default search action
Seng-Phil Hong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Young Sook Kim, Seng-Phil Hong, Marko Majer:
Validation of Value-Driven Token Economy: Focus on Blockchain Content Platform. Future Internet 16(5): 178 (2024) - [j9]Sung Yong An, Guy Ngayo, Seng-Phil Hong:
Applying Blockchain, Causal Loop Diagrams, and the Analytical Hierarchy Process to Enhance Fifth-Generation Ceramic Antenna Manufacturing: A Technology-Organization-Environment Framework Approach. Syst. 12(6): 184 (2024) - 2021
- [j8]Mpyana Mwamba Merlec, Youn Kyu Lee, Seng-Phil Hong, Hoh Peter In:
A Smart Contract-Based Dynamic Consent Management System for Personal Data Usage under GDPR. Sensors 21(23): 7994 (2021)
2010 – 2019
- 2013
- [j7]Kyong-jin Kim, Seng-Phil Hong:
Privacy Care Architecture in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - 2011
- [j6]Sungkuen Lee, Kyounghee Lee, Hyun-Woo Lee, Seng-Phil Hong, Jinwoo Park:
An Enhanced Network-based Mobility Management Protocol for Fast Mobility Support. KSII Trans. Internet Inf. Syst. 5(11): 1997-2015 (2011) - [j5]Jae-Jung Kim, Seng-Phil Hong:
A Method of Risk Assessment for Multi-Factor Authentication. J. Inf. Process. Syst. 7(1): 187-198 (2011)
2000 – 2009
- 2009
- [c5]Kyong-jin Kim, Eugene Kim, Seng-Phil Hong:
Privacy information protection in portable device. ICHIT 2009: 643-646 - 2008
- [j4]Seng-Phil Hong, Gail-Joon Ahn, Wenjuan Xu:
Access Control Management for SCADA Systems. IEICE Trans. Inf. Syst. 91-D(10): 2449-2457 (2008) - [c4]Ji-Hee Jeoung, Eun-Ji Shin, Seng-Phil Hong, Sung-Hoon Kim, In-Ho Kim, Min-Woo Lee:
Systematic Website Verification for Privacy Protection. IAS 2008: 231-234 - 2007
- [j3]Gail-Joon Ahn, Badrinath Mohan, Seng-Phil Hong:
Towards secure information sharing using role-based delegation. J. Netw. Comput. Appl. 30(1): 42-59 (2007) - 2006
- [c3]Seng-Phil Hong, Sungmin Kang:
Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems. Communications and Multimedia Security 2006: 206-215 - 2005
- [j2]William J. Tolone, Gail-Joon Ahn, Tanusree Pai, Seng-Phil Hong:
Access control in collaborative systems. ACM Comput. Surv. 37(1): 29-41 (2005) - 2004
- [c2]Gail-Joon Ahn, Seng-Phil Hong:
Group Hierarchies with Constrained User Assignment in Linux. WOSIS 2004: 13-22 - [c1]Gail-Joon Ahn, Dongwan Shin, Seng-Phil Hong:
Information Assurance in Federated Identity Management: Experimentations and Issues. WISE 2004: 78-89 - 2002
- [j1]Gail-Joon Ahn, Seng-Phil Hong, Michael E. Shin:
Reconstructing a formal security model. Inf. Softw. Technol. 44(11): 649-657 (2002)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-20 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint