What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Alastair R. Beresford
Google Scholar
ORCID:
0000-0003-0818-6535
21
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
SoK: Web Authentication and Recovery in the Age of End-to-End Encryption.
Jenny Blessing
Daniel Hugenroth
Ross J. Anderson
Alastair R. Beresford
2025
conf/asiaccs
App-solutely Modded: Surveying Modded App Market Operators and Original App Developers.
Luis Adan Saavedra
Hridoy S. Dutta
Alastair R. Beresford
Alice Hutchings
2024
journals/popets
Sloth: Key Stretching and Deniable Encryption using Secure Elements on Smartphones.
Daniel Hugenroth
Alberto Sonnino
Sam Cutler
Alastair R. Beresford
2024
conf/sp
Pudding: Private User Discovery in Anonymity Networks.
Ceren Kocaogullar
Daniel Hugenroth
Martin Kleppmann
Alastair R. Beresford
2023
journals/popets
SoK: Managing risks of linkage attacks on data privacy.
Jovan Powar
Alastair R. Beresford
2023
conf/uss
Powering Privacy: On the Energy Demand and Feasibility of Anonymity Networks on Smartphones.
Daniel Hugenroth
Alastair R. Beresford
2022
journals/popets
CoverDrop: Blowing the Whistle Through A News App.
Mansoor Ahmed-Rengers
Diana A. Vasile
Daniel Hugenroth
Alastair R. Beresford
Ross Anderson
2022
conf/esorics
Enhancing User Privacy in Mobile Devices Through Prediction of Privacy Preferences.
Ricardo Mendes
Mariana Cunha
João P. Vilela
Alastair R. Beresford
2022
conf/cans
ACDC: Anonymous Crowdsourcing Using Digital Cash.
Luis Adan Saavedra
Alastair R. Beresford
2021
journals/tifs
Factory Calibration Fingerprinting of Sensors.
Jiexin Zhang
Alastair R. Beresford
Ian Sheret
2021
conf/ccs
Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees.
Matthew Weidner
Martin Kleppmann
Daniel Hugenroth
Alastair R. Beresford
2021
conf/uss
Rollercoaster: An Efficient Group-Multicast Scheme for Mix Networks.
Daniel Hugenroth
Martin Kleppmann
Alastair R. Beresford
2020
conf/eurosp
CHERI Macaroons: Efficient, host-based access control for cyber-physical systems.
Michael Dodson
Alastair R. Beresford
Alexander Richardson
Jessica Clarke
Robert N. M. Watson
2019
journals/popets
Snapdoc: Authenticated snapshots with history privacy in peer-to-peer collaborative editing.
Stephan A. Kollmann
Martin Kleppmann
Alastair R. Beresford
2019
conf/sp
SensorID: Sensor Calibration Fingerprinting for Smartphones.
Jiexin Zhang
Alastair R. Beresford
Ian Sheret
2018
journals/popets
Quantifying Privacy Loss of Human Mobility Graph Topology.
Dionysis Manousakas
Cecilia Mascolo
Alastair R. Beresford
Dennis Chan
Nikhil Sharma
2017
conf/eurosp
The Cost of Push Notifications for Smartphones Using Tor Hidden Services.
Stephan A. Kollmann
Alastair R. Beresford
2017
conf/wisec
There are many apps for that: quantifying the availability of privacy-preserving apps.
Vincent F. Taylor
Alastair R. Beresford
Ivan Martinovic
2015
conf/ccs
Security Metrics for the Android Ecosystem.
Daniel R. Thomas
Alastair R. Beresford
Andrew C. Rice
2015
conf/wisec
Securacy: an empirical investigation of Android applications' network usage, privacy and security.
Denzil Ferreira
Vassilis Kostakos
Alastair R. Beresford
Janne Lindqvist
Anind K. Dey
2015
conf/wisec
Device analyzer: a privacy-aware platform to support research on the Android ecosystem.
Daniel T. Wagner
Daniel R. Thomas
Alastair R. Beresford
Andrew C. Rice
Coauthors
Alastair R. Beresford
(21)
Alberto Sonnino
(1)
Alexander Richardson
(1)
Alice Hutchings
(1)
Andrew C. Rice
(2)
Anind K. Dey
(1)
Cecilia Mascolo
(1)
Ceren Kocaogullar
(1)
Daniel Hugenroth
(7)
Daniel R. Thomas
(2)
Daniel T. Wagner
(1)
Dennis Chan
(1)
Denzil Ferreira
(1)
Diana A. Vasile
(1)
Dionysis Manousakas
(1)
Hridoy S. Dutta
(1)
Ian Sheret
(2)
Ivan Martinovic
(1)
Janne Lindqvist
(1)
Jenny Blessing
(1)
Jessica Clarke
(1)
Jiexin Zhang
(2)
João P. Vilela
(1)
Jovan Powar
(1)
Luis Adan Saavedra
(2)
Mansoor Ahmed-Rengers
(1)
Mariana Cunha
(1)
Martin Kleppmann
(4)
Matthew Weidner
(1)
Michael Dodson
(1)
Nikhil Sharma
(1)
Ricardo Mendes
(1)
Robert N. M. Watson
(1)
Ross Anderson
(1)
Ross J. Anderson
(1)
Sam Cutler
(1)
Stephan A. Kollmann
(2)
Vassilis Kostakos
(1)
Vincent F. Taylor
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to