Publications are sorted in reverse chronological order. (You may want to check this page instead if you prefer to see papers sorted by topic.)

The documents distributed from this webpage are provided as a means to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Some of the works presented here are © ACM. This is the authors' version of the work. It is posted here by permission of the ACM for your personal use. Not for redistribution.

2014

Nektarios Leontiadis, Tyler Moore, and Nicolas Christin. A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning. To appear in Proceedings of the 21st ACM Conference on Computer and Communication Security (CCS'14). Scottsdale, AZ. November 2014.
[paper (pdf, 1.3M)]   [BibTeX]

Timothy Vidas, Jiaqi Tan, Jay Nahata, Chaur Lih Tan, Nicolas Christin, and Patrick Tague. A5: Automated Analysis of Adversarial Android Applications. To appear in Proceedings of the 4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2014). Scottsdale, AZ. November 2014.
See also (preliminary version): CMU CyLab Technical Report CMU-CyLab-13-009. February 2013 (revised: July 2014).
[tech report (pdf, 296K)]   [BibTeX]   [Project website]

Nektarios Leontiadis and Nicolas Christin. Empirically measuring WHOIS misuse. To appear in Proceedings of the 19th European Symposium on Research in Computer Security (ESORICS 2014). Wroclaw, Poland. September 2014.
[BibTeX]

Kyle Soska and Nicolas Christin. Automatically Detecting Vulnerable Websites Before They Turn Malicious. In Proceedings of the 23rd USENIX Security Symposium (USENIX Security'14), pages 625-640. San Diego, CA. August 2014. Best student paper award.
[paper (pdf, 3.3M)]   [BibTeX]   [slides (pdf, 4.5M)]   [Trailer ("Lightning talk") (mp4, 14M)]  [Trailer ("Lightning talk") (YouTube)]

James Graves, Alessandro Acquisti and Nicolas Christin. Should Payment Card Issuers Re-Issue Cards in Response to a Data Breach? To appear in Proceedings (online) of the 13th Workshop on Economics of Information Security (WEIS 2014). State College, PA. June 2014.
[paper (pdf, 6.6M)]   [BibTeX]

Timothy Vidas and Nicolas Christin. Evading Android Runtime Analysis via Sandbox Detection. To appear in Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS'14). Kyoto, Japan. June 2014.
[paper (pdf, 220K)]   [BibTeX]

Nicolas Christin. Steps toward characterizing online anonymous drug marketplaces customers. (Commentary on Barratt et al: Use of Silk Road, the online drug marketplace, in the UK, Australia and the USA.) In Addiction, volume 109, issue 5, pages 784-785. May 2014
[paper (pdf, 1.1M)]    [BibTeX]

Richard Shay, Saranga Komanduri, Adam Durity, Phillip Huh, Michelle Mazurek, Sean Segreti, Blase Ur, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor. Can Long Passwords Be Secure and Usable? In Proceedings of the 2014 ACM Conference on Human Factors in Computing Systems (CHI 2014). Toronto, ON, Canada. May 2014.
[paper (pdf, 250K)]    [BibTeX]

2013

Daniel Votipka, Timothy Vidas, and Nicolas Christin. Passe-Partout: A General Collection Methodology for Android Devices. In IEEE Transactions on Information Forensics and Security, Volume 8, Number 12, pages 1937-1946. December 2013.
[paper (pdf, 3.2M)]   [BibTeX]

Jeremiah Blocki, Nicolas Christin, Anupam Datta, and Arunesh Sinha. Adaptive Regret Minimization in Bounded-Memory Games. In Proceedings of the 4th Conference on Decision and Game Theory for Security (GameSec 2013) (Invited paper). Fort Worth, Texas. November 2013.
See also (extended version): arXiv 1111.2888 [cs.GT], November 2011 (last revised: March 2013).
[paper (pdf, 352K)]    [BibTeX]

Michelle Mazurek, Saranga Komanduri, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Patrick Gage Kelley, Richard Shay, and Blase Ur. Measuring Password Guessability for an Entire University. In Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS 2013), pages 173-186. Berlin, Germany. November 2013.
See also (longer version): CMU CyLab Technical Report CMU-CyLab-13-013, March 2013.
[pdf, 3M] [BibTeX]

