BibTeX records: Nicolas Christin

download as .bib file

@inproceedings{DBLP:conf/wsdm/Christin24,
  author       = {Nicolas Christin},
  editor       = {Luz Angelica Caudillo{-}Mata and
                  Silvio Lattanzi and
                  Andr{\'{e}}s Mu{\~{n}}oz Medina and
                  Leman Akoglu and
                  Aristides Gionis and
                  Sergei Vassilvitskii},
  title        = {What {I} Learned from Spending a Dozen Years in the Dark Web},
  booktitle    = {Proceedings of the 17th {ACM} International Conference on Web Search
                  and Data Mining, {WSDM} 2024, Merida, Mexico, March 4-8, 2024},
  pages        = {2--3},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3616855.3637632},
  doi          = {10.1145/3616855.3637632},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wsdm/Christin24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aft/KawaiRSZC23,
  author       = {Daisuke Kawai and
                  Bryan R. Routledge and
                  Kyle Soska and
                  Ariel Zetlin{-}Jones and
                  Nicolas Christin},
  editor       = {Joseph Bonneau and
                  S. Matthew Weinberg},
  title        = {User Participation in Cryptocurrency Derivative Markets},
  booktitle    = {5th Conference on Advances in Financial Technologies, {AFT} 2023,
                  October 23-25, 2023, Princeton, NJ, {USA}},
  series       = {LIPIcs},
  volume       = {282},
  pages        = {8:1--8:24},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2023},
  url          = {https://doi.org/10.4230/LIPIcs.AFT.2023.8},
  doi          = {10.4230/LIPICS.AFT.2023.8},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aft/KawaiRSZC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DeuberKC23,
  author       = {Dominic Deuber and
                  Michael Keuchen and
                  Nicolas Christin},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Assessing Anonymity Techniques Employed in German Court Decisions:
                  {A} De-Anonymization Experiment},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {5199--5216},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/deuber},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/DeuberKC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/TsuchiyaCMC23,
  author       = {Taro Tsuchiya and
                  Alejandro Cuevas and
                  Thomas Magelinski and
                  Nicolas Christin},
  editor       = {Ying Ding and
                  Jie Tang and
                  Juan F. Sequeda and
                  Lora Aroyo and
                  Carlos Castillo and
                  Geert{-}Jan Houben},
  title        = {Misbehavior and Account Suspension in an Online Financial Communication
                  Platform},
  booktitle    = {Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin,
                  TX, USA, 30 April 2023 - 4 May 2023},
  pages        = {2686--2697},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3543507.3583385},
  doi          = {10.1145/3543507.3583385},
  timestamp    = {Mon, 28 Aug 2023 21:17:10 +0200},
  biburl       = {https://dblp.org/rec/conf/www/TsuchiyaCMC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/KawaiCRSZC23,
  author       = {Daisuke Kawai and
                  Alejandro Cuevas and
                  Bryan R. Routledge and
                  Kyle Soska and
                  Ariel Zetlin{-}Jones and
                  Nicolas Christin},
  editor       = {Ying Ding and
                  Jie Tang and
                  Juan F. Sequeda and
                  Lora Aroyo and
                  Carlos Castillo and
                  Geert{-}Jan Houben},
  title        = {Is your digital neighbor a reliable investment advisor?},
  booktitle    = {Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin,
                  TX, USA, 30 April 2023 - 4 May 2023},
  pages        = {3581--3591},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3543507.3583502},
  doi          = {10.1145/3543507.3583502},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/KawaiCRSZC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-18545,
  author       = {Anton Wahrst{\"{a}}tter and
                  Jens Ernstberger and
                  Aviv Yaish and
                  Liyi Zhou and
                  Kaihua Qin and
                  Taro Tsuchiya and
                  Sebastian Steinhorst and
                  Davor Svetinovic and
                  Nicolas Christin and
                  Mikolaj Barczentewicz and
                  Arthur Gervais},
  title        = {Blockchain Censorship},
  journal      = {CoRR},
  volume       = {abs/2305.18545},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.18545},
  doi          = {10.48550/ARXIV.2305.18545},
  eprinttype    = {arXiv},
  eprint       = {2305.18545},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-18545.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Christin22,
  author       = {Nicolas Christin},
  title        = {The effectiveness of security measures: technical perspective},
  journal      = {Commun. {ACM}},
  volume       = {65},
  number       = {9},
  pages        = {92},
  year         = {2022},
  url          = {https://doi.org/10.1145/3547132},
  doi          = {10.1145/3547132},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Christin22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tweb/CrichtonCC22,
  author       = {Kyle Crichton and
                  Nicolas Christin and
                  Lorrie Faith Cranor},
  title        = {How Do Home Computer Users Browse the Web?},
  journal      = {{ACM} Trans. Web},
  volume       = {16},
  number       = {1},
  pages        = {3:1--3:27},
  year         = {2022},
  url          = {https://doi.org/10.1145/3473343},
  doi          = {10.1145/3473343},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tweb/CrichtonCC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LopesMDBPVFC022,
  author       = {Daniela Lopes and
                  Pedro Medeiros and
                  Jin{-}Dong Dong and
                  Diogo Barradas and
                  Bernardo Portela and
                  Jo{\~{a}}o Vinagre and
                  Bernardo Ferreira and
                  Nicolas Christin and
                  Nuno Santos},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Poster: User Sessions on Tor Onion Services: Can Colluding ISPs Deanonymize
                  Them at Scale?},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {3399--3401},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3563520},
  doi          = {10.1145/3548606.3563520},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LopesMDBPVFC022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/0001CSDPKC22,
  author       = {Akira Yamada and
                  Kyle Crichton and
                  Yukiko Sawaya and
                  Jin{-}Dong Dong and
                  Sarah Pearman and
                  Ayumu Kubota and
                  Nicolas Christin},
  editor       = {Sonia Chiasson and
                  Apu Kapadia},
  title        = {On recruiting and retaining users for security-sensitive longitudinal
                  measurement panels},
  booktitle    = {Eighteenth Symposium on Usable Privacy and Security, {SOUPS} 2022,
                  Boston, MA, USA, August 7-9, 2022},
  pages        = {347--366},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/soups2022/presentation/yamada},
  timestamp    = {Wed, 26 Oct 2022 12:44:43 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/0001CSDPKC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CuevasMSCW22,
  author       = {Alejandro Cuevas and
                  Fieke Miedema and
                  Kyle Soska and
                  Nicolas Christin and
                  Rolf van Wegberg},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Measurement by Proxy: On the Accuracy of Online Marketplace Measurements},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {2153--2170},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/cuevas},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/CuevasMSCW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-12601,
  author       = {Alejandro Cuevas and
                  Emma Hogan and
                  Hanan Hibshi and
                  Nicolas Christin},
  title        = {Observations From an Online Security Competition and Its Implications
                  on Crowdsourced Security},
  journal      = {CoRR},
  volume       = {abs/2204.12601},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.12601},
  doi          = {10.48550/ARXIV.2204.12601},
  eprinttype    = {arXiv},
  eprint       = {2204.12601},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-12601.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/VermeerWCNCEFGM21,
  author       = {Mathew Vermeer and
                  Jonathan West and
                  Alejandro Cuevas and
                  Shuonan Niu and
                  Nicolas Christin and
                  Michel van Eeten and
                  Tobias Fiebig and
                  Carlos Ga{\~{n}}{\'{a}}n and
                  Tyler Moore},
  title        = {SoK: {A} Framework for Asset Discovery: Systematizing Advances in
                  Network Measurements for Protecting Organizations},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2021, Vienna, Austria, September 6-10, 2021},
  pages        = {440--456},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EuroSP51992.2021.00037},
  doi          = {10.1109/EUROSP51992.2021.00037},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/VermeerWCNCEFGM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhuGBWCFB21,
  author       = {Wanzheng Zhu and
                  Hongyu Gong and
                  Rohan Bansal and
                  Zachary Weinberg and
                  Nicolas Christin and
                  Giulia Fanti and
                  Suma Bhat},
  title        = {Self-Supervised Euphemism Detection and Identification for Content
                  Moderation},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {229--246},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00075},
  doi          = {10.1109/SP40001.2021.00075},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ZhuGBWCFB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/SoskaDKZRC21,
  author       = {Kyle Soska and
                  Jin{-}Dong Dong and
                  Alex Khodaverdian and
                  Ariel Zetlin{-}Jones and
                  Bryan R. Routledge and
                  Nicolas Christin},
  editor       = {Jure Leskovec and
                  Marko Grobelnik and
                  Marc Najork and
                  Jie Tang and
                  Leila Zia},
  title        = {Towards Understanding Cryptocurrency Derivatives: {A} Case Study of
                  BitMEX},
  booktitle    = {{WWW} '21: The Web Conference 2021, Virtual Event / Ljubljana, Slovenia,
                  April 19-23, 2021},
  pages        = {45--57},
  publisher    = {{ACM} / {IW3C2}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3442381.3450059},
  doi          = {10.1145/3442381.3450059},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/SoskaDKZRC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/WeinbergBC21,
  author       = {Zachary Weinberg and
                  Diogo Barradas and
                  Nicolas Christin},
  editor       = {Jure Leskovec and
                  Marko Grobelnik and
                  Marc Najork and
                  Jie Tang and
                  Leila Zia},
  title        = {Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall
                  of China},
  booktitle    = {{WWW} '21: The Web Conference 2021, Virtual Event / Ljubljana, Slovenia,
                  April 19-23, 2021},
  pages        = {472--483},
  publisher    = {{ACM} / {IW3C2}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3442381.3450076},
  doi          = {10.1145/3442381.3450076},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/WeinbergBC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/SzurdiLKNC21,
  author       = {Janos Szurdi and
                  Meng Luo and
                  Brian Kondracki and
                  Nick Nikiforakis and
                  Nicolas Christin},
  editor       = {Jure Leskovec and
                  Marko Grobelnik and
                  Marc Najork and
                  Jie Tang and
                  Leila Zia},
  title        = {Where are you taking me?Understanding Abusive Traffic Distribution
                  Systems},
  booktitle    = {{WWW} '21: The Web Conference 2021, Virtual Event / Ljubljana, Slovenia,
