a) To generate new cryptocurrency coins b) To validate transactions on the network c) To secure the network against attacks d) All of the above