Jeremiah Blocki, Nicolas Christin, Anupam Datta, Ariel Procaccia, and Arunesh Sinha. Audit Games. In Proceedings of the 23rd International Joint Conference on Artificial Intelligence (IJCAI'13), pages 41-47. Beijing, China. August 2013.
See also (preliminary, long version): CMU CyLab Technical Report CMU-CyLab-13-004, March 2013.
[paper (pdf, 560K)]    [BibTeX]

Nektarios Leontiadis, Tyler Moore, and Nicolas Christin. Pick Your Poison: Pricing and Inventories at Unlicensed Online Pharmacies. In Proceedings of the 14th ACM Conference on Electronic Commerce (EC'13), pages 621-638. Philadelphia, PA. June 2013.
[paper (pdf, 1.3M)]  [BibTeX]

Nicolas Christin. Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace. In Proceedings of the 22nd International World Wide Web Conference (WWW'13), pages 213-224. Rio de Janeiro, Brazil. May 2013.
See also (preliminary version): CMU CyLab Technical Report CMU-CyLab-12-018. (Also: arXiv 1207.7139 [cs.CY].) July 2012 (revised: November 2012).
[paper (pdf, 896K)]   [BibTeX]   [slides (pdf, 5.7M)]   [datasets]

Tyler Moore and Nicolas Christin. Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk. In Proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC'13), pages 25-33. Naha, Japan. April 2013.
[paper (pdf, 248K)]  [BibTeX]  [slides (pdf, 1.3M)]

Timothy Vidas, Emmanuel Owusu, Shuai Wang, Cheng Zeng, Lorrie Faith Cranor, and Nicolas Christin. QRishing: The Susceptibility of Smartphone Users to QR Code Phishing Attacks. In Proceedings of the 2013 Workshop on Usable Security (USEC'13), pages 52-69. Naha, Japan. April 2013.
[paper (pdf, 704K)]  [BibTeX]

Patrick Gage Kelley, Saranga Komanduri, Michelle Mazurek, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor. The impact of length and mathematical operators on the usability and security of system-assigned one-time PINs. To appear in Proceedings of the 2013 Workshop on Usable Security (USEC'13), pages 34-51. Naha, Japan. April 2013.
[paper (pdf, 900K)]  [BibTeX]

Timothy Vidas and Nicolas Christin. Sweetening Android Lemon Markets: Measuring and Combating Malware in Application Marketplaces. In Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy (CODASPY '13), pages 197-208. San Antonio, TX. February 2013.
[paper (pdf, 244K)]   [BibTeX]

2012

Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, and Julio Lopez. Helping Users Create Better Passwords. USENIX ;login:, Volume 37, Number 6, pages 51-57. December 2012.
[paper (pdf, 1M)]    [BibTeX]

Jeremiah Blocki, Nicolas Christin, Anupam Datta, and Arunesh Sinha. Audit Mechanisms for Provable Risk Management and Accountable Data Governance. In Proceedings of the 3rd Conference on Decision and Game Theory for Security (GameSec 2012), pages 38-59. Budapest, Hungary. November 2012.
See also (extended version): CMU CyLab Technical Report CMU-CyLab-12-020, September 2012.
[paper (pdf, 548K)]    [BibTeX]

Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin and Lorrie Faith Cranor. How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation. In Proceedings of the 21st USENIX Security Symposium (USENIX Security'12). Bellevue, WA. August 2012.
[pdf, 1.2M]   [BibTeX]

Richard Shay, Patrick Gage Kelley, Saranga Komanduri, Michelle Mazurek, Blase Ur, Timothy Vidas, Lujo Bauer, Nicolas Christin and Lorrie Faith Cranor. Correct horse battery staple: Exploring the usability of system-assigned passphrases. In Proceedings of the 8th Symposium on Usable Privacy and Security (SOUPS'12). Washington, DC. July 2012.
[paper (pdf, 528K)]   [BibTeX]

