
Preventing Greedy Transaction Selection: RTS and Fixed Fee Solutions
18 Sept 2024
Discover countermeasures against greedy miners in DAG protocols.

The Greedy Miner’s Dilemma: Flaws in DAG-Based Consensus Protocols
18 Sept 2024
This paper explores vulnerabilities in DAG-based blockchain protocols, showing how greedy miners exploit the random transaction selection strategy.

Comparative Study of DAG Protocols and Their Impact on Blockchain Performance
18 Sept 2024
Explore the landscape of DAG-based blockchain protocols—consensus mechanisms, mining and trade-offs between decentralization, scalability, and security.

Simulation Model for DAG-PROTOCOL Under Incentive Attacks
18 Sept 2024
Explore a simulation model designed to evaluate DAG-PROTOCOLs under incentive attacks.

The Future of DAG Protocols: Connectivity, Centralization, and Resilience
18 Sept 2024
Learn the centralization risks posed by greedy miners in DAG protocols.

How Greedy Mining Strategies Impact Blockchain Throughput and Profits
18 Sept 2024
This article evaluates the profitability of greedy miners and transaction collision rates in DAG protocols using simulations.

DAG-Oriented Solutions and the Risk of Greedy Mining
18 Sept 2024
Review DAG-based blockchain protocols, including Inclusive, PHANTOM, GHOSTDAG, Kaspa, and Prism, and examine their vulnerabilities to incentive attacks.

Identifying Incentive Attacks in DAG-Oriented Blockchain Protocols
18 Sept 2024
Explore incentive attacks within DAG-based blockchain protocols, focusing on greedy miners deviating from the RTS strategy.

Incentive Attacks on DAG-Based Blockchains with Random Transaction Selection
18 Sept 2024
Learn the fundamentals of blockchain, Nakamoto Consensus, and the optimization of Proof of Work blockchains using Directed Acyclic Graphs (DAGs)