參考文獻 |
[1] J. M. Phillips and S. M. Gully, "Multilevel and strategic recruiting: Where have we been, where can we go from here?" Journal of Management, vol. 41, no. 5, 2015.
[2] K. Navarra, "The real costs of recruitment," Society for Human Resource Management. [Online]. Available: https://www.shrm.org/resourcesandtools/hr-topics/talent-acquisition/pages/the-real-costs-of-recruitment.aspx. Accessed: Apr. 11, 2022.
[3] P. Sinha, A. kumar Rai, and B. Bhushan, "Information Security threats and attacks with conceivable counteraction," in 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), vol. 1, pp. 1208-1213, Jul. 2019.
[4] T. Hunt, "Pwned websites," Have I Been Pwned. [Online]. Available: https://haveibeenpwned.com/PwnedWebsites#LinkedIn. Accessed: May 24, 2016.
[5] P. Wang and C. Johnson, "CYBERSECURITY INCIDENT HANDLING: A CASE STUDY OF THE EQUIFAX DATA BREACH," Information Systems, vol. 19, no. 3, pp. 1-7, 2018.
[6] N. Daswani and M. Elbayadi, "The Marriott Breach," in Big Breaches, Apress, Berkeley, CA, 2021. [Online]. Available: https://doi.org/10.1007/978-1-4842-6655-7_3.
[7] L. Abrams, "533 Million Facebook Users’ Phone Numbers Leaked on Hacker Forum," Bleeping Computer. [Online]. Available: https://www.bleepingcomputer.com/news/security/533-million-facebook-users-phone-numbers-leaked-on-hacker-forum/. Accessed: Apr. 3, 2021.
[8] "Cost of a Data Breach 2022," IBM. [Online]. Available: https://www.ibm.com/reports/data-breach. Accessed: Apr. 2023.
[9] "Cost of a Data Breach Action Guide," IBM. [Online]. Available: https://www.ibm.com/reports/data-breach-action-guide. Accessed: Jul. 2, 2023.
[10] M. M. Rahman, M. S. U. Siddiqe, and A. Uddin, "Headhunting System Using Blockchain Technology," in 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Servers (HORA), pp. 1-7, Jun. 2022.
[11] N. S. Dhanala and D. Radha, "Implementation and testing of a blockchain based recruitment management system," in 2020 5th International conference on communication and electronics systems (ICCES), pp. 583-588, Jun. 2020.
[12] R. Sulaiman, A. Alamsyah, and P. Wulansari, "Reshaping the Future of Recruitment through Talent Reputation and Verifiable Credentials using Blockchain Technology," in 2022 10th International Conference on Information and Communication Technology (ICoICT), pp. 316-321, Aug. 2022.
[13] M. M. H. Onik, M. H. Miraz, and C. S. Kim, "A recruitment and human resource management technique using blockchain technology for industry 4.0," in Smart Cities Symposium 2018, pp. 1-6, Apr. 2018.
[14] D. Serranito, A. Vasconcelos, S. Guerreiro, and M. Correia, "Blockchain ecosystem for verifiable qualifications," in 2020 2nd Conference on Blockchain Research & Servers for Innovative Networks and Services (BRAINS), pp. 192-199, Sep. 2020.
[15] P. Sarda, M. Chowdhury, A. Colman, M. A. Kabir, and J. Han, "Blockchain for Fraud Prevention: A Work-History Fraud Prevention System," in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering, pp. 1–6, 2018.
[16] G. Zhao, H. He, B. Di, and J. Chu, "StuChain: an efficient blockchain-based student e-portfolio platform integrating hybrid access control approach," Multimedia Tools and Servers, pp. 1-25, 2023.
[17] S. Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash System," 2008.
[18] J. A. Jaoude and R. G. Saade, "Blockchain Servers – Usage in Different Domains," IEEE Access, vol. 7, pp. 45360-45381, 2019.
[19] K. -K. R. Choo, S. Ozcan, A. Dehghantanha and R. M. Parizi, "Editorial: Blockchain Ecosystem—Technological and Management Opportunities and Challenges," in IEEE Transactions on Engineering Management, vol. 67, no. 4, pp. 982-987, Nov. 2020, doi: 10.1109/TEM.2020.3023225.
[20] B. Müßigmann, H. von der Gracht and E. Hartmann, "Blockchain Technology in Logistics and Supply Chain Management—A Bibliometric Literature Review From 2016 to January 2020," in IEEE Transactions on Engineering Management, vol. 67, no. 4, pp. 988-1007, Nov. 2020, doi: 10.1109/TEM.2020.2980733.
[21] T. Hewa, A. Braeken, M. Liyanage and M. Ylianttila, "Fog Computing and Blockchain-Based Security Service Architecture for 5G Industrial IoT-Enabled Cloud Manufacturing," in IEEE Transactions on Industrial Informatics, vol. 18, no. 10, pp. 7174-7185, Oct. 2022, doi: 10.1109/TII.2022.3140792.
[22] J. Zhang, Y. Yang, X. Liu and J. Ma, "An Efficient Blockchain-Based Hierarchical Data Sharing for Healthcare Internet of Things," in IEEE Transactions on Industrial Informatics, vol. 18, no. 10, pp. 7139-7150, Oct. 2022, doi: 10.1109/TII.2022.3145851.
[23] J. Cui, F. Ouyang, Z. Ying, L. Wei and H. Zhong, "Secure and Efficient Data Sharing Among Vehicles Based on Consortium Blockchain," in IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 7, pp. 8857-8867, July 2022, doi: 10.1109/TITS.2021.3086976.