                  April 19-23, 2021},
  pages        = {3613--3624},
  publisher    = {{ACM} / {IW3C2}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3442381.3450071},
  doi          = {10.1145/3442381.3450071},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/SzurdiLKNC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/corr/abs-2111-08209,
  author       = {Carolina Carreira and
                  Jo{\~{a}}o F. Ferreira and
                  Alexandra Mendes and
                  Nicolas Christin},
  editor       = {Mario Gleirscher and
                  Jaco van de Pol and
                  Jim Woodcock},
  title        = {Exploring Usable Security to Improve the Impact of Formal Verification:
                  {A} Research Agenda},
  booktitle    = {Proceedings First Workshop on Applicable Formal Methods, AppFM@FM
                  2021, virtual, 23rd November 2021},
  series       = {{EPTCS}},
  volume       = {349},
  pages        = {77--84},
  year         = {2021},
  url          = {https://doi.org/10.4204/EPTCS.349.6},
  doi          = {10.4204/EPTCS.349.6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-08209.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-16808,
  author       = {Wanzheng Zhu and
                  Hongyu Gong and
                  Rohan Bansal and
                  Zachary Weinberg and
                  Nicolas Christin and
                  Giulia Fanti and
                  Suma Bhat},
  title        = {Self-Supervised Euphemism Detection and Identification for Content
                  Moderation},
  journal      = {CoRR},
  volume       = {abs/2103.16808},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.16808},
  eprinttype    = {arXiv},
  eprint       = {2103.16808},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-16808.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TanBCC20,
  author       = {Joshua Tan and
                  Lujo Bauer and
                  Nicolas Christin and
                  Lorrie Faith Cranor},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {Practical Recommendations for Stronger, More Usable Passwords Combining
                  Minimum-strength, Minimum-length, and Blocklist Requirements},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {1407--1426},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417882},
  doi          = {10.1145/3372297.3417882},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/TanBCC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ArpsC20,
  author       = {James E. Arps and
                  Nicolas Christin},
  editor       = {Joseph Bonneau and
                  Nadia Heninger},
  title        = {Open Market or Ghost Town? The Curious Case of OpenBazaar},
  booktitle    = {Financial Cryptography and Data Security - 24th International Conference,
                  {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12059},
  pages        = {561--577},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-51280-4\_30},
  doi          = {10.1007/978-3-030-51280-4\_30},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/ArpsC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/NiakiCWHRCG20,
  author       = {Arian Akhavan Niaki and
                  Shinyoung Cho and
                  Zachary Weinberg and
                  Nguyen Phong Hoang and
                  Abbas Razaghpanah and
                  Nicolas Christin and
                  Phillipa Gill},
  title        = {ICLab: {A} Global, Longitudinal Internet Censorship Measurement Platform},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {135--151},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00014},
  doi          = {10.1109/SP40000.2020.00014},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/NiakiCWHRCG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/SharifRD0KBC19,
  author       = {Mahmood Sharif and
                  Kevin A. Roundy and
                  Matteo Dell'Amico and
                  Christopher Gates and
                  Daniel Kats and
                  Lujo Bauer and
                  Nicolas Christin},
  editor       = {Stephen A. Brewster and
                  Geraldine Fitzpatrick and
                  Anna L. Cox and
                  Vassilis Kostakos},
  title        = {A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support
                  Chats},
  booktitle    = {Proceedings of the 2019 {CHI} Conference on Human Factors in Computing
                  Systems, {CHI} 2019, Glasgow, Scotland, UK, May 04-09, 2019},
  pages        = {78},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3290605.3300308},
  doi          = {10.1145/3290605.3300308},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/SharifRD0KBC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kdd/TaiSC19,
  author       = {Xiao Hui Tai and
                  Kyle Soska and
                  Nicolas Christin},
  editor       = {Ankur Teredesai and
                  Vipin Kumar and
                  Ying Li and
                  R{\'{o}}mer Rosales and
                  Evimaria Terzi and
                  George Karypis},
  title        = {Adversarial Matching of Dark Net Market Vendor Accounts},
  booktitle    = {Proceedings of the 25th {ACM} {SIGKDD} International Conference on
                  Knowledge Discovery {\&} Data Mining, {KDD} 2019, Anchorage, AK,
                  USA, August 4-8, 2019},
  pages        = {1871--1880},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3292500.3330763},
  doi          = {10.1145/3292500.3330763},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kdd/TaiSC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/ZhangPBC19,
  author       = {Shikun Zhang and
                  Sarah Pearman and
                  Lujo Bauer and
                  Nicolas Christin},
  editor       = {Heather Richter Lipford},
  title        = {Why people (don't) use password managers effectively},
  booktitle    = {Fifteenth Symposium on Usable Privacy and Security, {SOUPS} 2019,
                  Santa Clara, CA, USA, August 11-13, 2019},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/soups2019/presentation/pearman},
  timestamp    = {Mon, 01 Feb 2021 08:41:56 +0100},
  biburl       = {https://dblp.org/rec/conf/soups/ZhangPBC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-04245,
  author       = {Arian Akhavan Niaki and
                  Shinyoung Cho and
                  Zachary Weinberg and
                  Nguyen Phong Hoang and
                  Abbas Razaghpanah and
                  Nicolas Christin and
                  Phillipa Gill},
  title        = {ICLab: {A} Global, Longitudinal Internet Censorship Measurement Platform},
  journal      = {CoRR},
  volume       = {abs/1907.04245},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.04245},
  eprinttype    = {arXiv},
  eprint       = {1907.04245},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-04245.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/MoserSHLHSHHMNC18,
  author       = {Malte M{\"{o}}ser and
                  Kyle Soska and
                  Ethan Heilman and
                  Kevin Lee and
                  Henry Heffan and
                  Shashvat Srivastava and
                  Kyle Hogan and
                  Jason Hennessey and
                  Andrew Miller and
                  Arvind Narayanan and
                  Nicolas Christin},
  title        = {An Empirical Analysis of Traceability in the Monero Blockchain},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2018},
  number       = {3},
  pages        = {143--163},
  year         = {2018},
  url          = {https://doi.org/10.1515/popets-2018-0025},
  doi          = {10.1515/POPETS-2018-0025},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/MoserSHLHSHHMNC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/MooreCS18,
  author       = {Tyler Moore and
                  Nicolas Christin and
                  Janos Szurdi},
  title        = {Revisiting the Risks of Bitcoin Currency Exchange Closure},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {18},
  number       = {4},
  pages        = {50:1--50:18},
  year         = {2018},
  url          = {https://doi.org/10.1145/3155808},
  doi          = {10.1145/3155808},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toit/MooreCS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/GravesAC18,
  author       = {James T. Graves and
                  Alessandro Acquisti and
                  Nicolas Christin},
  title        = {Should Credit Card Issuers Reissue Cards in Response to a Data Breach?:
                  Uncertainty and Transparency in Metrics for Data Security Policymaking},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {18},
  number       = {4},
  pages        = {54:1--54:19},
  year         = {2018},
  url          = {https://doi.org/10.1145/3122983},
  doi          = {10.1145/3122983},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toit/GravesAC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SharifUCKY18,
  author       = {Mahmood Sharif and
                  Jumpei Urakawa and
                  Nicolas Christin and
                  Ayumu Kubota and
                  Akira Yamada},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Predicting Impending Exposure to Malicious Content from User Behavior},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {1487--1501},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243779},
  doi          = {10.1145/3243734.3243779},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SharifUCKY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/ColnagoDOSBCC18,
  author       = {Jessica Colnago and
                  Summer Devlin and
                  Maggie Oates and
                  Chelse Swoopes and
                  Lujo Bauer and
                  Lorrie Faith Cranor and
                  Nicolas Christin},
  editor       = {Regan L. Mandryk and
                  Mark Hancock and
                  Mark Perry and
                  Anna L. Cox},
  title        = {"It's not actually that horrible": Exploring Adoption of
                  Two-Factor Authentication at a University},
  booktitle    = {Proceedings of the 2018 {CHI} Conference on Human Factors in Computing
                  Systems, {CHI} 2018, Montreal, QC, Canada, April 21-26, 2018},
  pages        = {456},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3173574.3174030},
  doi          = {10.1145/3173574.3174030},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/ColnagoDOSBCC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/WeinbergCCSG18,
  author       = {Zachary Weinberg and
                  Shinyoung Cho and
                  Nicolas Christin and
                  Vyas Sekar and
                  Phillipa Gill},
  title        = {How to Catch when Proxies Lie: Verifying the Physical Locations of
                  Network Proxies with Active Geolocation},
  booktitle    = {Proceedings of the Internet Measurement Conference 2018, {IMC} 2018,
                  Boston, MA, USA, October 31 - November 02, 2018},
  pages        = {203--217},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://dl.acm.org/citation.cfm?id=3278551},
  timestamp    = {Fri, 25 Oct 2019 09:51:49 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/WeinbergCCSG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/HabibNDOSBCC18,
  author       = {Hana Habib and
                  Pardis Emami Naeini and
                  Summer Devlin and
                  Maggie Oates and
                  Chelse Swoopes and
                  Lujo Bauer and
                  Nicolas Christin and
                  Lorrie Faith Cranor},
  editor       = {Mary Ellen Zurko and
                  Heather Richter Lipford},
  title        = {User Behaviors and Attitudes Under Password Expiration Policies},
  booktitle    = {Fourteenth Symposium on Usable Privacy and Security, {SOUPS} 2018,
                  Baltimore, MD, USA, August 12-14, 2018},
  pages        = {13--30},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/soups2018/presentation/habib-password},
  timestamp    = {Mon, 01 Feb 2021 08:41:57 +0100},
  biburl       = {https://dblp.org/rec/conf/soups/HabibNDOSBCC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/HabibCGPTACC18,
  author       = {Hana Habib and
                  Jessica Colnago and
                  Vidya Gopalakrishnan and
                  Sarah Pearman and
                  Jeremy Thomas and
                  Alessandro Acquisti and
                  Nicolas Christin and
                  Lorrie Faith Cranor},
  editor       = {Mary Ellen Zurko and
                  Heather Richter Lipford},
  title        = {Away From Prying Eyes: Analyzing Usage and Understanding of Private
                  Browsing},
  booktitle    = {Fourteenth Symposium on Usable Privacy and Security, {SOUPS} 2018,
                  Baltimore, MD, USA, August 12-14, 2018},
  pages        = {159--175},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/soups2018/presentation/habib-prying},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/soups/HabibCGPTACC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WegbergTSAGKCE18,
  author       = {Rolf van Wegberg and
                  Samaneh Tajalizadehkhoob and
                  Kyle Soska and
                  Ugur Akyazi and
                  Carlos Hernandez Ga{\~{n}}{\'{a}}n and
                  Bram Klievink and
                  Nicolas Christin and
                  Michel van Eeten},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {Plug and Prey? Measuring the Commoditization of Cybercrime via Online
                  Anonymous Markets},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {1009--1026},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/van-wegberg},
  timestamp    = {Mon, 01 Feb 2021 08:43:20 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WegbergTSAGKCE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/WeinbergSSC17,
  author       = {Zachary Weinberg and
                  Mahmood Sharif and
                  Janos Szurdi and
                  Nicolas Christin},
  title        = {Topics of Controversy: An Empirical Analysis of Web Censorship Lists},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2017},
  number       = {1},
  pages        = {42--61},
  year         = {2017},
  url          = {https://doi.org/10.1515/popets-2017-0004},
  doi          = {10.1515/POPETS-2017-0004},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/WeinbergSSC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/MelicherUSBCC17,
  author       = {William Melicher and
                  Blase Ur and
                  Sean M. Segreti and
                  Lujo Bauer and
                  Nicolas Christin and
                  Lorrie Faith Cranor},
  title        = {Better Passwords through Science (and Neural Networks)},
  journal      = {login Usenix Mag.},
  volume       = {42},
  number       = {4},
  year         = {2017},
  url          = {https://www.usenix.org/publications/login/winter2017/melicher},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/MelicherUSBCC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PearmanTNHBCCEF17,
  author       = {Sarah Pearman and
                  Jeremy Thomas and
                  Pardis Emami Naeini and
                  Hana Habib and
                  Lujo Bauer and
                  Nicolas Christin and
                  Lorrie Faith Cranor and
                  Serge Egelman and
                  Alain Forget},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Let's Go in for a Closer Look: Observing Passwords in Their Natural
                  Habitat},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {295--310},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3133973},
  doi          = {10.1145/3133956.3133973},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/PearmanTNHBCCEF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/SawayaSCKNY17,
  author       = {Yukiko Sawaya and
                  Mahmood Sharif and
                  Nicolas Christin and
                  Ayumu Kubota and
                  Akihiro Nakarai and
                  Akira Yamada},
  editor       = {Gloria Mark and
                  Susan R. Fussell and
                  Cliff Lampe and
                  m. c. schraefel and
                  Juan Pablo Hourcade and
                  Caroline Appert and
                  Daniel Wigdor},
  title        = {Self-Confidence Trumps Knowledge: {A} Cross-Cultural Study of Security
                  Behavior},
  booktitle    = {Proceedings of the 2017 {CHI} Conference on Human Factors in Computing
                  Systems, Denver, CO, USA, May 06-11, 2017},
  pages        = {2202--2214},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3025453.3025926},
  doi          = {10.1145/3025453.3025926},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/SawayaSCKNY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/UrAABCCCDNHJM17,
  author       = {Blase Ur and
                  Felicia Alfieri and
                  Maung Aung and
                  Lujo Bauer and
                  Nicolas Christin and
                  Jessica Colnago and
                  Lorrie Faith Cranor and
                  Henry Dixon and
                  Pardis Emami Naeini and
                  Hana Habib and
                  Noah Johnson and
                  William Melicher},
  editor       = {Gloria Mark and
                  Susan R. Fussell and
                  Cliff Lampe and
                  m. c. schraefel and
                  Juan Pablo Hourcade and
                  Caroline Appert and
                  Daniel Wigdor},
  title        = {Design and Evaluation of a Data-Driven Password Meter},
  booktitle    = {Proceedings of the 2017 {CHI} Conference on Human Factors in Computing
                  Systems, Denver, CO, USA, May 06-11, 2017},
  pages        = {3775--3786},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3025453.3026050},
  doi          = {10.1145/3025453.3026050},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/UrAABCCCDNHJM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/SzurdiC17,
  author       = {Janos Szurdi and
                  Nicolas Christin},
  editor       = {Steve Uhlig and
                  Olaf Maennel},
  title        = {Email typosquatting},
  booktitle    = {Proceedings of the 2017 Internet Measurement Conference, {IMC} 2017,
                  London, United Kingdom, November 1-3, 2017},
  pages        = {419--431},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3131365.3131399},
  doi          = {10.1145/3131365.3131399},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/SzurdiC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kdd/SoskaGRC17,
  author       = {Kyle Soska and
                  Christopher S. Gates and
                  Kevin A. Roundy and
                  Nicolas Christin},
  title        = {Automatic Application Identification from Billions of Files},
  booktitle    = {Proceedings of the 23rd {ACM} {SIGKDD} International Conference on
                  Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13
                  - 17, 2017},
  pages        = {2021--2030},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3097983.3098196},
  doi          = {10.1145/3097983.3098196},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kdd/SoskaGRC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/SegretiMKMSUBCC17,
  author       = {Sean M. Segreti and
                  William Melicher and
                  Saranga Komanduri and
                  Darya Melicher and
                  Richard Shay and
                  Blase Ur and
                  Lujo Bauer and
                  Nicolas Christin and
                  Lorrie Faith Cranor and
                  Michelle L. Mazurek},
  title        = {Diversify to Survive: Making Passwords Stronger with Adaptive Policies},
  booktitle    = {Thirteenth Symposium on Usable Privacy and Security, {SOUPS} 2017,
                  Santa Clara, CA, USA, July 12-14, 2017},
  pages        = {1--12},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/soups2017/technical-sessions/presentation/segreti},
  timestamp    = {Wed, 19 Jul 2017 17:13:43 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/SegretiMKMSUBCC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/MelicherUKBCC17,
  author       = {William Melicher and
                  Blase Ur and
                  Saranga Komanduri and
                  Lujo Bauer and
                  Nicolas Christin and
                  Lorrie Faith Cranor},
  editor       = {Dilma Da Silva and
                  Bryan Ford},
  title        = {Fast, Lean, and Accurate: Modeling Password Guessability Using Neural
                  Networks},
  booktitle    = {2017 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2017, Santa
                  Clara, CA, USA, July 12-14, 2017},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/atc17/technical-sessions/presentation/melicher},
  timestamp    = {Mon, 01 Feb 2021 08:43:34 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/MelicherUKBCC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/Sigurbjarnarson17,
  author       = {Helgi Sigurbjarnarson and
                  James Bornholt and
                  Nicolas Christin and
                  Lorrie Faith Cranor},
  editor       = {Dilma Da Silva and
                  Bryan Ford},
  title        = {Push-Button Verification of File Systems via Crash Refinement},
  booktitle    = {2017 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2017, Santa
                  Clara, CA, USA, July 12-14, 2017},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/atc17/technical-sessions/presentation/sigurbjarnarson},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/Sigurbjarnarson17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ShayKDHMSUBCC16,
  author       = {Richard Shay and
                  Saranga Komanduri and
                  Adam L. Durity and
                  Phillip (Seyoung) Huh and
                  Michelle L. Mazurek and
                  Sean M. Segreti and
                  Blase Ur and
                  Lujo Bauer and
                  Nicolas Christin and
                  Lorrie Faith Cranor},
  title        = {Designing Password Policies for Strength and Usability},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {18},
  number       = {4},
  pages        = {13:1--13:34},
  year         = {2016},
  url          = {https://doi.org/10.1145/2891411},
  doi          = {10.1145/2891411},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ShayKDHMSUBCC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/MelicherKSKSUBC16,
  author       = {William Melicher and
                  Darya Kurilova and
                  Sean M. Segreti and
                  Pranshu Kalvani and
                  Richard Shay and
                  Blase Ur and
                  Lujo Bauer and
                  Nicolas Christin and
                  Lorrie Faith Cranor and
                  Michelle L. Mazurek},
  editor       = {Jofish Kaye and
                  Allison Druin and
                  Cliff Lampe and
                  Dan Morris and
                  Juan Pablo Hourcade},
  title        = {Usability and Security of Text Passwords on Mobile Devices},
  booktitle    = {Proceedings of the 2016 {CHI} Conference on Human Factors in Computing
                  Systems, San Jose, CA, USA, May 7-12, 2016},
  pages        = {527--539},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2858036.2858384},
  doi          = {10.1145/2858036.2858384},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/MelicherKSKSUBC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/UrBSBCC16,
  author       = {Blase Ur and
                  Jonathan Bees and
                  Sean M. Segreti and
                  Lujo Bauer and
                  Nicolas Christin and
                  Lorrie Faith Cranor},
  editor       = {Jofish Kaye and
                  Allison Druin and
                  Cliff Lampe and
                  Dan Morris and
                  Juan Pablo Hourcade},
  title        = {Do Users' Perceptions of Password Security Match Reality?},
  booktitle    = {Proceedings of the 2016 {CHI} Conference on Human Factors in Computing
                  Systems, San Jose, CA, USA, May 7-12, 2016},
  pages        = {3748--3760},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2858036.2858546},
  doi          = {10.1145/2858036.2858546},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/UrBSBCC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/ForgetPTACCEHT16,
  author       = {Alain Forget and
                  Sarah Pearman and
                  Jeremy Thomas and
                  Alessandro Acquisti and
                  Nicolas Christin and
                  Lorrie Faith Cranor and
                  Serge Egelman and
                  Marian Harbach and
                  Rahul Telang},
  title        = {Do or Do Not, There Is No Try: User Engagement May Not Improve Security
                  Outcomes},
  booktitle    = {Twelfth Symposium on Usable Privacy and Security, {SOUPS} 2016, Denver,
