His primary scientific interests are in Computer security, Password, Internet privacy, Cognitive password and Password strength. Nicolas Christin merges Computer security with Potential impact in his research. Nicolas Christin combines subjects such as Usability and Authentication with his study of Password.
His Internet privacy research integrates issues from Visual feedback, Anonymity, Law enforcement, Vendor and Demise. His studies deal with areas such as Parameterized complexity, Data mining, Measure and Security audit as well as Cognitive password. His study in the field of Password cracking is also linked to topics like Markov model.
His primary areas of study are Computer security, Internet privacy, Password, Usability and Password strength. The various areas that Nicolas Christin examines in his Computer security study include World Wide Web and Mobile device. His Internet privacy study combines topics from a wide range of disciplines, such as Service provider and Identification.
His research in Password intersects with topics in Artificial neural network and Resilience. His study in Password strength focuses on Password cracking in particular. His biological study spans a wide range of topics, including Incentive and Game theory.
Nicolas Christin mostly deals with Computer security, Password, Internet privacy, Cryptocurrency and Malware. His work on Chinese wall as part of his general Computer security study is frequently connected to Structure, thereby bridging the divide between different branches of science. In the field of Password, his study on Password policy and Password strength overlaps with subjects such as Expiration.
His work deals with themes such as Password management, S/KEY and Usability, which intersect with Password policy. His Internet privacy research is multidisciplinary, incorporating perspectives in Social media and Text corpus. His Cryptocurrency research incorporates elements of Database transaction, Cybercrime and Monetary economics, Currency.
His primary areas of investigation include Computer security, Password strength, Password, Usability and Traceability. His research on Computer security focuses in particular on Network security. His Password strength research focuses on Cognitive password in particular.
His Cognitive password study combines topics in areas such as Data-driven, Password psychology and Human–computer interaction. While the research belongs to areas of Usability, he spends his time largely on the problem of Software deployment, intersecting his research to questions surrounding Internet privacy. His Traceability study integrates concerns from other disciplines, such as Database transaction, Database, Cryptocurrency, Volume and Blockchain.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Bitcoin: economics, technology, and governance
Rainer Böhme;Nicolas Christin;Benjamin Edelman;Tyler Moore.
Journal of Economic Perspectives (2015)
Traveling the silk road: a measurement analysis of a large anonymous online marketplace
the web conference (2013)
Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms
P. G. Kelley;S. Komanduri;M. L. Mazurek;R. Shay.
ieee symposium on security and privacy (2012)
Of passwords and people: measuring the effect of password-composition policies
Saranga Komanduri;Richard Shay;Patrick Gage Kelley;Michelle L. Mazurek.
human factors in computing systems (2011)
Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk
Tyler Moore;Nicolas Christin.
financial cryptography (2013)
Encountering stronger password requirements: user attitudes and behaviors
Richard Shay;Saranga Komanduri;Patrick Gage Kelley;Pedro Giovanni Leon.
symposium on usable privacy and security (2010)
Measuring the longitudinal evolution of the online anonymous marketplace ecosystem
Kyle Soska;Nicolas Christin.
usenix security symposium (2015)
How does your password measure up? the effect of strength meters on password creation
Blase Ur;Patrick Gage Kelley;Saranga Komanduri;Joel Lee.
usenix security symposium (2012)
Secure or insure?: a game-theoretic analysis of information security games
Jens Grossklags;Nicolas Christin;John Chuang.
the web conference (2008)
Content availability, pollution and poisoning in file sharing peer-to-peer networks
Nicolas Christin;Andreas S. Weigend;John Chuang.
electronic commerce (2005)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: