Bitcoin: Economics, Technology and Governance R Böhme, N Christin, BG Edelman, T Moore The Journal of Economic Perspectives 29 (2), 213-238, 2015 | 2496 | 2015 |
Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace N Christin Proc. 22nd International Conference on the World Wide Web (WWW'13), 213-223, 2013 | 1067 | 2013 |
Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk T Moore, N Christin Financial Cryptography and Data Security, 2013 | 606 | 2013 |
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms P Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, N Christin, ... Proc. IEEE Security & Privacy (Oakland'12), 2012 | 605 | 2012 |
Of passwords and people: measuring the effect of password-composition policies S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ... Proceedings of the sigchi conference on human factors in computing systems …, 2011 | 567 | 2011 |
Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem K Soska, N Christin 24th USENIX Security Symposium (USENIX Security 15), 33-48, 2015 | 546 | 2015 |
Encountering stronger password requirements: user attitudes and behaviors R Shay, S Komanduri, PG Kelley, PG Leon, ML Mazurek, L Bauer, ... Proceedings of the sixth symposium on usable privacy and security, 1-20, 2010 | 482 | 2010 |
How does your password measure up? The effect of strength meters on password creation B Ur, PG Kelley, S Komanduri, J Lee, M Maass, ML Mazurek, T Passaro, ... 21st USENIX security symposium (USENIX Security 12), 65-80, 2012 | 414 | 2012 |
An Empirical Analysis of Traceability in the Monero Blockchain M Möser, K Soska, E Heilman, K Lee, H Heffan, S Srivastava, K Hogan, ... Proceedings on Privacy Enhancing Technologies 3, 2018 | 343 | 2018 |
Fast, lean, and accurate: Modeling password guessability using neural networks W Melicher, B Ur, SM Segreti, S Komanduri, L Bauer, N Christin, ... 25th USENIX Security Symposium (USENIX Security 16), 175-191, 2016 | 340 | 2016 |
Evading Android Runtime Analysis via Sandbox Detection T Vidas, N Christin ASIACSS 2014, 2014 | 334 | 2014 |
Secure or insure?: a game-theoretic analysis of information security games J Grossklags, N Christin, J Chuang Proceedings of the 17th international conference on World Wide Web, 209-218, 2008 | 334 | 2008 |
Measuring password guessability for an entire university ML Mazurek, S Komanduri, T Vidas, L Bauer, N Christin, LF Cranor, ... Proceedings ACM CCS 2013, 173-186, 2013 | 319 | 2013 |
Content availability, pollution and poisoning in file sharing peer-to-peer networks N Christin, AS Weigend, J Chuang Proceedings of the 6th ACM conference on Electronic commerce, 68-77, 2005 | 318 | 2005 |
"I added ‘!’ at the end to make it secure”: Observing password creation in the lab B Ur, F Noma, J Bees, SM Segreti, R Shay, L Bauer, N Christin, LF Cranor Proc. SOUPS, 2015 | 310 | 2015 |
All Your Droid Are Belong to Us: A Survey of Current Android Attacks T Vidas, D Votipka, N Christin WOOT, 81-90, 2011 | 245 | 2011 |
Curbing Android permission creep T Vidas, N Christin, L Cranor Proceedings of W2SP, 2011 | 238 | 2011 |
Do Users’ Perceptions of Password Security Match Reality? B Ur, J Bees, S Segreti, L Bauer, N Christin, L Cranor, A Deepak Proc. ACM CHI'16, 3748-3760, 2016 | 231 | 2016 |
Toward a general collection methodology for Android devices T Vidas, C Zhang, N Christin digital investigation 8, S14-S24, 2011 | 228 | 2011 |
Measuring Real-World Accuracies and Biases in Modeling Password Guessability B Ur, SM Segreti, L Bauer, N Christin, LF Cranor, S Komanduri, D Kurilova, ... USENIX Security, 463-481, 2015 | 218 | 2015 |