Author(s): Alim Al Ayub Ahmed, Harish Paruchuri, Siddhartha Vadlamudi, Apoorva Ganapathy
Digital finance is assuming a significant part in the arrangement of financial services all over the world. Fast growth with digitalization, data analysis, and computing capacities allows for a whole new scope of financial services and transactions. This financial development empowered by digital financial technology (Fintech) has pulled in a ton of attention, as it could offer some potential for economic growth and development. As a part of the Fintech environment, cryptography has started to grow quickly and digital assets are acquiring in favorability among financial bankers and investors. Human behavior as they engage with financial activities is personally associated with the noticed market elements. However, with many existing theories and studies on the fundamental motivations of the conduct of people in financial frameworks, there is still restricted experimental derivation of the behavioral conduct of the financial agents from a definite market analysis. Cryptocurrency technology has given a map to this analysis with its voluminous data and its transparency of financial transactions. It has empowered us to perform inference on the personal conduct standards of users in the market, which we analyze in the bitcoin and ethereum cryptocurrency markets. In our study, we initially decide different properties of the cryptography users by complex network analysis. Financial cryptography is a difficult subject that necessitates abilities from a variety of seemingly unrelated fields. There is a serious risk that attempts to establish Financial Cryptography frameworks would simplify or omit key disciplines because they are caught between central banking and cryptography. This paper discusses research that attempts to limit the scope of Financial Cryptography. This model should assist the project, administrative, and requirements personnel by classifying each discipline into a seven-layer model of basic nature, where the link between each adjoining layer is evident. While this model is shown as effective, all models have cutoff points. This one does not present a design system or a protocol agenda. Furthermore, given the model's initial adaptation and the field, it should be viewed as a suggestion of complexity rather than a definitive approach.