Nicolas Christin
Orcid: 0000-0002-2506-8031Affiliations:
- Carnegie Mellon University, Pittsburgh, USA
According to our database1,
Nicolas Christin
authored at least 138 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Proc. Priv. Enhancing Technol., 2024
Blockchain Economic Denial of Sustainability Attack: Exploiting Latency Optimization in Ethereum Transaction Forwarding.
CoRR, 2024
Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the 17th ACM International Conference on Web Search and Data Mining, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
"It was honestly just gambling": Investigating the Experiences of Teenage Cryptocurrency Users on Reddit.
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Stranger Danger? Investor Behavior and Incentives on Cryptocurrency Copy-Trading Platforms.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
2023
Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the ACM Web Conference 2023, 2023
Assessing Anonymity Techniques Employed in German Court Decisions: A De-Anonymization Experiment.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 5th Conference on Advances in Financial Technologies, 2023
2022
Observations From an Online Security Competition and Its Implications on Crowdsourced Security.
CoRR, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
On recruiting and retaining users for security-sensitive longitudinal measurement panels.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022
Poster: User Sessions on Tor Onion Services: Can Colluding ISPs Deanonymize Them at Scale?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Exploring Usable Security to Improve the Impact of Formal Verification: A Research Agenda.
Proceedings of the Proceedings First Workshop on Applicable Formal Methods, 2021
Proceedings of the WWW '21: The Web Conference 2021, 2021
Proceedings of the WWW '21: The Web Conference 2021, 2021
Proceedings of the WWW '21: The Web Conference 2021, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the Financial Cryptography and Data Security, 2020
Practical Recommendations for Stronger, More Usable Passwords Combining Minimum-strength, Minimum-length, and Blocklist Requirements.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019
A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support Chats.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
2018
ACM Trans. Internet Techn., 2018
Should Credit Card Issuers Reissue Cards in Response to a Data Breach?: Uncertainty and Transparency in Metrics for Data Security Policymaking.
ACM Trans. Internet Techn., 2018
Proc. Priv. Enhancing Technol., 2018
Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018
How to Catch when Proxies Lie: Verifying the Physical Locations of Network Proxies with Active Geolocation.
Proceedings of the Internet Measurement Conference 2018, 2018
"It's not actually that horrible": Exploring Adoption of Two-Factor Authentication at a University.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proc. Priv. Enhancing Technol., 2017
Proceedings of the 2017 USENIX Annual Technical Conference, 2017
Proceedings of the 2017 USENIX Annual Technical Conference, 2017
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13, 2017
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
ACM Trans. Inf. Syst. Secur., 2016
IACR Cryptol. ePrint Arch., 2016
CoRR, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
2015
Proc. Priv. Enhancing Technol., 2015
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015
A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015
2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 2014 IEEE Military Communications Conference, 2014
Building the security behavior observatory: an infrastructure for long-term monitoring of client machines.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
Traveling the silk road: a measurement analysis of a large anonymous online marketplace.
Proceedings of the 22nd International World Wide Web Conference, 2013
Proceedings of the fourteenth ACM Conference on Electronic Commerce, 2013
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs.
Proceedings of the Financial Cryptography and Data Security, 2013
Sweetening android lemon markets: measuring and combating malware in application marketplaces.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms.
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Correct horse battery staple: exploring the usability of system-assigned passphrases.
Proceedings of the Symposium On Usable Privacy and Security, 2012
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012
Proceedings of the Financial Cryptography and Data Security, 2012
2011
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011
Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade.
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011
Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms.
Proceedings of the Information Systems Security - 7th International Conference, 2011
Network Security Games: Combining Game Theory, Behavioral Economics, and Network Measurements.
Proceedings of the Decision and Game Theory for Security - Second International Conference, 2011
Proceedings of the Game Theory for Networks - 2nd International ICST Conference, 2011
Proceedings of the Financial Cryptography and Data Security, 2011
It's All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice.
Proceedings of the Financial Cryptography and Data Security, 2011
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010
Proceedings of the 2010 Workshop on New Security Paradigms, 2010
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010
Proceedings of the Decision and Game Theory for Security, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information.
Proceedings of the Computer Security, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Proceedings of the 8th Annual Workshop on the Economics of Information Security, 2009
Educated guess on graphical authentication schemes: vulnerabilities and countermeasures.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the 7th International Conference on Mobile Systems, 2009
2008
Proceedings of the 17th International Conference on World Wide Web, 2008
Security Investment (Failures) in Five Economic Environments: A Comparison of Homogeneous and Heterogeneous User Agents.
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008
Proceedings of the Proceedings 9th ACM Conference on Electronic Commerce (EC-2008), 2008
Proceedings of the Usability, Psychology, and Security, 2008
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008
2007
Enhancing class-based service architectures with adaptive rate allocation and dropping mechanisms.
IEEE/ACM Trans. Netw., 2007
Proceedings of the 2007 Workshop on Large Scale Attack Defense, 2007
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007
2006
Providing Service Guarantees in High-Speed Switching Systems with Feedback Output Queuing.
IEEE Trans. Parallel Distributed Syst., 2006
Comput. Networks, 2006
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006
2005
Proceedings of the Proceedings 6th ACM Conference on Electronic Commerce (EC-2005), 2005
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005
2004
Proceedings of the Peer-to-Peer Systems III, Third International Workshop, 2004
2003
2002
Comput. Networks, 2002
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002
2001
Proceedings of the Quality of Service, 2001