Seng-Phil Hong

Orcid: 0000-0003-4391-7313

According to our database1, Seng-Phil Hong authored at least 16 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Validation of Value-Driven Token Economy: Focus on Blockchain Content Platform.
Future Internet, May, 2024

Trust Aware Secured Data Transmission Based Routing Strategy Using Optimal Ch Selection in Mobile Ad-Hoc Network.
Mob. Networks Appl., April, 2024

Applying Blockchain, Causal Loop Diagrams, and the Analytical Hierarchy Process to Enhance Fifth-Generation Ceramic Antenna Manufacturing: A Technology-Organization-Environment Framework Approach.
Syst., 2024

2021
A Smart Contract-Based Dynamic Consent Management System for Personal Data Usage under GDPR.
Sensors, 2021

2013
Privacy Care Architecture in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

2011
A Method of Risk Assessment for Multi-Factor Authentication.
J. Inf. Process. Syst., 2011

An Enhanced Network-based Mobility Management Protocol for Fast Mobility Support.
KSII Trans. Internet Inf. Syst., 2011

2009
Privacy information protection in portable device.
Proceedings of the 2009 International Conference on Hybrid Information Technology, 2009

2008
Access Control Management for SCADA Systems.
IEICE Trans. Inf. Syst., 2008

Systematic Website Verification for Privacy Protection.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Towards secure information sharing using role-based delegation.
J. Netw. Comput. Appl., 2007

2006
Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems.
Proceedings of the Communications and Multimedia Security, 2006

2005
Access control in collaborative systems.
ACM Comput. Surv., 2005

2004
Information Assurance in Federated Identity Management: Experimentations and Issues.
Proceedings of the Web Information Systems, 2004

Group Hierarchies with Constrained User Assignment in Linux.
Proceedings of the Security In Information Systems, 2004

2002
Reconstructing a formal security model.
Inf. Softw. Technol., 2002


  Loading...