                  CO, USA, June 22-24, 2016},
  pages        = {97--111},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/soups2016/technical-sessions/presentation/forget},
  timestamp    = {Thu, 04 Aug 2016 15:59:03 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/ForgetPTACCEHT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MelicherUSKBCC16,
  author       = {William Melicher and
                  Blase Ur and
                  Sean M. Segreti and
                  Saranga Komanduri and
                  Lujo Bauer and
                  Nicolas Christin and
                  Lorrie Faith Cranor},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Fast, Lean, and Accurate: Modeling Password Guessability Using Neural
                  Networks},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {175--191},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/melicher},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MelicherUSKBCC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BrandaoCD16,
  author       = {Lu{\'{\i}}s T. A. N. Brand{\~{a}}o and
                  Nicolas Christin and
                  George Danezis},
  title        = {A Public Comment on NCCoE's White Paper on Privacy-Enhancing Identity
                  Brokers},
  journal      = {CoRR},
  volume       = {abs/1611.02968},
  year         = {2016},
  url          = {http://arxiv.org/abs/1611.02968},
  eprinttype    = {arXiv},
  eprint       = {1611.02968},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BrandaoCD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SoskaKCD16,
  author       = {Kyle Soska and
                  Albert Kwon and
                  Nicolas Christin and
                  Srinivas Devadas},
  title        = {Beaver: {A} Decentralized Anonymous Marketplace with Secure Reputation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {464},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/464},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SoskaKCD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/BrandaoCDa15,
  author       = {Lu{\'{\i}}s T. A. N. Brand{\~{a}}o and
                  Nicolas Christin and
                  George Danezis and
                  anonymous},
  title        = {Toward Mending Two Nation-Scale Brokered Identification Systems},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2015},
  number       = {2},
  pages        = {135--155},
  year         = {2015},
  url          = {https://doi.org/10.1515/popets-2015-0022},
  doi          = {10.1515/POPETS-2015-0022},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/BrandaoCDa15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/BlockiCDPS15,
  author       = {Jeremiah Blocki and
                  Nicolas Christin and
                  Anupam Datta and
                  Ariel D. Procaccia and
                  Arunesh Sinha},
  editor       = {Blai Bonet and
                  Sven Koenig},
  title        = {Audit Games with Multiple Defender Resources},
  booktitle    = {Proceedings of the Twenty-Ninth {AAAI} Conference on Artificial Intelligence,
                  January 25-30, 2015, Austin, Texas, {USA}},
  pages        = {791--797},
  publisher    = {{AAAI} Press},
  year         = {2015},
  url          = {https://doi.org/10.1609/aaai.v29i1.9317},
  doi          = {10.1609/AAAI.V29I1.9317},
  timestamp    = {Mon, 18 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/BlockiCDPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/ShayBCCFKMMSU15,
  author       = {Richard Shay and
                  Lujo Bauer and
                  Nicolas Christin and
                  Lorrie Faith Cranor and
                  Alain Forget and
                  Saranga Komanduri and
                  Michelle L. Mazurek and
                  William Melicher and
                  Sean M. Segreti and
                  Blase Ur},
  editor       = {Bo Begole and
                  Jinwoo Kim and
                  Kori Inkpen and
                  Woontack Woo},
  title        = {A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation
                  Behavior},
  booktitle    = {Proceedings of the 33rd Annual {ACM} Conference on Human Factors in
                  Computing Systems, {CHI} 2015, Seoul, Republic of Korea, April 18-23,
                  2015},
  pages        = {2903--2912},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2702123.2702586},
  doi          = {10.1145/2702123.2702586},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/ShayBCCFKMMSU15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/UrNBSSBCC15,
  author       = {Blase Ur and
                  Fumiko Noma and
                  Jonathan Bees and
                  Sean M. Segreti and
                  Richard Shay and
                  Lujo Bauer and
                  Nicolas Christin and
                  Lorrie Faith Cranor},
  editor       = {Lorrie Faith Cranor and
                  Robert Biddle and
                  Sunny Consolvo},
  title        = {"I Added '!' at the End to Make It Secure": Observing Password
                  Creation in the Lab},
  booktitle    = {Eleventh Symposium On Usable Privacy and Security, {SOUPS} 2015, Ottawa,
                  Canada, July 22-24, 2015},
  pages        = {123--140},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/soups2015/proceedings/presentation/ur},
  timestamp    = {Wed, 05 Apr 2017 12:53:50 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/UrNBSSBCC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SoskaC15,
  author       = {Kyle Soska and
                  Nicolas Christin},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Measuring the Longitudinal Evolution of the Online Anonymous Marketplace
                  Ecosystem},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {33--48},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/soska},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SoskaC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/UrSBCCKKMMS15,
  author       = {Blase Ur and
                  Sean M. Segreti and
                  Lujo Bauer and
                  Nicolas Christin and
                  Lorrie Faith Cranor and
                  Saranga Komanduri and
                  Darya Kurilova and
                  Michelle L. Mazurek and
                  William Melicher and
                  Richard Shay},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Measuring Real-World Accuracies and Biases in Modeling Password Guessability},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {463--481},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/ur},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/UrSBCCKKMMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/ClaytonMC15,
  author       = {Richard Clayton and
                  Tyler Moore and
                  Nicolas Christin},
  title        = {Concentrating Correctly on Cybercrime Concentration},
  booktitle    = {14th Annual Workshop on the Economics of Information Security, {WEIS}
                  2015, Delft, The Netherlands, 22-23 June, 2015},
  year         = {2015},
  url          = {http://www.econinfosec.org/archive/weis2015/papers/WEIS\_2015\_clayton.pdf},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/weis/ClaytonMC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/JohnsonLMCC15,
  author       = {Benjamin Johnson and
                  Paul Laskowski and
                  Thomas Maillart and
                  John C.{-}I. Chuang and
                  Nicolas Christin},
  title        = {Caviar and Yachts: How Your Purchase Data May Come Back to Haunt You},
  booktitle    = {14th Annual Workshop on the Economics of Information Security, {WEIS}
                  2015, Delft, The Netherlands, 22-23 June, 2015},
  year         = {2015},
  url          = {http://www.econinfosec.org/archive/weis2015/papers/WEIS\_2015\_johnson.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/weis/JohnsonLMCC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2015w,
  editor       = {Michael Brenner and
                  Nicolas Christin and
                  Benjamin Johnson and
                  Kurt Rohloff},
  title        = {Financial Cryptography and Data Security - {FC} 2015 International
                  Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January
                  30, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8976},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48051-9},
  doi          = {10.1007/978-3-662-48051-9},
  isbn         = {978-3-662-48050-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2015w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/VidasTNTCT14,
  author       = {Timothy Vidas and
                  Jiaqi Tan and
                  Jay Nahata and
                  Chaur Lih Tan and
                  Nicolas Christin and
                  Patrick Tague},
  editor       = {Cliff Wang and
                  Dijiang Huang and
                  Kapil Singh and
                  Zhenkai Liang},
  title        = {{A5:} Automated Analysis of Adversarial Android Applications},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Security and Privacy in Smartphones
                  {\&} Mobile Devices, SPSM@CCS 2014, Scottsdale, AZ, USA, November
                  03 - 07, 2014},
  pages        = {39--50},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2666620.2666630},
  doi          = {10.1145/2666620.2666630},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/VidasTNTCT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/VidasC14,
  author       = {Timothy Vidas and
                  Nicolas Christin},
  editor       = {Shiho Moriai and
                  Trent Jaeger and
                  Kouichi Sakurai},
  title        = {Evading android runtime analysis via sandbox detection},
  booktitle    = {9th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  pages        = {447--458},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2590296.2590325},
  doi          = {10.1145/2590296.2590325},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/VidasC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LeontiadisMC14,
  author       = {Nektarios Leontiadis and
                  Tyler Moore and
                  Nicolas Christin},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {930--941},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660332},
  doi          = {10.1145/2660267.2660332},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LeontiadisMC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/ShayKDHMSUBCC14,
  author       = {Richard Shay and
                  Saranga Komanduri and
                  Adam L. Durity and
                  Phillip (Seyoung) Huh and
                  Michelle L. Mazurek and
                  Sean M. Segreti and
                  Blase Ur and
                  Lujo Bauer and
                  Nicolas Christin and
                  Lorrie Faith Cranor},
  editor       = {Matt Jones and
                  Philippe A. Palanque and
                  Albrecht Schmidt and
                  Tovi Grossman},
  title        = {Can long passwords be secure and usable?},
  booktitle    = {{CHI} Conference on Human Factors in Computing Systems, CHI'14, Toronto,
                  ON, Canada - April 26 - May 01, 2014},
  pages        = {2927--2936},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2556288.2557377},
  doi          = {10.1145/2556288.2557377},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/ShayKDHMSUBCC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LeontiadisC14,
  author       = {Nektarios Leontiadis and
                  Nicolas Christin},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Empirically Measuring {WHOIS} Misuse},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8712},
  pages        = {19--36},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11203-9\_2},
  doi          = {10.1007/978-3-319-11203-9\_2},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/LeontiadisC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/ForgetKACCT14,
  author       = {Alain Forget and
                  Saranga Komanduri and
                  Alessandro Acquisti and
                  Nicolas Christin and
                  Lorrie Faith Cranor and
                  Rahul Telang},
  editor       = {Laurie A. Williams and
                  David M. Nicol and
                  Munindar P. Singh},
  title        = {Building the security behavior observatory: an infrastructure for
                  long-term monitoring of client machines},
  booktitle    = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security,
