-
#1Babylon: Enhancing Proof-of-Stake Security via Bitcoin Mining ReuseBabylon blockchain platform reuses Bitcoin mining hash power to solve fundamental PoS security issues like long-range attacks and censorship, with zero additional energy cost.
-
#2Catfish Effect Between Internal and External Attackers: Semi-honest Mining Strategy AnalysisAnalysis of blockchain mining attacks with multiple attackers, focusing on the catfish effect and semi-honest strategies in proof-of-work systems.
-
#3System Dynamics Modeling of Cryptocurrency Mining Environmental Impacts and Regulatory SolutionsAnalysis of Bitcoin mining environmental impacts using System Dynamics modeling, evaluating regulatory policies and sustainability scenarios for cryptocurrency ecosystem management.
-
#4Mobile Blockchain Meets Edge Computing: Resource Management and ApplicationsAnalysis of integrating mobile blockchain with edge computing to solve proof-of-work puzzles efficiently, including economic resource management and experimental validation.
-
#5Optimal Mining Strategies: Diversification Across Mining Pools in Proof-of-Work CryptocurrenciesAnalytical framework and computational tool for miners to optimize risk-adjusted returns through strategic diversification across multiple mining pools and cryptocurrencies using Modern Portfolio Theory.
-
#6Truxen: Trusted Computing Enhanced Blockchain with Proof of IntegrityTruxen blockchain leverages Trusted Computing and Proof of Integrity protocol for efficient consensus, single execution model, and enhanced security in enterprise applications.
-
#7Element and Everything Tokens: A Two-Tier Architecture for Mobilizing Alternative AssetsA novel blockchain-based architecture using Element and Everything Tokens to fractionalize and enhance liquidity for complex, heterogeneous real-world assets like infrastructure and energy projects.
Last updated: 2025-12-09 19:35:08