Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Nicolas Christin
@inproceedings{DBLP:conf/wsdm/Christin24, author = {Nicolas Christin}, editor = {Luz Angelica Caudillo{-}Mata and Silvio Lattanzi and Andr{\'{e}}s Mu{\~{n}}oz Medina and Leman Akoglu and Aristides Gionis and Sergei Vassilvitskii}, title = {What {I} Learned from Spending a Dozen Years in the Dark Web}, booktitle = {Proceedings of the 17th {ACM} International Conference on Web Search and Data Mining, {WSDM} 2024, Merida, Mexico, March 4-8, 2024}, pages = {2--3}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3616855.3637632}, doi = {10.1145/3616855.3637632}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wsdm/Christin24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aft/KawaiRSZC23, author = {Daisuke Kawai and Bryan R. Routledge and Kyle Soska and Ariel Zetlin{-}Jones and Nicolas Christin}, editor = {Joseph Bonneau and S. Matthew Weinberg}, title = {User Participation in Cryptocurrency Derivative Markets}, booktitle = {5th Conference on Advances in Financial Technologies, {AFT} 2023, October 23-25, 2023, Princeton, NJ, {USA}}, series = {LIPIcs}, volume = {282}, pages = {8:1--8:24}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2023}, url = {https://doi.org/10.4230/LIPIcs.AFT.2023.8}, doi = {10.4230/LIPICS.AFT.2023.8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aft/KawaiRSZC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DeuberKC23, author = {Dominic Deuber and Michael Keuchen and Nicolas Christin}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Assessing Anonymity Techniques Employed in German Court Decisions: {A} De-Anonymization Experiment}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {5199--5216}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/deuber}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/DeuberKC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/TsuchiyaCMC23, author = {Taro Tsuchiya and Alejandro Cuevas and Thomas Magelinski and Nicolas Christin}, editor = {Ying Ding and Jie Tang and Juan F. Sequeda and Lora Aroyo and Carlos Castillo and Geert{-}Jan Houben}, title = {Misbehavior and Account Suspension in an Online Financial Communication Platform}, booktitle = {Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin, TX, USA, 30 April 2023 - 4 May 2023}, pages = {2686--2697}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3543507.3583385}, doi = {10.1145/3543507.3583385}, timestamp = {Mon, 28 Aug 2023 21:17:10 +0200}, biburl = {https://dblp.org/rec/conf/www/TsuchiyaCMC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/KawaiCRSZC23, author = {Daisuke Kawai and Alejandro Cuevas and Bryan R. Routledge and Kyle Soska and Ariel Zetlin{-}Jones and Nicolas Christin}, editor = {Ying Ding and Jie Tang and Juan F. Sequeda and Lora Aroyo and Carlos Castillo and Geert{-}Jan Houben}, title = {Is your digital neighbor a reliable investment advisor?}, booktitle = {Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin, TX, USA, 30 April 2023 - 4 May 2023}, pages = {3581--3591}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3543507.3583502}, doi = {10.1145/3543507.3583502}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/KawaiCRSZC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-18545, author = {Anton Wahrst{\"{a}}tter and Jens Ernstberger and Aviv Yaish and Liyi Zhou and Kaihua Qin and Taro Tsuchiya and Sebastian Steinhorst and Davor Svetinovic and Nicolas Christin and Mikolaj Barczentewicz and Arthur Gervais}, title = {Blockchain Censorship}, journal = {CoRR}, volume = {abs/2305.18545}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.18545}, doi = {10.48550/ARXIV.2305.18545}, eprinttype = {arXiv}, eprint = {2305.18545}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-18545.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Christin22, author = {Nicolas Christin}, title = {The effectiveness of security measures: technical perspective}, journal = {Commun. {ACM}}, volume = {65}, number = {9}, pages = {92}, year = {2022}, url = {https://doi.org/10.1145/3547132}, doi = {10.1145/3547132}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Christin22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tweb/CrichtonCC22, author = {Kyle Crichton and Nicolas Christin and Lorrie Faith Cranor}, title = {How Do Home Computer Users Browse the Web?}, journal = {{ACM} Trans. Web}, volume = {16}, number = {1}, pages = {3:1--3:27}, year = {2022}, url = {https://doi.org/10.1145/3473343}, doi = {10.1145/3473343}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tweb/CrichtonCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LopesMDBPVFC022, author = {Daniela Lopes and Pedro Medeiros and Jin{-}Dong Dong and Diogo Barradas and Bernardo Portela and Jo{\~{a}}o Vinagre and Bernardo Ferreira and Nicolas Christin and Nuno Santos}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Poster: User Sessions on Tor Onion Services: Can Colluding ISPs Deanonymize Them at Scale?}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {3399--3401}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3563520}, doi = {10.1145/3548606.3563520}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LopesMDBPVFC022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/0001CSDPKC22, author = {Akira Yamada and Kyle Crichton and Yukiko Sawaya and Jin{-}Dong Dong and Sarah Pearman and Ayumu Kubota and Nicolas Christin}, editor = {Sonia Chiasson and Apu Kapadia}, title = {On recruiting and retaining users for security-sensitive longitudinal measurement panels}, booktitle = {Eighteenth Symposium on Usable Privacy and Security, {SOUPS} 2022, Boston, MA, USA, August 7-9, 2022}, pages = {347--366}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/soups2022/presentation/yamada}, timestamp = {Wed, 26 Oct 2022 12:44:43 +0200}, biburl = {https://dblp.org/rec/conf/soups/0001CSDPKC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CuevasMSCW22, author = {Alejandro Cuevas and Fieke Miedema and Kyle Soska and Nicolas Christin and Rolf van Wegberg}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Measurement by Proxy: On the Accuracy of Online Marketplace Measurements}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {2153--2170}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/cuevas}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/CuevasMSCW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-12601, author = {Alejandro Cuevas and Emma Hogan and Hanan Hibshi and Nicolas Christin}, title = {Observations From an Online Security Competition and Its Implications on Crowdsourced Security}, journal = {CoRR}, volume = {abs/2204.12601}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.12601}, doi = {10.48550/ARXIV.2204.12601}, eprinttype = {arXiv}, eprint = {2204.12601}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-12601.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/VermeerWCNCEFGM21, author = {Mathew Vermeer and Jonathan West and Alejandro Cuevas and Shuonan Niu and Nicolas Christin and Michel van Eeten and Tobias Fiebig and Carlos Ga{\~{n}}{\'{a}}n and Tyler Moore}, title = {SoK: {A} Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2021, Vienna, Austria, September 6-10, 2021}, pages = {440--456}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EuroSP51992.2021.00037}, doi = {10.1109/EUROSP51992.2021.00037}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/VermeerWCNCEFGM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhuGBWCFB21, author = {Wanzheng Zhu and Hongyu Gong and Rohan Bansal and Zachary Weinberg and Nicolas Christin and Giulia Fanti and Suma Bhat}, title = {Self-Supervised Euphemism Detection and Identification for Content Moderation}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {229--246}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00075}, doi = {10.1109/SP40001.2021.00075}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/ZhuGBWCFB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/SoskaDKZRC21, author = {Kyle Soska and Jin{-}Dong Dong and Alex Khodaverdian and Ariel Zetlin{-}Jones and Bryan R. Routledge and Nicolas Christin}, editor = {Jure Leskovec and Marko Grobelnik and Marc Najork and Jie Tang and Leila Zia}, title = {Towards Understanding Cryptocurrency Derivatives: {A} Case Study of BitMEX}, booktitle = {{WWW} '21: The Web Conference 2021, Virtual Event / Ljubljana, Slovenia, April 19-23, 2021}, pages = {45--57}, publisher = {{ACM} / {IW3C2}}, year = {2021}, url = {https://doi.org/10.1145/3442381.3450059}, doi = {10.1145/3442381.3450059}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/SoskaDKZRC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/WeinbergBC21, author = {Zachary Weinberg and Diogo Barradas and Nicolas Christin}, editor = {Jure Leskovec and Marko Grobelnik and Marc Najork and Jie Tang and Leila Zia}, title = {Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China}, booktitle = {{WWW} '21: The Web Conference 2021, Virtual Event / Ljubljana, Slovenia, April 19-23, 2021}, pages = {472--483}, publisher = {{ACM} / {IW3C2}}, year = {2021}, url = {https://doi.org/10.1145/3442381.3450076}, doi = {10.1145/3442381.3450076}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/WeinbergBC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/SzurdiLKNC21, author = {Janos Szurdi and Meng Luo and Brian Kondracki and Nick Nikiforakis and Nicolas Christin}, editor = {Jure Leskovec and Marko Grobelnik and Marc Najork and Jie Tang and Leila Zia}, title = {Where are you taking me?Understanding Abusive Traffic Distribution Systems}, booktitle = {{WWW} '21: The Web Conference 2021, Virtual Event / Ljubljana, Slovenia, April 19-23, 2021}, pages = {3613--3624}, publisher = {{ACM} / {IW3C2}}, year = {2021}, url = {https://doi.org/10.1145/3442381.3450071}, doi = {10.1145/3442381.3450071}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/SzurdiLKNC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/corr/abs-2111-08209, author = {Carolina Carreira and Jo{\~{a}}o F. Ferreira and Alexandra Mendes and Nicolas Christin}, editor = {Mario Gleirscher and Jaco van de Pol and Jim Woodcock}, title = {Exploring Usable Security to Improve the Impact of Formal Verification: {A} Research Agenda}, booktitle = {Proceedings First Workshop on Applicable Formal Methods, AppFM@FM 2021, virtual, 23rd November 2021}, series = {{EPTCS}}, volume = {349}, pages = {77--84}, year = {2021}, url = {https://doi.org/10.4204/EPTCS.349.6}, doi = {10.4204/EPTCS.349.6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-08209.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-16808, author = {Wanzheng Zhu and Hongyu Gong and Rohan Bansal and Zachary Weinberg and Nicolas Christin and Giulia Fanti and Suma Bhat}, title = {Self-Supervised Euphemism Detection and Identification for Content Moderation}, journal = {CoRR}, volume = {abs/2103.16808}, year = {2021}, url = {https://arxiv.org/abs/2103.16808}, eprinttype = {arXiv}, eprint = {2103.16808}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-16808.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TanBCC20, author = {Joshua Tan and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Practical Recommendations for Stronger, More Usable Passwords Combining Minimum-strength, Minimum-length, and Blocklist Requirements}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {1407--1426}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417882}, doi = {10.1145/3372297.3417882}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TanBCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ArpsC20, author = {James E. Arps and Nicolas Christin}, editor = {Joseph Bonneau and Nadia Heninger}, title = {Open Market or Ghost Town? The Curious Case of OpenBazaar}, booktitle = {Financial Cryptography and Data Security - 24th International Conference, {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12059}, pages = {561--577}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-51280-4\_30}, doi = {10.1007/978-3-030-51280-4\_30}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/ArpsC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/NiakiCWHRCG20, author = {Arian Akhavan Niaki and Shinyoung Cho and Zachary Weinberg and Nguyen Phong Hoang and Abbas Razaghpanah and Nicolas Christin and Phillipa Gill}, title = {ICLab: {A} Global, Longitudinal Internet Censorship Measurement Platform}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {135--151}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00014}, doi = {10.1109/SP40000.2020.00014}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/NiakiCWHRCG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/SharifRD0KBC19, author = {Mahmood Sharif and Kevin A. Roundy and Matteo Dell'Amico and Christopher Gates and Daniel Kats and Lujo Bauer and Nicolas Christin}, editor = {Stephen A. Brewster and Geraldine Fitzpatrick and Anna L. Cox and Vassilis Kostakos}, title = {A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support Chats}, booktitle = {Proceedings of the 2019 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2019, Glasgow, Scotland, UK, May 04-09, 2019}, pages = {78}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3290605.3300308}, doi = {10.1145/3290605.3300308}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/SharifRD0KBC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kdd/TaiSC19, author = {Xiao Hui Tai and Kyle Soska and Nicolas Christin}, editor = {Ankur Teredesai and Vipin Kumar and Ying Li and R{\'{o}}mer Rosales and Evimaria Terzi and George Karypis}, title = {Adversarial Matching of Dark Net Market Vendor Accounts}, booktitle = {Proceedings of the 25th {ACM} {SIGKDD} International Conference on Knowledge Discovery {\&} Data Mining, {KDD} 2019, Anchorage, AK, USA, August 4-8, 2019}, pages = {1871--1880}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3292500.3330763}, doi = {10.1145/3292500.3330763}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kdd/TaiSC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/ZhangPBC19, author = {Shikun Zhang and Sarah Pearman and Lujo Bauer and Nicolas Christin}, editor = {Heather Richter Lipford}, title = {Why people (don't) use password managers effectively}, booktitle = {Fifteenth Symposium on Usable Privacy and Security, {SOUPS} 2019, Santa Clara, CA, USA, August 11-13, 2019}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/soups2019/presentation/pearman}, timestamp = {Mon, 01 Feb 2021 08:41:56 +0100}, biburl = {https://dblp.org/rec/conf/soups/ZhangPBC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-04245, author = {Arian Akhavan Niaki and Shinyoung Cho and Zachary Weinberg and Nguyen Phong Hoang and Abbas Razaghpanah and Nicolas Christin and Phillipa Gill}, title = {ICLab: {A} Global, Longitudinal Internet Censorship Measurement Platform}, journal = {CoRR}, volume = {abs/1907.04245}, year = {2019}, url = {http://arxiv.org/abs/1907.04245}, eprinttype = {arXiv}, eprint = {1907.04245}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-04245.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/MoserSHLHSHHMNC18, author = {Malte M{\"{o}}ser and Kyle Soska and Ethan Heilman and Kevin Lee and Henry Heffan and Shashvat Srivastava and Kyle Hogan and Jason Hennessey and Andrew Miller and Arvind Narayanan and Nicolas Christin}, title = {An Empirical Analysis of Traceability in the Monero Blockchain}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2018}, number = {3}, pages = {143--163}, year = {2018}, url = {https://doi.org/10.1515/popets-2018-0025}, doi = {10.1515/POPETS-2018-0025}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/MoserSHLHSHHMNC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/MooreCS18, author = {Tyler Moore and Nicolas Christin and Janos Szurdi}, title = {Revisiting the Risks of Bitcoin Currency Exchange Closure}, journal = {{ACM} Trans. Internet Techn.}, volume = {18}, number = {4}, pages = {50:1--50:18}, year = {2018}, url = {https://doi.org/10.1145/3155808}, doi = {10.1145/3155808}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toit/MooreCS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/GravesAC18, author = {James T. Graves and Alessandro Acquisti and Nicolas Christin}, title = {Should Credit Card Issuers Reissue Cards in Response to a Data Breach?: Uncertainty and Transparency in Metrics for Data Security Policymaking}, journal = {{ACM} Trans. Internet Techn.}, volume = {18}, number = {4}, pages = {54:1--54:19}, year = {2018}, url = {https://doi.org/10.1145/3122983}, doi = {10.1145/3122983}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toit/GravesAC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SharifUCKY18, author = {Mahmood Sharif and Jumpei Urakawa and Nicolas Christin and Ayumu Kubota and Akira Yamada}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Predicting Impending Exposure to Malicious Content from User Behavior}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {1487--1501}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243779}, doi = {10.1145/3243734.3243779}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SharifUCKY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/ColnagoDOSBCC18, author = {Jessica Colnago and Summer Devlin and Maggie Oates and Chelse Swoopes and Lujo Bauer and Lorrie Faith Cranor and Nicolas Christin}, editor = {Regan L. Mandryk and Mark Hancock and Mark Perry and Anna L. Cox}, title = {"It's not actually that horrible": Exploring Adoption of Two-Factor Authentication at a University}, booktitle = {Proceedings of the 2018 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2018, Montreal, QC, Canada, April 21-26, 2018}, pages = {456}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3173574.3174030}, doi = {10.1145/3173574.3174030}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/ColnagoDOSBCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/WeinbergCCSG18, author = {Zachary Weinberg and Shinyoung Cho and Nicolas Christin and Vyas Sekar and Phillipa Gill}, title = {How to Catch when Proxies Lie: Verifying the Physical Locations of Network Proxies with Active Geolocation}, booktitle = {Proceedings of the Internet Measurement Conference 2018, {IMC} 2018, Boston, MA, USA, October 31 - November 02, 2018}, pages = {203--217}, publisher = {{ACM}}, year = {2018}, url = {https://dl.acm.org/citation.cfm?id=3278551}, timestamp = {Fri, 25 Oct 2019 09:51:49 +0200}, biburl = {https://dblp.org/rec/conf/imc/WeinbergCCSG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/HabibNDOSBCC18, author = {Hana Habib and Pardis Emami Naeini and Summer Devlin and Maggie Oates and Chelse Swoopes and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, editor = {Mary Ellen Zurko and Heather Richter Lipford}, title = {User Behaviors and Attitudes Under Password Expiration Policies}, booktitle = {Fourteenth Symposium on Usable Privacy and Security, {SOUPS} 2018, Baltimore, MD, USA, August 12-14, 2018}, pages = {13--30}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/soups2018/presentation/habib-password}, timestamp = {Mon, 01 Feb 2021 08:41:57 +0100}, biburl = {https://dblp.org/rec/conf/soups/HabibNDOSBCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/HabibCGPTACC18, author = {Hana Habib and Jessica Colnago and Vidya Gopalakrishnan and Sarah Pearman and Jeremy Thomas and Alessandro Acquisti and Nicolas Christin and Lorrie Faith Cranor}, editor = {Mary Ellen Zurko and Heather Richter Lipford}, title = {Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing}, booktitle = {Fourteenth Symposium on Usable Privacy and Security, {SOUPS} 2018, Baltimore, MD, USA, August 12-14, 2018}, pages = {159--175}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/soups2018/presentation/habib-prying}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/HabibCGPTACC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WegbergTSAGKCE18, author = {Rolf van Wegberg and Samaneh Tajalizadehkhoob and Kyle Soska and Ugur Akyazi and Carlos Hernandez Ga{\~{n}}{\'{a}}n and Bram Klievink and Nicolas Christin and Michel van Eeten}, editor = {William Enck and Adrienne Porter Felt}, title = {Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {1009--1026}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/van-wegberg}, timestamp = {Mon, 01 Feb 2021 08:43:20 +0100}, biburl = {https://dblp.org/rec/conf/uss/WegbergTSAGKCE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/WeinbergSSC17, author = {Zachary Weinberg and Mahmood Sharif and Janos Szurdi and Nicolas Christin}, title = {Topics of Controversy: An Empirical Analysis of Web Censorship Lists}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2017}, number = {1}, pages = {42--61}, year = {2017}, url = {https://doi.org/10.1515/popets-2017-0004}, doi = {10.1515/POPETS-2017-0004}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/WeinbergSSC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/MelicherUSBCC17, author = {William Melicher and Blase Ur and Sean M. Segreti and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, title = {Better Passwords through Science (and Neural Networks)}, journal = {login Usenix Mag.}, volume = {42}, number = {4}, year = {2017}, url = {https://www.usenix.org/publications/login/winter2017/melicher}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/MelicherUSBCC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PearmanTNHBCCEF17, author = {Sarah Pearman and Jeremy Thomas and Pardis Emami Naeini and Hana Habib and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor and Serge Egelman and Alain Forget}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Let's Go in for a Closer Look: Observing Passwords in Their Natural Habitat}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {295--310}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133973}, doi = {10.1145/3133956.3133973}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/PearmanTNHBCCEF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/SawayaSCKNY17, author = {Yukiko Sawaya and Mahmood Sharif and Nicolas Christin and Ayumu Kubota and Akihiro Nakarai and Akira Yamada}, editor = {Gloria Mark and Susan R. Fussell and Cliff Lampe and m. c. schraefel and Juan Pablo Hourcade and Caroline Appert and Daniel Wigdor}, title = {Self-Confidence Trumps Knowledge: {A} Cross-Cultural Study of Security Behavior}, booktitle = {Proceedings of the 2017 {CHI} Conference on Human Factors in Computing Systems, Denver, CO, USA, May 06-11, 2017}, pages = {2202--2214}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3025453.3025926}, doi = {10.1145/3025453.3025926}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/SawayaSCKNY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/UrAABCCCDNHJM17, author = {Blase Ur and Felicia Alfieri and Maung Aung and Lujo Bauer and Nicolas Christin and Jessica Colnago and Lorrie Faith Cranor and Henry Dixon and Pardis Emami Naeini and Hana Habib and Noah Johnson and William Melicher}, editor = {Gloria Mark and Susan R. Fussell and Cliff Lampe and m. c. schraefel and Juan Pablo Hourcade and Caroline Appert and Daniel Wigdor}, title = {Design and Evaluation of a Data-Driven Password Meter}, booktitle = {Proceedings of the 2017 {CHI} Conference on Human Factors in Computing Systems, Denver, CO, USA, May 06-11, 2017}, pages = {3775--3786}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3025453.3026050}, doi = {10.1145/3025453.3026050}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/UrAABCCCDNHJM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/SzurdiC17, author = {Janos Szurdi and Nicolas Christin}, editor = {Steve Uhlig and Olaf Maennel}, title = {Email typosquatting}, booktitle = {Proceedings of the 2017 Internet Measurement Conference, {IMC} 2017, London, United Kingdom, November 1-3, 2017}, pages = {419--431}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3131365.3131399}, doi = {10.1145/3131365.3131399}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/SzurdiC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kdd/SoskaGRC17, author = {Kyle Soska and Christopher S. Gates and Kevin A. Roundy and Nicolas Christin}, title = {Automatic Application Identification from Billions of Files}, booktitle = {Proceedings of the 23rd {ACM} {SIGKDD} International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13 - 17, 2017}, pages = {2021--2030}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3097983.3098196}, doi = {10.1145/3097983.3098196}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kdd/SoskaGRC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/SegretiMKMSUBCC17, author = {Sean M. Segreti and William Melicher and Saranga Komanduri and Darya Melicher and Richard Shay and Blase Ur and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor and Michelle L. Mazurek}, title = {Diversify to Survive: Making Passwords Stronger with Adaptive Policies}, booktitle = {Thirteenth Symposium on Usable Privacy and Security, {SOUPS} 2017, Santa Clara, CA, USA, July 12-14, 2017}, pages = {1--12}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/soups2017/technical-sessions/presentation/segreti}, timestamp = {Wed, 19 Jul 2017 17:13:43 +0200}, biburl = {https://dblp.org/rec/conf/soups/SegretiMKMSUBCC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/MelicherUKBCC17, author = {William Melicher and Blase Ur and Saranga Komanduri and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, editor = {Dilma Da Silva and Bryan Ford}, title = {Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks}, booktitle = {2017 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2017, Santa Clara, CA, USA, July 12-14, 2017}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/atc17/technical-sessions/presentation/melicher}, timestamp = {Mon, 01 Feb 2021 08:43:34 +0100}, biburl = {https://dblp.org/rec/conf/usenix/MelicherUKBCC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/Sigurbjarnarson17, author = {Helgi Sigurbjarnarson and James Bornholt and Nicolas Christin and Lorrie Faith Cranor}, editor = {Dilma Da Silva and Bryan Ford}, title = {Push-Button Verification of File Systems via Crash Refinement}, booktitle = {2017 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2017, Santa Clara, CA, USA, July 12-14, 2017}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/atc17/technical-sessions/presentation/sigurbjarnarson}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/usenix/Sigurbjarnarson17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ShayKDHMSUBCC16, author = {Richard Shay and Saranga Komanduri and Adam L. Durity and Phillip (Seyoung) Huh and Michelle L. Mazurek and Sean M. Segreti and Blase Ur and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, title = {Designing Password Policies for Strength and Usability}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {18}, number = {4}, pages = {13:1--13:34}, year = {2016}, url = {https://doi.org/10.1145/2891411}, doi = {10.1145/2891411}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ShayKDHMSUBCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/MelicherKSKSUBC16, author = {William Melicher and Darya Kurilova and Sean M. Segreti and Pranshu Kalvani and Richard Shay and Blase Ur and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor and Michelle L. Mazurek}, editor = {Jofish Kaye and Allison Druin and Cliff Lampe and Dan Morris and Juan Pablo Hourcade}, title = {Usability and Security of Text Passwords on Mobile Devices}, booktitle = {Proceedings of the 2016 {CHI} Conference on Human Factors in Computing Systems, San Jose, CA, USA, May 7-12, 2016}, pages = {527--539}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2858036.2858384}, doi = {10.1145/2858036.2858384}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/MelicherKSKSUBC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/UrBSBCC16, author = {Blase Ur and Jonathan Bees and Sean M. Segreti and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, editor = {Jofish Kaye and Allison Druin and Cliff Lampe and Dan Morris and Juan Pablo Hourcade}, title = {Do Users' Perceptions of Password Security Match Reality?