WORLD OF CRYPTO CURRENCY: A SURVEY

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Valuation of Crypto-Currency Mining Operations

Traditionally, the Net Present Value method is used to compare diverging investment strategies. However, valuating crypto-projects with fiat-based currency is confusing due to extreme coin appreciation rates as compared to fiat interest rates. Here, we provide a net present value method based on using crypto-coin as the underlying asset. Using this method, we compare HODL vs. mining, we also pr...

متن کامل

The Conceptual Principals of Bitcoin Crypto Currency

Email: [email protected] Abstract: In recent years, ideas about crypto currencies with interesting and new for today monetary principles becoming more and more popular. The crypto currencies’ met different attitude to it new for the world finances principals. There are different talks. Ones think that it may improve monetary system, others think that it is a toy money that may cause instability a...

متن کامل

Detecting Crypto Currency Mining in Corporate Environments

After many discussions amongst friends and colleagues about the opportunities of mining crypto currencies, one could start wondering what kind of corporate resources can be utilized in order to do crypto currency mining, and how a company can protect against this kind of threat. Some will say that this is not a real threat for a company; however, some believe differently, which is explained in ...

متن کامل

a structural survey of the polish posters

تصویرسازی قابلیتهای فراوانی را دارا است

15 صفحه اول

A Crypto-Steganography: A Survey

The two important aspects of security that deal with transmitting information or data over some medium like Internet are steganography and cryptography. Steganography deals with hiding the presence of a message and cryptography deals with hiding the contents of a message. Both of them are used to ensure security. But none of them can simply fulfill the basic requirements of security i.e. the fe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Engineering Applied Sciences and Technology

سال: 2020

ISSN: 2455-2143

DOI: 10.33564/ijeast.2020.v05i05.045