Alastair Beresford
Alastair Beresford
Computer Laboratory, University of Cambridge
Email confirmado em - Página inicial
Citado por
Citado por
Location privacy in pervasive computing
AR Beresford, F Stajano
IEEE Pervasive computing 2 (1), 46-55, 2003
Mix zones: User privacy in location-aware services
AR Beresford, F Stajano
IEEE Annual conference on pervasive computing and communications workshops …, 2004
Mockdroid: trading privacy for application functionality on smartphones
AR Beresford, A Rice, N Skehin, R Sohan
Proceedings of the 12th workshop on mobile computing systems and …, 2011
Scalable, distributed, real-time map generation
JJ Davies, AR Beresford, A Hopper
IEEE Pervasive Computing 5 (4), 47-54, 2006
Unwillingness to pay for privacy: A field experiment
AR Beresford, D Kübler, S Preibusch
Economics letters 117 (1), 25-27, 2012
Device analyzer: Understanding smartphone usage
DT Wagner, A Rice, AR Beresford
International Conference on Mobile and Ubiquitous Systems: Computing …, 2013
Device Analyzer: Large-scale mobile data collection
DT Wagner, A Rice, AR Beresford
ACM SIGMETRICS Performance Evaluation Review 41 (4), 53-56, 2014
Location privacy in ubiquitous computing
AR Beresford
University of Cambridge, Computer Laboratory, 2005
Security metrics for the android ecosystem
DR Thomas, AR Beresford, A Rice
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in …, 2015
Intelligent transportation systems
AD Joseph, AR Beresford, J Bacon, DN Cottingham, JJ Davies, BD Jones, ...
IEEE Pervasive Computing 5 (4), 63-67, 2006
Using real-time road traffic data to evaluate congestion
J Bacon, AI Bejan, AR Beresford, D Evans, RJ Gibbens, K Moody
Dependable and Historic Computing, 93-117, 2011
A conflict-free replicated JSON datatype
M Kleppmann, AR Beresford
IEEE Transactions on Parallel and Distributed Systems 28 (10), 2733-2746, 2017
Investigating engagement with in-video quiz questions in a programming course
S Cummins, AR Beresford, A Rice
IEEE Transactions on Learning Technologies 9 (1), 57-66, 2015
Secure mobile computing via public terminals
R Sharp, J Scott, AR Beresford
International Conference on Pervasive Computing, 238-253, 2006
Securacy: an empirical investigation of Android applications' network usage, privacy and security
D Ferreira, V Kostakos, AR Beresford, J Lindqvist, AK Dey
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015
Price versus privacy: an experiment into the competitive advantage of collecting less personal information
S Preibusch, D Kübler, AR Beresford
Electronic Commerce Research 13 (4), 423-455, 2013
Verifying strong eventual consistency in distributed systems
VBF Gomes, M Kleppmann, DP Mulligan, AR Beresford
Proceedings of the ACM on Programming Languages 1 (OOPSLA), 1-28, 2017
Statistical modelling and analysis of sparse bus probe data in urban areas
AI Bejan, RJ Gibbens, D Evans, AR Beresford, J Bacon, A Friday
13th International IEEE Conference on Intelligent Transportation Systems …, 2010
The lifetime of Android API vulnerabilities: case study on the JavaScript-to-Java interface
DR Thomas, AR Beresford, T Coudray, T Sutcliffe, A Taylor
Cambridge International Workshop on Security Protocols, 126-138, 2015
Cantag: an open source software toolkit for designing and deploying marker-based vision systems
AC Rice, AR Beresford, RK Harle
Fourth Annual IEEE International Conference on Pervasive Computing and …, 2006
O sistema não pode efectuar a operação agora. Tente novamente mais tarde.
Artigos 1–20