Conference proceedings
Mendes, R., Brandao, A., Vilela, JP. and Beresford, AR., 2022. Effect of User Expectation on Mobile App Privacy: A Field Study 2022 IEEE International Conference on Pervasive Computing and Communications, PerCom 2022,
Doi: http://doi.org/10.1109/PerCom53586.2022.9762379
Mendes, R., Cunha, M., Vilela, JP. and Beresford, AR., 2022. Enhancing User Privacy in Mobile Devices Through Prediction of Privacy Preferences Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 13554 LNCS
Doi: http://doi.org/10.1007/978-3-031-17140-6_8
Powar, J. and Beresford, AR., 2019. A Data Sharing Platform for Earables Research Proceedings of the 1st International Workshop on Earable Computing, EarComp 2019,
Doi: 10.1145/3345615.3361139
Kawsar, F. and Beresford, AR., 2019. EarComp 2019: First International Workshop on Earable Computing Proceedings of the 1st International Workshop on Earable Computing, EarComp 2019,
Doi: 10.1145/3345615.3361140
Kleppmann, M., Gomes, VBF., Mulligan, DP. and Beresford, AR., 2019. Interleaving anomalies in collaborative text editors. PaPoC@EuroSys,
2019. Proceedings of the 1st International Workshop on Earable Computing, EarComp@UbiComp 2019, London, UK, September 10, 2019 EarComp@UbiComp,
Kleppmann, M., Kollmann, SA., Vasile, DA. and Beresford, AR., 2018. From Secure Messaging to Secure Collaboration Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 11286 LNCS
Doi: http://doi.org/10.1007/978-3-030-03251-7_21
Gomes, VBF., Kleppmann, M., Mulligan, DP. and Beresford, AR., 2017. Verifying Strong Eventual Consistency in Distributed Systems. CoRR, v. abs/1707.01747
Widdicks, K., Bates, O., Hazas, M., Friday, A. and Beresford, AR., 2017. Demand around the clock: Time use and data demand of mobile devices in everyday life Conference on Human Factors in Computing Systems - Proceedings, v. 2017-May
Doi: 10.1145/3025453.3025730
Thomas, DR., Clayton, R. and Beresford, AR., 2017. 1000 days of UDP amplification DDoS attacks
Taylor, VF., Beresford, AR. and Martinovic, I., 2017. There are Many Apps for That: Quantifying the Availability of Privacy-Preserving Apps WiSec '17 Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (,
Doi: http://doi.org/10.1145/3098243.3098266
Mulligan, DP., Beresford, AR., Gomes, VBF. and Kleppmann, M., 2017. Verifying Strong Eventual Consistency in Distributed Systems Proceedings of the ACM on Programming Languages, v. 1
Thomas, DR., Pastrana Portillo, S., Hutchings, A., Clayton, R. and Beresford, AR., 2017. Ethical issues in research using datasets of illicit origin Proceedings of IMC '17,
Doi: 10.1145/3131365.3131389
Cummins, S., Stead, A., Jardine-Wright, L., Davies, I., Beresford, AR. and Rice, A., 2016. Investigating the use of hints in online problem solving L@S 2016 - Proceedings of the 3rd 2016 ACM Conference on Learning at Scale,
Doi: 10.1145/2876034.2893379
Cummins, S., Beresford, AR., Davies, I. and Rice, A., 2016. Supporting Authentication and Scalable Data Sharing in Online Education L@S 2016 - Proceedings of the 3rd 2016 ACM Conference on Learning at Scale,
Doi: 10.1145/2876034.2893376
Beresford, AR., 2016. Whack-a-mole security: Incentivising the production, delivery and installation of security updates CEUR Workshop Proceedings, v. 1575
Gechter, F., Beresford, AR. and Rice, A., 2016. Reconstruction of battery level curves based on user data collected from a smartphone Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 9883 LNAI
Doi: 10.1007/978-3-319-44748-3_28
Thomas, DR. and Beresford, AR., 2016. Incentivising software updates
Thomas, DR., Beresford, AR., Coudray, T., Sutcliffe, T. and Taylor, A., 2015. The lifetime of android API vulnerabilities: Case study on the JavaScript-to-Java interface Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 9379
Doi: 10.1007/978-3-319-26096-9_13
Wagner, DT., Thomas, DR., Beresford, AR. and Rice, A., 2015. Device analyzer: A privacy-aware platform to support research on the android ecosystem Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2015,
Doi: 10.1145/2766498.2774992
Ferreira, D., Kostakos, V., Beresford, AR., Lindqvist, J. and Dey, AK., 2015. Securacy: An empirical investigation of android applications' network usage, privacy and security Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2015,
Doi: 10.1145/2766498.2766506
Cummins, S., Davies, I., Rice, A. and Beresford, AR., 2015. Equality: A tool for free-form equation editing Proceedings - IEEE 15th International Conference on Advanced Learning Technologies: Advanced Technologies for Supporting Open Access to Formal and Informal Learning, ICALT 2015,
Doi: 10.1109/ICALT.2015.34
Thomas, DR., Beresford, AR. and Rice, A., 2015. Security metrics for the Android ecosystem SPSM 2015 - Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, co-located with: CCS 2015,
Doi: 10.1145/2808117.2808118
Rice, A. and Beresford, AR., 2014. The device analyzer competition UbiComp 2014 - Adjunct Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing,
Doi: 10.1145/2638728.2641696
Wagner, DT., Rice, A. and Beresford, AR., 2014. Device analyzer: Understanding smartphone usage Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, v. 131
Doi: 10.1007/978-3-319-11569-6_16
Thomas, DR. and Beresford, AR., 2014. Better authentication: Password revolution by evolution Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 8809
Doi: 10.1007/978-3-319-12400-1_13
Preibusch, S., Krol, K. and Beresford, AR., 2012. The Privacy Economics of Voluntary Over-disclosure in Web Forms. WEIS,
Beresford, AR., Rice, A., Skehin, N. and Sohan, R., 2011. MockDroid: trading privacy for application functionality on smartphones In the Proceedings of the 11th Workshop on Mobile Computing Systems and Applications (HotMobile),
Beresford, AR., Davies, JJ. and Harle, RK., 2009. Privacy-Sensitive Congestion Charging SECURITY PROTOCOLS, v. 5087
Bacon, J., Beresford, AR., Evans, D., Ingram, D., Trigoni, N., Guitton, A. and Skordylis, A., 2008. TIME: An open platform for capturing, processing and delivering transport-related data 2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3,
Davies, JJ., Beresford, AR. and Mycroft, A., 2008. Language-based optimisation of sensor-driven distributed computing applications FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, PROCEEDINGS, v. 4961
Davies, JJ. and Beresford, AR., 2007. Scalable inter-vehicular applications ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: OTM 2007 WORKSHOPS, PT 2, PROCEEDINGS, v. 4806
Evans, D., Beresford, AR., Burbridge, T. and Soppera, A., 2007. Context-derived pseudonyms for protection of privacy in transport middleware and applications Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, Proceedings,
Kim, J., Beresford, AR. and Stajano, F., 2007. Towards a security policy for ubiquitous healthcare systems (Position paper) Ubiquitous Convergence Technology, v. 4412
Rice, AC., Beresford, AR. and Harle, RK., 2006. Cantag: An open source software toolkit for designing and deploying marker-based vision systems PERCOM 2006: FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS,
Rice, AC. and Beresford, AR., 2006. Dependability and accountability for context-aware middleware systems FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS,
Beresford, AR., 2006. Privacy-Sensitive Congestion Charging. Security Protocols Workshop, v. 5087
Joseph, AD., Beresford, AR., Bacon, J., Cottingham, DN., Davies, JJ., Jones, BD., Guo, H., Guan, W., Lin, Y., Song, H., Iftode, L., Fuchs, S., Lamprecht, B., Kyamakya, K., Fernández, JG., García, JCY., García, YSM., Santos, JDG., Nimesh, M., Pan, G., Wu, Z., Wu, Q., Shan, Z., Sun, J., Lu, J., Yang, G., Khan, MK. and Zhang, J., 2006. Intelligent Transportation Systems. IEEE Pervasive Comput., v. 5
Doi: http://doi.org/10.1109/MPRV.2006.77
Sharp, R., Scott, J. and Beresford, AR., 2006. Secure mobile computing via public terminals PERVASIVE COMPUTING, PROCEEDINGS, v. 3968
Rice, AC., Harle, RK. and Beresford, AR., 2006. Analysing fundamental properties of marker-based vision system designs. Pervasive Mob. Comput., v. 2
Doi: 10.1016/j.pmcj.2006.07.006
Beresford, AR. and Stajano, F., 2004. Mix zones: User privacy in location-aware services SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS,
Mansley, K., Beresford, AR. and Scott, D., 2004. The carrot approach: Encouraging use of location systems UBICOMP 2004: UBIQUITOUS COMPUTING, PROCEEDINGS, v. 3205
Scott, D., Beresford, A. and Mycroft, A., 2003. Spatial security policies for mobile agents in a sentient computing environment FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, PROCEEDINGS, v. 2621
Scott, DJ., Beresford, AR. and Mycroft, A., 2003. Spatial Policies for Sentient Mobile Applications. POLICY,
Doi: 10.1109/POLICY.2003.1206968
Scott, D., Beresford, A. and Mycroft, A., 2003. Spatial policies for sentient mobile applications IEEE 4TH INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS,
Weidner, M., Kleppmann, M., Hugenroth, D. and Beresford, AR., Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees
Doi: http://doi.org/10.1145/3460120.3484542
Powar, J. and Beresford, AR., A data sharing platform for earables research EarComp'19: Proceedings of the 1st International Workshop on Earable Computing,
Doi: 10.1145/3345615.3361139
Dodson, M., Beresford, AR. and Vingaard, M., Using Global Honeypot Networks to Detect Targeted ICS Attacks
Kleppmann, M., Borges Ferreira Gomes, V., Mulligan, DP. and Beresford, AR., Interleaving anomalies in collaborative text editors
Ahmed-Rengers, M., Vasile, D., Hugenroth, D., Beresford, AR. and Anderson, R., CoverDrop: Blowing the Whistle Through A News App Proceedings on Privacy Enhancing Technologies Symposium,
Zhang, J., Beresford, A. and Sheret, I., SensorID: Sensor Calibration Fingerprinting for Smartphones
Dodson, M., Beresford, AR., Watson, R., Clarke, J. and Richardson, A., CHERI Macaroons: Efficient, host-based access control for cyber-physical systems
Franceschini, A., Beresford, AR. and Sharkey, JP., Inequality: multi-modal equation entry on the web
Dodson, M., Thomas, D. and Beresford, A., When will my PLC support Mirai? The security economics of large-scale attacks against Internet-connected ICS devices
Zhang, J., Beresford, A. and Kollmann, S., LibID: Reliable Identification of Obfuscated Third-Party Android Libraries ISSTA 2019: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis,
Doi: http://doi.org/10.1145/3293882.3330563
Vasile, DA., Kleppmann, M., Thomas, D. and Beresford, AR., Ghost trace on the wire? Using key evidence for informed decisions
Hugenroth, D., Kleppmann, M. and Beresford, A., Rollercoaster: An Efficient Group-Multicast Scheme for Mix Networks Proceedings of the 30th USENIX Security Symposium,
Book chapters
Preibusch, S., Krol, K. and Beresford, AR., 2013. The Privacy Economics of Voluntary Over-disclosure in Web Forms.
Doi: 10.1007/978-3-642-39498-0_9
Books
Beresford, AR., Patra, A. and Bellini, E., 2022. Preface
Journal articles
Weidner, M., Kleppmann, M., Hugenroth, D. and Beresford, AR., 2020. Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees. IACR Cryptol. ePrint Arch., v. 2020
Kleppmann, M., Beresford, AR. and Svingen, B., 2019. Online Event Processing Queue, v. 17
Doi: 10.1145/3317287.3321612
Kleppmann, M., Gomes, VBF., Mulligan, DP. and Beresford, AR., 2018. OpSets: Sequential Specifications for Replicated Datatypes (Extended
Version)
Kleppmann, M., Gomes, VBF., Mulligan, DP. and Beresford, AR., 2018. OpSets: Sequential Specifications for Replicated Datatypes. Arch. Formal Proofs, v. 2018
Gomes, VBF., Kleppmann, M., Mulligan, DP. and Beresford, AR., 2017. A framework for establishing Strong Eventual Consistency for Conflict-free Replicated Datatypes. Arch. Formal Proofs, v. 2017
Cummins, S., Beresford, AR. and Rice, A., 2016. Investigating Engagement with In-Video Quiz Questions in a Programming Course IEEE Transactions on Learning Technologies, v. 9
Doi: 10.1109/TLT.2015.2444374
Kleppmann, M. and Beresford, AR., 2016. A Conflict-Free Replicated JSON Datatype. CoRR, v. abs/1608.03960
Wagner, DT., Rice, A. and Beresford, AR., 2014. Device analyzer: Largescale mobile data collection Performance Evaluation Review, v. 41
Doi: 10.1145/2627534.2627553
Preibusch, S. and Beresford, AR., 2013. Establishing distributed hidden friendship relations Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7028 LNCS
Doi: 10.1007/978-3-642-36213-2_35
Preibusch, S., Kübler, D. and Beresford, AR., 2013. Price versus privacy: an experiment into the competitive advantage of collecting less personal information Electronic Commerce Research,
Preibusch, S., Kübler, D. and Beresford, AR., 2013. Price versus privacy: An experiment into the competitive advantage of collecting less personal information Electronic Commerce Research, v. 13
Doi: 10.1007/s10660-013-9130-3
