan R. Routledge, Nicolas Christin:
Towards Understanding Cryptocurrency Derivatives: A Case Study of BitMEX. WWW 2021: 45-57 - [c95]Zachary Weinberg, Diogo Barradas, Nicolas Christin:
Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China. WWW 2021: 472-483 - [c94]Janos Szurdi, Meng Luo, Brian Kondracki, Nick Nikiforakis, Nicolas Christin:
Where are you taking me?Understanding Abusive Traffic Distribution Systems. WWW 2021: 3613-3624 - [c93]Carolina Carreira, João F. Ferreira, Alexandra Mendes, Nicolas Christin:
Exploring Usable Security to Improve the Impact of Formal Verification: A Research Agenda. AppFM@FM 2021: 77-84 - [i11]Wanzheng Zhu, Hongyu Gong, Rohan Bansal, Zachary Weinberg, Nicolas Christin, Giulia Fanti, Suma Bhat:
Self-Supervised Euphemism Detection and Identification for Content Moderation. CoRR abs/2103.16808 (2021) - 2020
- [c92]Joshua Tan, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Practical Recommendations for Stronger, More Usable Passwords Combining Minimum-strength, Minimum-length, and Blocklist Requirements. CCS 2020: 1407-1426 - [c91]James E. Arps, Nicolas Christin:
Open Market or Ghost Town? The Curious Case of OpenBazaar. Financial Cryptography 2020: 561-577 - [c90]Arian Akhavan Niaki, Shinyoung Cho, Zachary Weinberg, Nguyen Phong Hoang, Abbas Razaghpanah, Nicolas Christin, Phillipa Gill:
ICLab: A Global, Longitudinal Internet Censorship Measurement Platform. SP 2020: 135-151
2010 – 2019
- 2019
- [c89]Mahmood Sharif, Kevin A. Roundy, Matteo Dell'Amico, Christopher Gates, Daniel Kats, Lujo Bauer, Nicolas Christin:
A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support Chats. CHI 2019: 78 - [c88]Xiao Hui Tai, Kyle Soska, Nicolas Christin:
Adversarial Matching of Dark Net Market Vendor Accounts. KDD 2019: 1871-1880 - [c87]Shikun Zhang, Sarah Pearman, Lujo Bauer, Nicolas Christin:
Why people (don't) use password managers effectively. SOUPS @ USENIX Security Symposium 2019 - [i10]Arian Akhavan Niaki, Shinyoung Cho, Zachary Weinberg, Nguyen Phong Hoang, Abbas Razaghpanah, Nicolas Christin, Phillipa Gill:
ICLab: A Global, Longitudinal Internet Censorship Measurement Platform. CoRR abs/1907.04245 (2019) - 2018
- [j16]Malte Möser, Kyle Soska, Ethan Heilman, Kevin Lee, Henry Heffan, Shashvat Srivastava, Kyle Hogan, Jason Hennessey, Andrew Miller, Arvind Narayanan, Nicolas Christin:
An Empirical Analysis of Traceability in the Monero Blockchain. Proc. Priv. Enhancing Technol. 2018(3): 143-163 (2018) - [j15]Tyler Moore, Nicolas Christin, Janos Szurdi:
Revisiting the Risks of Bitcoin Currency Exchange Closure. ACM Trans. Internet Techn. 18(4): 50:1-50:18 (2018) - [j14]James T. Graves, Alessandro Acquisti, Nicolas Christin:
Should Credit Card Issuers Reissue Cards in Response to a Data Breach?: Uncertainty and Transparency in Metrics for Data Security Policymaking. ACM Trans. Internet Techn. 18(4): 54:1-54:19 (2018) - [c86]Mahmood Sharif, Jumpei Urakawa, Nicolas Christin, Ayumu Kubota, Akira Yamada:
Predicting Impending Exposure to Malicious Content from User Behavior. CCS 2018: 1487-1501 - [c85]Jessica Colnago, Summer Devlin, Maggie Oates, Chelse Swoopes, Lujo Bauer, Lorrie Faith Cranor, Nicolas Christin:
"It's not actually that horrible": Exploring Adoption of Two-Factor Authentication at a University. CHI 2018: 456 - [c84]Zachary Weinberg, Shinyoung Cho, Nicolas Christin, Vyas Sekar, Phillipa Gill:
How to Catch when Proxies Lie: Verifying the Physical Locations of Network Proxies with Active Geolocation. Internet Measurement Conference 2018: 203-217 - [c83]Hana Habib, Pardis Emami Naeini, Summer Devlin, Maggie Oates, Chelse Swoopes, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
User Behaviors and Attitudes Under Password Expiration Policies. SOUPS @ USENIX Security Symposium 2018: 13-30 - [c82]Hana Habib, Jessica Colnago, Vidya Gopalakrishnan, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor:
Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing. SOUPS @ USENIX Security Symposium 2018: 159-175 - [c81]Rolf van Wegberg, Samaneh Tajalizadehkhoob, Kyle Soska, Ugur Akyazi, Carlos Hernandez Gañán, Bram Klievink, Nicolas Christin, Michel van Eeten:
Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets. USENIX Security Symposium 2018: 1009-1026 - 2017
- [j13]Zachary Weinberg, Mahmood Sharif, Janos Szurdi, Nicolas Christin:
Topics of Controversy: An Empirical Analysis of Web Censorship Lists. Proc. Priv. Enhancing Technol. 2017(1): 42-61 (2017) - [j12]William Melicher, Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Better Passwords through Science (and Neural Networks). login Usenix Mag. 42(4) (2017) - [c80]Sarah Pearman, Jeremy Thomas, Pardis Emami Naeini, Hana Habib, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Alain Forget:
Let's Go in for a Closer Look: Observing Passwords in Their Natural Habitat. CCS 2017: 295-310 - [c79]Yukiko Sawaya, Mahmood Sharif, Nicolas Christin, Ayumu Kubota, Akihiro Nakarai, Akira Yamada:
Self-Confidence Trumps Knowledge: A Cross-Cultural Study of Security Behavior. CHI 2017: 2202-2214 - [c78]Blase Ur, Felicia Alfieri, Maung Aung, Lujo Bauer, Nicolas Christin, Jessica Colnago, Lorrie Faith Cranor, Henry Dixon, Pardis Emami Naeini, Hana Habib, Noah Johnson, William Melicher:
Design and Evaluation of a Data-Driven Password Meter. CHI 2017: 3775-3786 - [c77]Janos Szurdi, Nicolas Christin:
Email typosquatting. Internet Measurement Conference 2017: 419-431 - [c76]Kyle Soska, Christopher S. Gates, Kevin A. Roundy, Nicolas Christin:
Automatic Application Identification from Billions of Files. KDD 2017: 2021-2030 - [c75]Sean M. Segreti, William Melicher, Saranga Komanduri, Darya Melicher, Richard Shay, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Michelle L. Mazurek:
Diversify to Survive: Making Passwords Stronger with Adaptive Policies. SOUPS 2017: 1-12 - [c74]William Melicher, Blase Ur, Saranga Komanduri, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks. USENIX ATC 2017 - [c73]Helgi Sigurbjarnarson, James Bornholt, Nicolas Christin, Lorrie Faith Cranor:
Push-Button Verification of File Systems via Crash Refinement. USENIX ATC 2017 - 2016
- [j11]Richard Shay, Saranga Komanduri, Adam L. Durity, Phillip (Seyoung) Huh, Michelle L. Mazurek, Sean M. Segreti, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Designing Password Policies for Strength and Usability. ACM Trans. Inf. Syst. Secur. 18(4): 13:1-13:34 (2016) - [c72]William Melicher, Darya Kurilova, Sean M. Segreti, Pranshu Kalvani, Richard Shay, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Michelle L. Mazurek:
Usability and Security of Text Passwords on Mobile Devices. CHI 2016: 527-539 - [c71]Blase Ur, Jonathan Bees, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Do Users' Perceptions of Password Security Match Reality? CHI 2016: 3748-3760 - [c70]Alain Forget, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Marian Harbach, Rahul Telang:
Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes. SOUPS 2016: 97-111 - [c69]William Melicher, Blase Ur, Sean M. Segreti, Saranga Komanduri, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks. USENIX Security Symposium 2016: 175-191 - [i9]Luís T. A. N. Brandão, Nicolas Christin, George Danezis:
A Public Comment on NCCoE's White Paper on Privacy-Enhancing Identity Brokers. CoRR abs/1611.02968 (2016) - [i8]Kyle Soska, Albert Kwon, Nicolas Christin, Srinivas Devadas:
Beaver: A Decentralized Anonymous Marketplace with Secure Reputation. IACR Cryptol. ePrint Arch. 2016: 464 (2016) - 2015
- [j10]Luís T. A. N. Brandão, Nicolas Christin, George Danezis, anonymous:
Toward Mending Two Nation-Scale Brokered Identification Systems. Proc. Priv. Enhancing Technol. 2015(2): 135-155 (2015) - [c68]Jeremiah Blocki, Nicolas Christin, Anupam Datta, Ariel D. Procaccia, Arunesh Sinha:
Audit Games with Multiple Defender Resources. AAAI 2015: 791-797 - [c67]Richard Shay, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Alain Forget, Saranga Komanduri, Michelle L. Mazurek, William Melicher, Sean M. Segreti, Blase Ur:
