Follow
Nicolas Christin
Title
Cited by
Cited by
Year
Bitcoin: Economics, Technology and Governance
R Böhme, N Christin, BG Edelman, T Moore
The Journal of Economic Perspectives 29 (2), 213-238, 2015
26762015
Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace
N Christin
Proc. 22nd International Conference on the World Wide Web (WWW'13), 213-223, 2013
11012013
Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk
T Moore, N Christin
Financial Cryptography and Data Security, 2013
6242013
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
P Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, N Christin, ...
Proc. IEEE Security & Privacy (Oakland'12), 2012
6192012
Of passwords and people: measuring the effect of password-composition policies
S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ...
Proceedings of the sigchi conference on human factors in computing systems …, 2011
5822011
Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem
K Soska, N Christin
24th USENIX Security Symposium (USENIX Security 15), 33-48, 2015
5782015
Encountering stronger password requirements: user attitudes and behaviors
R Shay, S Komanduri, PG Kelley, PG Leon, ML Mazurek, L Bauer, ...
Proceedings of the sixth symposium on usable privacy and security, 1-20, 2010
4922010
How does your password measure up? The effect of strength meters on password creation
B Ur, PG Kelley, S Komanduri, J Lee, M Maass, ML Mazurek, T Passaro, ...
21st USENIX security symposium (USENIX Security 12), 65-80, 2012
4272012
Fast, lean, and accurate: Modeling password guessability using neural networks
W Melicher, B Ur, SM Segreti, S Komanduri, L Bauer, N Christin, ...
25th USENIX Security Symposium (USENIX Security 16), 175-191, 2016
3632016
An Empirical Analysis of Traceability in the Monero Blockchain
M Möser, K Soska, E Heilman, K Lee, H Heffan, S Srivastava, K Hogan, ...
Proceedings on Privacy Enhancing Technologies 3, 2018
3592018
Evading Android Runtime Analysis via Sandbox Detection
T Vidas, N Christin
ASIACSS 2014, 2014
3392014
Secure or insure?: a game-theoretic analysis of information security games
J Grossklags, N Christin, J Chuang
Proceedings of the 17th international conference on World Wide Web, 209-218, 2008
3382008
Measuring password guessability for an entire university
ML Mazurek, S Komanduri, T Vidas, L Bauer, N Christin, LF Cranor, ...
Proceedings ACM CCS 2013, 173-186, 2013
3302013
"I added ‘!’ at the end to make it secure”: Observing password creation in the lab
B Ur, F Noma, J Bees, SM Segreti, R Shay, L Bauer, N Christin, LF Cranor
Proc. SOUPS, 2015
3242015
Content availability, pollution and poisoning in file sharing peer-to-peer networks
N Christin, AS Weigend, J Chuang
Proceedings of the 6th ACM conference on Electronic commerce, 68-77, 2005
3222005
All Your Droid Are Belong to Us: A Survey of Current Android Attacks
T Vidas, D Votipka, N Christin
WOOT, 81-90, 2011
2452011
Do Users’ Perceptions of Password Security Match Reality?
B Ur, J Bees, S Segreti, L Bauer, N Christin, L Cranor, A Deepak
Proc. ACM CHI'16, 3748-3760, 2016
2422016
Curbing Android permission creep
T Vidas, N Christin, L Cranor
Proceedings of W2SP, 2011
2392011
Toward a general collection methodology for Android devices
T Vidas, C Zhang, N Christin
digital investigation 8, S14-S24, 2011
2352011
Measuring Real-World Accuracies and Biases in Modeling Password Guessability
B Ur, SM Segreti, L Bauer, N Christin, LF Cranor, S Komanduri, D Kurilova, ...
USENIX Security, 463-481, 2015
2272015
The system can't perform the operation now. Try again later.
Articles 1–20