What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Nicolas Christin
Google Scholar
ORCID:
0000-0002-2506-8031
63
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
Rethinking Fingerprinting: An Assessment of Behavior-based Methods at Scale and Implications for Web Tracking.
Kyle Crichton
Lorrie Faith Cranor
Nicolas Christin
2025
conf/soups
Misuse, Misreporting, Misinterpretation of Statistical Methods in Usable Privacy and Security Papers.
Jenny Tang
Lujo Bauer
Nicolas Christin
2025
conf/uss
Blockchain Address Poisoning.
Taro Tsuchiya
Jin-Dong Dong
Kyle Soska
Nicolas Christin
2024
journals/popets
Automatic Generation of Web Censorship Probe Lists.
Jenny Tang
Léo Alvarez
Arjun Brar
Nguyen Phong Hoang
Nicolas Christin
2024
conf/uss
Does Online Anonymous Market Vendor Reputation Matter?
Alejandro Cuevas
Nicolas Christin
2024
conf/uss
GFWeb: Measuring the Great Firewall's Web Censorship at Scale.
Nguyen Phong Hoang
Jakub Dalek
Masashi Crete-Nishihata
Nicolas Christin
Vinod Yegneswaran
Michalis Polychronakis
Nick Feamster
2024
conf/soups
"It was honestly just gambling": Investigating the Experiences of Teenage Cryptocurrency Users on Reddit.
Elijah Robert Bouma-Sims
Hiba Hassan
Alexandra Nisenoff
Lorrie Faith Cranor
Nicolas Christin
2024
conf/ndss
Flow Correlation Attacks on Tor Onion Service Sessions with Sliding Subset Sum.
Daniela Lopes
Jin-Dong Dong
Pedro Medeiros
Daniel Castro
Diogo Barradas
Bernardo Portela
João Vinagre
Bernardo Ferreira
Nicolas Christin
Nuno Santos
2023
conf/uss
Assessing Anonymity Techniques Employed in German Court Decisions: A De-Anonymization Experiment.
Dominic Deuber
Michael Keuchen
Nicolas Christin
2022
conf/ccs
Poster: User Sessions on Tor Onion Services: Can Colluding ISPs Deanonymize Them at Scale?
Daniela Lopes
Pedro Medeiros
Jin-Dong Dong
Diogo Barradas
Bernardo Portela
João Vinagre
Bernardo Ferreira
Nicolas Christin
Nuno Santos
2022
conf/uss
Measurement by Proxy: On the Accuracy of Online Marketplace Measurements.
Alejandro Cuevas
Fieke Miedema
Kyle Soska
Nicolas Christin
Rolf van Wegberg
2022
conf/soups
On recruiting and retaining users for security-sensitive longitudinal measurement panels.
Akira Yamada
Kyle Crichton
Yukiko Sawaya
Jin-Dong Dong
Sarah Pearman
Ayumu Kubota
Nicolas Christin
2021
conf/sp
Self-Supervised Euphemism Detection and Identification for Content Moderation.
Wanzheng Zhu
Hongyu Gong
Rohan Bansal
Zachary Weinberg
Nicolas Christin
Giulia Fanti
Suma Bhat
2021
conf/eurosp
SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations.
Mathew Vermeer
Jonathan West
Alejandro Cuevas
Shuonan Niu
Nicolas Christin
Michel van Eeten
Tobias Fiebig
Carlos Gañán
Tyler Moore
2020
conf/ccs
Practical Recommendations for Stronger, More Usable Passwords Combining Minimum-strength, Minimum-length, and Blocklist Requirements.
Joshua Tan
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
2020
conf/fc
Open Market or Ghost Town? The Curious Case of OpenBazaar.
James E. Arps
Nicolas Christin
2020
conf/sp
ICLab: A Global, Longitudinal Internet Censorship Measurement Platform.
Arian Akhavan Niaki
Shinyoung Cho
Zachary Weinberg
Nguyen Phong Hoang
Abbas Razaghpanah
Nicolas Christin
Phillipa Gill
2019
conf/soups
Why people (don't) use password managers effectively.
Shikun Zhang
Sarah Pearman
Lujo Bauer
Nicolas Christin
2018
journals/popets
An Empirical Analysis of Traceability in the Monero Blockchain.
Malte Möser
Kyle Soska
Ethan Heilman
Kevin Lee
Henry Heffan
Shashvat Srivastava
Kyle Hogan
Jason Hennessey
Andrew Miller
Arvind Narayanan
Nicolas Christin
2018
conf/ccs
Predicting Impending Exposure to Malicious Content from User Behavior.
Mahmood Sharif
Jumpei Urakawa
Nicolas Christin
Ayumu Kubota
Akira Yamada
2018
conf/uss
Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets.
Rolf van Wegberg
Samaneh Tajalizadehkhoob
Kyle Soska
Ugur Akyazi
Carlos Hernandez Gañán
Bram Klievink
Nicolas Christin
Michel van Eeten
2018
conf/soups
User Behaviors and Attitudes Under Password Expiration Policies.
Hana Habib
Pardis Emami Naeini
Summer Devlin
Maggie Oates
Chelse Swoopes
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
2018
conf/soups
Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing.
Hana Habib
Jessica Colnago
Vidya Gopalakrishnan
Sarah Pearman
Jeremy Thomas
Alessandro Acquisti
Nicolas Christin
Lorrie Faith Cranor
2017
journals/popets
Topics of Controversy: An Empirical Analysis of Web Censorship Lists.
Zachary Weinberg
Mahmood Sharif
Janos Szurdi
Nicolas Christin
2017
conf/ccs
Let's Go in for a Closer Look: Observing Passwords in Their Natural Habitat.
Sarah Pearman
Jeremy Thomas
Pardis Emami Naeini
Hana Habib
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
Serge Egelman
Alain Forget
2017
conf/soups
Diversify to Survive: Making Passwords Stronger with Adaptive Policies.
Sean M. Segreti
William Melicher
Saranga Komanduri
Darya Melicher
Richard Shay
Blase Ur
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
Michelle L. Mazurek
2016
conf/uss
Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks.
William Melicher
Blase Ur
Sean M. Segreti
Saranga Komanduri
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
2016
conf/soups
Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes.
Alain Forget
Sarah Pearman
Jeremy Thomas
Alessandro Acquisti
Nicolas Christin
Lorrie Faith Cranor
Serge Egelman
Marian Harbach
Rahul Telang
2015
journals/popets
Toward Mending Two Nation-Scale Brokered Identification Systems.
Luís T. A. N. Brandão
Nicolas Christin
George Danezis
anonymous
2015
conf/uss
Measuring Real-World Accuracies and Biases in Modeling Password Guessability.
Blase Ur
Sean M. Segreti
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
Saranga Komanduri
Darya Kurilova
Michelle L. Mazurek
William Melicher
Richard Shay
2015
conf/uss
Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem.
Kyle Soska
Nicolas Christin
2015
conf/soups
"I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab.
Blase Ur
Fumiko Noma
Jonathan Bees
Sean M. Segreti
Richard Shay
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
2014
conf/ccs
Evading android runtime analysis via sandbox detection.
Timothy Vidas
Nicolas Christin
2014
conf/ccs
A5: Automated Analysis of Adversarial Android Applications.
Timothy Vidas
Jiaqi Tan
Jay Nahata
Chaur Lih Tan
Nicolas Christin
Patrick Tague
2014
conf/ccs
A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning.
Nektarios Leontiadis
Tyler Moore
Nicolas Christin
2014
conf/uss
Automatically Detecting Vulnerable Websites Before They Turn Malicious.
Kyle Soska
Nicolas Christin
2014
conf/esorics
Empirically Measuring WHOIS Misuse.
Nektarios Leontiadis
Nicolas Christin
2013
journals/tifs
Passe-Partout: A General Collection Methodology for Android Devices.
Daniel Votipka
Timothy Vidas
Nicolas Christin
2013
conf/ccs
Measuring password guessability for an entire university.
Michelle L. Mazurek
Saranga Komanduri
Timothy Vidas
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
Patrick Gage Kelley
Richard Shay
Blase Ur
2013
conf/fc
Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk.
Tyler Moore
Nicolas Christin
2013
conf/fc
The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs.
Patrick Gage Kelley
Saranga Komanduri
Michelle L. Mazurek
Richard Shay
Timothy Vidas
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
2013
conf/fc
QRishing: The Susceptibility of Smartphone Users to QR Code Phishing Attacks.
Timothy Vidas
Emmanuel Owusu
Shuai Wang
Cheng Zeng
Lorrie Faith Cranor
Nicolas Christin
2012
conf/uss
How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation.
Blase Ur
Patrick Gage Kelley
Saranga Komanduri
Joel Lee
Michael Maass
Michelle L. Mazurek
Timothy Passaro
Richard Shay
Timothy Vidas
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
2012
conf/fc
Metrics for Measuring ISP Badness: The Case of Spam - (Short Paper).
Benjamin Johnson
John Chuang
Jens Grossklags
Nicolas Christin
2012
conf/sp
Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms.
Patrick Gage Kelley
Saranga Komanduri
Michelle L. Mazurek
Richard Shay
Timothy Vidas
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
Julio C. López
2012
conf/soups
Correct horse battery staple: exploring the usability of system-assigned passphrases.
Richard Shay
Patrick Gage Kelley
Saranga Komanduri
Michelle L. Mazurek
Blase Ur
Timothy Vidas
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
2011
conf/ccs
Fashion crimes: trending-term exploitation on the web.
Tyler Moore
Nektarios Leontiadis
Nicolas Christin
2011
conf/uss
All Your Droid Are Belong to Us: A Survey of Current Android Attacks.
Timothy Vidas
Daniel Votipka
Nicolas Christin
2011
conf/uss
Audit Mechanisms for Privacy Protection in Healthcare Environments.
Jeremiah Blocki
Nicolas Christin
Anupam Datta
Arunesh Sinha
2011
conf/uss
Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade.
Nektarios Leontiadis
Tyler Moore
Nicolas Christin
2011
conf/fc
Moving Forward, Building an Ethics Community (Panel Statements).
Erin Kenneally
Angelos Stavrou
John McHugh
Nicolas Christin
2011
conf/fc
It's All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice.
Nicolas Christin
Serge Egelman
Timothy Vidas
Jens Grossklags
2011
conf/iciss
Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms.
Anupam Datta
Jeremiah Blocki
Nicolas Christin
Henry DeYoung
Deepak Garg
Limin Jia
Dilsun Kirli Kaynar
Arunesh Sinha
2010
conf/ccs
Dissecting one click frauds.
Nicolas Christin
Sally S. Yanagihara
Keisuke Kamataki
2010
conf/fc
When Information Improves Information Security.
Jens Grossklags
Benjamin Johnson
Nicolas Christin
2010
conf/nspw
This is your data on drugs: lessons computer security can learn from the drug war.
David Molnar
Serge Egelman
Nicolas Christin
2010
conf/icisc
A Comparative Usability Evaluation of Traditional Password Managers.
Ambarish Karole
Nitesh Saxena
Nicolas Christin
2010
conf/soups
Encountering stronger password requirements: user attitudes and behaviors.
Richard Shay
Saranga Komanduri
Patrick Gage Kelley
Pedro Giovanni Leon
Michelle L. Mazurek
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
2010
conf/esorics
Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information.
Benjamin Johnson
Jens Grossklags
Nicolas Christin
John Chuang
2009
conf/soups
Educated guess on graphical authentication schemes: vulnerabilities and countermeasures.
Eiji Hayashi
Jason I. Hong
Nicolas Christin
2009
conf/soups
New directions in multisensory authentication.
Madoka Hasegawa
Nicolas Christin
Eiji Hayashi
2008
conf/fc
Countermeasures against Government-Scale Monetary Forgery.
Alessandro Acquisti
Nicolas Christin
Bryan Parno
Adrian Perrig
2008
conf/soups
Use Your Illusion: secure authentication usable anywhere.