[24] X. Wang, S. Garg, H. Lin, M. J. Piran, J. Hu and M. S. Hossain, "Enabling Secure Authentication in Industrial IoT With Transfer Learning Empowered Blockchain," in IEEE Transactions on Industrial Informatics, vol. 17, no. 11, pp. 7725-7733, Nov. 2021, doi: 10.1109/TII.2021.3049405.
[25] P. Zhuang, T. Zamir and H. Liang, "Blockchain for Cybersecurity in Smart Grid: A Comprehensive Survey," in IEEE Transactions on Industrial Informatics, vol. 17, no. 1, pp. 3-19, Jan. 2021, doi: 10.1109/TII.2020.2998479.
[26] J. Xie, F. R. Yu, T. Huang, R. Xie, J. Liu and Y. Liu, "A Survey on the Scalability of Blockchain Systems," in IEEE Network, vol. 33, no. 5, pp. 166-173, Sept.-Oct. 2019, doi: 10.1109/MNET.001.1800290.
[27] H. Jin, Y. Luo, P. Li and J. Mathew, "AReview of Secure and Privacy-Preserving Medical Data Sharing," in IEEE Access, vol. 7, pp. 61656-61669, 2019, doi: 10.1109/ACCESS.2019.2916503.
[28] N. Szabo, “Smart Contracts: Building Blocks for Digital Markets,” Nick Szabo -- smart contracts: Building blocks for Digital Markets. [Online]. Available: https://web.archive.org/web/20180427165653/http://www.fon.hum.uva.nl/rob/Courses/InformationInSpeech/CDROM/Literature/LOTwinterschool2006/szabo.best.vwh.net/smart_contracts_2.html. Accessed: Jul. 2, 2023.
[29] V. Buterin, "A next-generation smart contract and decentralized server platform," white paper, vol. 3, no. 37, pp. 2-1, 2014.
[30] Z. Zheng, S. Xie, H. N. Dai, W. Chen, X. Chen, J. Weng, and M. Imran, "An overview on smart contracts: Challenges, advances and platforms," Future Generation Computer Systems, vol. 105, pp. 475-491, 2020.
[31] "REACHABLE BITCOIN NODES," Bitnodes. [Online]. Available: https://bitnodes.io/. Accessed: Jul. 2, 2023.
[32] "Ethereum Node Tracker," Etherscan. [Online]. Available: https://etherscan.io/nodetracker. Accessed: Jun. 5, 2023.
[33] G. Wood, "Ethereum: A secure decentralised generalised transaction ledger," Ethereum project yellow paper, vol. 151, pp. 1-32, 2014.
[34] H. Huang, jianru Lin, B. Zheng, Z. Zheng, and J. Bian, "When Blockchain Meets Distributed File Systems: An Overview, Challenges, and Open Issues," IEEE Access, vol. 8, pp. 50574-50586, 2020.
[35] J. Benet, "IPFS - Content Addressed, Versioned, P2P File System," ArXiv. [Online]. Available: https://arxiv.org/abs/1407.3561. Accessed: Jul. 14, 2014.
[36] E. Daniel and F. Tschorsch, "Ipfs and friends: A qualitative comparison of next generation peer-to-peer data networks," IEEE Communications Surveys & Tutorials, vol. 24, no. 1, pp. 31-52, 2022.
[37] M. Blaze, G. Bleumer, and M. Strauss, "Divertible protocols and atomic proxy cryptography," in International conference on the theory and servers of cryptographic techniques, Springer, pp. 127–144, 1998.
[38] H. Delfs, H. Knebl, Introduction to cryptography, vol. 2, Heidelberg: Springer, 2002.
[39] S. Mehnaz and E. Bertino, "Privacy-preserving Real-time Anomaly Detection Using Edge Computing," in 2020 IEEE 36th International Conference on Data Engineering (ICDE), Dallas, TX, USA, pp. 469-480, 2020, doi: 10.1109/ICDE48307.2020.00047.
[40] R. Canetti and S. Hohenberger, "Chosen-ciphertext secure proxy re-encryption," in Proceedings of the 14th ACM conference on Computer and communications security, pp. 185-194, Oct. 2007.
[41] S. S. Chow, J. Weng, Y. Yang, and R. H. Deng, "Efficient unidirectional proxy re-encryption," in Progress in Cryptology–AFRICACRYPT 2010: Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings 3, pp. 316-332, Springer Berlin Heidelberg, 2010.
[42] D. Johnson, A. Menezes, and S. Vanstone, "The elliptic curve digital signature algorithm (ECDSA)," International journal of information security, vol. 1, pp. 36-63, 2001.
[43] "Patricia Merkle Trie," Ethereum.org. [Online].Available: https://ethereum.org/en/developers/docs/data-structures-and-encoding/patricia-merkle-trie/. Accessed: Jul. 2, 2023.
[44] B. Kashyap, "PROOF-OF-STAKE (POS)," Ethereum.Org. [Online]. Available: https://ethereum.org/zh-tw/developers/docs/consensus-mechanisms/pos/. Accessed: May 12, 2023.
[45] "WHAT IS ETHEREUM?" Ethereum.Org. [Online]. Available: https://ethereum.org/zh-tw/what-is-ethereum/. Accessed: Jun. 2023.
[46] C. Smith, "ERC-20 TOKEN STANDARD," Ethereum.Org. [Online]. Available: https://ethereum.org/zh-tw/developers/docs/standards/tokens/erc-20/. Accessed: May 31, 2023. |