Nicolas Christin
Nicolas Christin
Associate Professor, Carnegie Mellon University
Verified email at andrew.cmu.edu - Homepage
Title
Cited by
Cited by
Year
Bitcoin: Economics, Technology and Governance
R Böhme, N Christin, BG Edelman, T Moore
The Journal of Economic Perspectives 29 (2), 213-238, 2015
12152015
Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace
N Christin
Proc. 22nd International Conference on the World Wide Web (WWW'13), 213-223, 2013
7372013
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
P Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, N Christin, ...
Proc. IEEE Security & Privacy (Oakland'12), 2012
4612012
Of passwords and people: measuring the effect of password-composition policies
S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ...
Proceedings of the sigchi conference on human factors in computing systems …, 2011
4252011
Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk
T Moore, N Christin
Financial Cryptography and Data Security, 2013
4112013
Encountering stronger password requirements: user attitudes and behaviors
R Shay, S Komanduri, PG Kelley, PG Leon, ML Mazurek, L Bauer, ...
Proceedings of the sixth symposium on usable privacy and security, 1-20, 2010
3742010
Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem
K Soska, N Christin
24th USENIX Security Symposium (USENIX Security 15), 33-48, 2015
3402015
How does your password measure up? The effect of strength meters on password creation
B Ur, PG Kelley, S Komanduri, J Lee, M Maass, ML Mazurek, T Passaro, ...
21st {USENIX} Security Symposium ({USENIX} Security 12), 65-80, 2012
3032012
Content availability, pollution and poisoning in file sharing peer-to-peer networks
N Christin, AS Weigend, J Chuang
Proceedings of the 6th ACM conference on Electronic commerce, 68-77, 2005
3002005
Secure or insure?: a game-theoretic analysis of information security games
J Grossklags, N Christin, J Chuang
Proceedings of the 17th international conference on World Wide Web, 209-218, 2008
2882008
Evading Android Runtime Analysis via Sandbox Detection
T Vidas, N Christin
ASIACSS 2014, 2014
2292014
Measuring password guessability for an entire university
ML Mazurek, S Komanduri, T Vidas, L Bauer, N Christin, LF Cranor, ...
Proceedings ACM CCS 2013, 173-186, 2013
2292013
All Your Droid Are Belong to Us: A Survey of Current Android Attacks
T Vidas, D Votipka, N Christin
WOOT, 81-90, 2011
2272011
Curbing Android permission creep
T Vidas, N Christin, L Cranor
Proceedings of W2SP, 2011
1992011
Toward a general collection methodology for Android devices
T Vidas, C Zhang, N Christin
digital investigation 8, S14-S24, 2011
1952011
Use your illusion: secure authentication usable anywhere
E Hayashi, N Christin, R Dhamija, A Perrig
Proceedings of the 4th Symposium on Usable Privacy and Security, 35-45, 2008
1812008
Fast, lean, and accurate: Modeling password guessability using neural networks
W Melicher, B Ur, SM Segreti, S Komanduri, L Bauer, N Christin, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 175-191, 2016
1642016
"I added ‘!’ at the end to make it secure”: Observing password creation in the lab
B Ur, F Noma, J Bees, SM Segreti, R Shay, L Bauer, N Christin, LF Cranor
Proc. SOUPS, 2015
1582015
Correct horse battery staple: Exploring the usability of system-assigned passphrases
R Shay, PG Kelley, S Komanduri, ML Mazurek, B Ur, T Vidas, L Bauer, ...
Proceedings of the eighth symposium on usable privacy and security, 1-20, 2012
1502012
Undercover: authentication usable in front of prying eyes
H Sasamoto, N Christin, E Hayashi
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008
1482008
The system can't perform the operation now. Try again later.
Articles 1–20