Author image not provided
 Arthur Gervais

Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article4.67
Citation Count28
Publication count6
Publication years2014-2017
Available for download6
Average downloads per article943.83
Downloads (cumulative)5,663
Downloads (12 Months)3,494
Downloads (6 Weeks)389
Arrow RightAuthor only

See all colleagues of this author


6 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 6 of 6
Sort by:

1 published by ACM
October 2017 CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Citation Count: 0
Downloads (6 Weeks): 73,   Downloads (12 Months): 185,   Downloads (Overall): 185

Full text available: PDFPDF
Scaling the transaction throughput of decentralized blockchain ledgers such as Bitcoin and Ethereum has been an ongoing challenge. Two-party duplex payment channels have been designed and used as building blocks to construct linked payment networks, which allow atomic and trust-free payments between parties without exhausting the resources of the blockchain. ...
Keywords: ethereum, ledger, payment channels, blockchain, off-chain, smart contracts

2 published by ACM
October 2016 CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Citation Count: 10
Downloads (6 Weeks): 222,   Downloads (12 Months): 2,408,   Downloads (Overall): 2,912

Full text available: PDFPDF
Proof of Work (PoW) powered blockchains currently account for more than 90% of the total market capitalization of existing digital cryptocurrencies. Although the security provisions of Bitcoin have been thoroughly analysed, the security guarantees of variant (forked) PoW blockchains (which were instantiated with different parameters) have not received much attention ...
Keywords: bitcoin, blockchain, performance, security

3 published by ACM
October 2015 CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Citation Count: 3
Downloads (6 Weeks): 38,   Downloads (12 Months): 313,   Downloads (Overall): 745

Full text available: PDFPDF
Given the increasing adoption of Bitcoin, the number of transactions and the block sizes within the system are only expected to increase. To sustain its correct operation in spite of its ever-increasing use, Bitcoin implements a number of necessary optimizations and scalability measures. These measures limit the amount of information ...
Keywords: bitcoin, countermeasures., preventing object delivery

4 published by ACM
May 2015 ACM Transactions on Information and System Security (TISSEC): Volume 18 Issue 1, June 2015
Publisher: ACM
Citation Count: 5
Downloads (6 Weeks): 42,   Downloads (12 Months): 434,   Downloads (Overall): 1,189

Full text available: PDFPDF
Bitcoin is a decentralized payment system that relies on Proof-of-Work (PoW) to resist double-spending through a distributed timestamping service. To ensure the operation and security of Bitcoin, it is essential that all transactions and their order of execution are available to all Bitcoin users. Unavoidably, in such a setting, the ...
Keywords: Monetization, privacy, security, Bitcoin, distributed computing, double-spending

5 published by ACM
December 2014 ACSAC '14: Proceedings of the 30th Annual Computer Security Applications Conference
Publisher: ACM
Citation Count: 3
Downloads (6 Weeks): 11,   Downloads (12 Months): 79,   Downloads (Overall): 248

Full text available: PDFPDF
Lightweight Bitcoin clients are gaining increasing adoption among Bitcoin users, owing to their reduced resource and bandwidth consumption. These clients support a simplified payment verification (SPV) mode as they are only required to download and verify a part of the block chain---thus supporting the usage of Bitcoin on constrained devices, ...

6 published by ACM
November 2014 CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Citation Count: 7
Downloads (6 Weeks): 5,   Downloads (12 Months): 77,   Downloads (Overall): 386

Full text available: PDFPDF
Web search queries reveal extensive information about users' personal lives to the search engines and Internet eavesdroppers. Obfuscating search queries through adding dummy queries is a practical and user-centric protection mechanism to hide users' search intentions and interests. Despite few such obfuscation methods and tools, there is no generic quantitative ...
Keywords: semantic privacy, privacy, quantification framework, web search, machine learning, obfuscation, query privacy

The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us