default search action
Alastair R. Beresford
Person information
- affiliation: University of Cambridge, UK
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [e5]Markulf Kohlweiss, Roberto Di Pietro, Alastair R. Beresford:
Cryptology and Network Security - 23rd International Conference, CANS 2024, Cambridge, UK, September 24-27, 2024, Proceedings, Part I. Lecture Notes in Computer Science 14905, Springer 2025, ISBN 978-981-97-8012-9 [contents] - [e4]Markulf Kohlweiss, Roberto Di Pietro, Alastair R. Beresford:
Cryptology and Network Security - 23rd International Conference, CANS 2024, Cambridge, UK, September 24-27, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14906, Springer 2025, ISBN 978-981-97-8015-0 [contents] - 2024
- [j21]Daniel Hugenroth, Alberto Sonnino, Sam Cutler, Alastair R. Beresford:
Sloth: Key Stretching and Deniable Encryption using Secure Elements on Smartphones. Proc. Priv. Enhancing Technol. 2024(4): 393-412 (2024) - [c58]Ceren Kocaogullar, Daniel Hugenroth, Martin Kleppmann, Alastair R. Beresford:
Pudding: Private User Discovery in Anonymity Networks. SP 2024: 3203-3220 - [i10]Luis Adan Saavedra, Hridoy S. Dutta, Alastair R. Beresford, Alice Hutchings:
ModZoo: A Large-Scale Study of Modded Android Apps and their Markets. CoRR abs/2402.19180 (2024) - [i9]Jenny Blessing, Daniel Hugenroth, Ross J. Anderson, Alastair R. Beresford:
SoK: Web Authentication in the Age of End-to-End Encryption. CoRR abs/2406.18226 (2024) - [i8]Ceren Kocaogullar, Tina Marjanov, Ivan Petrov, Ben Laurie, Al Cutter, Christoph Kern, Alice Hutchings, Alastair R. Beresford:
Confidential Computing Transparency. CoRR abs/2409.03720 (2024) - 2023
- [j20]Jovan Powar, Alastair R. Beresford:
SoK: Managing risks of linkage attacks on data privacy. Proc. Priv. Enhancing Technol. 2023(2): 97-116 (2023) - [c57]Mario Lins, René Mayrhofer, Michael Roland, Alastair R. Beresford:
Mobile App Distribution Transparency (MADT): Design and Evaluation of a System to Mitigate Necessary Trust in Mobile App Distribution Systems. NordSec 2023: 185-203 - [c56]Kieron Ivy Turk, Alice Hutchings, Alastair R. Beresford:
Can't Keep Them Away: The Failures of Anti-stalking Protocols in Personal Item Tracking Devices. Security Protocols Workshop 2023: 78-88 - [c55]Daniel Hugenroth, Ceren Kocaogullar, Alastair R. Beresford:
Choosing Your Friends: Shaping Ethical Use of Anonymity Networks. Security Protocols Workshop 2023: 151-161 - [c54]Daniel Hugenroth, Alastair R. Beresford:
Powering Privacy: On the Energy Demand and Feasibility of Anonymity Networks on Smartphones. USENIX Security Symposium 2023: 5431-5448 - [i7]Ceren Kocaogullar, Daniel Hugenroth, Martin Kleppmann, Alastair R. Beresford:
Pudding: Private User Discovery in Anonymity Networks. CoRR abs/2311.10825 (2023) - [i6]Daniel Hugenroth, Alberto Sonnino, Sam Cutler, Alastair R. Beresford:
Sloth: Key Stretching and Deniable Encryption using Secure Elements on Smartphones. IACR Cryptol. ePrint Arch. 2023: 1792 (2023) - 2022
- [j19]Mansoor Ahmed-Rengers, Diana A. Vasile, Daniel Hugenroth, Alastair R. Beresford, Ross Anderson:
CoverDrop: Blowing the Whistle Through A News App. Proc. Priv. Enhancing Technol. 2022(2): 47-67 (2022) - [j18]Martin Kleppmann, Dominic P. Mulligan, Victor B. F. Gomes, Alastair R. Beresford:
A Highly-Available Move Operation for Replicated Trees. IEEE Trans. Parallel Distributed Syst. 33(7): 1711-1724 (2022) - [c53]Luis Adan Saavedra, Alastair R. Beresford:
ACDC: Anonymous Crowdsourcing Using Digital Cash. CANS 2022: 314-325 - [c52]Ricardo Mendes, Mariana Cunha, João P. Vilela, Alastair R. Beresford:
Enhancing User Privacy in Mobile Devices Through Prediction of Privacy Preferences. ESORICS (1) 2022: 153-172 - [c51]Ricardo Mendes, André Brandão, João P. Vilela, Alastair R. Beresford:
Effect of User Expectation on Mobile App Privacy: A Field Study. PerCom 2022: 207-214 - [e3]Alastair R. Beresford, Arpita Patra, Emanuele Bellini:
Cryptology and Network Security - 21st International Conference, CANS 2022, Dubai, United Arab Emirates, November 13-16, 2022, Proceedings. Lecture Notes in Computer Science 13641, Springer 2022, ISBN 978-3-031-20973-4 [contents] - 2021
- [j17]Jiexin Zhang, Alastair R. Beresford, Ian Sheret:
Factory Calibration Fingerprinting of Sensors. IEEE Trans. Inf. Forensics Secur. 16: 1626-1639 (2021) - [c50]Matthew Weidner, Martin Kleppmann, Daniel Hugenroth, Alastair R. Beresford:
Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees. CCS 2021: 2024-2045 - [c49]Daniel Hugenroth, Martin Kleppmann, Alastair R. Beresford:
Rollercoaster: An Efficient Group-Multicast Scheme for Mix Networks. USENIX Security Symposium 2021: 3433-3450 - 2020
- [c48]Michael Dodson, Alastair R. Beresford, Mikael Vingaard:
Using Global Honeypot Networks to Detect Targeted ICS Attacks. CyCon 2020: 275-291 - [c47]Michael Dodson, Alastair R. Beresford, Daniel R. Thomas:
When will my PLC support Mirai? The security economics of large-scale attacks against Internet-connected ICS devices. eCrime 2020: 1-14 - [c46]Michael Dodson, Alastair R. Beresford, Alexander Richardson, Jessica Clarke, Robert N. M. Watson:
CHERI Macaroons: Efficient, host-based access control for cyber-physical systems. EuroS&P Workshops 2020: 688-693 - [i5]Matthew Weidner, Martin Kleppmann, Daniel Hugenroth, Alastair R. Beresford:
Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees. IACR Cryptol. ePrint Arch. 2020: 1281 (2020)
2010 – 2019
- 2019
- [j16]Martin Kleppmann, Alastair R. Beresford, Boerge Svingen:
Online event processing. Commun. ACM 62(5): 43-49 (2019) - [j15]Stephan A. Kollmann, Martin Kleppmann, Alastair R. Beresford:
Snapdoc: Authenticated snapshots with history privacy in peer-to-peer collaborative editing. Proc. Priv. Enhancing Technol. 2019(3): 210-232 (2019) - [j14]Martin Kleppmann, Alastair R. Beresford, Boerge Svingen:
Online Event Processing. ACM Queue 17(1): 40 (2019) - [c45]Martin Kleppmann, Victor B. F. Gomes, Dominic P. Mulligan, Alastair R. Beresford:
Interleaving anomalies in collaborative text editors. PaPoC@EuroSys 2019: 6:1-6:7 - [c44]Jovan Powar, Alastair R. Beresford:
A Data Sharing Platform for Earables Research. EarComp@UbiComp 2019: 30-35 - [c43]Jiexin Zhang, Alastair R. Beresford, Stephan A. Kollmann:
LibID: reliable identification of obfuscated third-party Android libraries. ISSTA 2019: 55-65 - [c42]Andrea Franceschini, James P. Sharkey, Alastair R. Beresford:
Inequality: multi-modal equation entry on the web. L@S 2019: 12:1-12:10 - [c41]Jiexin Zhang, Alastair R. Beresford, Ian Sheret:
SensorID: Sensor Calibration Fingerprinting for Smartphones. IEEE Symposium on Security and Privacy 2019: 638-655 - [c40]Diana A. Vasile, Martin Kleppmann, Daniel R. Thomas, Alastair R. Beresford:
Ghost Trace on the Wire? Using Key Evidence for Informed Decisions. Security Protocols Workshop 2019: 245-257 - [e2]Fahim Kawsar, Alastair R. Beresford:
Proceedings of the 1st International Workshop on Earable Computing, EarComp@UbiComp 2019, London, UK, September 10, 2019. ACM 2019, ISBN 978-1-4503-6902-2 [contents] - 2018