}, booktitle = {Proceedings of the 2016 {CHI} Conference on Human Factors in Computing Systems, San Jose, CA, USA, May 7-12, 2016}, pages = {3748--3760}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2858036.2858546}, doi = {10.1145/2858036.2858546}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/UrBSBCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/ForgetPTACCEHT16, author = {Alain Forget and Sarah Pearman and Jeremy Thomas and Alessandro Acquisti and Nicolas Christin and Lorrie Faith Cranor and Serge Egelman and Marian Harbach and Rahul Telang}, title = {Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes}, booktitle = {Twelfth Symposium on Usable Privacy and Security, {SOUPS} 2016, Denver, CO, USA, June 22-24, 2016}, pages = {97--111}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/soups2016/technical-sessions/presentation/forget}, timestamp = {Thu, 04 Aug 2016 15:59:03 +0200}, biburl = {https://dblp.org/rec/conf/soups/ForgetPTACCEHT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MelicherUSKBCC16, author = {William Melicher and Blase Ur and Sean M. Segreti and Saranga Komanduri and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, editor = {Thorsten Holz and Stefan Savage}, title = {Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {175--191}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/melicher}, timestamp = {Mon, 01 Feb 2021 08:43:18 +0100}, biburl = {https://dblp.org/rec/conf/uss/MelicherUSKBCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BrandaoCD16, author = {Lu{\'{\i}}s T. A. N. Brand{\~{a}}o and Nicolas Christin and George Danezis}, title = {A Public Comment on NCCoE's White Paper on Privacy-Enhancing Identity Brokers}, journal = {CoRR}, volume = {abs/1611.02968}, year = {2016}, url = {http://arxiv.org/abs/1611.02968}, eprinttype = {arXiv}, eprint = {1611.02968}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BrandaoCD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SoskaKCD16, author = {Kyle Soska and Albert Kwon and Nicolas Christin and Srinivas Devadas}, title = {Beaver: {A} Decentralized Anonymous Marketplace with Secure Reputation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {464}, year = {2016}, url = {http://eprint.iacr.org/2016/464}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SoskaKCD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/BrandaoCDa15, author = {Lu{\'{\i}}s T. A. N. Brand{\~{a}}o and Nicolas Christin and George Danezis and anonymous}, title = {Toward Mending Two Nation-Scale Brokered Identification Systems}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2015}, number = {2}, pages = {135--155}, year = {2015}, url = {https://doi.org/10.1515/popets-2015-0022}, doi = {10.1515/POPETS-2015-0022}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/BrandaoCDa15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/BlockiCDPS15, author = {Jeremiah Blocki and Nicolas Christin and Anupam Datta and Ariel D. Procaccia and Arunesh Sinha}, editor = {Blai Bonet and Sven Koenig}, title = {Audit Games with Multiple Defender Resources}, booktitle = {Proceedings of the Twenty-Ninth {AAAI} Conference on Artificial Intelligence, January 25-30, 2015, Austin, Texas, {USA}}, pages = {791--797}, publisher = {{AAAI} Press}, year = {2015}, url = {https://doi.org/10.1609/aaai.v29i1.9317}, doi = {10.1609/AAAI.V29I1.9317}, timestamp = {Mon, 18 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/BlockiCDPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/ShayBCCFKMMSU15, author = {Richard Shay and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor and Alain Forget and Saranga Komanduri and Michelle L. Mazurek and William Melicher and Sean M. Segreti and Blase Ur}, editor = {Bo Begole and Jinwoo Kim and Kori Inkpen and Woontack Woo}, title = {A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior}, booktitle = {Proceedings of the 33rd Annual {ACM} Conference on Human Factors in Computing Systems, {CHI} 2015, Seoul, Republic of Korea, April 18-23, 2015}, pages = {2903--2912}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2702123.2702586}, doi = {10.1145/2702123.2702586}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/ShayBCCFKMMSU15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/UrNBSSBCC15, author = {Blase Ur and Fumiko Noma and Jonathan Bees and Sean M. Segreti and Richard Shay and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, editor = {Lorrie Faith Cranor and Robert Biddle and Sunny Consolvo}, title = {"I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab}, booktitle = {Eleventh Symposium On Usable Privacy and Security, {SOUPS} 2015, Ottawa, Canada, July 22-24, 2015}, pages = {123--140}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/soups2015/proceedings/presentation/ur}, timestamp = {Wed, 05 Apr 2017 12:53:50 +0200}, biburl = {https://dblp.org/rec/conf/soups/UrNBSSBCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SoskaC15, author = {Kyle Soska and Nicolas Christin}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {33--48}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/soska}, timestamp = {Mon, 01 Feb 2021 08:42:57 +0100}, biburl = {https://dblp.org/rec/conf/uss/SoskaC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/UrSBCCKKMMS15, author = {Blase Ur and Sean M. Segreti and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor and Saranga Komanduri and Darya Kurilova and Michelle L. Mazurek and William Melicher and Richard Shay}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Measuring Real-World Accuracies and Biases in Modeling Password Guessability}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {463--481}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/ur}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/UrSBCCKKMMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/ClaytonMC15, author = {Richard Clayton and Tyler Moore and Nicolas Christin}, title = {Concentrating Correctly on Cybercrime Concentration}, booktitle = {14th Annual Workshop on the Economics of Information Security, {WEIS} 2015, Delft, The Netherlands, 22-23 June, 2015}, year = {2015}, url = {http://www.econinfosec.org/archive/weis2015/papers/WEIS\_2015\_clayton.pdf}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/weis/ClaytonMC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/JohnsonLMCC15, author = {Benjamin Johnson and Paul Laskowski and Thomas Maillart and John C.{-}I. Chuang and Nicolas Christin}, title = {Caviar and Yachts: How Your Purchase Data May Come Back to Haunt You}, booktitle = {14th Annual Workshop on the Economics of Information Security, {WEIS} 2015, Delft, The Netherlands, 22-23 June, 2015}, year = {2015}, url = {http://www.econinfosec.org/archive/weis2015/papers/WEIS\_2015\_johnson.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/weis/JohnsonLMCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2015w, editor = {Michael Brenner and Nicolas Christin and Benjamin Johnson and Kurt Rohloff}, title = {Financial Cryptography and Data Security - {FC} 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8976}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48051-9}, doi = {10.1007/978-3-662-48051-9}, isbn = {978-3-662-48050-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2015w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VidasTNTCT14, author = {Timothy Vidas and Jiaqi Tan and Jay Nahata and Chaur Lih Tan and Nicolas Christin and Patrick Tague}, editor = {Cliff Wang and Dijiang Huang and Kapil Singh and Zhenkai Liang}, title = {{A5:} Automated Analysis of Adversarial Android Applications}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Privacy in Smartphones {\&} Mobile Devices, SPSM@CCS 2014, Scottsdale, AZ, USA, November 03 - 07, 2014}, pages = {39--50}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666620.2666630}, doi = {10.1145/2666620.2666630}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/VidasTNTCT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VidasC14, author = {Timothy Vidas and Nicolas Christin}, editor = {Shiho Moriai and Trent Jaeger and Kouichi Sakurai}, title = {Evading android runtime analysis via sandbox detection}, booktitle = {9th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014}, pages = {447--458}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2590296.2590325}, doi = {10.1145/2590296.2590325}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/VidasC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LeontiadisMC14, author = {Nektarios Leontiadis and Tyler Moore and Nicolas Christin}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {930--941}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660332}, doi = {10.1145/2660267.2660332}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LeontiadisMC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/ShayKDHMSUBCC14, author = {Richard Shay and Saranga Komanduri and Adam L. Durity and Phillip (Seyoung) Huh and Michelle L. Mazurek and Sean M. Segreti and Blase Ur and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, editor = {Matt Jones and Philippe A. Palanque and Albrecht Schmidt and Tovi Grossman}, title = {Can long passwords be secure and usable?}, booktitle = {{CHI} Conference on Human Factors in Computing Systems, CHI'14, Toronto, ON, Canada - April 26 - May 01, 2014}, pages = {2927--2936}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2556288.2557377}, doi = {10.1145/2556288.2557377}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/ShayKDHMSUBCC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LeontiadisC14, author = {Nektarios Leontiadis and Nicolas Christin}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Empirically Measuring {WHOIS} Misuse}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8712}, pages = {19--36}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11203-9\_2}, doi = {10.1007/978-3-319-11203-9\_2}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/LeontiadisC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/ForgetKACCT14, author = {Alain Forget and Saranga Komanduri and Alessandro Acquisti and Nicolas Christin and Lorrie Faith Cranor and Rahul Telang}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Building the security behavior observatory: an infrastructure for long-term monitoring of client machines}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {24}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600200}, doi = {10.1145/2600176.2600200}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/ForgetKACCT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/OltramariBCBC14, author = {Alessandro Oltramari and Noam Ben{-}Asher and Lorrie Faith Cranor and Lujo Bauer and Nicolas Christin}, title = {General Requirements of a Hybrid-Modeling Framework for Cyber Security}, booktitle = {2014 {IEEE} Military Communications Conference, {MILCOM} 2014, Baltimore, MD, USA, October 6-8, 2014}, pages = {129--135}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/MILCOM.2014.28}, doi = {10.1109/MILCOM.2014.28}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/milcom/OltramariBCBC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SoskaC14, author = {Kyle Soska and Nicolas Christin}, editor = {Kevin Fu and Jaeyeon Jung}, title = {Automatically Detecting Vulnerable Websites Before They Turn Malicious}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, pages = {625--640}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/soska}, timestamp = {Mon, 01 Feb 2021 08:43:04 +0100}, biburl = {https://dblp.org/rec/conf/uss/SoskaC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2014, editor = {Nicolas Christin and Reihaneh Safavi{-}Naini}, title = {Financial Cryptography and Data Security - 18th International Conference, {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8437}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45472-5}, doi = {10.1007/978-3-662-45472-5}, isbn = {978-3-662-45471-8}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BlockiCDPS14, author = {Jeremiah Blocki and Nicolas Christin and Anupam Datta and Ariel D. Procaccia and Arunesh Sinha}, title = {Audit Games with Multiple Defender Resources}, journal = {CoRR}, volume = {abs/1409.4503}, year = {2014}, url = {http://arxiv.org/abs/1409.4503}, eprinttype = {arXiv}, eprint = {1409.4503}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BlockiCDPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/VotipkaVC13, author = {Daniel Votipka and Timothy Vidas and Nicolas Christin}, title = {Passe-Partout: {A} General Collection Methodology for Android Devices}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {8}, number = {12}, pages = {1937--1946}, year = {2013}, url = {https://doi.org/10.1109/TIFS.2013.2285360}, doi = {10.1109/TIFS.2013.2285360}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/VotipkaVC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MazurekKVBCCKSU13, author = {Michelle L. Mazurek and Saranga Komanduri and Timothy Vidas and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor and Patrick Gage Kelley and Richard Shay and Blase Ur}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Measuring password guessability for an entire university}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {173--186}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516726}, doi = {10.1145/2508859.2516726}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MazurekKVBCCKSU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/VidasC13, author = {Timothy Vidas and Nicolas Christin}, editor = {Elisa Bertino and Ravi S. Sandhu and Lujo Bauer and Jaehong Park}, title = {Sweetening android lemon markets: measuring and combating malware in application marketplaces}, booktitle = {Third {ACM} Conference on Data and Application Security and Privacy, CODASPY'13, San Antonio, TX, USA, February 18-20, 2013}, pages = {197--208}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2435349.2435378}, doi = {10.1145/2435349.2435378}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/VidasC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MooreC13, author = {Tyler Moore and Nicolas Christin}, editor = {Ahmad{-}Reza Sadeghi}, title = {Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk}, booktitle = {Financial Cryptography and Data Security - 17th International Conference, {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7859}, pages = {25--33}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39884-1\_3}, doi = {10.1007/978-3-642-39884-1\_3}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/MooreC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KelleyKMSVBCC13, author = {Patrick Gage Kelley and Saranga Komanduri and Michelle L. Mazurek and Richard Shay and Timothy Vidas and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {34--51}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9\_3}, doi = {10.1007/978-3-642-41320-9\_3}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/KelleyKMSVBCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/VidasOWZCC13, author = {Timothy Vidas and Emmanuel Owusu and Shuai Wang and Cheng Zeng and Lorrie Faith Cranor and Nicolas Christin}, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {QRishing: The Susceptibility of Smartphone Users to {QR} Code Phishing Attacks}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {52--69}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9\_4}, doi = {10.1007/978-3-642-41320-9\_4}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/VidasOWZCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BlockiCDS13, author = {Jeremiah Blocki and Nicolas Christin and Anupam Datta and Arunesh Sinha}, editor = {Sajal K. Das and Cristina Nita{-}Rotaru and Murat Kantarcioglu}, title = {Adaptive Regret Minimization in Bounded-Memory Games}, booktitle = {Decision and Game Theory for Security - 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8252}, pages = {65--84}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02786-9\_5}, doi = {10.1007/978-3-319-02786-9\_5}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/BlockiCDS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/BlockiCDPS13, author = {Jeremiah Blocki and Nicolas Christin and Anupam Datta and Ariel D. Procaccia and Arunesh Sinha}, editor = {Francesca Rossi}, title = {Audit Games}, booktitle = {{IJCAI} 2013, Proceedings of the 23rd International Joint Conference on Artificial Intelligence, Beijing, China, August 3-9, 2013}, pages = {41--47}, publisher = {{IJCAI/AAAI}}, year = {2013}, url = {http://www.aaai.org/ocs/index.php/IJCAI/IJCAI13/paper/view/6951}, timestamp = {Tue, 23 Jan 2024 13:25:46 +0100}, biburl = {https://dblp.org/rec/conf/ijcai/BlockiCDPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigecom/LeontiadisMC13, author = {Nektarios Leontiadis and Tyler Moore and Nicolas Christin}, editor = {Michael J. Kearns and R. Preston McAfee and {\'{E}}va Tardos}, title = {Pick your poison: pricing and inventories at unlicensed online pharmacies}, booktitle = {Proceedings of the fourteenth {ACM} Conference on Electronic Commerce, {EC} 2013, Philadelphia, PA, USA, June 16-20, 2013}, pages = {621--638}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2492002.2482610}, doi = {10.1145/2492002.2482610}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigecom/LeontiadisMC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/Christin13, author = {Nicolas Christin}, editor = {Daniel Schwabe and Virg{\'{\i}}lio A. F. Almeida and Hartmut Glaser and Ricardo Baeza{-}Yates and Sue B. Moon}, title = {Traveling the silk road: a measurement analysis of a large anonymous online marketplace}, booktitle = {22nd International World Wide Web Conference, {WWW} '13, Rio de Janeiro, Brazil, May 13-17, 2013}, pages = {213--224}, publisher = {International World Wide Web Conferences Steering Committee / {ACM}}, year = {2013}, url = {https://doi.org/10.1145/2488388.2488408}, doi = {10.1145/2488388.2488408}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/Christin13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1303-0356, author = {Jeremiah Blocki and Nicolas Christin and Anupam Datta and Ariel D. Procaccia and Arunesh Sinha}, title = {Audit Games}, journal = {CoRR}, volume = {abs/1303.0356}, year = {2013}, url = {http://arxiv.org/abs/1303.0356}, eprinttype = {arXiv}, eprint = {1303.0356}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1303-0356.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/UrKKLMMPSVBCCEL12, author = {Blase Ur and Patrick Gage Kelley and Saranga Komanduri and Joel Lee and Michael Maass and Michelle L. Mazurek and Timothy Passaro and Richard Shay and Timothy Vidas and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor and Serge Egelman and Julio L{\'{o}}pez}, title = {Helping Users Create Better Passwords}, journal = {login Usenix Mag.}, volume = {37}, number = {6}, year = {2012}, url = {https://www.usenix.org/publications/login/december-2012-volume-37-number-6/helping-users-create-better-passwords}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/UrKKLMMPSVBCCEL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/JohnsonCGC12, author = {Benjamin Johnson and John Chuang and Jens Grossklags and Nicolas Christin}, editor = {Angelos D. Keromytis}, title = {Metrics for Measuring {ISP} Badness: The Case of Spam - (Short Paper)}, booktitle = {Financial Cryptography and Data Security - 16th International Conference, {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7397}, pages = {89--97}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32946-3\_8}, doi = {10.1007/978-3-642-32946-3\_8}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/JohnsonCGC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BlockiCDS12, author = {Jeremiah Blocki and Nicolas Christin and Anupam Datta and Arunesh Sinha}, editor = {Jens Grossklags and Jean C. Walrand}, title = {Audit Mechanisms for Provable Risk Management and Accountable Data Governance}, booktitle = {Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7638}, pages = {38--59}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34266-0\_3}, doi = {10.1007/978-3-642-34266-0\_3}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/BlockiCDS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/ShayKKMUVBCC12, author = {Richard Shay and Patrick Gage Kelley and Saranga Komanduri and Michelle L. Mazurek and Blase Ur and Timothy Vidas and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, editor = {Lorrie Faith Cranor}, title = {Correct horse battery staple: exploring the usability of system-assigned passphrases}, booktitle = {Symposium On Usable Privacy and Security, {SOUPS} '12, Washington, DC, {USA} - July 11 - 13, 2012}, pages = {7}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2335356.2335366}, doi = {10.1145/2335356.2335366}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/ShayKKMUVBCC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KelleyKMSVBCCL12, author = {Patrick Gage Kelley and Saranga Komanduri and Michelle L. Mazurek and Richard Shay and Timothy Vidas and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor and Julio L{\'{o}}pez}, title = {Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012, San Francisco, California, {USA}}, pages = {523--537}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SP.2012.38}, doi = {10.1109/SP.2012.38}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/KelleyKMSVBCCL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/UrKKLMMPSVBCC12, author = {Blase Ur and Patrick Gage Kelley and Saranga Komanduri and Joel Lee and Michael Maass and Michelle L. Mazurek and Timothy Passaro and Richard Shay and Timothy Vidas and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, editor = {Tadayoshi Kohno}, title = {How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation}, booktitle = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA, USA, August 8-10, 2012}, pages = {65--80}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/ur}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/UrKKLMMPSVBCC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1207-7139, author = {Nicolas Christin}, title = {Traveling the Silk Road: {A} measurement analysis of a large anonymous online marketplace}, journal = {CoRR}, volume = {abs/1207.7139}, year = {2012}, url = {http://arxiv.org/abs/1207.7139}, eprinttype = {arXiv}, eprint = {1207.7139}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1207-7139.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/VidasZC11, author = {Timothy Vidas and Chengye Zhang and Nicolas Christin}, title = {Toward a general collection methodology for Android devices}, journal = {Digit. Investig.}, volume = {8}, number = {Supplement}, pages = {S14--S24}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.003}, doi = {10.1016/J.DIIN.2011.05.003}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/VidasZC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MooreLC11, author = {Tyler Moore and Nektarios Leontiadis and Nicolas Christin}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Fashion crimes: trending-term exploitation on the web}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {455--466}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046761}, doi = {10.1145/2046707.2046761}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MooreLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/HayashiHC11, author = {Eiji Hayashi and Jason I. Hong and Nicolas Christin}, editor = {Desney S. Tan and Saleema Amershi and Bo Begole and Wendy A. Kellogg and Manas Tungare}, title = {Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes}, booktitle = {Proceedings of the International Conference on Human Factors in Computing Systems, {CHI} 2011, Vancouver, BC, Canada, May 7-12, 2011}, pages = {2055--2064}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1978942.1979242}, doi = {10.1145/1978942.1979242}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/HayashiHC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/KomanduriSKMBCCE11, author = {Saranga Komanduri and Richard Shay and Patrick Gage Kelley and Michelle L. Mazurek and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor and Serge Egelman}, editor = {Desney S. Tan and Saleema Amershi and Bo Begole and Wendy A. Kellogg and Manas Tungare}, title = {Of passwords and people: measuring the effect of password-composition policies}, booktitle = {Proceedings of the International Conference on Human Factors in Computing Systems, {CHI} 2011, Vancouver, BC, Canada, May 7-12, 2011}, pages = {2595--2604}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1978942.1979321}, doi = {10.1145/1978942.1979321}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/KomanduriSKMBCCE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BlockiCDS11, author = {Jeremiah Blocki and Nicolas Christin and Anupam Datta and Arunesh Sinha}, title = {Regret Minimizing Audits: {A} Learning-Theoretic Basis for Privacy Protection}, booktitle = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium, {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011}, pages = {312--327}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CSF.2011.28}, doi = {10.1109/CSF.2011.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BlockiCDS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ChristinEVG11, author = {Nicolas Christin and Serge Egelman and Timothy Vidas and Jens Grossklags}, editor = {George Danezis}, title = {It's All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice}, booktitle = {Financial Cryptography and Data Security - 15th International Conference, {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7035}, pages = {16--30}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27576-0\_2}, doi = {10.1007/978-3-642-27576-0\_2}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/ChristinEVG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KenneallySMC11, author = {Erin Kenneally and Angelos Stavrou and John McHugh and Nicolas Christin}, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {Moving Forward, Building an Ethics Community (Panel Statements)}, booktitle = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7126}, pages = {178--183}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29889-9\_16}, doi = {10.1007/978-3-642-29889-9\_16}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/KenneallySMC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamenets/JohnsonGCC11, author = {Benjamin Johnson and Jens Grossklags and Nicolas Christin and John Chuang}, editor = {Rahul Jain and Rajgopal Kannan}, title = {Nash Equilibria for Weakest Target Security Games with Heterogeneous Agents}, booktitle = {Game Theory for Networks - 2nd International {ICST} Conference, {GAMENETS} 2011, Shanghai, China, April 16-18, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {75}, pages = {444--458}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-30373-9\_31}, doi = {10.1007/978-3-642-30373-9\_31}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamenets/JohnsonGCC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/Christin11, author = {Nicolas Christin}, editor = {John S. Baras and Jonathan Katz and Eitan Altman}, title = {Network Security Games: Combining Game Theory, Behavioral Economics, and Network Measurements}, booktitle = {Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7037}, pages = {4--6}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25280-8\_2}, doi = {10.1007/978-3-642-25280-8\_2}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/Christin11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/DattaBCDGJKS11, author = {Anupam Datta and Jeremiah Blocki and Nicolas Christin and Henry DeYoung and Deepak Garg and Limin Jia and Dilsun Kirli Kaynar and Arunesh Sinha}, editor = {Sushil Jajodia and Chandan Mazumdar}, title = {Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms}, booktitle = {Information Systems Security - 7th International Conference, {ICISS} 2011, Kolkata, India, December 15-19, 2011, Procedings}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {1--27}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25560-1\_1}, doi = {10.1007/978-3-642-25560-1\_1}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/DattaBCDGJKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BlockiCDS11, author = {Jeremiah Blocki and Nicolas Christin and Anupam Datta and Arunesh Sinha}, editor = {Ben Adida and Umesh Shankar}, title = {Audit Mechanisms for Privacy Protection in Healthcare Environments}, booktitle = {2nd {USENIX} Workshop on Health Security and Privacy, HealthSec'11, San Francisco, CA, USA, August 9, 2011}, publisher = {{USENIX} Association}, year = {2011}, url = {https://www.usenix.org/conference/healthsec11/audit-mechanisms-privacy-protection-healthcare-environments}, timestamp = {Mon, 01 Feb 2021 17:03:06 +0100}, biburl = {https://dblp.org/rec/conf/uss/BlockiCDS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LeontiadisMC11, author = {Nektarios Leontiadis and Tyler Moore and Nicolas Christin}, title = {Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade}, booktitle = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings}, publisher = {{USENIX} Association}, year = {2011}, url = {http://static.usenix.org/events/sec11/tech/full\_papers/Leontiadis.pdf}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LeontiadisMC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/VidasVC11a, author = {Timothy Vidas and Daniel Votipka and Nicolas Christin}, editor = {David Brumley and Michal Zalewski}, title = {All Your Droid Are Belong to Us: {A} Survey of Current Android Attacks}, booktitle = {5th {USENIX} Workshop on Offensive Technologies, WOOT'11, August 8, 2011, San Francisco, CA, USA, Proceedings}, pages = {81--90}, publisher = {{USENIX} Association}, year = {2011}, url = {http://static.usenix.org/event/woot11/tech/final\_files/Vidas.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/VidasVC11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1111-2888, author = {Jeremiah Blocki and Nicolas Christin and Anupam Datta and Arunesh Sinha}, title = {Adaptive Regret Minimization in Bounded-Memory Games}, journal = {CoRR}, volume = {abs/1111.2888}, year = {2011}, url = {http://arxiv.org/abs/1111.2888}, eprinttype = {arXiv}, eprint = {1111.2888}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1111-2888.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChristinYK10, author = {Nicolas Christin and Sally S. Yanagihara and Keisuke Kamataki}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Dissecting one click frauds}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {15--26}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866310}, doi = {10.1145/1866307.1866310}, timestamp = {Tue, 10 Nov 2020 20:00:21 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChristinYK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/JohnsonGCC10, author = {Benjamin Johnson and Jens Grossklags and Nicolas Christin and John Chuang}, editor = {Dimitris Gritzalis and Bart Preneel and Marianthi Theoharidou}, title = {Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information}, booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6345}, pages = {588--606}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15497-3\_36}, doi = {10.1007/978-3-642-15497-3\_36}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/JohnsonGCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GrossklagsJC10, author = {Jens Grossklags and Benjamin Johnson and Nicolas Christin}, editor = {Radu Sion}, title = {When Information Improves Information Security}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {416--423}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14577-3\_37}, doi = {10.1007/978-3-642-14577-3\_37}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/GrossklagsJC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/JohnsonGCC10, author = {Benjamin Johnson and Jens Grossklags and Nicolas Christin and John Chuang}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Uncertainty in Interdependent Security Games}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {234--244}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_16}, doi = {10.1007/978-3-642-17197-0\_16}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/JohnsonGCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KaroleSC10, author = {Ambarish Karole and Nitesh Saxena and Nicolas Christin}, editor = {Kyung Hyune Rhee and DaeHun Nyang}, title = {A Comparative Usability Evaluation of Traditional Password Managers}, booktitle = {Information Security and Cryptology - {ICISC} 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6829}, pages = {233--251}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-24209-0\_16}, doi = {10.1007/978-3-642-24209-0\_16}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/KaroleSC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/MolnarEC10, author = {David Molnar and Serge Egelman and Nicolas Christin}, editor = {Angelos D. Keromytis and Sean Peisert and Richard Ford and Carrie Gates}, title = {This is your data on drugs: lessons computer security can learn from the drug war}, booktitle = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA, USA, September 21-23, 2010}, pages = {143--149}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1900546.1900566}, doi = {10.1145/1900546.1900566}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/MolnarEC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/ShayKKLMBCC10, author = {Richard Shay and Saranga Komanduri and Patrick Gage Kelley and Pedro Giovanni Leon and Michelle L. Mazurek and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, editor = {Lorrie Faith Cranor}, title = {Encountering stronger password requirements: user attitudes and behaviors}, booktitle = {Proceedings of the Sixth Symposium on Usable Privacy and Security, {SOUPS} 2010, Redmond, Washington, USA, July 14-16, 2010}, series = {{ACM} International Conference Proceeding Series}, volume = {485}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1837110.1837113}, doi = {10.1145/1837110.1837113}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/ShayKKLMBCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/EgelmanMCAHK10, author = {Serge Egelman and David Molnar and Nicolas Christin and Alessandro Acquisti and Cormac Herley and Shriram Krishnamurthi}, title = {Please Continue to Hold: An Empirical Study on User Tolerance of Security Delays}, booktitle = {9th Annual Workshop on the Economics of Information Security, {WEIS} 2010, Harvard University, Cambridge, MA, USA, June 7-8, 2010}, year = {2010}, url = {http://weis2010.econinfosec.org/papers/session3/weis2010\_egelman.pdf}, timestamp = {Thu, 22 Jul 2021 16:15:46 +0200}, biburl = {https://dblp.org/rec/conf/weis/EgelmanMCAHK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/BalanRPCH09, author = {Rajesh Krishna Balan and Narayan Ramasubbu and Komsit Prakobphol and Nicolas Christin and Jason I. Hong}, editor = {Krzysztof Zielinski and Adam Wolisz and Jason Flinn and Anthony LaMarca}, title = {mFerio: the design and evaluation of a peer-to-peer mobile payment system}, booktitle = {Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services (MobiSys 2009), Krak{\'{o}}w, Poland, June 22-25, 2009}, pages = {291--304}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1555816.1555846}, doi = {10.1145/1555816.1555846}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisys/BalanRPCH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/HasegawaCH09, author = {Madoka Hasegawa and Nicolas Christin and Eiji Hayashi}, editor = {Lorrie Faith Cranor}, title = {New directions in multisensory authentication}, booktitle = {Proceedings of the 5th Symposium on Usable Privacy and Security, {SOUPS} 2009, Mountain View, California, USA, July 15-17, 2009}, series = {{ACM} International Conference Proceeding Series}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1572532.1572584}, doi = {10.1145/1572532.1572584}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/HasegawaCH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/HayashiHC09, author = {Eiji Hayashi and Jason I. Hong and Nicolas Christin}, editor = {Lorrie Faith Cranor}, title = {Educated guess on graphical authentication schemes: vulnerabilities and countermeasures}, booktitle = {Proceedings of the 5th Symposium on Usable Privacy and Security, {SOUPS} 2009, Mountain View, California, USA, July 15-17, 2009}, series = {{ACM} International Conference Proceeding Series}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1572532.1572564}, doi = {10.1145/1572532.1572564}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/HayashiHC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/GrossklagsJC09, author = {Jens Grossklags and Benjamin Johnson and Nicolas Christin}, title = {The Price of Uncertainty in Security Games}, booktitle = {8th Annual Workshop on the Economics of Information Security, {WEIS} 2009, University College London, England, UK, June 24-25, 2009}, year = {2009}, url = {http://weis09.infosecon.net/files/161/index.html}, timestamp = {Thu, 22 Jul 2021 16:15:45 +0200}, biburl = {https://dblp.org/rec/conf/weis/GrossklagsJC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/SasamotoCH08, author = {Hirokazu Sasamoto and Nicolas Christin and Eiji Hayashi}, editor = {Mary Czerwinski and Arnold M. Lund and Desney S. Tan}, title = {Undercover: authentication usable in front of prying eyes}, booktitle = {Proceedings of the 2008 Conference on Human Factors in Computing Systems, {CHI} 2008, 2008, Florence, Italy, April 5-10, 2008}, pages = {183--192}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1357054.1357085}, doi = {10.1145/1357054.1357085}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/SasamotoCH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AcquistiCPP08, author = {Alessandro Acquisti and Nicolas Christin and Bryan Parno and Adrian Perrig}, editor = {Gene Tsudik}, title = {Countermeasures against Government-Scale Monetary Forgery}, booktitle = {Financial Cryptography and Data Security, 12th International Conference, {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5143}, pages = {262--266}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85230-8\_23}, doi = {10.1007/978-3-540-85230-8\_23}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/AcquistiCPP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/GrossklagsCC08, author = {Jens Grossklags and Nicolas Christin and John Chuang}, editor = {Elizabeth F. Churchill and Rachna Dhamija}, title = {Predicted and Observed User Behavior in the Weakest-link Security Game}, booktitle = {Usability, Psychology, and Security, UPSEC'08, San Francisco, CA, USA, April 14, 2008, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/upsec08/tech/full\_papers/grossklags/grossklags.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nsdi/GrossklagsCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigecom/GrossklagsCC08, author = {Jens Grossklags and Nicolas Christin and John Chuang}, editor = {Lance Fortnow and John Riedl and Tuomas Sandholm}, title = {Security and insurance management in networks with heterogeneous agents}, booktitle = {Proceedings 9th {ACM} Conference on Electronic Commerce (EC-2008), Chicago, IL, USA, June 8-12, 2008}, pages = {160--169}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1386790.1386818}, doi = {10.1145/1386790.1386818}, timestamp = {Tue, 27 Nov 2018 11:56:48 +0100}, biburl = {https://dblp.org/rec/conf/sigecom/GrossklagsCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/HayashiDCP08, author = {Eiji Hayashi and Rachna Dhamija and Nicolas Christin and Adrian Perrig}, editor = {Lorrie Faith Cranor}, title = {Use Your Illusion: secure authentication usable anywhere}, booktitle = {Proceedings of the 4th Symposium on Usable Privacy and Security, {SOUPS} 2008, Pittsburgh, Pennsylvania, USA, July 23-25, 2008}, series = {{ACM} International Conference Proceeding Series}, pages = {35--45}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1408664.1408670}, doi = {10.1145/1408664.1408670}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/HayashiDCP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/GrossklagsCC08, author = {Jens Grossklags and Nicolas Christin and John Chuang}, title = {Security Investment (Failures) in Five Economic Environments: {A} Comparison of Homogeneous and Heterogeneous User Agents}, booktitle = {7th Annual Workshop on the Economics of Information Security, {WEIS} 2008, Dartmouth College, Hanover, NH, USA, June 25-28, 2008}, year = {2008}, url = {http://weis2008.econinfosec.org/papers/Grossklags.pdf}, timestamp = {Thu, 22 Jul 2021 16:15:45 +0200}, biburl = {https://dblp.org/rec/conf/weis/GrossklagsCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/GrossklagsCC08, author = {Jens Grossklags and Nicolas Christin and John Chuang}, editor = {Jinpeng Huai and Robin Chen and Hsiao{-}Wuen Hon and Yunhao Liu and Wei{-}Ying Ma and Andrew Tomkins and Xiaodong Zhang}, title = {Secure or insure?: a game-theoretic analysis of information security games}, booktitle = {Proceedings of the 17th International Conference on World Wide Web, {WWW} 2008, Beijing, China, April 21-25, 2008}, pages = {209--218}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1367497.1367526}, doi = {10.1145/1367497.1367526}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/GrossklagsCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/ChristinLA07, author = {Nicolas Christin and J{\"{o}}rg Liebeherr and Tarek F. Abdelzaher}, title = {Enhancing class-based service architectures with adaptive rate allocation and dropping mechanisms}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {15}, number = {3}, pages = {669--682}, year = {2007}, url = {http://doi.acm.org/10.1145/1295237.1295252}, doi = {10.1145/1295237.1295252}, timestamp = {Tue, 23 Oct 2007 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/ChristinLA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/HabibCC07, author = {Ahsan Habib and Nicolas Christin and John C.{-}I. Chuang}, title = {On the Feasibility of Switching ISPs in Residential Multihoming}, booktitle = {Fifteenth {IEEE} International Workshop on Quality of Service, IWQoS 2007, Evanston, Illinois, USA, June 21-22, 2007}, pages = {91--99}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/IWQOS.2007.376553}, doi = {10.1109/IWQOS.2007.376553}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwqos/HabibCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/KhorCWN07, author = {Soon Hin Khor and Nicolas Christin and Tina Wong and Akihiro Nakao}, title = {Power to the people: securing the internet one edge at a time}, booktitle = {Proceedings of the 2007 Workshop on Large Scale Attack Defense, {LSAD} '07, Kyoto, Japan, August 27, 2007}, pages = {89--96}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1352664.1352666}, doi = {10.1145/1352664.1352666}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/KhorCWN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ChristinL06, author = {Nicolas Christin and J{\"{o}}rg Liebeherr}, title = {The QoSbox: Quantitative service differentiation in {BSD} routers}, journal = {Comput. Networks}, volume = {50}, number = {17}, pages = {3353--3374}, year = {2006}, url = {https://doi.org/10.1016/j.comnet.2006.01.002}, doi = {10.1016/J.COMNET.2006.01.002}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ChristinL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/FiroiuZGC06, author = {Victor Firoiu and Xiaohui Zhang and Emre G{\"{u}}nd{\"{u}}zhan and Nicolas Christin}, title = {Providing Service Guarantees in High-Speed Switching Systems with Feedback Output Queuing}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {17}, number = {5}, pages = {434--447}, year = {2006}, url = {https://doi.org/10.1109/TPDS.2006.64}, doi = {10.1109/TPDS.2006.64}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tpds/FiroiuZGC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/HabibCC06, author = {Ahsan Habib and Nicolas Christin and John Chuang}, title = {Taking Advantage of Multihoming with Session Layer Striping}, booktitle = {{INFOCOM} 2006. 25th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 23-29 April 2006, Barcelona, Catalunya, Spain}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/INFOCOM.2006.54}, doi = {10.1109/INFOCOM.2006.54}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/HabibCC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ChristinL05, author = {Nicolas Christin and J{\"{o}}rg Liebeherr}, title = {Marking algorithms for service differentiation of {TCP} traffic}, journal = {Comput. Commun.}, volume = {28}, number = {18}, pages = {2058--2069}, year = {2005}, url = {https://doi.org/10.1016/j.comcom.2004.07.031}, doi = {10.1016/J.COMCOM.2004.07.031}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/ChristinL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ChristinC05, author = {Nicolas Christin and John Chuang}, title = {A cost-based analysis of overlay routing geometries}, booktitle = {{INFOCOM} 2005. 24th Annual Joint Conference of the {IEEE} Computer and Communications Societies, 13-17 March 2005, Miami, FL, {USA}}, pages = {2566--2577}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/INFCOM.2005.1498541}, doi = {10.1109/INFCOM.2005.1498541}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/ChristinC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigecom/ChristinWC05, author = {Nicolas Christin and Andreas S. Weigend and John Chuang}, editor = {John Riedl and Michael J. Kearns and Michael K. Reiter}, title = {Content availability, pollution and poisoning in file sharing peer-to-peer networks}, booktitle = {Proceedings 6th {ACM} Conference on Electronic Commerce (EC-2005), Vancouver, BC, Canada, June 5-8, 2005}, pages = {68--77}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1064009.1064017}, doi = {10.1145/1064009.1064017}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigecom/ChristinWC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptps/ChristinC04, author = {Nicolas Christin and John Chuang}, editor = {Geoffrey M. Voelker and Scott Shenker}, title = {On the Cost of Participating in a Peer-to-Peer Network}, booktitle = {Peer-to-Peer Systems III, Third International Workshop, {IPTPS} 2004, La Jolla, CA, USA, February 26-27, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3279}, pages = {22--32}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30183-7\_3}, doi = {10.1007/978-3-540-30183-7\_3}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptps/ChristinC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-GT-0404040, author = {Nicolas Christin and Jens Grossklags and John Chuang}, title = {Near Rationality and Competitive Equilibria in Networked Systems}, journal = {CoRR}, volume = {cs.GT/0404040}, year = {2004}, url = {http://arxiv.org/abs/cs/0404040}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/cs-GT-0404040.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-NI-0401010, author = {Nicolas Christin and John Chuang}, title = {On the Cost of Participating in a Peer-to-Peer Network}, journal = {CoRR}, volume = {cs.NI/0401010}, year = {2004}, url = {http://arxiv.org/abs/cs/0401010}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-NI-0401010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-NI-0406019, author = {Victor Firoiu and Xiaohui Zhang and Emre G{\"{u}}nd{\"{u}}zhan and Nicolas Christin}, title = {Providing Service Guarantees in High-Speed Switching Systems with Feedback Output Queuing}, journal = {CoRR}, volume = {cs.NI/0406019}, year = {2004}, url = {http://arxiv.org/abs/cs/0406019}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/cs-NI-0406019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/ChristinL03, author = {Nicolas Christin and J{\"{o}}rg Liebeherr}, title = {A QoS architecture for quantitative service differentiation}, journal = {{IEEE} Commun. Mag.}, volume = {41}, number = {6}, pages = {38--45}, year = {2003}, url = {https://doi.org/10.1109/MCOM.2003.1204746}, doi = {10.1109/MCOM.2003.1204746}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cm/ChristinL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LiebeherrC02, author = {J{\"{o}}rg Liebeherr and Nicolas Christin}, title = {Rate allocation and buffer management for differentiated services}, journal = {Comput. Networks}, volume = {40}, number = {1}, pages = {89--110}, year = {2002}, url = {https://doi.org/10.1016/S1389-1286(02)00268-2}, doi = {10.1016/S1389-1286(02)00268-2}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LiebeherrC02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ChristinLA02, author = {Nicolas Christin and J{\"{o}}rg Liebeherr and Tarek F. Abdelzaher}, title = {A Quantitative Assured Forwarding Service}, booktitle = {Proceedings {IEEE} {INFOCOM} 2002, The 21st Annual Joint Conference of the {IEEE} Computer and Communications Societies, New York, USA, June 23-27, 2002}, pages = {864--873}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/INFCOM.2002.1019333}, doi = {10.1109/INFCOM.2002.1019333}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/ChristinLA02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/LiebeherrC01, author = {J{\"{o}}rg Liebeherr and Nicolas Christin}, editor = {Lars C. Wolf and David Hutchison and Ralf Steinmetz}, title = {JoBS: Joint Buffer Management and Scheduling for Differentiated Services}, booktitle = {Quality of Service - IWQoS 2001, 9th International Workshop Karlsruhe, Germany, June 6-8, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2092}, pages = {404--418}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45512-4\_31}, doi = {10.1007/3-540-45512-4\_31}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwqos/LiebeherrC01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.