Alastair R. Beresford
Orcid: 0000-0003-0818-6535Affiliations:
- University of Cambridge, UK
According to our database1,
Alastair R. Beresford
authored at least 85 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on cl.cam.ac.uk
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proc. Priv. Enhancing Technol., 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
2023
Proc. Priv. Enhancing Technol., April, 2023
Powering Privacy: On the Energy Demand and Feasibility of Anonymity Networks on Smartphones.
Proceedings of the 32nd USENIX Security Symposium, 2023
Can't Keep Them Away: The Failures of Anti-stalking Protocols in Personal Item Tracking Devices.
Proceedings of the Security Protocols XXVIII, 2023
Proceedings of the Security Protocols XXVIII, 2023
Mobile App Distribution Transparency (MADT): Design and Evaluation of a System to Mitigate Necessary Trust in Mobile App Distribution Systems.
Proceedings of the Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, 2023
2022
IEEE Trans. Parallel Distributed Syst., 2022
Proc. Priv. Enhancing Technol., 2022
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the Cryptology and Network Security - 21st International Conference, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
2020
Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees.
IACR Cryptol. ePrint Arch., 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
When will my PLC support Mirai? The security economics of large-scale attacks against Internet-connected ICS devices.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020
Proceedings of the 12th International Conference on Cyber Conflict, 2020
2019
Snapdoc: Authenticated snapshots with history privacy in peer-to-peer collaborative editing.
Proc. Priv. Enhancing Technol., 2019
Proceedings of the Security Protocols XXVII, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the Sixth ACM Conference on Learning @ Scale, 2019
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019
Proceedings of the 1st International Workshop on Earable Computing, 2019
Proceedings of the 6th Workshop on Principles and Practice of Consistency for Distributed Data, 2019
2018
Proc. Priv. Enhancing Technol., 2018
IEEE Pervasive Comput., 2018
CoRR, 2018
Arch. Formal Proofs, 2018
Proceedings of the Security Protocols XXVI, 2018
2017
IEEE Trans. Parallel Distributed Syst., 2017
Proc. ACM Program. Lang., 2017
A framework for establishing Strong Eventual Consistency for Conflict-free Replicated Datatypes.
Arch. Formal Proofs, 2017
There are many apps for that: quantifying the availability of privacy-preserving apps.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Proceedings of the 2017 Internet Measurement Conference, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017
Demand Around the Clock: Time Use and Data Demand of Mobile Devices in Everyday Life.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
2016
IEEE Trans. Learn. Technol., 2016
Proceedings of the Third ACM Conference on Learning @ Scale, 2016
Proceedings of the Third ACM Conference on Learning @ Scale, 2016
Whack-A-Mole Security: Incentivising the Production, Delivery and Installation of Security Updates (invited paper).
Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security, 2016
Reconstruction of Battery Level Curves Based on User Data Collected from a Smartphone.
Proceedings of the Artificial Intelligence: Methodology, Systems, and Applications, 2016
2015
Device analyzer: a privacy-aware platform to support research on the Android ecosystem.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
Securacy: an empirical investigation of Android applications' network usage, privacy and security.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
The Lifetime of Android API Vulnerabilities: Case Study on the JavaScript-to-Java Interface.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
Proceedings of the 15th IEEE International Conference on Advanced Learning Technologies, 2015
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015
2014
SIGMETRICS Perform. Evaluation Rev., 2014
Proceedings of the Security Protocols XXII, 2014
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014
2013
Price versus privacy: an experiment into the competitive advantage of collecting less personal information.
Electron. Commer. Res., 2013
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013
Proceedings of the Economics of Information Security and Privacy, 2013
2012
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012
2011
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, 2011
Proceedings of the Dependable and Historic Computing, 2011
2010
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010
Proceedings of the 13th International IEEE Conference on Intelligent Transportation Systems, 2010
2009
Proceedings of the Security Protocols XVII, 2009
2008
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008
Proceedings of the Fundamental Approaches to Software Engineering, 2008
TIME: An Open Platform for Capturing, Processing and Delivering Transport-Related Data.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008
2007
Context-Derived Pseudonyms for Protection of Privacy in Transport Middleware and Applications.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007
2006
Pervasive Mob. Comput., 2006
Proceedings of the Pervasive Computing, 2006
Cantag: an open source software toolkit for designing and deploying marker-based vision systems.
Proceedings of the 4th IEEE International Conference on Pervasive Computing and Communications (PerCom 2006), 2006
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006
Proceedings of the Ubiquitous Convergence Technology, First International Conference, 2006
2005
Proceedings of the 2005 joint conference on Smart objects and ambient intelligence, 2005
2004
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004
Proceedings of the UbiComp 2004: Ubiquitous Computing: 6th International Conference, 2004
2003
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003
Proceedings of the Fundamental Approaches to Software Engineering, 2003