A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior. CHI 2015: 2903-2912 - [c66]Blase Ur, Fumiko Noma, Jonathan Bees, Sean M. Segreti, Richard Shay, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
"I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab. SOUPS 2015: 123-140 - [c65]Kyle Soska, Nicolas Christin:
Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem. USENIX Security Symposium 2015: 33-48 - [c64]Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Saranga Komanduri, Darya Kurilova, Michelle L. Mazurek, William Melicher, Richard Shay:
Measuring Real-World Accuracies and Biases in Modeling Password Guessability. USENIX Security Symposium 2015: 463-481 - [c63]Richard Clayton, Tyler Moore, Nicolas Christin:
Concentrating Correctly on Cybercrime Concentration. WEIS 2015 - [c62]Benjamin Johnson, Paul Laskowski, Thomas Maillart, John C.-I. Chuang, Nicolas Christin:
Caviar and Yachts: How Your Purchase Data May Come Back to Haunt You. WEIS 2015 - [e2]Michael Brenner, Nicolas Christin, Benjamin Johnson, Kurt Rohloff:
Financial Cryptography and Data Security - FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers. Lecture Notes in Computer Science 8976, Springer 2015, ISBN 978-3-662-48050-2 [contents] - 2014
- [c61]Timothy Vidas, Jiaqi Tan, Jay Nahata, Chaur Lih Tan, Nicolas Christin, Patrick Tague:
A5: Automated Analysis of Adversarial Android Applications. SPSM@CCS 2014: 39-50 - [c60]Timothy Vidas, Nicolas Christin:
Evading android runtime analysis via sandbox detection. AsiaCCS 2014: 447-458 - [c59]Nektarios Leontiadis, Tyler Moore, Nicolas Christin:
A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning. CCS 2014: 930-941 - [c58]Richard Shay, Saranga Komanduri, Adam L. Durity, Phillip (Seyoung) Huh, Michelle L. Mazurek, Sean M. Segreti, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Can long passwords be secure and usable? CHI 2014: 2927-2936 - [c57]Nektarios Leontiadis, Nicolas Christin:
Empirically Measuring WHOIS Misuse. ESORICS (1) 2014: 19-36 - [c56]Alain Forget, Saranga Komanduri, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor, Rahul Telang:
Building the security behavior observatory: an infrastructure for long-term monitoring of client machines. HotSoS 2014: 24 - [c55]Alessandro Oltramari, Noam Ben-Asher, Lorrie Faith Cranor, Lujo Bauer, Nicolas Christin:
General Requirements of a Hybrid-Modeling Framework for Cyber Security. MILCOM 2014: 129-135 - [c54]Kyle Soska, Nicolas Christin:
Automatically Detecting Vulnerable Websites Before They Turn Malicious. USENIX Security Symposium 2014: 625-640 - [e1]Nicolas Christin, Reihaneh Safavi-Naini:
Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8437, Springer 2014, ISBN 978-3-662-45471-8 [contents] - [i7]Jeremiah Blocki, Nicolas Christin, Anupam Datta, Ariel D. Procaccia, Arunesh Sinha:
Audit Games with Multiple Defender Resources. CoRR abs/1409.4503 (2014) - 2013
- [j9]Daniel Votipka, Timothy Vidas, Nicolas Christin:
Passe-Partout: A General Collection Methodology for Android Devices. IEEE Trans. Inf. Forensics Secur. 8(12): 1937-1946 (2013) - [c53]Michelle L. Mazurek, Saranga Komanduri, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Patrick Gage Kelley, Richard Shay, Blase Ur:
Measuring password guessability for an entire university. CCS 2013: 173-186 - [c52]Timothy Vidas, Nicolas Christin:
Sweetening android lemon markets: measuring and combating malware in application marketplaces. CODASPY 2013: 197-208 - [c51]Tyler Moore, Nicolas Christin:
Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk. Financial Cryptography 2013: 25-33 - [c50]Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs. Financial Cryptography Workshops 2013: 34-51 - [c49]Timothy Vidas, Emmanuel Owusu, Shuai Wang, Cheng Zeng, Lorrie Faith Cranor, Nicolas Christin:
QRishing: The Susceptibility of Smartphone Users to QR Code Phishing Attacks. Financial Cryptography Workshops 2013: 52-69 - [c48]Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha:
