Alastair Beresford
Alastair Beresford
Computer Laboratory, University of Cambridge
Verified email at - Homepage
Cited by
Cited by
Location privacy in pervasive computing
AR Beresford, F Stajano
IEEE Pervasive computing 2 (1), 46-55, 2003
Mix zones: User privacy in location-aware services
AR Beresford, F Stajano
IEEE Annual conference on pervasive computing and communications workshops …, 2004
Mockdroid: trading privacy for application functionality on smartphones
AR Beresford, A Rice, N Skehin, R Sohan
Proceedings of the 12th workshop on mobile computing systems and …, 2011
Scalable, distributed, real-time map generation
JJ Davies, AR Beresford, A Hopper
IEEE Pervasive Computing 5 (4), 47-54, 2006
Unwillingness to pay for privacy: A field experiment
AR Beresford, D Kübler, S Preibusch
Economics letters 117 (1), 25-27, 2012
Device analyzer: Understanding smartphone usage
DT Wagner, A Rice, AR Beresford
International Conference on Mobile and Ubiquitous Systems: Computing …, 2013
Device Analyzer: Large-scale mobile data collection
DT Wagner, A Rice, AR Beresford
ACM SIGMETRICS Performance Evaluation Review 41 (4), 53-56, 2014
Location privacy in ubiquitous computing
AR Beresford
University of Cambridge, Computer Laboratory, 2005
Security metrics for the android ecosystem
DR Thomas, AR Beresford, A Rice
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in …, 2015
Intelligent transportation systems
AD Joseph, AR Beresford, J Bacon, DN Cottingham, JJ Davies, BD Jones, ...
IEEE Pervasive Computing 5 (4), 63-67, 2006
Using real-time road traffic data to evaluate congestion
J Bacon, AI Bejan, AR Beresford, D Evans, RJ Gibbens, K Moody
Dependable and Historic Computing, 93-117, 2011
A conflict-free replicated JSON datatype
M Kleppmann, AR Beresford
IEEE Transactions on Parallel and Distributed Systems 28 (10), 2733-2746, 2017
Investigating engagement with in-video quiz questions in a programming course
S Cummins, AR Beresford, A Rice
IEEE Transactions on Learning Technologies 9 (1), 57-66, 2015
Securacy: an empirical investigation of Android applications' network usage, privacy and security
D Ferreira, V Kostakos, AR Beresford, J Lindqvist, AK Dey
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015
Secure mobile computing via public terminals
R Sharp, J Scott, AR Beresford
International Conference on Pervasive Computing, 238-253, 2006
Price versus privacy: an experiment into the competitive advantage of collecting less personal information
S Preibusch, D Kübler, AR Beresford
Electronic Commerce Research 13 (4), 423-455, 2013
Verifying strong eventual consistency in distributed systems
VBF Gomes, M Kleppmann, DP Mulligan, AR Beresford
Proceedings of the ACM on Programming Languages 1 (OOPSLA), 1-28, 2017
Statistical modelling and analysis of sparse bus probe data in urban areas
AI Bejan, RJ Gibbens, D Evans, AR Beresford, J Bacon, A Friday
13th International IEEE Conference on Intelligent Transportation Systems …, 2010
The lifetime of Android API vulnerabilities: case study on the JavaScript-to-Java interface
DR Thomas, AR Beresford, T Coudray, T Sutcliffe, A Taylor
Cambridge International Workshop on Security Protocols, 126-138, 2015
Cantag: an open source software toolkit for designing and deploying marker-based vision systems
AC Rice, AR Beresford, RK Harle
Fourth Annual IEEE International Conference on Pervasive Computing and …, 2006
The system can't perform the operation now. Try again later.
Articles 1–20