Abstract
Crypto Currencies have recently gained enormous popularity amongst the general public. With each passing day, more and more companies are radically accepting crypto cur-rencies in their payment systems, paving way for an economic revolution. Currently more than 700 crypto-currencies are avail-able at Coindesk alone for trade purposes. As of November 2016, the Crypto currencies hold a total market share of over 14 Billion USD1 [5]. With no centralized institution to monitor the movement of funds, Crypto currencies and their users are susceptible to multiple threats. In this paper we present an effort to explain the functionality of some of the most popular crypto currencies available in the online market. We present an analysis of the mining methodologies employed by these currencies to induce new currency into the market and how they compete with each other to provide fast, decentralized transactions to the users. We also share, some of the most dangerous attacks that can be placed on these crypto currencies and how the overall model of the crypto currencies mitigates these attacks. Towards the end, we will present taxonomy of the five highly popular crypto currencies and compare their features.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Advanced Computer Science and Applications
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.