Adaptive Regret Minimization in Bounded-Memory Games. GameSec 2013: 65-84 - [c47]Jeremiah Blocki, Nicolas Christin, Anupam Datta, Ariel D. Procaccia, Arunesh Sinha:
Audit Games. IJCAI 2013: 41-47 - [c46]Nektarios Leontiadis, Tyler Moore, Nicolas Christin:
Pick your poison: pricing and inventories at unlicensed online pharmacies. EC 2013: 621-638 - [c45]Nicolas Christin:
Traveling the silk road: a measurement analysis of a large anonymous online marketplace. WWW 2013: 213-224 - [i6]Jeremiah Blocki, Nicolas Christin, Anupam Datta, Ariel D. Procaccia, Arunesh Sinha:
Audit Games. CoRR abs/1303.0356 (2013) - 2012
- [j8]Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Julio C. López:
Helping Users Create Better Passwords. login Usenix Mag. 37(6) (2012) - [c44]Benjamin Johnson, John Chuang, Jens Grossklags, Nicolas Christin:
Metrics for Measuring ISP Badness: The Case of Spam - (Short Paper). Financial Cryptography 2012: 89-97 - [c43]Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha:
Audit Mechanisms for Provable Risk Management and Accountable Data Governance. GameSec 2012: 38-59 - [c42]Richard Shay, Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Blase Ur, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Correct horse battery staple: exploring the usability of system-assigned passphrases. SOUPS 2012: 7 - [c41]Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Julio C. López:
Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms. IEEE Symposium on Security and Privacy 2012: 523-537 - [c40]Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation. USENIX Security Symposium 2012: 65-80 - [i5]Nicolas Christin:
Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace. CoRR abs/1207.7139 (2012) - 2011
- [j7]Timothy Vidas, Chengye Zhang, Nicolas Christin:
Toward a general collection methodology for Android devices. Digit. Investig. 8(Supplement): S14-S24 (2011) - [c39]Tyler Moore, Nektarios Leontiadis, Nicolas Christin:
Fashion crimes: trending-term exploitation on the web. CCS 2011: 455-466 - [c38]Eiji Hayashi, Jason I. Hong, Nicolas Christin:
Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes. CHI 2011: 2055-2064 - [c37]Saranga Komanduri, Richard Shay, Patrick Gage Kelley, Michelle L. Mazurek, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman:
Of passwords and people: measuring the effect of password-composition policies. CHI 2011: 2595-2604 - [c36]Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha:
Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection. CSF 2011: 312-327 - [c35]Nicolas Christin, Serge Egelman, Timothy Vidas, Jens Grossklags:
It's All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice. Financial Cryptography 2011: 16-30 - [c34]Erin Kenneally, Angelos Stavrou, John McHugh, Nicolas Christin:
Moving Forward, Building an Ethics Community (Panel Statements). Financial Cryptography Workshops 2011: 178-183 - [c33]Benjamin Johnson, Jens Grossklags, Nicolas Christin, John Chuang:
Nash Equilibria for Weakest Target Security Games with Heterogeneous Agents. GAMENETS 2011: 444-458 - [c32]Nicolas Christin:
Network Security Games: Combining Game Theory, Behavioral Economics, and Network Measurements. GameSec 2011: 4-6 - [c31]Anupam Datta, Jeremiah Blocki, Nicolas Christin, Henry DeYoung, Deepak Garg, Limin Jia, Dilsun Kirli Kaynar, Arunesh Sinha:
Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms. ICISS 2011: 1-27 - [c30]Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha:
Audit Mechanisms for Privacy Protection in Healthcare Environments. HealthSec 2011 - [c29]Nektarios Leontiadis, Tyler Moore, Nicolas Christin:
Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade. USENIX Security Symposium 2011 - [c28]Timothy Vidas, Daniel Votipka, Nicolas Christin:
All Your Droid Are Belong to Us: A Survey of Current Android Attacks. WOOT 2011: 81-90 - [i4]Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha:
Adaptive Regret Minimization in Bounded-Memory Games. CoRR abs/1111.2888 (2011) - 2010
- [c27]