Alastair R. Beresford

According to our database1, Alastair R. Beresford authored at least 52 papers between 2003 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Quantifying Privacy Loss of Human Mobility Graph Topology.
PoPETs, 2018

The Specter of Malicious Computing: Securing the Internet of Things.
IEEE Pervasive Computing, 2018

OpSets: Sequential Specifications for Replicated Datatypes.
Archive of Formal Proofs, 2018

From Secure Messaging to Secure Collaboration.
Proceedings of the Security Protocols XXVI, 2018

2017
A Conflict-Free Replicated JSON Datatype.
IEEE Trans. Parallel Distrib. Syst., 2017

Verifying strong eventual consistency in distributed systems.
PACMPL, 2017

A framework for establishing Strong Eventual Consistency for Conflict-free Replicated Datatypes.
Archive of Formal Proofs, 2017

There are many apps for that: quantifying the availability of privacy-preserving apps.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Ethical issues in research using datasets of illicit origin.
Proceedings of the 2017 Internet Measurement Conference, 2017

The Cost of Push Notifications for Smartphones Using Tor Hidden Services.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

1000 days of UDP amplification DDoS attacks.
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017

Demand Around the Clock: Time Use and Data Demand of Mobile Devices in Everyday Life.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
Investigating Engagement with In-Video Quiz Questions in a Programming Course.
TLT, 2016

Investigating the Use of Hints in Online Problem Solving.
Proceedings of the Third ACM Conference on Learning @ Scale, 2016

Supporting Scalable Data Sharing in Online Education.
Proceedings of the Third ACM Conference on Learning @ Scale, 2016

Whack-A-Mole Security: Incentivising the Production, Delivery and Installation of Security Updates (invited paper).
Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security, 2016

Reconstruction of Battery Level Curves Based on User Data Collected from a Smartphone.
Proceedings of the Artificial Intelligence: Methodology, Systems, and Applications, 2016

2015
Device analyzer: a privacy-aware platform to support research on the Android ecosystem.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Securacy: an empirical investigation of Android applications' network usage, privacy and security.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

The Lifetime of Android API Vulnerabilities: Case Study on the JavaScript-to-Java Interface.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

Equality: A Tool for Free-form Equation Editing.
Proceedings of the 15th IEEE International Conference on Advanced Learning Technologies, 2015

Security Metrics for the Android Ecosystem.
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015

2014
Device analyzer: largescale mobile data collection.
SIGMETRICS Performance Evaluation Review, 2014

Better Authentication: Password Revolution by Evolution.
Proceedings of the Security Protocols XXII, 2014

The device analyzer competition.
Proceedings of the 2014 ACM Conference on Ubiquitous Computing, 2014

2013
Price versus privacy: an experiment into the competitive advantage of collecting less personal information.
Electronic Commerce Research, 2013

Device Analyzer: Understanding Smartphone Usage.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013

The Privacy Economics of Voluntary Over-disclosure in Web Forms.
Proceedings of the Economics of Information Security and Privacy, 2013

2012
The Privacy Economics of Voluntary Over-disclosure in Web Forms.
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012

2011
MockDroid: trading privacy for application functionality on smartphones.
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, 2011

Using Real-Time Road Traffic Data to Evaluate Congestion.
Proceedings of the Dependable and Historic Computing, 2011

2010
Estimating Personal Energy expenditure with location data.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

Statistical modelling and analysis of sparse bus probe data in urban areas.
Proceedings of the 13th International IEEE Conference on Intelligent Transportation Systems, 2010

2009
Establishing Distributed Hidden Friendship Relations.
Proceedings of the Security Protocols XVII, 2009

2008
Data Privacy.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Language-Based Optimisation of Sensor-Driven Distributed Computing Applications.
Proceedings of the Fundamental Approaches to Software Engineering, 2008

2007
Context-Derived Pseudonyms for Protection of Privacy in Transport Middleware and Applications.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

Scalable Inter-vehicular Applications.
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007

2006
Intelligent Transportation Systems.
IEEE Pervasive Computing, 2006

Scalable, Distributed, Real-Time Map Generation.
IEEE Pervasive Computing, 2006

Analysing fundamental properties of marker-based vision system designs.
Pervasive and Mobile Computing, 2006

Privacy-Sensitive Congestion Charging.
Proceedings of the Security Protocols, 2006

Privacy-Sensitive Congestion Charging.
Proceedings of the Security Protocols, 2006

Secure Mobile Computing Via Public Terminals.
Proceedings of the Pervasive Computing, 2006

Cantag: an open source software toolkit for designing and deploying marker-based vision systems.
Proceedings of the 4th IEEE International Conference on Pervasive Computing and Communications (PerCom 2006), 2006

Dependability and Accountability for Context-aware Middleware Systems.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

Towards a Security Policy for Ubiquitous Healthcare Systems (Position Paper).
Proceedings of the Ubiquitous Convergence Technology, First International Conference, 2006

2004
Mix Zones: User Privacy in Location-aware Services.
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004

The Carrot Approach: Encouraging Use of Location Systems.
Proceedings of the UbiComp 2004: Ubiquitous Computing: 6th International Conference, 2004

2003
Location Privacy in Pervasive Computing.
IEEE Pervasive Computing, 2003

Spatial Policies for Sentient Mobile Applications.
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003

Spatial Security Policies for Mobile Agents in a Sentient Computing Environment.
Proceedings of the Fundamental Approaches to Software Engineering, 2003


  Loading...