Eiji Hayashi
Rachna Dhamija
Nicolas Christin
Adrian Perrig
Coauthors
Abbas Razaghpanah
(1)
Adrian Perrig
(2)
Akira Yamada
(2)
Alain Forget
(2)
Alejandro Cuevas
(3)
Alessandro Acquisti
(3)
Alexandra Nisenoff
(1)
Ambarish Karole
(1)
Andrew Miller
(1)
Angelos Stavrou
(1)
anonymous
(1)
Anupam Datta
(2)
Arian Akhavan Niaki
(1)
Arjun Brar
(1)
Arunesh Sinha
(2)
Arvind Narayanan
(1)
Ayumu Kubota
(2)
Benjamin Johnson
(3)
Bernardo Ferreira
(2)
Bernardo Portela
(2)
Blase Ur
(7)
Bram Klievink
(1)
Bryan Parno
(1)
Carlos Gañán
(1)
Carlos Hernandez Gañán
(1)
Chaur Lih Tan
(1)
Chelse Swoopes
(1)
Cheng Zeng
(1)
Daniel Castro
(1)
Daniel Votipka
(2)
Daniela Lopes
(2)
Darya Kurilova
(1)
Darya Melicher
(1)
David Molnar
(1)
Deepak Garg
(1)
Dilsun Kirli Kaynar
(1)
Diogo Barradas
(2)
Dominic Deuber
(1)
Eiji Hayashi
(3)
Elijah Robert Bouma-Sims
(1)
Emmanuel Owusu
(1)
Erin Kenneally
(1)
Ethan Heilman
(1)
Fieke Miedema
(1)
Fumiko Noma
(1)
George Danezis
(1)
Giulia Fanti
(1)
Hana Habib
(3)
Henry DeYoung
(1)
Henry Heffan
(1)
Hiba Hassan
(1)
Hongyu Gong
(1)
Jakub Dalek
(1)
James E. Arps
(1)
Janos Szurdi
(1)
Jason Hennessey
(1)
Jason I. Hong
(1)
Jay Nahata
(1)
Jenny Tang
(2)
Jens Grossklags
(4)
Jeremiah Blocki
(2)
Jeremy Thomas
(3)
Jessica Colnago
(1)
Jiaqi Tan
(1)
Jin-Dong Dong
(4)
João Vinagre
(2)
Joel Lee
(1)
John Chuang
(2)
John McHugh
(1)
Jonathan Bees
(1)
Jonathan West
(1)
Joshua Tan
(1)
Julio C. López
(1)
Jumpei Urakawa
(1)
Keisuke Kamataki
(1)
Kevin Lee
(1)
Kyle Crichton
(2)
Kyle Hogan
(1)
Kyle Soska
(6)
Léo Alvarez
(1)
Limin Jia
(1)
Lorrie Faith Cranor
(18)
Luís T. A. N. Brandão
(1)
Lujo Bauer
(15)
Madoka Hasegawa
(1)
Maggie Oates
(1)
Mahmood Sharif
(2)
Malte Möser
(1)
Marian Harbach
(1)
Masashi Crete-Nishihata
(1)
Mathew Vermeer
(1)
Michael Keuchen
(1)
Michael Maass
(1)
Michalis Polychronakis
(1)
Michel van Eeten
(2)
Michelle L. Mazurek
(8)
Nektarios Leontiadis
(4)
Nguyen Phong Hoang
(3)
Nick Feamster
(1)
Nicolas Christin
(63)
Nitesh Saxena
(1)
Nuno Santos
(2)
Pardis Emami Naeini
(2)
Patrick Gage Kelley
(6)
Patrick Tague
(1)
Pedro Giovanni Leon
(1)
Pedro Medeiros
(2)
Phillipa Gill
(1)
Rachna Dhamija
(1)
Rahul Telang
(1)
Richard Shay
(9)
Rohan Bansal
(1)
Rolf van Wegberg
(2)
Sally S. Yanagihara
(1)
Samaneh Tajalizadehkhoob
(1)
Sarah Pearman
(5)
Saranga Komanduri
(9)
Sean M. Segreti
(4)
Serge Egelman
(4)
Shashvat Srivastava
(1)
Shikun Zhang
(1)
Shinyoung Cho
(1)
Shuai Wang
(1)
Shuonan Niu
(1)
Suma Bhat
(1)
Summer Devlin
(1)
Taro Tsuchiya
(1)
Timothy Passaro
(1)
Timothy Vidas
(11)
Tobias Fiebig
(1)
Tyler Moore
(5)
Ugur Akyazi
(1)
Vidya Gopalakrishnan
(1)
Vinod Yegneswaran
(1)
Wanzheng Zhu
(1)
William Melicher
(3)
Yukiko Sawaya
(1)
Zachary Weinberg
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to