Nicolas Christin
Nicolas Christin
Associate Professor, Carnegie Mellon University
Geverifieerd e-mailadres voor andrew.cmu.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Bitcoin: Economics, Technology and Governance
R Böhme, N Christin, BG Edelman, T Moore
The Journal of Economic Perspectives 29 (2), 213-238, 2015
10082015
Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace
N Christin
Proc. 22nd International Conference on the World Wide Web (WWW'13), 213-223, 2013
6552013
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
P Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, N Christin, ...
Proc. IEEE Security & Privacy (Oakland'12), 2012
4312012
Of passwords and people: measuring the effect of password-composition policies
S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ...
Proceedings of the sigchi conference on human factors in computing systems …, 2011
3972011
Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk
T Moore, N Christin
Financial Cryptography and Data Security, 2013
3752013
Encountering stronger password requirements: user attitudes and behaviors
R Shay, S Komanduri, PG Kelley, PG Leon, ML Mazurek, L Bauer, ...
Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-20, 2010
3472010
Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem
K Soska, N Christin
24th USENIX Security Symposium (USENIX Security 15), 33-48, 2015
3122015
Content availability, pollution and poisoning in file sharing peer-to-peer networks
N Christin, AS Weigend, J Chuang
Proceedings of the 6th ACM conference on Electronic commerce, 68-77, 2005
2932005
How does your password measure up? the effect of strength meters on password creation
B Ur, PG Kelley, S Komanduri, J Lee, M Maass, ML Mazurek, T Passaro, ...
Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security …, 2012
2792012
Secure or insure?: a game-theoretic analysis of information security games
J Grossklags, N Christin, J Chuang
Proceedings of the 17th international conference on World Wide Web, 209-218, 2008
2762008
All Your Droid Are Belong to Us: A Survey of Current Android Attacks
T Vidas, D Votipka, N Christin
WOOT, 81-90, 2011
2142011
Evading Android Runtime Analysis via Sandbox Detection
T Vidas, N Christin
ASIACSS 2014, 2014
2072014
Measuring password guessability for an entire university
ML Mazurek, S Komanduri, T Vidas, L Bauer, N Christin, LF Cranor, ...
Proceedings ACM CCS 2013, 173-186, 2013
2062013
Toward a general collection methodology for Android devices
T Vidas, C Zhang, N Christin
digital investigation 8, S14-S24, 2011
1922011
Curbing Android permission creep
T Vidas, N Christin, L Cranor
Proceedings of W2SP, 2011
1892011
Use your illusion: secure authentication usable anywhere
E Hayashi, N Christin, R Dhamija, A Perrig
Proceedings of the 4th Symposium on Usable Privacy and Security, 35-45, 2008
1692008
Fast, lean, and accurate: Modeling password guessability using neural networks
W Melicher, B Ur, SM Segreti, S Komanduri, L Bauer, N Christin, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 175-191, 2016
1432016
Correct horse battery staple: Exploring the usability of system-assigned passphrases
R Shay, PG Kelley, S Komanduri, ML Mazurek, B Ur, T Vidas, L Bauer, ...
Proceedings of the eighth symposium on usable privacy and security, 1-20, 2012
1412012
Undercover: authentication usable in front of prying eyes
H Sasamoto, N Christin, E Hayashi
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008
1362008
Measuring Real-World Accuracies and Biases in Modeling Password Guessability
B Ur, SM Segreti, L Bauer, N Christin, LF Cranor, S Komanduri, D Kurilova, ...
USENIX Security, 463-481, 2015
1322015
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20