Patrick Gage Kelley, Saranga Komanduri, Michelle Mazurek, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor and Julio Lopez. Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms. In Proceedings of the 33rd IEEE Symposium on Security and Privacy (Oakland 2012), pages 523-537. San Francisco, CA. May 2012.
[paper (pdf, 2.9M)]   [BibTeX]

Benjamin Johnson, John Chuang, Jens Grossklags, and Nicolas Christin. Metrics for Measuring ISP Badness: The Case of Spam (Short Paper). In Proceedings of the 16th International Conference on Financial Cryptography and Data Security (FC'12), pages 89-97. Kralendijk, Bonaire. February 2012.
[paper (pdf, 860K)]   [BibTeX]

Nicolas Christin, Alessandro Acquisti, Adrian Perrig, and Bryan Parno. Monetary Forgery in the Digital Age: Will Physical-Digital Cash Be a Solution? In I/S: A Journal of Law and Policy for the Information Society, Volume 7, Number 2, pages 171-206. Winter 2012.
(Note: This is a thoroughly expanded and revised version of our FC'08 paper.)
[paper, 1.8M]   [BibTeX]

2011

Anupam Datta, Jeremiah Blocki, Nicolas Christin, Henry DeYoung, Deepak Garg, Limin Jia, Dilsun Kaynar, and Arunesh Sinha. Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms. In Proceedings of the 7th International Conference on Information Systems Security (ICISS 2011), pages 1-27 (Invited paper). Kolkata, India. December 2011.
[paper (pdf, 419K)]  [BiBTeX]

Nicolas Christin. Network Security Games: Combining Game Theory, Behavioral Economics, and Network Measurements. In Proceedings of the 2nd Conference on Decision and Game Theory for Security (GameSec 2011), pages 4-6 (Invited keynote). College Park, MD. November 2011.
[paper (pdf, 68K)]   [BibTeX]   [slides (pdf, 9.6M)]

Tyler Moore, Nektarios Leontiadis, and Nicolas Christin. Fashion Crimes: Trending-Term Exploitation on the Web. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS 2011), pages 455-466. Chicago, IL. October 2011.
[paper (pdf, 738K)]  [BibTeX]

Nektarios Leontiadis, Tyler Moore, and Nicolas Christin. Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade. In Proceedings of the 20th USENIX Security Symposium (USENIX Security'11), pages 281-298. San Francisco, CA. August 2011.
[paper (pdf, 2.3M)]   [BibTeX]   [talk (video)]   [dataset (sql, 16.4M)]

Jeremiah Blocki, Nicolas Christin, Anupam Datta, and Arunesh Sinha. Audit Mechanisms for Privacy Protection in Healthcare Environments. In Proceedings of the 2nd USENIX Workshop on Health Security and Privacy (HealthSec '11). San Francisco, CA. August 2011.
[paper (pdf, 61K)]    [BibTeX]

Timothy Vidas, Daniel Votipka, and Nicolas Christin. All Your Droid Are Belong to Us: A Survey of Current Android Attacks. In Proceedings of the 5th USENIX Workshop on Offensive Technologies (WOOT '11). San Francisco, CA. August 2011.
[paper (pdf, 133K)]   [BibTeX]

Timothy Vidas, Chengye Zhang, and Nicolas Christin. Towards a General Collection Methodology for Android Devices. In Proceedings of the 11th Digital Forensics Research Workshop (DFRWS 2011). New Orleans, LA. August 2011.
[paper (pdf, 6.9M)]   [BibTeX]

Jeremiah Blocki, Nicolas Christin, Anupam Datta, and Arunesh Sinha. Regret Minimizing Audits: A Learning-theoretic Basis for Privacy Protection. In Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF 2011), pages 312-327. Domaine de l'Abbaye des Vaux de Cernay, France. June 2011.
[paper (pdf, 371K)]    [BibTeX]

Timothy Vidas, Nicolas Christin, and Lorrie Faith Cranor. Curbing Android Permission Creep. In Proceedings of the 2011 Web 2.0 Security and Privacy Workshop (W2SP 2011). Oakland, CA. May 2011.
[paper (pdf, 418K)]    [BibTeX]