- [j13]Martin Kleppmann, Victor B. F. Gomes, Dominic P. Mulligan, Alastair R. Beresford:
OpSets: Sequential Specifications for Replicated Datatypes. Arch. Formal Proofs 2018 (2018) - [j12]Alastair R. Beresford, Cecilia Mascolo, Marco Gruteser:
The Specter of Malicious Computing: Securing the Internet of Things. IEEE Pervasive Comput. 17(3): 10-11 (2018) - [j11]Dionysis Manousakas, Cecilia Mascolo, Alastair R. Beresford, Dennis Chan, Nikhil Sharma:
Quantifying Privacy Loss of Human Mobility Graph Topology. Proc. Priv. Enhancing Technol. 2018(3): 5-21 (2018) - [c39]Martin Kleppmann, Stephan A. Kollmann, Diana A. Vasile, Alastair R. Beresford:
From Secure Messaging to Secure Collaboration. Security Protocols Workshop 2018: 179-185 - [i4]Martin Kleppmann, Victor B. F. Gomes, Dominic P. Mulligan, Alastair R. Beresford:
OpSets: Sequential Specifications for Replicated Datatypes (Extended Version). CoRR abs/1805.04263 (2018) - 2017
- [j10]Victor B. F. Gomes, Martin Kleppmann, Dominic P. Mulligan, Alastair R. Beresford:
A framework for establishing Strong Eventual Consistency for Conflict-free Replicated Datatypes. Arch. Formal Proofs 2017 (2017) - [j9]Victor B. F. Gomes, Martin Kleppmann, Dominic P. Mulligan, Alastair R. Beresford:
Verifying strong eventual consistency in distributed systems. Proc. ACM Program. Lang. 1(OOPSLA): 109:1-109:28 (2017) - [j8]Martin Kleppmann, Alastair R. Beresford:
A Conflict-Free Replicated JSON Datatype. IEEE Trans. Parallel Distributed Syst. 28(10): 2733-2746 (2017) - [c38]Kelly Widdicks, Oliver Bates, Mike Hazas, Adrian Friday, Alastair R. Beresford:
Demand Around the Clock: Time Use and Data Demand of Mobile Devices in Everyday Life. CHI 2017: 5361-5372 - [c37]Daniel R. Thomas, Richard Clayton, Alastair R. Beresford:
1000 days of UDP amplification DDoS attacks. eCrime 2017: 79-84 - [c36]Stephan A. Kollmann, Alastair R. Beresford:
The Cost of Push Notifications for Smartphones Using Tor Hidden Services. EuroS&P Workshops 2017: 76-85 - [c35]Daniel R. Thomas, Sergio Pastrana, Alice Hutchings, Richard Clayton, Alastair R. Beresford:
Ethical issues in research using datasets of illicit origin. Internet Measurement Conference 2017: 445-462 - [c34]Vincent F. Taylor, Alastair R. Beresford, Ivan Martinovic:
There are many apps for that: quantifying the availability of privacy-preserving apps. WISEC 2017: 247-252 - [i3]Victor B. F. Gomes, Martin Kleppmann, Dominic P. Mulligan, Alastair R. Beresford:
Verifying Strong Eventual Consistency in Distributed Systems. CoRR abs/1707.01747 (2017) - [i2]Vincent F. Taylor, Alastair R. Beresford, Ivan Martinovic:
Intra-Library Collusion: A Potential Privacy Nightmare on Smartphones. CoRR abs/1708.03520 (2017) - 2016
- [j7]Stephen Cummins, Alastair R. Beresford, Andrew C. Rice:
Investigating Engagement with In-Video Quiz Questions in a Programming Course. IEEE Trans. Learn. Technol. 9(1): 57-66 (2016) - [c33]Franck Gechter, Alastair R. Beresford, Andrew C. Rice:
Reconstruction of Battery Level Curves Based on User Data Collected from a Smartphone. AIMSA 2016: 289-298 - [c32]Alastair R. Beresford:
Whack-A-Mole Security: Incentivising the Production, Delivery and Installation of Security Updates (invited paper). IMPS@ESSoS 2016: 9-10 - [c31]Stephen Cummins, Alastair R. Beresford, Ian Davies, Andrew C. Rice:
Supporting Scalable Data Sharing in Online Education. L@S 2016: 97-100 - [c30]Stephen Cummins, Alistair Stead, Lisa Jardine-Wright, Ian Davies, Alastair R. Beresford, Andrew C. Rice:
Investigating the Use of Hints in Online Problem Solving. L@S 2016: 105-108 - [i1]Martin Kleppmann, Alastair R. Beresford:
A Conflict-Free Replicated JSON Datatype. CoRR abs/1608.03960 (2016) - 2015
- [c29]Daniel R. Thomas, Alastair R. Beresford, Andrew C. Rice:
Security Metrics for the Android Ecosystem. SPSM@CCS 2015: 87-98 - [c28]Stephen Cummins, Ian Davies, Andrew C. Rice, Alastair R. Beresford:
Equality: A Tool for Free-form Equation Editing. ICALT 2015: 270-274 - [c27]Daniel R. Thomas, Alastair R. Beresford, Thomas Coudray, Tom Sutcliffe, Adrian Taylor:
The Lifetime of Android API Vulnerabilities: Case Study on the JavaScript-to-Java Interface. Security Protocols Workshop 2015: 126-138 - [c26]Denzil Ferreira, Vassilis Kostakos, Alastair R. Beresford, Janne Lindqvist, Anind K. Dey:
Securacy: an empirical investigation of Android applications' network usage, privacy and security. WISEC 2015: 11:1-11:11 - [c25]Daniel T. Wagner, Daniel R. Thomas, Alastair R. Beresford, Andrew C. Rice:
Device analyzer: a privacy-aware platform to support research on the Android ecosystem. WISEC 2015: 34:1-34:2 - 2014
- [j6]Daniel T. Wagner, Andrew C. Rice, Alastair R. Beresford:
Device analyzer: largescale mobile data collection. SIGMETRICS Perform. Evaluation Rev. 41(4): 53-56 (2014) - [c24]Andrew C. Rice, Alastair R. Beresford:
The device analyzer competition. UbiComp Adjunct 2014: 403-407 - [c23]Daniel R. Thomas, Alastair R. Beresford:
Better Authentication: Password Revolution by Evolution. Security Protocols Workshop 2014: 130-145 - 2013
- [j5]Sören Preibusch, Dorothea Kübler, Alastair R. Beresford:
Price versus privacy: an experiment into the competitive advantage of collecting less personal information. Electron. Commer. Res. 13(4): 423-455 (2013) - [c22]Daniel T. Wagner, Andrew Colin Rice, Alastair R. Beresford:
Device Analyzer: Understanding Smartphone Usage. MobiQuitous 2013: 195-208 - [p2]Sören Preibusch, Kat Krol, Alastair R. Beresford:
The Privacy Economics of Voluntary Over-disclosure in Web Forms. The Economics of Information Security and Privacy 2013: 183-209 - 2012
- [c21]Sören Preibusch, Kat Krol, Alastair R. Beresford:
The Privacy Economics of Voluntary Over-disclosure in Web Forms. WEIS 2012 - 2011
- [c20]Jean Bacon, Andrei Iu. Bejan, Alastair R. Beresford, David Evans, Richard J. Gibbens, Ken Moody:
Using Real-Time Road Traffic Data to Evaluate Congestion. Dependable and Historic Computing 2011: 93-117 - [c19]Alastair R. Beresford, Andrew C. Rice, Nicholas Skehin, Ripduman Sohan:
MockDroid: trading privacy for application functionality on smartphones. HotMobile 2011: 49-54 - 2010
- [c18]Andrei Iu. Bejan, Richard J. Gibbens, David Evans, Alastair R. Beresford, Jean Bacon, Adrian Friday:
Statistical modelling and analysis of sparse bus probe data in urban areas. ITSC 2010: 1256-1263 - [c17]Simon Hay, S. T. Rassia, Alastair R. Beresford:
Estimating Personal Energy expenditure with location data. PerCom Workshops 2010: 304-309
2000 – 2009
- 2009
- [c16]Sören Preibusch, Alastair R. Beresford:
Establishing Distributed Hidden Friendship Relations. Security Protocols Workshop 2009: 321-334 - [e1]Alastair R. Beresford, Simon J. Gay:
Proceedings Second International Workshop on Programming Language Approaches to Concurrency and Communication-cEntric Software, PLACES 2009, York, UK, 22nd March 2009. EPTCS 17, 2009 [contents] - 2008
- [c15]Jean Bacon, Alastair R. Beresford, David Evans, David Ingram, Niki Trigoni, Alexandre Guitton, Antonios Skordylis:
TIME: An Open Platform for Capturing, Processing and Delivering Transport-Related Data. CCNC 2008: 687-691 - [c14]Jonathan J. Davies, Alastair R. Beresford, Alan Mycroft:
Language-Based Optimisation of Sensor-Driven Distributed Computing Applications. FASE 2008: 407-422 - [p1]Alastair R. Beresford, David J. Scott:
Data Privacy. Wiley Encyclopedia of Computer Science and Engineering 2008 - 2007
- [c13]Jonathan J. Davies, Alastair R. Beresford:
Scalable Inter-vehicular Applications. OTM Workshops (2) 2007: 876-885 - [c12]David Evans, Alastair R. Beresford, Trevor Burbridge, Andrea Soppera:
Context-Derived Pseudonyms for Protection of Privacy in Transport Middleware and Applications. PerCom Workshops 2007: 395-400 - 2006
- [j4]Andrew C. Rice, Robert K. Harle, Alastair R. Beresford:
Analysing fundamental properties of marker-based vision system designs. Pervasive Mob. Comput. 2(4): 453-471 (2006) - [j3]Jonathan J. Davies, Alastair R. Beresford, Andy Hopper:
Scalable, Distributed, Real-Time Map Generation. IEEE Pervasive Comput. 5(4): 47-54 (2006) - [j2]Anthony D. Joseph, Alastair R. Beresford, Jean Bacon, David Naveen Cottingham, Jonathan J. Davies, Brian D. Jones, Haitao Guo, Wei Guan, Yong Lin, Houbing Song, Liviu Iftode, Simone Fuchs, Bernhard Lamprecht, Kyandoghere Kyamakya, Jorge González Fernández, Juan Carlos Yelmo García, Yod Samuel Martín García, Jorge de Gracia Santos, Milind Nimesh, Gang Pan, Zhaohui Wu, Qing Wu, Zhenyu Shan, Jie Sun, Jian Lu, Guoqing Yang, Muhammad Khurram Khan, Jiashu Zhang:
Intelligent Transportation Systems. IEEE Pervasive Comput. 5(4): 63-67 (2006) - [c11]Joonwoong Kim, Alastair R. Beresford, Frank Stajano:
Towards a Security Policy for Ubiquitous Healthcare Systems (Position Paper). ICUCT 2006: 263-272 - [c10]Andrew C. Rice, Alastair R. Beresford, Robert K. Harle:
Cantag: an open source software toolkit for designing and deploying marker-based vision systems. PerCom 2006: 12-21 - [c9]Andrew C. Rice, Alastair R. Beresford:
Dependability and Accountability for Context-aware Middleware Systems. PerCom Workshops 2006: 378-382 - [c8]Richard Sharp, James Scott, Alastair R. Beresford:
Secure Mobile Computing Via Public Terminals. Pervasive 2006: 238-253 - [c7]Alastair R. Beresford, Jonathan J. Davies, Robert K. Harle:
Privacy-Sensitive Congestion Charging. Security Protocols Workshop 2006: 97-104 - [c6]Alastair R. Beresford:
Privacy-Sensitive Congestion Charging. Security Protocols Workshop 2006: 105-111 - 2005
- [c5]Sarah Mount, Elena I. Gaura, Robert M. Newman, Alastair R. Beresford, Sam R. Dolan, Michael Allen:
Trove: a physical game running on an ad-hoc wireless sensor network. sOc-EUSAI 2005: 235-239 - 2004
- [c4]Kieran Mansley, Alastair R. Beresford, David J. Scott:
The Carrot Approach: Encouraging Use of Location Systems. UbiComp 2004: 366-383 - [c3]Alastair R. Beresford, Frank Stajano:
Mix Zones: User Privacy in Location-aware Services. PerCom Workshops 2004: 127-131 - 2003
- [j1]Alastair R. Beresford, Frank Stajano:
Location Privacy in Pervasive Computing. IEEE Pervasive Comput. 2(1): 46-55 (2003) - [c2]David J. Scott, Alastair R. Beresford, Alan Mycroft:
Spatial Security Policies for Mobile Agents in a Sentient Computing Environment. FASE 2003: 102-117 - [c1]David J. Scott, Alastair R. Beresford, Alan Mycroft:
Spatial Policies for Sentient Mobile Applications. POLICY 2003: 147-157
Coauthor Index
aka: Andrew Colin Rice
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint