Deok Gyu Lee
Deok Gyu Lee
Seowon University
Verified email at - Homepage
Cited by
Cited by
Hybrid security protocol for wireless body area networks
CS Jang, DG Lee, J Han, JH Park
Wireless Communications and Mobile Computing 11 (2), 277-288, 2011
A study on secure RFID mutual authentication scheme in pervasive computing environment
SY Kang, DG Lee, IY Lee
Computer Communications 31 (18), 4248-4254, 2008
A proposal of security framework for wireless body area network
C Jang, DG Lee, J Han
2008 International Conference on Security Technology, 202-205, 2008
Home network device authentication: Device authentication framework and device certificate profile
YK Lee, DG Lee, JW Han, TH Kim
The computer journal 52 (8), 871-877, 2009
Authentication for single/Multi domain in ubiquitous computing using attribute certification
DG Lee, SI Kang, DH Seo, IY Lee
Computational Science and Its Applications-ICCSA 2006: International …, 2006
A study on contents distribution using electronic cash system
DG Lee, HG Oh, IY Lee
IEEE International Conference on e-Technology, e-Commerce and e-Service …, 2004
Intelligent dynamic workflow support for a ubiquitous Web service-based manufacturing environment
M Lee, H Yoon, H Shin, DG Lee
Journal of Intelligent Manufacturing 20, 295-302, 2009
System architecture for real-time face detection on analog video camera
M Kim, D Lee, KY Kim
International Journal of Distributed Sensor Networks 11 (5), 251386, 2015
Protection method for data communication between ADS-B sensor and next-generation air traffic control systems
SH Lee, YK Kim, JW Han, DG Lee
Information 5 (4), 622-633, 2014
Security framework for home network: Authentication, authorization, and security policy
GW Kim, DG Lee, JW Han, SC Kim, SW Kim
Emerging Technologies in Knowledge Discovery and Data Mining: PAKDD 2007 …, 2007
Security technologies based on home gateway for making smart home secure
GW Kim, DG Lee, JW Han, SW Kim
Emerging Directions in Embedded and Ubiquitous Computing: EUC 2007 Workshops …, 2007
Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing
M Kim, DG Lee, J Ryou
Personal and ubiquitous computing 17, 921-932, 2013
Intelligent multimedia service system based on context awareness in smart home
JH Park, HS Park, SJ Lee, J Choi, DG Lee
International Conference on Knowledge-Based and Intelligent Information and …, 2005
A multi-level behavior network-based dangerous situation recognition method in cloud computing environments
DG Lee
The Journal of Supercomputing 73 (7), 3291-3306, 2017
Intelligent pervasive network authentication: S/key based device authentication
DG Lee, JW Han, DS Park
2009 6th IEEE Consumer Communications and Networking Conference, 1-5, 2009
SecureDom: secure mobile-sensitive information protection with domain separation
SW Park, JN Kim, DG Lee
The Journal of Supercomputing 72, 2682-2702, 2016
Medical image segmentation for mobile electronic patient charts using numerical modeling of IoT
SH Chae, D Moon, DG Lee, SB Pan
Journal of Applied Mathematics 2014 (1), 815039, 2014
Smart environment authentication: Multi-domain authentication, authorization, security policy for pervasive network
DG Lee, GW Kim, JW Han, YS Jeong, DS Park
2008 International Symposium on Ubiquitous Multimedia Computing, 99-104, 2008
PIS-CC RBAC: Patient information service based on CC-RBAC in next generation hospital considering ubiquitous intelligent environment
JH Park, DG Lee
2007 International Conference on Multimedia and Ubiquitous Engineering (MUE …, 2007
Small target detection using morphology and modified Gaussian distance function
JH Kim, JJ Park, SH Ahn, DG Lee, D Moon, SK Kim
Security and Communication Networks 9 (6), 555-560, 2016
The system can't perform the operation now. Try again later.
Articles 1–20