Saranga Komanduri, Richard Shay, Patrick Gage Kelley, Michelle Mazurek, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor and Serge Egelman. Of Passwords and People: Measuring the Effect of Password-Composition Policies. In Proceedings of the 2011 ACM Conference on Human Factors in Computing Systems (CHI 2011), pages 2595-2604. Vancouver, BC, Canada. May 2011. Honorable Mention award.
[paper (pdf, 478K)]    [BibTeX]

Eiji Hayashi, Jason Hong, and Nicolas Christin. Security through a Different Kind of Obscurity: Evaluating Distortion in Graphical Authentication Schemes. In Proceedings of the 2011 ACM Conference on Human Factors in Computing Systems (CHI 2011), pages 2055-2064. Vancouver, BC, Canada. May 2011.
[paper (pdf, 396K)]    [BibTeX]

Benjamin Johnson, Jens Grossklags, Nicolas Christin, and John Chuang. Nash Equilibria for Weakest Target Security Games with Heterogeneous Agents. In Proceedings of the 2nd International ICST Conference on Game Theory for Networks (GameNets 2011). Shanghai, China. April 2011.
[paper (pdf, 1.3M)]   [BibTeX]

Nicolas Christin. On Critical Infrastructure Protection and International Agreements. Center for International and Security Studies at Maryland Working Paper. March 2011.
[paper (pdf, 255K)]  

Nicolas Christin, Serge Egelman, Timothy Vidas, and Jens Grossklags. It's All About the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice. In Proceedings of the 15th International Conference on Financial Cryptography and Data Security (FC'11), pages 16-30. St Lucia. February 2011.
[paper (pdf, 437K)]   [BibTeX]

2010

Ambarish Karole, Nitesh Saxena, and Nicolas Christin. A Comparative Usability Evaluation of Traditional Password Managers. In Proceedings of the 13th International Conference on Information Security and Cryptology (ICICS 2010). Seoul, Republic of Korea. December 2010.
[paper (pdf, 2.2M)]   [BibTeX]

Benjamin Johnson, Jens Grossklags, Nicolas Christin, and John Chuang. Uncertainty in Interdependent Security Games. In Proceedings of the 1st Conference on Decision and Game Theory for Security (GameSec 2010). Berlin, Germany. November 2010.
[paper (pdf, 549K)]   [BibTeX]

Nicolas Christin, Sally Yanagihara, and Keisuke Kamataki. Dissecting One Click Frauds. In Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS 2010), pages 15-26. Chicago, IL. October 2010.
See also (earlier version): CMU CyLab Technical Report CMU-CyLab-10-011, April 2010.
[paper (pdf, 2.4M)]   [BibTeX]

Benjamin Johnson, Jens Grossklags, Nicolas Christin, and John Chuang. Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information. In Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS 2010), pages 588-606. Athens, Greece. September 2010.
See also: CMU CyLab Technical Report CMU-CyLab-10-010, April 2010.
[paper (pdf, 208K)]   [BibTeX]

David Molnar, Serge Egelman, and Nicolas Christin. This Is Your Data on Drugs:Lessons Computer Security Can Learn From The Drug War. In Proceedings of the 13th New Security Paradigms Workshop (NSPW 2010). Concord, MA. September 2010.
[paper (pdf, 124K)]   [BibTeX]

Richard Shay, Saranga Komanduri, Patrick Gage Kelley, Pedro Leon, Michelle Mazurek, Lujo Bauer, Nicolas Christin and Lorrie Faith Cranor. Encountering Stronger Password Requirements: User Attitudes and Behaviors. In Proceedings of the Sixth Symposium on Usable Privacy and Security (SOUPS'10). Redmond, WA. July 2010.
[paper (pdf, 684K)]   [BibTeX]

Serge Egelman, David Molnar, Nicolas Christin, Alessandro Acquisti, Cormac Herley, and Shriram Krishnamurthi. Please Continue to Hold: An Empirical Study on User Tolerance of Security Delays. In Proceedings (online) of the 9th Workshop on Economics of Information Security (WEIS 2010). Cambridge, MA. June 2010.
[paper (pdf, 346K)]   [BibTeX]   [slides (pdf, 1.1M)]

Nicolas Christin. Peer-to-Peer Networks: Interdisciplinary Challenges for Interconnected Systems. In M. Dark (editor), Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives. IGI Global, United States, 2010.
[paper (pdf, 553K)]   [slides (pdf, 3104K)]   [BibTeX]
(Copyright 2010, IGI Global, www.igi-global.com. Posted by permission of the publisher.)

Jens Grossklags, Benjamin Johnson, and Nicolas Christin. When Information Improves Information Security. In Proceedings of the Fourteenth International Conference on Financial Cryptography and Data Security (FC'10), pages 416-423. Tenerife, Spain. January 2010.
See also (extended version): CMU CyLab Technical Report CMU-CyLab-09-004, March 2009.
[paper (pdf, 289K)]   [BibTeX]

2009

Jens Grossklags, Benjamin Johnson, and Nicolas Christin. The Price of Uncertainty in Security Games. In Proceedings (online) of the 8th Workshop on Economics of Information Security (WEIS 2009). London, UK. June 2009.
[paper (pdf, 587K]   [slides (pdf, 2148K)]   [BibTeX]

Rajesh Balan, Narayan Ramasubbu, Komsit Prakobphol, Nicolas Christin, and Jason Hong. mFerio: The Design and Evaluation of a Peer-to-Peer Mobile Payment System. In Proceedings of the Seventh ACM/USENIX Annual International Conference on Mobile Systems, Applications and Services (MobiSys '09), pages 291-304. Krakow, Poland. June 2009.
[paper (pdf, 908K]  [BibTeX]

Madoka Hasegawa, Nicolas Christin, and Eiji Hayashi. New Directions in Multisensory Authentication. In Adjunct Proceedings of the Seventh International Conference on Pervasive Computing (Pervasive 2009) - Late Breaking Results, pages 103-106. Nara, Japan. May 2009.
[paper (pdf, 519K]  [BibTeX]

2008

Ash Bashir and Nicolas Christin. Three Case Studies in Quantitative Information Risk Analysis. In Proceedings of the CERT/SEI Business Case Workshop: Making the Business Case for Software Assurance, pages 77-86. Pittsburgh, PA. September 2008.
[paper (pdf, 120K)]   [appendix data (pdf, 530K)]  [BibTeX]  [software (xls/vba, 1.5M)]

Eiji Hayashi, Nicolas Christin, Rachna Dhamija, and Adrian Perrig. Use Your Illusion: Secure Authentication Usable Anywhere. In Proceedings of the Fourth Symposium on Usable Privacy and Security (SOUPS'08), pages 35-43. Pittsburgh, PA. July 2008.
See also (preliminary version, very different!): CMU CyLab Technical Report CMU-CyLab-07-011, August 2007.
[paper (pdf, 412K)]  [BibTeX]   [demo site]

Jens Grossklags, Nicolas Christin, and John Chuang. Security and Insurance Management in Networks with Heterogeneous Agents. In Proceedings of the 9th ACM Conference on Electronic Commerce (EC'08), pages 160-169. Chicago, IL. July 2008.
[paper (pdf, 208K)]  [BibTeX]

Nicolas Christin, John Chuang, and Jens Grossklags. Economics-Informed Design of Content Delivery Networks. Invited chapter in R. Buyya, A.-M. Khan Pathan, A. Vakali (editors), Content Delivery Networks: Principles and Paradigms, chapter 7. Springer Verlag, Germany, July 2008.
[BibTeX]

Jens Grossklags, Nicolas Christin, and John Chuang. Security Investment (Failures) in Five Economic Environments: A Comparison of Homogeneous and Heterogeneous User Agents. In Proceedings (online) of the 7th Workshop on Economics of Information Security (WEIS 2008). Hannover, NH. June 2008.
[paper (pdf, 287K)]  [BibTeX]

Jens Grossklags, Nicolas Christin, and John Chuang. Secure or Insure? A Game-Theoretic Analysis of Information Security Games. In Proceedings of the 17th International World Wide Web Conference (WWW'08), pages 209-218. Beijing, China. April 2008.
[paper (pdf, 223K)]  [BibTeX]

Jens Grossklags, Nicolas Christin, and John Chuang. Predicted and Observed User Behavior in the Weakest-Link Security Game. In Proceedings of the 2008 USENIX Workshop on Usability, Psychology, and Security (UPSEC'08). San Francisco, CA. April 2008.
[paper (pdf, 128K)]  [paper (html)]  [BibTeX]

Hirokazu Sasamoto, Nicolas Christin, and Eiji Hayashi. Undercover: Authentication Usable in Front of Prying Eyes. In Proceedings of the 2008 ACM Conference on Human Factors in Computing Systems (CHI 2008), pages 183-192. Florence, Italy. April 2008.
[paper (pdf, 618K)]    [BibTeX]

Alessandro Acquisti, Nicolas Christin, Adrian Perrig, and Bryan Parno. Countermeasures against Government-Scale Monetary Forgery. In Proceedings of the Twelfth International Conference on Financial Cryptography and Data Security (FC'08), pages 262-266. Cozumel, Mexico. January 2008.
See also (extended version): CMU CyLab Technical Report CMU-CyLab-07-016, December 2007.
[paper (pdf, 40K)]    [BibTeX]

2007

Soon Hin Khor, Nicolas Christin, Tina Wong, and Akihiro Nakao. Power to the People: Securing the Internet One Edge at a Time. In Proceedings of the ACM SIGCOMM'07 Workshop on Large-Scale Attack Defense (LSAD), pages 89-96. Kyoto, Japan. August 2007.
[paper (pdf, 163K)]    [BibTeX]

Nicolas Christin, Jörg Liebeherr, and Tarek F. Abdelzaher. Enhancing Class-Based Service Architectures with Adaptive Rate Allocation and Dropping Mechanisms. In IEEE/ACM Transactions on Networking 15(3), pages 669-682. June 2007.
See also (older version): University of Virginia, Technical Report CS-2004-09.
[BibTeX]

Ahsan Habib, Nicolas Christin, and John Chuang. On the Feasibility of Switching ISPs in Residential Multihoming. In Proceedings of the Fifteenth IEEE International Workshop on Quality-of-Service (IWQoS 2007), pages 91-99. Chicago, IL. June 2007.
[paper (pdf, 276K)]   [BibTeX]

Keiji Takeda, Nicolas Christin, and Davar Pishva. Jouhou Sekyuriti ni Kansuru Torikumi Nitsuite no Saishin Doukou (Recent trends in information security challenges, in Japanese). Invited paper in Journal of Japan Society for Fuzzy Theory and Intelligent Informatics 19(3), Special Issue on Security and Trust, pages 200-208. June 2007.
[Abstract in English]     [BibTeX]

2006

Nicolas Christin and Jörg Liebeherr. The QoSbox: Quantitative Service Differentiation in BSD Routers. In Computer Networks 50(17), pages 3353-3374. December 2006.
See also (very preliminary version, quite different): University of Virginia, Technical Report CS-2001-28.
[BibTeX]

Victor Firoiu, Xiaohui Zhang, Emre Gündüzhan, and Nicolas Christin. Providing Service Guarantees in High-Speed Switching Systems with Feedback Output Queuing. In IEEE Transactions on Parallel and Distributed Systems 17(5), pages 434-447, May 2006.
See also (older version): Nortel Networks, Technical Report arXiv:cs.NI/0406019.
[paper (pdf, 312K)]    [BibTeX]

Ahsan Habib, Nicolas Christin, and John Chuang. Taking Advantage of Multihoming with Session Layer Striping. In Proceedings of the 9th IEEE Global Internet Symposium (Global Internet 2006), pages 102-107. Barcelona, Spain. April 2006.
[paper (pdf, 122K)]   [slides (pdf, 388K)]    [BibTeX]

2005

Nicolas Christin and Jörg Liebeherr. Marking Algorithms for Service Differentiation of TCP Traffic. In Computer Communications 28(18), Special Issue on End-to-End Quality of Service Differentiation, pages 2058-2069. November 2005.
See also: University of Virginia, Technical Report CS-2003-04, February 2003.
[paper (pdf, 962K)]    [BibTeX]

Nicolas Christin, Andreas S. Weigend, and John Chuang. Content Availability, Pollution and Poisoning in Peer-to-Peer File Sharing Networks. In Proceedings of the Sixth ACM Conference on Electronic Commerce (EC'05), pages 68-77. Vancouver, BC, Canada. June 2005.
[paper (pdf, 654K)]    [slides (pdf, 2M)]   [BibTeX]

Nicolas Christin and John Chuang. A Cost-Based Analysis of Overlay Routing Geometries. In Proceedings of IEEE INFOCOM'05, vol. 4, pages 2566-2577. Miami, FL. March 2005.
[paper (pdf, 498K)]   [slides (pdf, 916K)]   [BibTeX]

2004

Nicolas Christin, Jens Grossklags, and John Chuang. Near Rationality and Competitive Equilibria in Networked Systems. In Proceedings of the ACM SIGCOMM'04 Workshop on Practice & Theory of Incentives in Networked Systems (PINS), pages 213-219. Portland, OR. August 2004.
A preliminary version known as University of California, Berkeley, Technical Report p2pecon TR-2004-04-CGC (also arXiv:cs.GT/0404040) is available, but we prefer you cite the PINS paper.
[paper (pdf, 105K)]    [slides (pdf, 151K)]    [BibTeX]

Nicolas Christin and John Chuang. On the Cost of Participating in a Peer-to-Peer Network. In Proceedings of the Third International Workshop on Peer-to-Peer Systems (IPTPS'04). Lecture Notes in Computer Science vol. 3279, pages 22-32. San Diego, CA. February 2004.
See also (preliminary version, quite different!): University of California, Berkeley, Technical Report p2pecon TR-2003-12-CC (also arXiv:cs.NI/0401010).
[LNCS paper]  [workshop paper (pdf, 181K)]    [slides (pdf, 448K)]    [BibTeX]

2003

Nicolas Christin. Quantifiable Service Differentiation for Packet Networks, Ph.D. Dissertation, University of Virginia, August 2003.
[dissertation (pdf, 3.3M)]    [slides (pdf, 2.4M)]    [BibTeX]

Nicolas Christin and Jörg Liebeherr. A QoS Architecture for Quantitative Service Differentiation. In IEEE Communications Magazine 41(6), Special Issue on Scalability in IP-Oriented Networks, pages 38-45. June 2003.
[paper (pdf, 100K)]    [BibTeX]

2002

Jörg Liebeherr and Nicolas Christin. Rate Allocation and Buffer Management for Differentiated Services. In Computer Networks 40(1), Special Issue on the New Internet Architecture, pages 89-110. September 2002.
[paper (pdf, 1M)]    [BibTeX]

Nicolas Christin and Jörg Liebeherr. A Scalable Service Architecture for Providing Strong Service Guarantees. In Scalability and Traffic Control in IP Networks II (ITCOM'02), Proceedings of SPIE, vol. 4868, pages 31-42 (Invited paper). Boston, MA. July 2002.
[paper (pdf, 261K)]    [slides (pdf, 2M)]    [BibTeX]

Nicolas Christin, Jörg Liebeherr, and Tarek F. Abdelzaher. A Quantitative Assured Forwarding Service. In Proceedings of IEEE INFOCOM'02, vol. 2, pages 864-873, New York, NY. June 2002. See also (long version): University of Virginia, Technical Report CS-2001-21, August 2001.
[paper (pdf, 338K)]    [slides (pdf, 2M)]    [BibTeX]

2001

Jörg Liebeherr and Nicolas Christin. JoBS: Joint Buffer Management and Scheduling for Differentiated Services. In Proceedings of the Ninth IEEE/IFIP International Workshop on Quality-of-Service (IWQoS 2001), pages 404-418, Karlsruhe, Germany. June 2001.
[paper (ps.gz, 212K)]    [paper (pdf, 291K)]    [slides (pdf, 2.4M)]    [BibTeX]

2000

Jörg Liebeherr and Nicolas Christin. Buffer Management and Scheduling for Enhanced Differentiated Services. University of Virginia, Technical Report CS-2000-24, August 2000.
[paper (pdf, 1.2M)]    [BibTeX]