<p> Cryptocurrencies acquire user confidence by making the whole creation and transaction history transparent to the public. In exchange, the transaction history accurately captures the complete range of user activities related to cryptocurrencies. In this paper, the use of data mining methods in Bitcoin transactions is analyzed and summarized. Cryptocurrencies, similar to the well-known Bitcoin, were targeted to ensure transaction security and privacy and overcome the drawbacks of traditional banking systems as well as other centralized systems. We also conduct a thorough analysis of the literature on the challenges and applications of electronic currencies. We outline the evolution of digital currency from electronic cash to cryptocurrencies and put the spotlight on the methods used to increase user privacy. We also highlight security threats in the existing cryptocurrency systems that jeopardize the privacy of Bitcoin users. Finally, we identify several research gaps and trends that need to be looked at further. </p>
<p> Cryptocurrencies acquire user confidence by making the whole creation and transaction history transparent to the public. In exchange, the transaction history accurately captures the complete range of user activities related to cryptocurrencies. In this paper, the use of data mining methods in Bitcoin transactions is analyzed and summarized. Cryptocurrencies, similar to the well-known Bitcoin, were targeted to ensure transaction security and privacy and overcome the drawbacks of traditional banking systems as well as other centralized systems. We also conduct a thorough analysis of the literature on the challenges and applications of electronic currencies. We outline the evolution of digital currency from electronic cash to cryptocurrencies and put the spotlight on the methods used to increase user privacy. We also highlight security threats in the existing cryptocurrency systems that jeopardize the privacy of Bitcoin users. Finally, we identify several research gaps and trends that need to be looked at further. </p>
<p> Cryptocurrencies acquire user confidence by making the whole creation and transaction history transparent to the public. In exchange, the transaction history accurately captures the complete range of user activities related to cryptocurrencies. In this paper, the use of data mining methods in Bitcoin transactions is analyzed and summarized. Cryptocurrencies, similar to the well-known Bitcoin, were targeted to ensure transaction security and privacy and overcome the drawbacks of traditional banking systems as well as other centralized systems. We also conduct a thorough analysis of the literature on the challenges and applications of electronic currencies. We outline the evolution of digital currency from electronic cash to cryptocurrencies and put the spotlight on the methods used to increase user privacy. We also highlight security threats in the existing cryptocurrency systems that jeopardize the privacy of Bitcoin users. Finally, we identify several research gaps and trends that need to be looked at further. </p>
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.