Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Christin, Nicolas Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 4 of 4 reviews    
  Revisiting the risks of Bitcoin currency exchange closure
Moore T., Christin N., Szurdi J. ACM Transactions on Internet Technology 18(4): 1-18, 2018.  Type: Article

As someone who has written a few general articles on the topic of Bitcoin and cryptocurrencies, this review assignment was extremely interesting to me. Because of its specificity, it was interesting to delve into an aspect of currency ...
...
Mar 26 2019  
  Designing password policies for strength and usability
Shay R., Komanduri S., Durity A., Huh P., Mazurek M., Segreti S., Ur B., Bauer L., Christin N., Cranor L. ACM Transactions on Information and System Security 18(4): Article No. 13, 2016.  Type: Article

Have you ever wondered why some websites use really annoying password policies? Or have you been responsible for designing a password policy for your organization, and been caught between the users’ demands for easy-to-rememb...
...
Jun 27 2017  
  Traveling the Silk Road: a measurement analysis of a large anonymous online marketplace
Christin N.  WWW 2013 (Proceedings of the 22nd International World Wide Web Conference, Rio de Janeiro, Brazil, May 13-17, 2013) 213-224, 2013.  Type: Proceedings

On October 1, 2013, US federal agencies (the Federal Bureau of Investigation (FBI), the Drug Enforcement Agency (DEA), and the Internal Revenue Service (IRS)) shut down Silk Road [1], a Tor hidden service that was an anonymous marketpl...
...
Apr 15 2014  
   Correct horse battery staple: exploring the usability of system-assigned passphrases
Shay R., Kelley P., Komanduri S., Mazurek M., Ur B., Vidas T., Bauer L., Christin N., Cranor L.  SOUPS 2012 (Proceedings of the 8th Symposium on Usable Privacy and Security, Washington, DC, Jul 11-13, 2012) 1-20, 2012.  Type: Proceedings

This paper describes research associated with systems security. It will be of interest to system administrators and people monitoring network security for an organization. It will also be of interest to people doing research in systems...
...
Nov 21 2012  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy