Reward mechanisms and network security in Proof of Stake: The case ...