Volgen
Alastair Beresford
Alastair Beresford
Computer Laboratory, University of Cambridge
Geverifieerd e-mailadres voor cam.ac.uk - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Location privacy in pervasive computing
AR Beresford, F Stajano
IEEE Pervasive computing 2 (1), 46-55, 2003
21302003
Mix zones: User privacy in location-aware services
AR Beresford, F Stajano
IEEE Annual conference on pervasive computing and communications workshops …, 2004
6942004
Mockdroid: trading privacy for application functionality on smartphones
AR Beresford, A Rice, N Skehin, R Sohan
Proceedings of the 12th workshop on mobile computing systems and …, 2011
6212011
Unwillingness to pay for privacy: A field experiment
AR Beresford, D Kübler, S Preibusch
Economics letters 117 (1), 25-27, 2012
2642012
Scalable, distributed, real-time map generation
JJ Davies, AR Beresford, A Hopper
IEEE Pervasive Computing 5 (4), 47-54, 2006
2562006
Device analyzer: Understanding smartphone usage
DT Wagner, A Rice, AR Beresford
International Conference on Mobile and Ubiquitous Systems: Computing …, 2013
1892013
Device Analyzer: Large-scale mobile data collection
DT Wagner, A Rice, AR Beresford
ACM SIGMETRICS Performance Evaluation Review 41 (4), 53-56, 2014
1362014
Location privacy in ubiquitous computing
AR Beresford
University of Cambridge, Computer Laboratory, 2005
1242005
Security metrics for the android ecosystem
DR Thomas, AR Beresford, A Rice
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in …, 2015
1152015
A conflict-free replicated JSON datatype
M Kleppmann, AR Beresford
IEEE Transactions on Parallel and Distributed Systems 28 (10), 2733-2746, 2017
902017
Intelligent transportation systems
AD Joseph, AR Beresford, J Bacon, DN Cottingham, JJ Davies, BD Jones, ...
IEEE Pervasive Computing 5 (4), 63-67, 2006
862006
Using real-time road traffic data to evaluate congestion
J Bacon, AI Bejan, AR Beresford, D Evans, RJ Gibbens, K Moody
Dependable and historic computing, 93-117, 2011
762011
Investigating engagement with in-video quiz questions in a programming course
S Cummins, AR Beresford, A Rice
IEEE Transactions on Learning Technologies 9 (1), 57-66, 2015
752015
Securacy: an empirical investigation of Android applications' network usage, privacy and security
D Ferreira, V Kostakos, AR Beresford, J Lindqvist, AK Dey
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015
662015
Price versus privacy: an experiment into the competitive advantage of collecting less personal information
S Preibusch, D Kübler, AR Beresford
Electronic Commerce Research 13 (4), 423-455, 2013
642013
Verifying strong eventual consistency in distributed systems
VBF Gomes, M Kleppmann, DP Mulligan, AR Beresford
Proceedings of the ACM on Programming Languages 1 (OOPSLA), 1-28, 2017
612017
Secure mobile computing via public terminals
R Sharp, J Scott, AR Beresford
International Conference on Pervasive Computing, 238-253, 2006
612006
Ethical issues in research using datasets of illicit origin
DR Thomas, S Pastrana, A Hutchings, R Clayton, AR Beresford
Proceedings of the 2017 Internet Measurement Conference, 445-462, 2017
552017
1000 days of UDP amplification DDoS attacks
DR Thomas, R Clayton, AR Beresford
2017 APWG Symposium on electronic crime research (eCrime), 79-84, 2017
502017
The lifetime of Android API vulnerabilities: case study on the JavaScript-to-Java interface
DR Thomas, AR Beresford, T Coudray, T Sutcliffe, A Taylor
Cambridge International Workshop on Security Protocols, 126-138, 2015
482015
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20