                  HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014},
  pages        = {24},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600176.2600200},
  doi          = {10.1145/2600176.2600200},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotsos/ForgetKACCT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/OltramariBCBC14,
  author       = {Alessandro Oltramari and
                  Noam Ben{-}Asher and
                  Lorrie Faith Cranor and
                  Lujo Bauer and
                  Nicolas Christin},
  title        = {General Requirements of a Hybrid-Modeling Framework for Cyber Security},
  booktitle    = {2014 {IEEE} Military Communications Conference, {MILCOM} 2014, Baltimore,
                  MD, USA, October 6-8, 2014},
  pages        = {129--135},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/MILCOM.2014.28},
  doi          = {10.1109/MILCOM.2014.28},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/OltramariBCBC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SoskaC14,
  author       = {Kyle Soska and
                  Nicolas Christin},
  editor       = {Kevin Fu and
                  Jaeyeon Jung},
  title        = {Automatically Detecting Vulnerable Websites Before They Turn Malicious},
  booktitle    = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
                  USA, August 20-22, 2014},
  pages        = {625--640},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/soska},
  timestamp    = {Mon, 01 Feb 2021 08:43:04 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SoskaC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2014,
  editor       = {Nicolas Christin and
                  Reihaneh Safavi{-}Naini},
  title        = {Financial Cryptography and Data Security - 18th International Conference,
                  {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8437},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45472-5},
  doi          = {10.1007/978-3-662-45472-5},
  isbn         = {978-3-662-45471-8},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BlockiCDPS14,
  author       = {Jeremiah Blocki and
                  Nicolas Christin and
                  Anupam Datta and
                  Ariel D. Procaccia and
                  Arunesh Sinha},
  title        = {Audit Games with Multiple Defender Resources},
  journal      = {CoRR},
  volume       = {abs/1409.4503},
  year         = {2014},
  url          = {http://arxiv.org/abs/1409.4503},
  eprinttype    = {arXiv},
  eprint       = {1409.4503},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BlockiCDPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/VotipkaVC13,
  author       = {Daniel Votipka and
                  Timothy Vidas and
                  Nicolas Christin},
  title        = {Passe-Partout: {A} General Collection Methodology for Android Devices},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {8},
  number       = {12},
  pages        = {1937--1946},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIFS.2013.2285360},
  doi          = {10.1109/TIFS.2013.2285360},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/VotipkaVC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MazurekKVBCCKSU13,
  author       = {Michelle L. Mazurek and
                  Saranga Komanduri and
                  Timothy Vidas and
                  Lujo Bauer and
                  Nicolas Christin and
                  Lorrie Faith Cranor and
                  Patrick Gage Kelley and
                  Richard Shay and
                  Blase Ur},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Measuring password guessability for an entire university},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {173--186},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516726},
  doi          = {10.1145/2508859.2516726},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MazurekKVBCCKSU13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/VidasC13,
  author       = {Timothy Vidas and
                  Nicolas Christin},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Lujo Bauer and
                  Jaehong Park},
  title        = {Sweetening android lemon markets: measuring and combating malware
                  in application marketplaces},
  booktitle    = {Third {ACM} Conference on Data and Application Security and Privacy,
                  CODASPY'13, San Antonio, TX, USA, February 18-20, 2013},
  pages        = {197--208},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2435349.2435378},
  doi          = {10.1145/2435349.2435378},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/VidasC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MooreC13,
  author       = {Tyler Moore and
                  Nicolas Christin},
  editor       = {Ahmad{-}Reza Sadeghi},
  title        = {Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk},
  booktitle    = {Financial Cryptography and Data Security - 17th International Conference,
                  {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7859},
  pages        = {25--33},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39884-1\_3},
  doi          = {10.1007/978-3-642-39884-1\_3},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/MooreC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KelleyKMSVBCC13,
  author       = {Patrick Gage Kelley and
                  Saranga Komanduri and
                  Michelle L. Mazurek and
                  Richard Shay and
                  Timothy Vidas and
                  Lujo Bauer and
                  Nicolas Christin and
                  Lorrie Faith Cranor},
  editor       = {Andrew A. Adams and
                  Michael Brenner and
                  Matthew Smith},
  title        = {The Impact of Length and Mathematical Operators on the Usability and
                  Security of System-Assigned One-Time PINs},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
                  and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {34--51},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41320-9\_3},
  doi          = {10.1007/978-3-642-41320-9\_3},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/KelleyKMSVBCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/VidasOWZCC13,
  author       = {Timothy Vidas and
                  Emmanuel Owusu and
                  Shuai Wang and
                  Cheng Zeng and
                  Lorrie Faith Cranor and
                  Nicolas Christin},
  editor       = {Andrew A. Adams and
                  Michael Brenner and
                  Matthew Smith},
  title        = {QRishing: The Susceptibility of Smartphone Users to {QR} Code Phishing
                  Attacks},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
                  and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {52--69},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41320-9\_4},
  doi          = {10.1007/978-3-642-41320-9\_4},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/VidasOWZCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BlockiCDS13,
  author       = {Jeremiah Blocki and
                  Nicolas Christin and
                  Anupam Datta and
                  Arunesh Sinha},
  editor       = {Sajal K. Das and
                  Cristina Nita{-}Rotaru and
                  Murat Kantarcioglu},
  title        = {Adaptive Regret Minimization in Bounded-Memory Games},
  booktitle    = {Decision and Game Theory for Security - 4th International Conference,
                  GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8252},
  pages        = {65--84},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02786-9\_5},
  doi          = {10.1007/978-3-319-02786-9\_5},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/BlockiCDS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/BlockiCDPS13,
  author       = {Jeremiah Blocki and
                  Nicolas Christin and
                  Anupam Datta and
                  Ariel D. Procaccia and
                  Arunesh Sinha},
  editor       = {Francesca Rossi},
  title        = {Audit Games},
  booktitle    = {{IJCAI} 2013, Proceedings of the 23rd International Joint Conference
                  on Artificial Intelligence, Beijing, China, August 3-9, 2013},
  pages        = {41--47},
  publisher    = {{IJCAI/AAAI}},
  year         = {2013},
  url          = {http://www.aaai.org/ocs/index.php/IJCAI/IJCAI13/paper/view/6951},
  timestamp    = {Tue, 23 Jan 2024 13:25:46 +0100},
  biburl       = {https://dblp.org/rec/conf/ijcai/BlockiCDPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigecom/LeontiadisMC13,
  author       = {Nektarios Leontiadis and
                  Tyler Moore and
                  Nicolas Christin},
  editor       = {Michael J. Kearns and
                  R. Preston McAfee and
                  {\'{E}}va Tardos},
  title        = {Pick your poison: pricing and inventories at unlicensed online pharmacies},
  booktitle    = {Proceedings of the fourteenth {ACM} Conference on Electronic Commerce,
                  {EC} 2013, Philadelphia, PA, USA, June 16-20, 2013},
  pages        = {621--638},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2492002.2482610},
  doi          = {10.1145/2492002.2482610},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigecom/LeontiadisMC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/Christin13,
  author       = {Nicolas Christin},
  editor       = {Daniel Schwabe and
                  Virg{\'{\i}}lio A. F. Almeida and
                  Hartmut Glaser and
                  Ricardo Baeza{-}Yates and
                  Sue B. Moon},
  title        = {Traveling the silk road: a measurement analysis of a large anonymous
                  online marketplace},
  booktitle    = {22nd International World Wide Web Conference, {WWW} '13, Rio de Janeiro,
                  Brazil, May 13-17, 2013},
  pages        = {213--224},
  publisher    = {International World Wide Web Conferences Steering Committee / {ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2488388.2488408},
  doi          = {10.1145/2488388.2488408},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/Christin13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1303-0356,
  author       = {Jeremiah Blocki and
                  Nicolas Christin and
                  Anupam Datta and
                  Ariel D. Procaccia and
                  Arunesh Sinha},
  title        = {Audit Games},
  journal      = {CoRR},
  volume       = {abs/1303.0356},
  year         = {2013},
  url          = {http://arxiv.org/abs/1303.0356},
  eprinttype    = {arXiv},
  eprint       = {1303.0356},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1303-0356.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/UrKKLMMPSVBCCEL12,
  author       = {Blase Ur and
                  Patrick Gage Kelley and
                  Saranga Komanduri and
                  Joel Lee and
                  Michael Maass and
                  Michelle L. Mazurek and
                  Timothy Passaro and
                  Richard Shay and
                  Timothy Vidas and
                  Lujo Bauer and
                  Nicolas Christin and
                  Lorrie Faith Cranor and
                  Serge Egelman and
                  Julio L{\'{o}}pez},
  title        = {Helping Users Create Better Passwords},
  journal      = {login Usenix Mag.},
  volume       = {37},
  number       = {6},
  year         = {2012},
  url          = {https://www.usenix.org/publications/login/december-2012-volume-37-number-6/helping-users-create-better-passwords},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/UrKKLMMPSVBCCEL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JohnsonCGC12,
  author       = {Benjamin Johnson and
                  John Chuang and
                  Jens Grossklags and
                  Nicolas Christin},
  editor       = {Angelos D. Keromytis},
  title        = {Metrics for Measuring {ISP} Badness: The Case of Spam - (Short Paper)},
  booktitle    = {Financial Cryptography and Data Security - 16th International Conference,
                  {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7397},
  pages        = {89--97},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32946-3\_8},
  doi          = {10.1007/978-3-642-32946-3\_8},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/JohnsonCGC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BlockiCDS12,
  author       = {Jeremiah Blocki and
                  Nicolas Christin and
                  Anupam Datta and
                  Arunesh Sinha},
  editor       = {Jens Grossklags and
                  Jean C. Walrand},
  title        = {Audit Mechanisms for Provable Risk Management and Accountable Data
                  Governance},
  booktitle    = {Decision and Game Theory for Security - Third International Conference,
                  GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7638},
  pages        = {38--59},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34266-0\_3},
  doi          = {10.1007/978-3-642-34266-0\_3},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/BlockiCDS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/ShayKKMUVBCC12,
  author       = {Richard Shay and
                  Patrick Gage Kelley and
                  Saranga Komanduri and
                  Michelle L. Mazurek and
                  Blase Ur and
                  Timothy Vidas and
                  Lujo Bauer and
                  Nicolas Christin and
                  Lorrie Faith Cranor},
  editor       = {Lorrie Faith Cranor},
  title        = {Correct horse battery staple: exploring the usability of system-assigned
                  passphrases},
  booktitle    = {Symposium On Usable Privacy and Security, {SOUPS} '12, Washington,
                  DC, {USA} - July 11 - 13, 2012},
  pages        = {7},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2335356.2335366},
  doi          = {10.1145/2335356.2335366},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/soups/ShayKKMUVBCC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KelleyKMSVBCCL12,
  author       = {Patrick Gage Kelley and
                  Saranga Komanduri and
                  Michelle L. Mazurek and
                  Richard Shay and
                  Timothy Vidas and
                  Lujo Bauer and
                  Nicolas Christin and
                  Lorrie Faith Cranor and
                  Julio L{\'{o}}pez},
  title        = {Guess Again (and Again and Again): Measuring Password Strength by
                  Simulating Password-Cracking Algorithms},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012,
                  San Francisco, California, {USA}},
  pages        = {523--537},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SP.2012.38},
  doi          = {10.1109/SP.2012.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/KelleyKMSVBCCL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/UrKKLMMPSVBCC12,
  author       = {Blase Ur and
                  Patrick Gage Kelley and
                  Saranga Komanduri and
                  Joel Lee and
                  Michael Maass and
                  Michelle L. Mazurek and
                  Timothy Passaro and
                  Richard Shay and
                  Timothy Vidas and
                  Lujo Bauer and
                  Nicolas Christin and
                  Lorrie Faith Cranor},
  editor       = {Tadayoshi Kohno},
  title        = {How Does Your Password Measure Up? The Effect of Strength Meters on
                  Password Creation},
  booktitle    = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA,
                  USA, August 8-10, 2012},
  pages        = {65--80},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/ur},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/UrKKLMMPSVBCC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1207-7139,
  author       = {Nicolas Christin},
  title        = {Traveling the Silk Road: {A} measurement analysis of a large anonymous
                  online marketplace},
  journal      = {CoRR},
  volume       = {abs/1207.7139},
  year         = {2012},
  url          = {http://arxiv.org/abs/1207.7139},
  eprinttype    = {arXiv},
  eprint       = {1207.7139},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1207-7139.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/VidasZC11,
  author       = {Timothy Vidas and
                  Chengye Zhang and
                  Nicolas Christin},
  title        = {Toward a general collection methodology for Android devices},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {Supplement},
  pages        = {S14--S24},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.003},
  doi          = {10.1016/J.DIIN.2011.05.003},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/VidasZC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MooreLC11,
  author       = {Tyler Moore and
                  Nektarios Leontiadis and
                  Nicolas Christin},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Fashion crimes: trending-term exploitation on the web},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {455--466},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046761},
  doi          = {10.1145/2046707.2046761},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MooreLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/HayashiHC11,
  author       = {Eiji Hayashi and
                  Jason I. Hong and
                  Nicolas Christin},
  editor       = {Desney S. Tan and
                  Saleema Amershi and
                  Bo Begole and
                  Wendy A. Kellogg and
                  Manas Tungare},
  title        = {Security through a different kind of obscurity: evaluating distortion
                  in graphical authentication schemes},
  booktitle    = {Proceedings of the International Conference on Human Factors in Computing
                  Systems, {CHI} 2011, Vancouver, BC, Canada, May 7-12, 2011},
  pages        = {2055--2064},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1978942.1979242},
  doi          = {10.1145/1978942.1979242},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/HayashiHC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/KomanduriSKMBCCE11,
  author       = {Saranga Komanduri and
                  Richard Shay and
                  Patrick Gage Kelley and
                  Michelle L. Mazurek and
                  Lujo Bauer and
                  Nicolas Christin and
                  Lorrie Faith Cranor and
                  Serge Egelman},
  editor       = {Desney S. Tan and
                  Saleema Amershi and
                  Bo Begole and
                  Wendy A. Kellogg and
                  Manas Tungare},
  title        = {Of passwords and people: measuring the effect of password-composition
                  policies},
  booktitle    = {Proceedings of the International Conference on Human Factors in Computing
                  Systems, {CHI} 2011, Vancouver, BC, Canada, May 7-12, 2011},
  pages        = {2595--2604},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1978942.1979321},
  doi          = {10.1145/1978942.1979321},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/KomanduriSKMBCCE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BlockiCDS11,
  author       = {Jeremiah Blocki and
                  Nicolas Christin and
                  Anupam Datta and
                  Arunesh Sinha},
  title        = {Regret Minimizing Audits: {A} Learning-Theoretic Basis for Privacy
                  Protection},
  booktitle    = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011},
  pages        = {312--327},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CSF.2011.28},
  doi          = {10.1109/CSF.2011.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BlockiCDS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ChristinEVG11,
  author       = {Nicolas Christin and
                  Serge Egelman and
                  Timothy Vidas and
                  Jens Grossklags},
  editor       = {George Danezis},
  title        = {It's All about the Benjamins: An Empirical Study on Incentivizing
                  Users to Ignore Security Advice},
  booktitle    = {Financial Cryptography and Data Security - 15th International Conference,
                  {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7035},
  pages        = {16--30},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27576-0\_2},
  doi          = {10.1007/978-3-642-27576-0\_2},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/ChristinEVG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KenneallySMC11,
  author       = {Erin Kenneally and
                  Angelos Stavrou and
                  John McHugh and
                  Nicolas Christin},
  editor       = {George Danezis and
                  Sven Dietrich and
                  Kazue Sako},
  title        = {Moving Forward, Building an Ethics Community (Panel Statements)},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
                  and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  pages        = {178--183},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29889-9\_16},
  doi          = {10.1007/978-3-642-29889-9\_16},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/KenneallySMC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamenets/JohnsonGCC11,
  author       = {Benjamin Johnson and
                  Jens Grossklags and
                  Nicolas Christin and
                  John Chuang},
  editor       = {Rahul Jain and
                  Rajgopal Kannan},
  title        = {Nash Equilibria for Weakest Target Security Games with Heterogeneous
                  Agents},
  booktitle    = {Game Theory for Networks - 2nd International {ICST} Conference, {GAMENETS}
                  2011, Shanghai, China, April 16-18, 2011, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {75},
  pages        = {444--458},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-30373-9\_31},
  doi          = {10.1007/978-3-642-30373-9\_31},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamenets/JohnsonGCC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/Christin11,
  author       = {Nicolas Christin},
  editor       = {John S. Baras and
                  Jonathan Katz and
                  Eitan Altman},
  title        = {Network Security Games: Combining Game Theory, Behavioral Economics,
                  and Network Measurements},
  booktitle    = {Decision and Game Theory for Security - Second International Conference,
                  GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7037},
  pages        = {4--6},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25280-8\_2},
  doi          = {10.1007/978-3-642-25280-8\_2},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/Christin11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DattaBCDGJKS11,
  author       = {Anupam Datta and
                  Jeremiah Blocki and
                  Nicolas Christin and
                  Henry DeYoung and
                  Deepak Garg and
                  Limin Jia and
                  Dilsun Kirli Kaynar and
                  Arunesh Sinha},
  editor       = {Sushil Jajodia and
                  Chandan Mazumdar},
  title        = {Understanding and Protecting Privacy: Formal Semantics and Principled
                  Audit Mechanisms},
  booktitle    = {Information Systems Security - 7th International Conference, {ICISS}
                  2011, Kolkata, India, December 15-19, 2011, Procedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {1--27},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25560-1\_1},
  doi          = {10.1007/978-3-642-25560-1\_1},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/DattaBCDGJKS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BlockiCDS11,
  author       = {Jeremiah Blocki and
                  Nicolas Christin and
                  Anupam Datta and
                  Arunesh Sinha},
  editor       = {Ben Adida and
                  Umesh Shankar},
  title        = {Audit Mechanisms for Privacy Protection in Healthcare Environments},
  booktitle    = {2nd {USENIX} Workshop on Health Security and Privacy, HealthSec'11,
                  San Francisco, CA, USA, August 9, 2011},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {https://www.usenix.org/conference/healthsec11/audit-mechanisms-privacy-protection-healthcare-environments},
  timestamp    = {Mon, 01 Feb 2021 17:03:06 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BlockiCDS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LeontiadisMC11,
  author       = {Nektarios Leontiadis and
                  Tyler Moore and
                  Nicolas Christin},
  title        = {Measuring and Analyzing Search-Redirection Attacks in the Illicit
                  Online Prescription Drug Trade},
  booktitle    = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
                  2011, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/events/sec11/tech/full\_papers/Leontiadis.pdf},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LeontiadisMC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/VidasVC11a,
  author       = {Timothy Vidas and
                  Daniel Votipka and
                  Nicolas Christin},
  editor       = {David Brumley and
                  Michal Zalewski},
  title        = {All Your Droid Are Belong to Us: {A} Survey of Current Android Attacks},
  booktitle    = {5th {USENIX} Workshop on Offensive Technologies, WOOT'11, August 8,
                  2011, San Francisco, CA, USA, Proceedings},
  pages        = {81--90},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/event/woot11/tech/final\_files/Vidas.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/VidasVC11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-2888,
  author       = {Jeremiah Blocki and
                  Nicolas Christin and
                  Anupam Datta and
                  Arunesh Sinha},
  title        = {Adaptive Regret Minimization in Bounded-Memory Games},
  journal      = {CoRR},
  volume       = {abs/1111.2888},
  year         = {2011},
  url          = {http://arxiv.org/abs/1111.2888},
  eprinttype    = {arXiv},
  eprint       = {1111.2888},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1111-2888.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChristinYK10,
  author       = {Nicolas Christin and
                  Sally S. Yanagihara and
                  Keisuke Kamataki},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {Dissecting one click frauds},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {15--26},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866310},
  doi          = {10.1145/1866307.1866310},
  timestamp    = {Tue, 10 Nov 2020 20:00:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChristinYK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/JohnsonGCC10,
  author       = {Benjamin Johnson and
                  Jens Grossklags and
                  Nicolas Christin and
                  John Chuang},
  editor       = {Dimitris Gritzalis and
                  Bart Preneel and
                  Marianthi Theoharidou},
  title        = {Are Security Experts Useful? Bayesian Nash Equilibria for Network
                  Security Games with Limited Information},
  booktitle    = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
                  in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6345},
  pages        = {588--606},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15497-3\_36},
  doi          = {10.1007/978-3-642-15497-3\_36},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/JohnsonGCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GrossklagsJC10,
  author       = {Jens Grossklags and
                  Benjamin Johnson and
                  Nicolas Christin},
  editor       = {Radu Sion},
  title        = {When Information Improves Information Security},
  booktitle    = {Financial Cryptography and Data Security, 14th International Conference,
                  {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  pages        = {416--423},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14577-3\_37},
  doi          = {10.1007/978-3-642-14577-3\_37},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/GrossklagsJC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/JohnsonGCC10,
  author       = {Benjamin Johnson and
                  Jens Grossklags and
                  Nicolas Christin and
                  John Chuang},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {Uncertainty in Interdependent Security Games},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {234--244},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_16},
  doi          = {10.1007/978-3-642-17197-0\_16},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/JohnsonGCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KaroleSC10,
  author       = {Ambarish Karole and
                  Nitesh Saxena and
                  Nicolas Christin},
  editor       = {Kyung Hyune Rhee and
                  DaeHun Nyang},
  title        = {A Comparative Usability Evaluation of Traditional Password Managers},
  booktitle    = {Information Security and Cryptology - {ICISC} 2010 - 13th International
                  Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6829},
  pages        = {233--251},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-24209-0\_16},
  doi          = {10.1007/978-3-642-24209-0\_16},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/KaroleSC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/MolnarEC10,
  author       = {David Molnar and
                  Serge Egelman and
                  Nicolas Christin},
  editor       = {Angelos D. Keromytis and
                  Sean Peisert and
                  Richard Ford and
                  Carrie Gates},
  title        = {This is your data on drugs: lessons computer security can learn from
                  the drug war},
  booktitle    = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord,
                  MA, USA, September 21-23, 2010},
  pages        = {143--149},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1900546.1900566},
  doi          = {10.1145/1900546.1900566},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/MolnarEC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/ShayKKLMBCC10,
  author       = {Richard Shay and
                  Saranga Komanduri and
                  Patrick Gage Kelley and
                  Pedro Giovanni Leon and
                  Michelle L. Mazurek and
                  Lujo Bauer and
                  Nicolas Christin and
                  Lorrie Faith Cranor},
  editor       = {Lorrie Faith Cranor},
  title        = {Encountering stronger password requirements: user attitudes and behaviors},
  booktitle    = {Proceedings of the Sixth Symposium on Usable Privacy and Security,
                  {SOUPS} 2010, Redmond, Washington, USA, July 14-16, 2010},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {485},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1837110.1837113},
  doi          = {10.1145/1837110.1837113},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/soups/ShayKKLMBCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/EgelmanMCAHK10,
  author       = {Serge Egelman and
                  David Molnar and
                  Nicolas Christin and
                  Alessandro Acquisti and
                  Cormac Herley and
                  Shriram Krishnamurthi},
  title        = {Please Continue to Hold: An Empirical Study on User Tolerance of Security
                  Delays},
  booktitle    = {9th Annual Workshop on the Economics of Information Security, {WEIS}
                  2010, Harvard University, Cambridge, MA, USA, June 7-8, 2010},
  year         = {2010},
  url          = {http://weis2010.econinfosec.org/papers/session3/weis2010\_egelman.pdf},
  timestamp    = {Thu, 22 Jul 2021 16:15:46 +0200},
  biburl       = {https://dblp.org/rec/conf/weis/EgelmanMCAHK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/BalanRPCH09,
  author       = {Rajesh Krishna Balan and
                  Narayan Ramasubbu and
                  Komsit Prakobphol and
                  Nicolas Christin and
                  Jason I. Hong},
  editor       = {Krzysztof Zielinski and
                  Adam Wolisz and
                  Jason Flinn and
                  Anthony LaMarca},
  title        = {mFerio: the design and evaluation of a peer-to-peer mobile payment
                  system},
  booktitle    = {Proceedings of the 7th International Conference on Mobile Systems,
                  Applications, and Services (MobiSys 2009), Krak{\'{o}}w, Poland,
                  June 22-25, 2009},
  pages        = {291--304},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1555816.1555846},
  doi          = {10.1145/1555816.1555846},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisys/BalanRPCH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/HasegawaCH09,
  author       = {Madoka Hasegawa and
                  Nicolas Christin and
                  Eiji Hayashi},
  editor       = {Lorrie Faith Cranor},
  title        = {New directions in multisensory authentication},
  booktitle    = {Proceedings of the 5th Symposium on Usable Privacy and Security, {SOUPS}
                  2009, Mountain View, California, USA, July 15-17, 2009},
  series       = {{ACM} International Conference Proceeding Series},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1572532.1572584},
  doi          = {10.1145/1572532.1572584},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/soups/HasegawaCH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/HayashiHC09,
  author       = {Eiji Hayashi and
                  Jason I. Hong and
                  Nicolas Christin},
  editor       = {Lorrie Faith Cranor},
  title        = {Educated guess on graphical authentication schemes: vulnerabilities
                  and countermeasures},
  booktitle    = {Proceedings of the 5th Symposium on Usable Privacy and Security, {SOUPS}
                  2009, Mountain View, California, USA, July 15-17, 2009},
  series       = {{ACM} International Conference Proceeding Series},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1572532.1572564},
  doi          = {10.1145/1572532.1572564},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/soups/HayashiHC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/GrossklagsJC09,
  author       = {Jens Grossklags and
                  Benjamin Johnson and
                  Nicolas Christin},
  title        = {The Price of Uncertainty in Security Games},
  booktitle    = {8th Annual Workshop on the Economics of Information Security, {WEIS}
                  2009, University College London, England, UK, June 24-25, 2009},
  year         = {2009},
  url          = {http://weis09.infosecon.net/files/161/index.html},
  timestamp    = {Thu, 22 Jul 2021 16:15:45 +0200},
  biburl       = {https://dblp.org/rec/conf/weis/GrossklagsJC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/SasamotoCH08,
  author       = {Hirokazu Sasamoto and
                  Nicolas Christin and
                  Eiji Hayashi},
  editor       = {Mary Czerwinski and
                  Arnold M. Lund and
                  Desney S. Tan},
  title        = {Undercover: authentication usable in front of prying eyes},
  booktitle    = {Proceedings of the 2008 Conference on Human Factors in Computing Systems,
                  {CHI} 2008, 2008, Florence, Italy, April 5-10, 2008},
  pages        = {183--192},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1357054.1357085},
  doi          = {10.1145/1357054.1357085},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/SasamotoCH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AcquistiCPP08,
  author       = {Alessandro Acquisti and
                  Nicolas Christin and
                  Bryan Parno and
                  Adrian Perrig},
  editor       = {Gene Tsudik},
  title        = {Countermeasures against Government-Scale Monetary Forgery},
  booktitle    = {Financial Cryptography and Data Security, 12th International Conference,
                  {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5143},
  pages        = {262--266},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85230-8\_23},
  doi          = {10.1007/978-3-540-85230-8\_23},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/AcquistiCPP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/GrossklagsCC08,
  author       = {Jens Grossklags and
                  Nicolas Christin and
                  John Chuang},
  editor       = {Elizabeth F. Churchill and
                  Rachna Dhamija},
  title        = {Predicted and Observed User Behavior in the Weakest-link Security
                  Game},
  booktitle    = {Usability, Psychology, and Security, UPSEC'08, San Francisco, CA,
                  USA, April 14, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/upsec08/tech/full\_papers/grossklags/grossklags.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nsdi/GrossklagsCC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigecom/GrossklagsCC08,
  author       = {Jens Grossklags and
                  Nicolas Christin and
                  John Chuang},
  editor       = {Lance Fortnow and
                  John Riedl and
                  Tuomas Sandholm},
  title        = {Security and insurance management in networks with heterogeneous agents},
  booktitle    = {Proceedings 9th {ACM} Conference on Electronic Commerce (EC-2008),
                  Chicago, IL, USA, June 8-12, 2008},
  pages        = {160--169},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1386790.1386818},
  doi          = {10.1145/1386790.1386818},
  timestamp    = {Tue, 27 Nov 2018 11:56:48 +0100},
  biburl       = {https://dblp.org/rec/conf/sigecom/GrossklagsCC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/HayashiDCP08,
  author       = {Eiji Hayashi and
                  Rachna Dhamija and
                  Nicolas Christin and
                  Adrian Perrig},
  editor       = {Lorrie Faith Cranor},
  title        = {Use Your Illusion: secure authentication usable anywhere},
  booktitle    = {Proceedings of the 4th Symposium on Usable Privacy and Security, {SOUPS}
                  2008, Pittsburgh, Pennsylvania, USA, July 23-25, 2008},
  series       = {{ACM} International Conference Proceeding Series},
  pages        = {35--45},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1408664.1408670},
  doi          = {10.1145/1408664.1408670},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/soups/HayashiDCP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/GrossklagsCC08,
  author       = {Jens Grossklags and
                  Nicolas Christin and
                  John Chuang},
  title        = {Security Investment (Failures) in Five Economic Environments: {A}
                  Comparison of Homogeneous and Heterogeneous User Agents},
  booktitle    = {7th Annual Workshop on the Economics of Information Security, {WEIS}
                  2008, Dartmouth College, Hanover, NH, USA, June 25-28, 2008},
  year         = {2008},
  url          = {http://weis2008.econinfosec.org/papers/Grossklags.pdf},
  timestamp    = {Thu, 22 Jul 2021 16:15:45 +0200},
  biburl       = {https://dblp.org/rec/conf/weis/GrossklagsCC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/GrossklagsCC08,
  author       = {Jens Grossklags and
                  Nicolas Christin and
                  John Chuang},
  editor       = {Jinpeng Huai and
                  Robin Chen and
                  Hsiao{-}Wuen Hon and
                  Yunhao Liu and
                  Wei{-}Ying Ma and
                  Andrew Tomkins and
                  Xiaodong Zhang},
  title        = {Secure or insure?: a game-theoretic analysis of information security
                  games},
  booktitle    = {Proceedings of the 17th International Conference on World Wide Web,
                  {WWW} 2008, Beijing, China, April 21-25, 2008},
  pages        = {209--218},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1367497.1367526},
  doi          = {10.1145/1367497.1367526},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/GrossklagsCC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/ChristinLA07,
  author       = {Nicolas Christin and
                  J{\"{o}}rg Liebeherr and
                  Tarek F. Abdelzaher},
  title        = {Enhancing class-based service architectures with adaptive rate allocation
                  and dropping mechanisms},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {15},
  number       = {3},
  pages        = {669--682},
  year         = {2007},
  url          = {http://doi.acm.org/10.1145/1295237.1295252},
  doi          = {10.1145/1295237.1295252},
  timestamp    = {Tue, 23 Oct 2007 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/ChristinLA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/HabibCC07,
  author       = {Ahsan Habib and
                  Nicolas Christin and
                  John C.{-}I. Chuang},
  title        = {On the Feasibility of Switching ISPs in Residential Multihoming},
  booktitle    = {Fifteenth {IEEE} International Workshop on Quality of Service, IWQoS
                  2007, Evanston, Illinois, USA, June 21-22, 2007},
  pages        = {91--99},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/IWQOS.2007.376553},
  doi          = {10.1109/IWQOS.2007.376553},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwqos/HabibCC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/KhorCWN07,
  author       = {Soon Hin Khor and
                  Nicolas Christin and
                  Tina Wong and
                  Akihiro Nakao},
  title        = {Power to the people: securing the internet one edge at a time},
  booktitle    = {Proceedings of the 2007 Workshop on Large Scale Attack Defense, {LSAD}
                  '07, Kyoto, Japan, August 27, 2007},
  pages        = {89--96},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1352664.1352666},
  doi          = {10.1145/1352664.1352666},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/KhorCWN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ChristinL06,
  author       = {Nicolas Christin and
                  J{\"{o}}rg Liebeherr},
  title        = {The QoSbox: Quantitative service differentiation in {BSD} routers},
  journal      = {Comput. Networks},
  volume       = {50},
  number       = {17},
  pages        = {3353--3374},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.comnet.2006.01.002},
  doi          = {10.1016/J.COMNET.2006.01.002},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/ChristinL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/FiroiuZGC06,
  author       = {Victor Firoiu and
                  Xiaohui Zhang and
                  Emre G{\"{u}}nd{\"{u}}zhan and
                  Nicolas Christin},
  title        = {Providing Service Guarantees in High-Speed Switching Systems with
                  Feedback Output Queuing},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {17},
  number       = {5},
  pages        = {434--447},
  year         = {2006},
  url          = {https://doi.org/10.1109/TPDS.2006.64},
  doi          = {10.1109/TPDS.2006.64},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tpds/FiroiuZGC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/HabibCC06,
  author       = {Ahsan Habib and
                  Nicolas Christin and
                  John Chuang},
  title        = {Taking Advantage of Multihoming with Session Layer Striping},
  booktitle    = {{INFOCOM} 2006. 25th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  23-29 April 2006, Barcelona, Catalunya, Spain},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/INFOCOM.2006.54},
  doi          = {10.1109/INFOCOM.2006.54},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/HabibCC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ChristinL05,
  author       = {Nicolas Christin and
                  J{\"{o}}rg Liebeherr},
  title        = {Marking algorithms for service differentiation of {TCP} traffic},
  journal      = {Comput. Commun.},
  volume       = {28},
  number       = {18},
  pages        = {2058--2069},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.comcom.2004.07.031},
  doi          = {10.1016/J.COMCOM.2004.07.031},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/ChristinL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ChristinC05,
  author       = {Nicolas Christin and
                  John Chuang},
  title        = {A cost-based analysis of overlay routing geometries},
  booktitle    = {{INFOCOM} 2005. 24th Annual Joint Conference of the {IEEE} Computer
                  and Communications Societies, 13-17 March 2005, Miami, FL, {USA}},
  pages        = {2566--2577},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/INFCOM.2005.1498541},
  doi          = {10.1109/INFCOM.2005.1498541},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/ChristinC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigecom/ChristinWC05,
  author       = {Nicolas Christin and
                  Andreas S. Weigend and
                  John Chuang},
  editor       = {John Riedl and
                  Michael J. Kearns and
                  Michael K. Reiter},
  title        = {Content availability, pollution and poisoning in file sharing peer-to-peer
                  networks},
  booktitle    = {Proceedings 6th {ACM} Conference on Electronic Commerce (EC-2005),
                  Vancouver, BC, Canada, June 5-8, 2005},
  pages        = {68--77},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1064009.1064017},
  doi          = {10.1145/1064009.1064017},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigecom/ChristinWC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptps/ChristinC04,
  author       = {Nicolas Christin and
                  John Chuang},
  editor       = {Geoffrey M. Voelker and
                  Scott Shenker},
  title        = {On the Cost of Participating in a Peer-to-Peer Network},
  booktitle    = {Peer-to-Peer Systems III, Third International Workshop, {IPTPS} 2004,
                  La Jolla, CA, USA, February 26-27, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3279},
  pages        = {22--32},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30183-7\_3},
  doi          = {10.1007/978-3-540-30183-7\_3},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptps/ChristinC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-GT-0404040,
  author       = {Nicolas Christin and
                  Jens Grossklags and
                  John Chuang},
  title        = {Near Rationality and Competitive Equilibria in Networked Systems},
  journal      = {CoRR},
  volume       = {cs.GT/0404040},
  year         = {2004},
  url          = {http://arxiv.org/abs/cs/0404040},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/cs-GT-0404040.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-NI-0401010,
  author       = {Nicolas Christin and
                  John Chuang},
  title        = {On the Cost of Participating in a Peer-to-Peer Network},
  journal      = {CoRR},
  volume       = {cs.NI/0401010},
  year         = {2004},
  url          = {http://arxiv.org/abs/cs/0401010},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/cs-NI-0401010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-NI-0406019,
  author       = {Victor Firoiu and
                  Xiaohui Zhang and
                  Emre G{\"{u}}nd{\"{u}}zhan and
                  Nicolas Christin},
  title        = {Providing Service Guarantees in High-Speed Switching Systems with
                  Feedback Output Queuing},
  journal      = {CoRR},
  volume       = {cs.NI/0406019},
  year         = {2004},
  url          = {http://arxiv.org/abs/cs/0406019},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/cs-NI-0406019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/ChristinL03,
  author       = {Nicolas Christin and
                  J{\"{o}}rg Liebeherr},
  title        = {A QoS architecture for quantitative service differentiation},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {41},
  number       = {6},
  pages        = {38--45},
  year         = {2003},
  url          = {https://doi.org/10.1109/MCOM.2003.1204746},
  doi          = {10.1109/MCOM.2003.1204746},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cm/ChristinL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LiebeherrC02,
  author       = {J{\"{o}}rg Liebeherr and
                  Nicolas Christin},
  title        = {Rate allocation and buffer management for differentiated services},
  journal      = {Comput. Networks},
  volume       = {40},
  number       = {1},
  pages        = {89--110},
  year         = {2002},
  url          = {https://doi.org/10.1016/S1389-1286(02)00268-2},
  doi          = {10.1016/S1389-1286(02)00268-2},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/LiebeherrC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ChristinLA02,
  author       = {Nicolas Christin and
                  J{\"{o}}rg Liebeherr and
                  Tarek F. Abdelzaher},
  title        = {A Quantitative Assured Forwarding Service},
  booktitle    = {Proceedings {IEEE} {INFOCOM} 2002, The 21st Annual Joint Conference
                  of the {IEEE} Computer and Communications Societies, New York, USA,
                  June 23-27, 2002},
  pages        = {864--873},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/INFCOM.2002.1019333},
  doi          = {10.1109/INFCOM.2002.1019333},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/ChristinLA02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/LiebeherrC01,
  author       = {J{\"{o}}rg Liebeherr and
                  Nicolas Christin},
  editor       = {Lars C. Wolf and
                  David Hutchison and
                  Ralf Steinmetz},
  title        = {JoBS: Joint Buffer Management and Scheduling for Differentiated Services},
  booktitle    = {Quality of Service - IWQoS 2001, 9th International Workshop Karlsruhe,
                  Germany, June 6-8, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2092},
  pages        = {404--418},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45512-4\_31},
  doi          = {10.1007/3-540-45512-4\_31},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwqos/LiebeherrC01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics