Search
for Author
All Reviews
Christin, Nicolas
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
4
of
4
reviews
Revisiting the risks of Bitcoin currency exchange closure
Moore T., Christin N., Szurdi J. ACM Transactions on Internet Technology 18(4): 1-18, 2018. Type: Article
As someone who has written a few general articles on the topic of Bitcoin and cryptocurrencies, this review assignment was extremely interesting to me. Because of its specificity, it was interesting to delve into an aspect of currency ...
...
Mar 26 2019
Designing password policies for strength and usability
Shay R., Komanduri S., Durity A., Huh P., Mazurek M., Segreti S., Ur B., Bauer L., Christin N., Cranor L. ACM Transactions on Information and System Security 18(4): Article No. 13, 2016. Type: Article
Have you ever wondered why some websites use really annoying password policies? Or have you been responsible for designing a password policy for your organization, and been caught between the users’ demands for easy-to-rememb...
...
Jun 27 2017
Traveling the Silk Road: a measurement analysis of a large anonymous online marketplace
Christin N. WWW 2013 (Proceedings of the 22nd International World Wide Web Conference, Rio de Janeiro, Brazil, May 13-17, 2013) 213-224, 2013. Type: Proceedings
On October 1, 2013, US federal agencies (the Federal Bureau of Investigation (FBI), the Drug Enforcement Agency (DEA), and the Internal Revenue Service (IRS)) shut down Silk Road [1], a Tor hidden service that was an anonymous marketpl...
...
Apr 15 2014
Correct horse battery staple: exploring the usability of system-assigned passphrases
Shay R., Kelley P., Komanduri S., Mazurek M., Ur B., Vidas T., Bauer L., Christin N., Cranor L. SOUPS 2012 (Proceedings of the 8th Symposium on Usable Privacy and Security, Washington, DC, Jul 11-13, 2012) 1-20, 2012. Type: Proceedings
This paper describes research associated with systems security. It will be of interest to system administrators and people monitoring network security for an organization. It will also be of interest to people doing research in systems...
...
Nov 21 2012
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy