Nicolas Christin

Publication Statistics

Publication period start
2008
Publication period end
2012
Number of co-authors
18

Co-authors

Number of publications with favourite co-authors

Productive Colleagues

Most productive colleagues in number of publications

Publications

Sasamoto, Hirokazu, Christin, Nicolas, Hayashi, Eiji (2008): Undercover: authentication usable in front of prying eyes. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 183-192. http://doi.acm.org/10.1145/1357054.1357085

Hayashi, Eiji, Dhamija, Rachna, Christin, Nicolas, Perrig, Adrian (2008): Use Your Illusion: secure authentication usable anywhere. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 35-45. http://doi.acm.org/10.1145/1408664.1408670

Grossklags, Jens, Christin, Nicolas, Chuang, John (2008): Secure or insure?: a game-theoretic analysis of information security games. In: Proceedings of the 2008 International Conference on the World Wide Web , 2008, . pp. 209-218. http://doi.acm.org/10.1145/1367497.1367526

Hayashi, Eiji, Hong, Jason, Christin, Nicolas (2009): Educated guess on graphical authentication schemes: vulnerabilities and countermeasures. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 25. http://doi.acm.org/10.1145/1572532.1572564

Hasegawa, Madoka, Christin, Nicolas, Hayashi, Eiji (2009): New directions in multisensory authentication. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 44. http://doi.acm.org/10.1145/1572532.1572584

Shay, Richard, Komanduri, Saranga, Kelley, Patrick Gage, Leon, Pedro Giovanni, Mazurek, Michelle L., Bauer, Lujo, Christin, Nicolas, Cranor, Lorrie Faith (2010): Encountering stronger password requirements: user attitudes and behaviors. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 2. http://doi.acm.org/10.1145/1837110.1837113

Hayashi, Eiji, Hong, Jason, Christin, Nicolas (2011): Security through a different kind of obscurity: evaluating distortion in graphical authent. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 2055-2064. http://dx.doi.org/10.1145/1978942.1979242

Komanduri, Saranga, Shay, Richard, Kelley, Patrick Gage, Mazurek, Michelle L., Bauer, Lujo, Christin, Nicolas, Cranor, Lorrie Faith, Egelman, Serge (2011): Of passwords and people: measuring the effect of password-composition policies. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 2595-2604. http://dx.doi.org/10.1145/1978942.1979321

Shay, Richard, Kelley, Patrick Gage, Komanduri, Saranga, Mazurek, Michelle L., Ur, Blase, Vidas, Timothy, Bauer, Lujo, Christin, Nicolas, Cranor, Lorrie Faith (2012): Correct horse battery staple: exploring the usability of system-assigned passphrases. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 7. http://dx.doi.org/10.1145/2335356.2335366