Alastair R. Beresford

Orcid: 0000-0003-0818-6535

Affiliations:
  • University of Cambridge, UK


According to our database1, Alastair R. Beresford authored at least 85 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Sloth: Key Stretching and Deniable Encryption using Secure Elements on Smartphones.
Proc. Priv. Enhancing Technol., 2024

Confidential Computing Transparency.
CoRR, 2024

SoK: Web Authentication in the Age of End-to-End Encryption.
CoRR, 2024

ModZoo: A Large-Scale Study of Modded Android Apps and their Markets.
CoRR, 2024

Pudding: Private User Discovery in Anonymity Networks.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

2023
SoK: Managing risks of linkage attacks on data privacy.
Proc. Priv. Enhancing Technol., April, 2023

Powering Privacy: On the Energy Demand and Feasibility of Anonymity Networks on Smartphones.
Proceedings of the 32nd USENIX Security Symposium, 2023

Can't Keep Them Away: The Failures of Anti-stalking Protocols in Personal Item Tracking Devices.
Proceedings of the Security Protocols XXVIII, 2023

Choosing Your Friends: Shaping Ethical Use of Anonymity Networks.
Proceedings of the Security Protocols XXVIII, 2023

Mobile App Distribution Transparency (MADT): Design and Evaluation of a System to Mitigate Necessary Trust in Mobile App Distribution Systems.
Proceedings of the Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, 2023

2022
A Highly-Available Move Operation for Replicated Trees.
IEEE Trans. Parallel Distributed Syst., 2022

CoverDrop: Blowing the Whistle Through A News App.
Proc. Priv. Enhancing Technol., 2022

Effect of User Expectation on Mobile App Privacy: A Field Study.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2022

Enhancing User Privacy in Mobile Devices Through Prediction of Privacy Preferences.
Proceedings of the Computer Security - ESORICS 2022, 2022

ACDC: Anonymous Crowdsourcing Using Digital Cash.
Proceedings of the Cryptology and Network Security - 21st International Conference, 2022

2021
Factory Calibration Fingerprinting of Sensors.
IEEE Trans. Inf. Forensics Secur., 2021

Rollercoaster: An Efficient Group-Multicast Scheme for Mix Networks.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees.
IACR Cryptol. ePrint Arch., 2020

CHERI Macaroons: Efficient, host-based access control for cyber-physical systems.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

When will my PLC support Mirai? The security economics of large-scale attacks against Internet-connected ICS devices.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020

Using Global Honeypot Networks to Detect Targeted ICS Attacks.
Proceedings of the 12th International Conference on Cyber Conflict, 2020

2019
Online Event Processing.
ACM Queue, 2019

Snapdoc: Authenticated snapshots with history privacy in peer-to-peer collaborative editing.
Proc. Priv. Enhancing Technol., 2019

Ghost Trace on the Wire? Using Key Evidence for Informed Decisions.
Proceedings of the Security Protocols XXVII, 2019

SensorID: Sensor Calibration Fingerprinting for Smartphones.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Inequality: multi-modal equation entry on the web.
Proceedings of the Sixth ACM Conference on Learning @ Scale, 2019

LibID: reliable identification of obfuscated third-party Android libraries.
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019

A Data Sharing Platform for Earables Research.
Proceedings of the 1st International Workshop on Earable Computing, 2019

Interleaving anomalies in collaborative text editors.
Proceedings of the 6th Workshop on Principles and Practice of Consistency for Distributed Data, 2019

2018
Quantifying Privacy Loss of Human Mobility Graph Topology.
Proc. Priv. Enhancing Technol., 2018

The Specter of Malicious Computing: Securing the Internet of Things.
IEEE Pervasive Comput., 2018

OpSets: Sequential Specifications for Replicated Datatypes (Extended Version).
CoRR, 2018

OpSets: Sequential Specifications for Replicated Datatypes.
Arch. Formal Proofs, 2018

From Secure Messaging to Secure Collaboration.
Proceedings of the Security Protocols XXVI, 2018

2017
A Conflict-Free Replicated JSON Datatype.
IEEE Trans. Parallel Distributed Syst., 2017

Verifying strong eventual consistency in distributed systems.
Proc. ACM Program. Lang., 2017

Intra-Library Collusion: A Potential Privacy Nightmare on Smartphones.
CoRR, 2017

A framework for establishing Strong Eventual Consistency for Conflict-free Replicated Datatypes.
Arch. Formal Proofs, 2017

There are many apps for that: quantifying the availability of privacy-preserving apps.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Ethical issues in research using datasets of illicit origin.
Proceedings of the 2017 Internet Measurement Conference, 2017

The Cost of Push Notifications for Smartphones Using Tor Hidden Services.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

1000 days of UDP amplification DDoS attacks.
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017

Demand Around the Clock: Time Use and Data Demand of Mobile Devices in Everyday Life.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
Investigating Engagement with In-Video Quiz Questions in a Programming Course.
IEEE Trans. Learn. Technol., 2016

Investigating the Use of Hints in Online Problem Solving.
Proceedings of the Third ACM Conference on Learning @ Scale, 2016

Supporting Scalable Data Sharing in Online Education.
Proceedings of the Third ACM Conference on Learning @ Scale, 2016

Whack-A-Mole Security: Incentivising the Production, Delivery and Installation of Security Updates (invited paper).
Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security, 2016

Reconstruction of Battery Level Curves Based on User Data Collected from a Smartphone.
Proceedings of the Artificial Intelligence: Methodology, Systems, and Applications, 2016

2015
Device analyzer: a privacy-aware platform to support research on the Android ecosystem.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Securacy: an empirical investigation of Android applications' network usage, privacy and security.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

The Lifetime of Android API Vulnerabilities: Case Study on the JavaScript-to-Java Interface.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

Equality: A Tool for Free-form Equation Editing.
Proceedings of the 15th IEEE International Conference on Advanced Learning Technologies, 2015

Security Metrics for the Android Ecosystem.
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015

2014
Device analyzer: largescale mobile data collection.
SIGMETRICS Perform. Evaluation Rev., 2014

Better Authentication: Password Revolution by Evolution.
Proceedings of the Security Protocols XXII, 2014

The device analyzer competition.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

2013
Price versus privacy: an experiment into the competitive advantage of collecting less personal information.
Electron. Commer. Res., 2013

Device Analyzer: Understanding Smartphone Usage.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013

The Privacy Economics of Voluntary Over-disclosure in Web Forms.
Proceedings of the Economics of Information Security and Privacy, 2013

2012
The Privacy Economics of Voluntary Over-disclosure in Web Forms.
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012

2011
MockDroid: trading privacy for application functionality on smartphones.
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, 2011

Using Real-Time Road Traffic Data to Evaluate Congestion.
Proceedings of the Dependable and Historic Computing, 2011

2010
Estimating Personal Energy expenditure with location data.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

Statistical modelling and analysis of sparse bus probe data in urban areas.
Proceedings of the 13th International IEEE Conference on Intelligent Transportation Systems, 2010

2009
Establishing Distributed Hidden Friendship Relations.
Proceedings of the Security Protocols XVII, 2009

2008
Data Privacy.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Language-Based Optimisation of Sensor-Driven Distributed Computing Applications.
Proceedings of the Fundamental Approaches to Software Engineering, 2008

TIME: An Open Platform for Capturing, Processing and Delivering Transport-Related Data.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

2007
Context-Derived Pseudonyms for Protection of Privacy in Transport Middleware and Applications.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

Scalable Inter-vehicular Applications.
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007

2006
Intelligent Transportation Systems.
IEEE Pervasive Comput., 2006

Scalable, Distributed, Real-Time Map Generation.
IEEE Pervasive Comput., 2006

Analysing fundamental properties of marker-based vision system designs.
Pervasive Mob. Comput., 2006

Privacy-Sensitive Congestion Charging.
Proceedings of the Security Protocols, 2006

Privacy-Sensitive Congestion Charging.
Proceedings of the Security Protocols, 2006

Secure Mobile Computing Via Public Terminals.
Proceedings of the Pervasive Computing, 2006

Cantag: an open source software toolkit for designing and deploying marker-based vision systems.
Proceedings of the 4th IEEE International Conference on Pervasive Computing and Communications (PerCom 2006), 2006

Dependability and Accountability for Context-aware Middleware Systems.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

Towards a Security Policy for Ubiquitous Healthcare Systems (Position Paper).
Proceedings of the Ubiquitous Convergence Technology, First International Conference, 2006

2005
Trove: a physical game running on an ad-hoc wireless sensor network.
Proceedings of the 2005 joint conference on Smart objects and ambient intelligence, 2005

2004
Mix Zones: User Privacy in Location-aware Services.
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004

The Carrot Approach: Encouraging Use of Location Systems.
Proceedings of the UbiComp 2004: Ubiquitous Computing: 6th International Conference, 2004

2003
Location Privacy in Pervasive Computing.
IEEE Pervasive Comput., 2003

Spatial Policies for Sentient Mobile Applications.
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003

Spatial Security Policies for Mobile Agents in a Sentient Computing Environment.
Proceedings of the Fundamental Approaches to Software Engineering, 2003


  Loading...