Nicolas Christin
Nicolas Christin
Associate Professor, Carnegie Mellon University
Dirección de correo verificada de andrew.cmu.edu - Página principal
Título
Citado por
Citado por
Año
Bitcoin: Economics, Technology and Governance
R Böhme, N Christin, BG Edelman, T Moore
The Journal of Economic Perspectives 29 (2), 213-238, 2015
12042015
Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace
N Christin
Proc. 22nd International Conference on the World Wide Web (WWW'13), 213-223, 2013
7312013
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
P Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, N Christin, ...
Proc. IEEE Security & Privacy (Oakland'12), 2012
4602012
Of passwords and people: measuring the effect of password-composition policies
S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ...
Proceedings of the sigchi conference on human factors in computing systems …, 2011
4282011
Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk
T Moore, N Christin
Financial Cryptography and Data Security, 2013
4032013
Encountering stronger password requirements: user attitudes and behaviors
R Shay, S Komanduri, PG Kelley, PG Leon, ML Mazurek, L Bauer, ...
Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-20, 2010
3782010
Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem
K Soska, N Christin
24th USENIX Security Symposium (USENIX Security 15), 33-48, 2015
3462015
How does your password measure up? the effect of strength meters on password creation
B Ur, PG Kelley, S Komanduri, J Lee, M Maass, ML Mazurek, T Passaro, ...
Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security …, 2012
2982012
Content availability, pollution and poisoning in file sharing peer-to-peer networks
N Christin, AS Weigend, J Chuang
Proceedings of the 6th ACM conference on Electronic commerce, 68-77, 2005
2942005
Secure or insure?: a game-theoretic analysis of information security games
J Grossklags, N Christin, J Chuang
Proceedings of the 17th international conference on World Wide Web, 209-218, 2008
2812008
Evading Android Runtime Analysis via Sandbox Detection
T Vidas, N Christin
ASIACSS 2014, 2014
2232014
Measuring password guessability for an entire university
ML Mazurek, S Komanduri, T Vidas, L Bauer, N Christin, LF Cranor, ...
Proceedings ACM CCS 2013, 173-186, 2013
2232013
All Your Droid Are Belong to Us: A Survey of Current Android Attacks
T Vidas, D Votipka, N Christin
WOOT, 81-90, 2011
2192011
Toward a general collection methodology for Android devices
T Vidas, C Zhang, N Christin
digital investigation 8, S14-S24, 2011
1982011
Curbing Android permission creep
T Vidas, N Christin, L Cranor
Proceedings of W2SP, 2011
1942011
Use your illusion: secure authentication usable anywhere
E Hayashi, N Christin, R Dhamija, A Perrig
Proceedings of the 4th Symposium on Usable Privacy and Security, 35-45, 2008
1792008
Fast, lean, and accurate: Modeling password guessability using neural networks
W Melicher, B Ur, SM Segreti, S Komanduri, L Bauer, N Christin, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 175-191, 2016
1652016
"I added ‘!’ at the end to make it secure”: Observing password creation in the lab
B Ur, F Noma, J Bees, SM Segreti, R Shay, L Bauer, N Christin, LF Cranor
Proc. SOUPS, 2015
1562015
Correct horse battery staple: Exploring the usability of system-assigned passphrases
R Shay, PG Kelley, S Komanduri, ML Mazurek, B Ur, T Vidas, L Bauer, ...
Proceedings of the eighth symposium on usable privacy and security, 1-20, 2012
1492012
Undercover: authentication usable in front of prying eyes
H Sasamoto, N Christin, E Hayashi
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008
1482008
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20