Bacon, J., Bejan, AI., Beresford, AR., Evans, D., Gibbens, RJ. and Moody, K., 2011. Using Real-Time Road Traffic Data to Evaluate Congestion Dependable and Historic Computing, v. LNCS 6875
Bejan, AI., Gibbens, RJ., Evans, D., Beresford, AR., Bacon, J. and Friday, A., 2010. Statistical modelling and analysis of sparse bus probe data in urban areas IEEE Conference on Intelligent Transportation Systems, Proceedings, ITSC,
Doi: http://doi.org/10.1109/ITSC.2010.5625144
Beresford, AR. and Gay, S., 2010. Proceedings Second International Workshop on Programming Language
Approaches to Concurrency and Communication-cEntric Software EPTCS 17, 2010,
North, R., Cohen, J., Wilkins, S., Richards, M., Hoose, N., Polak, J., Bell, M., Blythe, P., Sharif, B., Neasham, J., Suresh, V., Galatioto, F., Hill, G., Mead, I., Jones, R., Beresford, A., Chen, H., Ropkins, K., Goodman, P., Oates, C., Tate, J. and Ballijepalli, N., 2009. Field deployments of the environmental monitoring Traffic Engineering and Control, v. 50
Cohen, J., North, R., Wilkins, S., Darlington, J., Guo, Y., Hoose, N., Ma, Y., Polak, J., Suresh, V., Watson, P., Bell, M., Blythe, P., Neasham, J., Calleja, M., Hayes, M., Beresford, A., Jones, R. and Mead, I., 2009. Creating the message infrastructure Traffic Engineering and Control, v. 50
Cottingham, DN., Beresford, AR. and Harle, RK., 2007. Survey of technologies for the implementation of national-scale road user charging TRANSPORT REV, v. 27
Doi: http://doi.org/10.1080/01441640701214304
Davies, JJ., Beresford, AR. and Hopper, A., 2006. Scalable, distributed, real-time map generation IEEE PERVAS COMPUT, v. 5
Harle, R. and Beresford, A., 2005. Keeping big brother off the road IEE REVIEW, v. 51
Mount, S., Gaura, E., Newman, RM., Beresford, AR., Dolan, SR. and Allen, M., 2005. Trove: A physical game running on an ad-hoc wireless sensor network ACM International Conference Proceeding Series, v. 121
Doi: http://doi.org/10.1145/1107548.1107607
Midkiff, SF., Beresford, A., Kalló, CK., Kretschmer, U., Mattern, F. and Muehlenbrock, M., 2003. The first summer school on ubiquitous and pervasive computing IEEE Pervasive Computing, v. 2
Doi: http://doi.org/10.1109/MPRV.2003.1274024
Beresford, AR. and Stajano, F., 2003. Location privacy in pervasive computing IEEE PERVAS COMPUT, v. 2
BERESFORD, AR., 2003. Location Privacy in Pervasive Computing IEEE Pervasive Computing, v. 2
Dennis, RM., Beresford, AR. and Brown, KM., 2001. Virtual University research initiative on mobility BT TECHNOL J, v. 19
Manousakas, D., Mascolo, C., Beresford, A., Chan, D. and Sharma, N., Quantifying Privacy Loss of Human Mobility Graph Topology Proceedings on the Privacy Enhancing Technologies Symposium (PoPETS),
Kleppmann, M., Mulligan, DP., Gomes, VBF. and Beresford, AR., A highly-available move operation for replicated trees IEEE Transactions on Parallel and Distributed Systems,
Kleppmann, M., Beresford, AR. and Svingen, B., Online Event Processing: Achieving Consistency Where Distributed Transactions Have Failed Communications of the ACM, v. 62
Doi: http://doi.org/10.1145/3312527
Kollmann, SA. and Beresford, AR., The Cost of Push Notifications for Smartphones using Tor Hidden Services IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), v. 2017
Doi: http://doi.org/10.1109/EuroSPW.2017.55
Kollmann, SA., Kleppmann, M. and Beresford, AR., Snapdoc: Authenticated snapshots with history privacy in peer-to-peer collaborative editing Proceedings on Privacy Enhancing Technologies (PoPETs), v. 2019
Doi: 10.2478/popets-2019-0044
Zhang, J., Beresford, A. and Sheret, I., Factory Calibration Fingerprinting of Sensors IEEE Transactions on Information Forensics and Security,
Taylor, VF., Beresford, AR. and Martinovic, I., Intra-Library Collusion: A Potential Privacy Nightmare on Smartphones arXiv.org,
Datasets
Thomas, DR., Wagner, DT., Beresford, AR. and Rice, A., Supporting data for: "Security metrics for the Android ecosystem"
Kollmann, SA. and Beresford, AR., Supporting data for "The cost of push notifications for smartphones using Tor hidden services"
Theses / dissertations
Zhang, J., Hardware and software fingerprinting of mobile devices
Dodson, M., Capability-based access control for cyber physical systems
Internet publications
Beresford, AR., Home Page