Follow
Alastair Beresford
Alastair Beresford
Computer Laboratory, University of Cambridge
Verified email at cam.ac.uk - Homepage
Title
Cited by
Cited by
Year
Location privacy in pervasive computing
AR Beresford, F Stajano
IEEE Pervasive computing 2 (1), 46-55, 2003
22192003
Mix zones: User privacy in location-aware services
AR Beresford, F Stajano
IEEE Annual conference on pervasive computing and communications workshops …, 2004
7352004
Mockdroid: trading privacy for application functionality on smartphones
AR Beresford, A Rice, N Skehin, R Sohan
Proceedings of the 12th workshop on mobile computing systems and …, 2011
6512011
Unwillingness to pay for privacy: A field experiment
AR Beresford, D Kübler, S Preibusch
Economics letters 117 (1), 25-27, 2012
3092012
Scalable, distributed, real-time map generation
JJ Davies, AR Beresford, A Hopper
IEEE Pervasive Computing 5 (4), 47-54, 2006
2782006
Device analyzer: Understanding smartphone usage
DT Wagner, A Rice, AR Beresford
Mobile and Ubiquitous Systems: Computing, Networking, and Services: 10th …, 2014
2012014
A conflict-free replicated JSON datatype
M Kleppmann, AR Beresford
IEEE Transactions on Parallel and Distributed Systems 28 (10), 2733-2746, 2017
1392017
Device Analyzer: Large-scale mobile data collection
DT Wagner, A Rice, AR Beresford
ACM SIGMETRICS Performance Evaluation Review 41 (4), 53-56, 2014
1372014
Security metrics for the android ecosystem
DR Thomas, AR Beresford, A Rice
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in …, 2015
1362015
Location privacy in ubiquitous computing
AR Beresford
University of Cambridge, Computer Laboratory, 2005
1272005
Investigating engagement with in-video quiz questions in a programming course
S Cummins, AR Beresford, A Rice
IEEE Transactions on Learning Technologies 9 (1), 57-66, 2015
1152015
Intelligent transportation systems
AD Joseph, AR Beresford, J Bacon, DN Cottingham, JJ Davies, BD Jones, ...
IEEE Pervasive Computing 5 (4), 63-67, 2006
962006
Verifying strong eventual consistency in distributed systems
VBF Gomes, M Kleppmann, DP Mulligan, AR Beresford
Proceedings of the ACM on Programming Languages 1 (OOPSLA), 1-28, 2017
882017
Price versus privacy: an experiment into the competitive advantage of collecting less personal information
S Preibusch, D Kübler, AR Beresford
Electronic Commerce Research 13, 423-455, 2013
842013
Using real-time road traffic data to evaluate congestion
J Bacon, AI Bejan, AR Beresford, D Evans, RJ Gibbens, K Moody
Dependable and Historic Computing: Essays Dedicated to Brian Randell on the …, 2011
812011
Securacy: an empirical investigation of Android applications' network usage, privacy and security
D Ferreira, V Kostakos, AR Beresford, J Lindqvist, AK Dey
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015
752015
Ethical issues in research using datasets of illicit origin
DR Thomas, S Pastrana, A Hutchings, R Clayton, AR Beresford
Proceedings of the 2017 Internet Measurement Conference, 445-462, 2017
742017
SensorID: Sensor calibration fingerprinting for smartphones
J Zhang, AR Beresford, I Sheret
2019 IEEE Symposium on Security and Privacy (SP), 638-655, 2019
732019
1000 days of UDP amplification DDoS attacks
DR Thomas, R Clayton, AR Beresford
2017 APWG Symposium on Electronic Crime Research (eCrime), 79-84, 2017
662017
Secure mobile computing via public terminals
R Sharp, J Scott, AR Beresford
International Conference on Pervasive Computing, 238-253, 2006
612006
The system can't perform the operation now. Try again later.
Articles 1–20