Submit your paper : editorIJETjournal@gmail.com Paper Title : BIT COIN MANAGEMENT SYSTEM USING DIGITAL FINGER PRINT ISSN : 2395-1303 Year of Publication : 2022 10.29126/23951303/IJET-V8I2P1 MLA Style: -DR. K. RAVI KUMAR, J. POORNIMA, BIT COIN MANAGEMENT SYSTEM USING DIGITAL FINGER PRINT, Volume 8 - Issue 2 March - April,2022 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org APA Style: -DR. K. RAVI KUMAR, J. POORNIMA, BIT COIN MANAGEMENT SYSTEM USING DIGITAL FINGER PRINT, Volume 8 - Issue 2 March - April,2022 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org Abstract Bit coin is hesitant, decentralized digital cash that allow immediate expenses to some self, where on earth in the person race Bit coin employ peer-to-peer know-how to make active by way of no underground power. folder is the site where Bit coins are office block. In advance Bit coin wallet is place up on a movable phone, it strength of mind manufacture primary Bit coin communicate to the length of with at the back that the customer can create and talk to for each exchange. Wallet most important make a private contribution and after that it will alter secret input to Bit coin talk to. Wallet stay pathway of private keys, additional often than not by amass them in an encrypted wallet file, furthermore on firm drive, on a server on the Internet, or wherever else. If the confidential key to talk to is lost (for example, in a firm force shatter into, fire or preceding usual disaster), any linked Bit coins are productively lost eternally. Alive answer in the market use easy encryption tool to correct of entry vulnerable in series in electronic wallets. gamely obtainable is a necessitate for a far over the earth refuge wallet that uses handle produce as at hand is a high likelihood of security shatter where hackers can pinch open in chain or electronic cash. The in all-purpose thing of this text is to propose a finger turn out electronic wallet to amass and move digital currency by means of far above the earth security/encryption with handle print exterior USB Sensor. All client side in order in movable Bit coin wallets will be store in a sleeve in mobile tool merely. So, anybody can correct of entry that folder. As a consequence, the major aspire is to create obtainable a security for customer surface file by finger turn out exterior USB Sensor plus AES algorithm Reference [1] I. Miers, C. Garman, M. Green, and A. D. Rubin, “Zerocoin: Anonymous Distributed E-Cash from Bitcoin,” in 2020 IEEE Symposium on Security and Privacy (SP), 2013, pp. 397–411. [2] F. Tschorsch and B. Scheuermann, "Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies," in IEEE Communications Surveys & Tutorials, vol. 18, no. 3, pp. 2084-2123, third quarter 2019. [3] S. Barber, X. Boyen, E. Shi, and E. Uzun, “Bitter to Better How to Make Bitcoin a Better Currency,” in Financial Cryptography and Data Security, A. D. Keromytis, Ed. Springer Berlin Heidelberg, 2018, pp. 399–414. [4] E. Ben-Sasson et al., “Zerocash: Decentralized Anonymous Payments from Bitcoin,” 349, 2014. [5] http://www.coindesk.com/data/bitcoin-dailytransactions/. [Accessed: 18-Nov-2016]. [6] N. L. Clarke and S. M. Furnell, “Authentication of users on mobile telephones – A survey of attitudes and practices,” Computers & Security, vol. 24, no. 7, pp. 519–527, Oct. 2017. [7] C. Garman, M. Green, I. Miers, and A. D. Rubin, “Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity,” in Financial Cryptography and Data Security, R. Böhme, M. Brenner, T. Moore, and M. Smith, Eds. Springer Berlin Heidelberg, 2016, pp. 140–155 [8] D. Genkin, L. Pachmanov, I. Pipman, E. Tromer, and Y. Yarom, “ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels,” in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 2015, pp. 1626–1638. [9] T. Bamert, C. Decker, R. Wattenhofer, and S. Welten, “BlueWallet: The Secure Bitcoin Wallet,” in Security and Trust Management, S. Mauw and C. D. Jensen, Eds. Springer International Publishing, 2014, pp. 65–80. [10] V. Matyás Jr. and Z. Ríha, “Fingerprint Authentication - Security and Usability,” in Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security, Deventer, Netherlands, 2013, pp. 227– 239 Keywords -Block-chain, Digital currency, Bit-coin, Finger print. |