Deok Gyu Lee
Deok Gyu Lee
Seowon University
Potvrđena adresa e-pošte na - Početna stranica
Hybrid security protocol for wireless body area networks
CS Jang, DG Lee, J Han, JH Park
Wireless Communications and Mobile Computing 11 (2), 277-288, 2011
A study on secure RFID mutual authentication scheme in pervasive computing environment
SY Kang, DG Lee, IY Lee
Computer Communications 31 (18), 4248-4254, 2008
A proposal of security framework for wireless body area network
C Jang, DG Lee, J Han
2008 International Conference on Security Technology, 202-205, 2008
Home network device authentication: Device authentication framework and device certificate profile
YK Lee, DG Lee, JW Han, TH Kim
The computer journal 52 (8), 871-877, 2009
Authentication for single/Multi domain in ubiquitous computing using attribute certification
DG Lee, SI Kang, DH Seo, IY Lee
Computational Science and Its Applications-ICCSA 2006: International …, 2006
A study on contents distribution using electronic cash system
DG Lee, HG Oh, IY Lee
IEEE International Conference on e-Technology, e-Commerce and e-Service …, 2004
Intelligent dynamic workflow support for a ubiquitous Web service-based manufacturing environment
M Lee, H Yoon, H Shin, DG Lee
Journal of Intelligent Manufacturing 20, 295-302, 2009
System architecture for real-time face detection on analog video camera
M Kim, D Lee, KY Kim
International Journal of Distributed Sensor Networks 11 (5), 251386, 2015
Protection method for data communication between ADS-B sensor and next-generation air traffic control systems
SH Lee, YK Kim, JW Han, DG Lee
Information 5 (4), 622-633, 2014
Security technologies based on home gateway for making smart home secure
GW Kim, DG Lee, JW Han, SW Kim
Emerging Directions in Embedded and Ubiquitous Computing: EUC 2007 Workshops …, 2007
Security framework for home network: Authentication, authorization, and security policy
GW Kim, DG Lee, JW Han, SC Kim, SW Kim
Emerging Technologies in Knowledge Discovery and Data Mining: PAKDD 2007 …, 2007
Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing
M Kim, DG Lee, J Ryou
Personal and ubiquitous computing 17, 921-932, 2013
Intelligent multimedia service system based on context awareness in smart home
JH Park, HS Park, SJ Lee, J Choi, DG Lee
International Conference on Knowledge-Based and Intelligent Information and …, 2005
A multi-level behavior network-based dangerous situation recognition method in cloud computing environments
DG Lee
The Journal of Supercomputing 73 (7), 3291-3306, 2017
Intelligent pervasive network authentication: S/key based device authentication
DG Lee, JW Han, DS Park
2009 6th IEEE Consumer Communications and Networking Conference, 1-5, 2009
PIS-CC RBAC: Patient information service based on CC-RBAC in next generation hospital considering ubiquitous intelligent environment
JH Park, DG Lee
2007 International Conference on Multimedia and Ubiquitous Engineering (MUE …, 2007
SecureDom: secure mobile-sensitive information protection with domain separation
SW Park, JN Kim, DG Lee
The Journal of Supercomputing 72, 2682-2702, 2016
Medical image segmentation for mobile electronic patient charts using numerical modeling of IoT
SH Chae, D Moon, DG Lee, SB Pan
Journal of Applied Mathematics 2014 (1), 815039, 2014
Smart environment authentication: Multi-domain authentication, authorization, security policy for pervasive network
DG Lee, GW Kim, JW Han, YS Jeong, DS Park
2008 International Symposium on Ubiquitous Multimedia Computing, 99-104, 2008
Small target detection using morphology and modified Gaussian distance function
JH Kim, JJ Park, SH Ahn, DG Lee, D Moon, SK Kim
Security and Communication Networks 9 (6), 555-560, 2016
Sustav trenutno ne može provesti ovu radnju. Pokušajte ponovo kasnije.
Članci 1–20