Seguir
Alastair Beresford
Alastair Beresford
Computer Laboratory, University of Cambridge
Email confirmado em cam.ac.uk - Página inicial
Título
Citado por
Citado por
Ano
Location privacy in pervasive computing
AR Beresford, F Stajano
IEEE Pervasive computing 2 (1), 46-55, 2003
22302003
Mix zones: User privacy in location-aware services
AR Beresford, F Stajano
IEEE Annual conference on pervasive computing and communications workshops …, 2004
7392004
Mockdroid: trading privacy for application functionality on smartphones
AR Beresford, A Rice, N Skehin, R Sohan
Proceedings of the 12th workshop on mobile computing systems and …, 2011
6542011
Unwillingness to pay for privacy: A field experiment
AR Beresford, D Kübler, S Preibusch
Economics letters 117 (1), 25-27, 2012
3142012
Scalable, distributed, real-time map generation
JJ Davies, AR Beresford, A Hopper
IEEE Pervasive Computing 5 (4), 47-54, 2006
2842006
Device analyzer: Understanding smartphone usage
DT Wagner, A Rice, AR Beresford
Mobile and Ubiquitous Systems: Computing, Networking, and Services: 10th …, 2014
2012014
A conflict-free replicated JSON datatype
M Kleppmann, AR Beresford
IEEE Transactions on Parallel and Distributed Systems 28 (10), 2733-2746, 2017
1422017
Device Analyzer: Large-scale mobile data collection
DT Wagner, A Rice, AR Beresford
ACM SIGMETRICS Performance Evaluation Review 41 (4), 53-56, 2014
1392014
Security metrics for the android ecosystem
DR Thomas, AR Beresford, A Rice
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in …, 2015
1362015
Location privacy in ubiquitous computing
AR Beresford
University of Cambridge, Computer Laboratory, 2005
1272005
Investigating engagement with in-video quiz questions in a programming course
S Cummins, AR Beresford, A Rice
IEEE Transactions on Learning Technologies 9 (1), 57-66, 2015
1172015
Intelligent transportation systems
AD Joseph, AR Beresford, J Bacon, DN Cottingham, JJ Davies, BD Jones, ...
IEEE Pervasive Computing 5 (4), 63-67, 2006
962006
Verifying strong eventual consistency in distributed systems
VBF Gomes, M Kleppmann, DP Mulligan, AR Beresford
Proceedings of the ACM on Programming Languages 1 (OOPSLA), 1-28, 2017
922017
Price versus privacy: an experiment into the competitive advantage of collecting less personal information
S Preibusch, D Kübler, AR Beresford
Electronic Commerce Research 13, 423-455, 2013
852013
Using real-time road traffic data to evaluate congestion
J Bacon, AI Bejan, AR Beresford, D Evans, RJ Gibbens, K Moody
Dependable and Historic Computing: Essays Dedicated to Brian Randell on the …, 2011
812011
Securacy: an empirical investigation of Android applications' network usage, privacy and security
D Ferreira, V Kostakos, AR Beresford, J Lindqvist, AK Dey
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015
772015
SensorID: Sensor calibration fingerprinting for smartphones
J Zhang, AR Beresford, I Sheret
2019 IEEE Symposium on Security and Privacy (SP), 638-655, 2019
752019
Ethical issues in research using datasets of illicit origin
DR Thomas, S Pastrana, A Hutchings, R Clayton, AR Beresford
Proceedings of the 2017 Internet Measurement Conference, 445-462, 2017
742017
1000 days of UDP amplification DDoS attacks
DR Thomas, R Clayton, AR Beresford
2017 APWG Symposium on Electronic Crime Research (eCrime), 79-84, 2017
682017
Secure mobile computing via public terminals
R Sharp, J Scott, AR Beresford
International Conference on Pervasive Computing, 238-253, 2006
612006
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20