Securing Permissioned Blockchains
Explore an alternate basis for block verification, perhaps using some other metric other than proof-of-work or the like, enabling smaller blockchain networks to remain resistant to attack.
The Algebra of Anonequity: Smuggling Ring Over a Field
Illegal versus clandestine market transactions.
Trustworthy Computing vs. Trustless Computing
Explore how trust models can be leveraged to mitigate or reduce the risk of fraud on the blockchain.
By clicking “sign up” you consent to your personal data being stored and used to receive news and updates from ColliderX.
We respect your privacy.
Thank you for submitting your email!