Nicolas Christin

According to our database1, Nicolas Christin authored at least 107 papers between 2001 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
Open Market or Ghost Town? The Curious Case of OpenBazaar.
Proceedings of the Financial Cryptography and Data Security, 2020

2019
ICLab: A Global, Longitudinal Internet Censorship Measurement Platform.
CoRR, 2019

Why people (don't) use password managers effectively.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

Adversarial Matching of Dark Net Market Vendor Accounts.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019

A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support Chats.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Revisiting the Risks of Bitcoin Currency Exchange Closure.
ACM Trans. Internet Techn., 2018

Should Credit Card Issuers Reissue Cards in Response to a Data Breach?: Uncertainty and Transparency in Metrics for Data Security Policymaking.
ACM Trans. Internet Techn., 2018

An Empirical Analysis of Traceability in the Monero Blockchain.
PoPETs, 2018

Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets.
Proceedings of the 27th USENIX Security Symposium, 2018

User Behaviors and Attitudes Under Password Expiration Policies.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

How to Catch when Proxies Lie: Verifying the Physical Locations of Network Proxies with Active Geolocation.
Proceedings of the Internet Measurement Conference 2018, 2018

"It's not actually that horrible": Exploring Adoption of Two-Factor Authentication at a University.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

Predicting Impending Exposure to Malicious Content from User Behavior.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Better Passwords through Science (and Neural Networks).
login Usenix Mag., 2017

Topics of Controversy: An Empirical Analysis of Web Censorship Lists.
PoPETs, 2017

Push-Button Verification of File Systems via Crash Refinement.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

Diversify to Survive: Making Passwords Stronger with Adaptive Policies.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Automatic Application Identification from Billions of Files.
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13, 2017

Email typosquatting.
Proceedings of the 2017 Internet Measurement Conference, 2017

Design and Evaluation of a Data-Driven Password Meter.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

Self-Confidence Trumps Knowledge: A Cross-Cultural Study of Security Behavior.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

Let's Go in for a Closer Look: Observing Passwords in Their Natural Habitat.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
Designing Password Policies for Strength and Usability.
ACM Trans. Inf. Syst. Secur., 2016

Beaver: A Decentralized Anonymous Marketplace with Secure Reputation.
IACR Cryptol. ePrint Arch., 2016

A Public Comment on NCCoE's White Paper on Privacy-Enhancing Identity Brokers.
CoRR, 2016

Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks.
Proceedings of the 25th USENIX Security Symposium, 2016

Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Do Users' Perceptions of Password Security Match Reality?
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

Usability and Security of Text Passwords on Mobile Devices.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
Toward Mending Two Nation-Scale Brokered Identification Systems.
PoPETs, 2015

Caviar and Yachts: How Your Purchase Data May Come Back to Haunt You.
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015

Concentrating Correctly on Cybercrime Concentration.
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015

Measuring Real-World Accuracies and Biases in Modeling Password Guessability.
Proceedings of the 24th USENIX Security Symposium, 2015

Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem.
Proceedings of the 24th USENIX Security Symposium, 2015

"I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

Audit Games with Multiple Defender Resources.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
Automatically Detecting Vulnerable Websites Before They Turn Malicious.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Building the security behavior observatory: an infrastructure for long-term monitoring of client machines.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

Empirically Measuring WHOIS Misuse.
Proceedings of the Computer Security - ESORICS 2014, 2014

Can long passwords be secure and usable?
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

A5: Automated Analysis of Adversarial Android Applications.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014

Evading android runtime analysis via sandbox detection.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Passe-Partout: A General Collection Methodology for Android Devices.
IEEE Trans. Inf. Forensics Secur., 2013

Traveling the silk road: a measurement analysis of a large anonymous online marketplace.
Proceedings of the 22nd International World Wide Web Conference, 2013

Pick your poison: pricing and inventories at unlicensed online pharmacies.
Proceedings of the fourteenth ACM Conference on Electronic Commerce, 2013

Audit Games.
Proceedings of the IJCAI 2013, 2013

Adaptive Regret Minimization in Bounded-Memory Games.
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013

QRishing: The Susceptibility of Smartphone Users to QR Code Phishing Attacks.
Proceedings of the Financial Cryptography and Data Security, 2013

Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk.
Proceedings of the Financial Cryptography and Data Security, 2013

The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs.
Proceedings of the Financial Cryptography and Data Security, 2013

Sweetening android lemon markets: measuring and combating malware in application marketplaces.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

Measuring password guessability for an entire university.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Helping Users Create Better Passwords.
login Usenix Mag., 2012

How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Correct horse battery staple: exploring the usability of system-assigned passphrases.
Proceedings of the Symposium On Usable Privacy and Security, 2012

Audit Mechanisms for Provable Risk Management and Accountable Data Governance.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

Metrics for Measuring ISP Badness: The Case of Spam - (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2012

2011
All Your Droid Are Belong to Us: A Survey of Current Android Attacks.
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011

Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade.
Proceedings of the 20th USENIX Security Symposium, 2011

Audit Mechanisms for Privacy Protection in Healthcare Environments.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011

Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms.
Proceedings of the Information Systems Security - 7th International Conference, 2011

Network Security Games: Combining Game Theory, Behavioral Economics, and Network Measurements.
Proceedings of the Decision and Game Theory for Security - Second International Conference, 2011

Nash Equilibria for Weakest Target Security Games with Heterogeneous Agents.
Proceedings of the Game Theory for Networks - 2nd International ICST Conference, 2011

Moving Forward, Building an Ethics Community (Panel Statements).
Proceedings of the Financial Cryptography and Data Security, 2011

It's All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice.
Proceedings of the Financial Cryptography and Data Security, 2011

Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection.
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011

Of passwords and people: measuring the effect of password-composition policies.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

Fashion crimes: trending-term exploitation on the web.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Please Continue to Hold: An Empirical Study on User Tolerance of Security Delays.
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010

Encountering stronger password requirements: user attitudes and behaviors.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010

This is your data on drugs: lessons computer security can learn from the drug war.
Proceedings of the 2010 Workshop on New Security Paradigms, 2010

A Comparative Usability Evaluation of Traditional Password Managers.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

Uncertainty in Interdependent Security Games.
Proceedings of the Decision and Game Theory for Security, 2010

When Information Improves Information Security.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information.
Proceedings of the Computer Security, 2010

Dissecting one click frauds.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
The Price of Uncertainty in Security Games.
Proceedings of the 8th Annual Workshop on the Economics of Information Security, 2009

Educated guess on graphical authentication schemes: vulnerabilities and countermeasures.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

New directions in multisensory authentication.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

mFerio: the design and evaluation of a peer-to-peer mobile payment system.
Proceedings of the 7th International Conference on Mobile Systems, 2009

2008
Secure or insure?: a game-theoretic analysis of information security games.
Proceedings of the 17th International Conference on World Wide Web, 2008

Security Investment (Failures) in Five Economic Environments: A Comparison of Homogeneous and Heterogeneous User Agents.
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008

Use Your Illusion: secure authentication usable anywhere.
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008

Security and insurance management in networks with heterogeneous agents.
Proceedings of the Proceedings 9th ACM Conference on Electronic Commerce (EC-2008), 2008

Predicted and Observed User Behavior in the Weakest-link Security Game.
Proceedings of the Usability, Psychology, and Security, 2008

Countermeasures against Government-Scale Monetary Forgery.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

Undercover: authentication usable in front of prying eyes.
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

2007
Enhancing class-based service architectures with adaptive rate allocation and dropping mechanisms.
IEEE/ACM Trans. Netw., 2007

On the Feasibility of Switching ISPs in Residential Multihoming.
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007

2006
Providing Service Guarantees in High-Speed Switching Systems with Feedback Output Queuing.
IEEE Trans. Parallel Distrib. Syst., 2006

The QoSbox: Quantitative service differentiation in BSD routers.
Comput. Networks, 2006

Taking Advantage of Multihoming with Session Layer Striping.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

2005
Marking algorithms for service differentiation of TCP traffic.
Comput. Commun., 2005

Content availability, pollution and poisoning in file sharing peer-to-peer networks.
Proceedings of the Proceedings 6th ACM Conference on Electronic Commerce (EC-2005), 2005

A cost-based analysis of overlay routing geometries.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

2004
Near Rationality and Competitive Equilibria in Networked Systems
CoRR, 2004

On the Cost of Participating in a Peer-to-Peer Network.
Proceedings of the Peer-to-Peer Systems III, Third International Workshop, 2004

2003
A QoS architecture for quantitative service differentiation.
IEEE Communications Magazine, 2003

2002
Rate allocation and buffer management for differentiated services.
Comput. Networks, 2002

A Quantitative Assured Forwarding Service.
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002

2001
JoBS: Joint Buffer Management and Scheduling for Differentiated Services.
Proceedings of the Quality of Service, 2001


  Loading...