Obserwuj
Nicolas Christin
Tytuł
Cytowane przez
Cytowane przez
Rok
Bitcoin: Economics, Technology and Governance
R Böhme, N Christin, BG Edelman, T Moore
The Journal of Economic Perspectives 29 (2), 213-238, 2015
23932015
Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace
N Christin
Proc. 22nd International Conference on the World Wide Web (WWW'13), 213-223, 2013
10452013
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
P Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, N Christin, ...
Proc. IEEE Security & Privacy (Oakland'12), 2012
5992012
Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk
T Moore, N Christin
Financial Cryptography and Data Security, 2013
5922013
Of passwords and people: measuring the effect of password-composition policies
S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ...
Proceedings of the sigchi conference on human factors in computing systems …, 2011
5622011
Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem
K Soska, N Christin
24th USENIX Security Symposium (USENIX Security 15), 33-48, 2015
5352015
Encountering stronger password requirements: user attitudes and behaviors
R Shay, S Komanduri, PG Kelley, PG Leon, ML Mazurek, L Bauer, ...
Proceedings of the sixth symposium on usable privacy and security, 1-20, 2010
4732010
How does your password measure up? The effect of strength meters on password creation
B Ur, PG Kelley, S Komanduri, J Lee, M Maass, ML Mazurek, T Passaro, ...
21st USENIX security symposium (USENIX Security 12), 65-80, 2012
4102012
An Empirical Analysis of Traceability in the Monero Blockchain
M Möser, K Soska, E Heilman, K Lee, H Heffan, S Srivastava, K Hogan, ...
Proceedings on Privacy Enhancing Technologies 3, 2018
3352018
Secure or insure?: a game-theoretic analysis of information security games
J Grossklags, N Christin, J Chuang
Proceedings of the 17th international conference on World Wide Web, 209-218, 2008
3332008
Evading Android Runtime Analysis via Sandbox Detection
T Vidas, N Christin
ASIACSS 2014, 2014
3302014
Fast, lean, and accurate: Modeling password guessability using neural networks
W Melicher, B Ur, SM Segreti, S Komanduri, L Bauer, N Christin, ...
25th USENIX Security Symposium (USENIX Security 16), 175-191, 2016
3292016
Content availability, pollution and poisoning in file sharing peer-to-peer networks
N Christin, AS Weigend, J Chuang
Proceedings of the 6th ACM conference on Electronic commerce, 68-77, 2005
3172005
Measuring password guessability for an entire university
ML Mazurek, S Komanduri, T Vidas, L Bauer, N Christin, LF Cranor, ...
Proceedings ACM CCS 2013, 173-186, 2013
3112013
"I added ‘!’ at the end to make it secure”: Observing password creation in the lab
B Ur, F Noma, J Bees, SM Segreti, R Shay, L Bauer, N Christin, LF Cranor
Proc. SOUPS, 2015
3032015
All Your Droid Are Belong to Us: A Survey of Current Android Attacks
T Vidas, D Votipka, N Christin
WOOT, 81-90, 2011
2442011
Curbing Android permission creep
T Vidas, N Christin, L Cranor
Proceedings of W2SP, 2011
2372011
Toward a general collection methodology for Android devices
T Vidas, C Zhang, N Christin
digital investigation 8, S14-S24, 2011
2272011
Do Users’ Perceptions of Password Security Match Reality?
B Ur, J Bees, S Segreti, L Bauer, N Christin, L Cranor, A Deepak
Proc. ACM CHI'16, 3748-3760, 2016
2262016
Measuring Real-World Accuracies and Biases in Modeling Password Guessability
B Ur, SM Segreti, L Bauer, N Christin, LF Cranor, S Komanduri, D Kurilova, ...
USENIX Security, 463-481, 2015
2142015
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20