default search action
Deok-Gyu Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j26]Deok-Gyu Lee:
A multi-level behavior network-based dangerous situation recognition method in cloud computing environments. J. Supercomput. 73(7): 3291-3306 (2017) - 2016
- [j25]Jong-Ho Kim, Jun-Jae Park, Sang-Ho Ahn, Deok-Gyu Lee, Daesung Moon, Sang-Kyoon Kim:
Small target detection using morphology and modified Gaussian distance function. Secur. Commun. Networks 9(6): 555-560 (2016) - [j24]Geon Woo Kim, Jong Wook Han, Deok-Gyu Lee, Sang Wook Kim:
Single authentication through in convergence space using collaborative smart cameras. Secur. Commun. Networks 9(6): 561-570 (2016) - [j23]Seoung-Hyeon Lee, Young-Hyuk Kim, Jae-Kwang Lee, Deok-Gyu Lee:
Hybrid app security protocol for high speed mobile communication. J. Supercomput. 72(5): 1715-1739 (2016) - [j22]Kwang-il Hwang, Young-Sik Jeong, Deok-Gyu Lee:
Hierarchical multichannel-based integrated smart metering infrastructure. J. Supercomput. 72(7): 2453-2470 (2016) - [j21]Su-Wan Park, Jeong-Nyeo Kim, Deok-Gyu Lee:
SecureDom: secure mobile-sensitive information protection with domain separation. J. Supercomput. 72(7): 2682-2702 (2016) - 2015
- [j20]Mooseop Kim, Deok-Gyu Lee, Ki-Young Kim:
System Architecture for Real-Time Face Detection on Analog Video Camera. Int. J. Distributed Sens. Networks 11: 251386:1-251386:11 (2015) - 2014
- [j19]Deok-Gyu Lee, Jong Wook Han:
Flight Protection Data via Dynamic Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j18]Seoung-Hyeon Lee, Yong-Kyun Kim, Jong Wook Han, Deok-Gyu Lee:
Protection Method for Data Communication between ADS-B Sensor and Next-Generation Air Traffic Control Systems. Inf. 5(4): 622-633 (2014) - [j17]Seung-Hoon Chae, Daesung Moon, Deok-Gyu Lee, Sung Bum Pan:
Medical Image Segmentation for Mobile Electronic Patient Charts Using Numerical Modeling of IoT. J. Appl. Math. 2014: 815039:1-815039:8 (2014) - [j16]Su-Wan Park, Deok-Gyu Lee, Jong Wook Han, Jeong-Nyeo Kim:
Automated and coupled services of advanced smart surveillance systems toward green IT: tracking, retrieval and digital evidence. J. Supercomput. 69(3): 1215-1234 (2014) - 2013
- [j15]Mooseop Kim, Deok-Gyu Lee, Jaecheol Ryou:
Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing. Pers. Ubiquitous Comput. 17(5): 921-932 (2013) - [c36]Seung-Hoon Chae, Daesung Moon, Deok-Gyu Lee, Sung Bum Pan:
Improvement of Lung Segmentation Using Volume Data and Linear Equation. ITCS 2013: 213-221 - [c35]Deok-Gyu Lee, Jong Wook Han:
A Based on Single Image Authentication System in Aviation Security. MUE 2013: 293-302 - [c34]Yong-Kyun Kim, Deok-Gyu Lee, Jong Wook Han:
Trajectory Calculation Based on Position and Speed for Effective Air Traffic Flow Management. MUE 2013: 377-384 - 2012
- [j14]Soon-Seok Kim, Deok-Gyu Lee, Jong Hyuk Park:
Efficient scheme of verifying integrity of application binaries in embedded operating systems. J. Supercomput. 59(2): 676-692 (2012) - 2011
- [j13]Chol Soon Jang, Deok-Gyu Lee, Jong Wook Han, Jong Hyuk Park:
Hybrid security protocol for wireless body area networks. Wirel. Commun. Mob. Comput. 11(2): 277-288 (2011) - [c33]Kyung-Soo Lim, Deok-Gyu Lee, Jong Wook Han:
A new proposal for a digital evidence container for security convergence. ICCSCE 2011: 171-175 - [c32]Deok-Gyu Lee, Jong Wook Han:
For Aviation Security Using Surveillance System. STA Workshops 2011: 103-115 - 2010
- [j12]Hee Suk Seo, Hae Young Lee, Seung-Jae Lee, Deok-Gyu Lee:
Fuzzy-Based Filtering Solution Selection Method For Dynamic Sensor Networks1. Intell. Autom. Soft Comput. 16(4): 579-592 (2010) - [j11]Deok-Gyu Lee, Jongsung Kim, Jaechul Sung, Yangsun Lee, Seungmin Rho:
Cryptanalysis of block-wise stream ciphers suitable for the protection of multimedia and ubiquitous systems. Telecommun. Syst. 44(3-4): 297-306 (2010) - [j10]Deok-Gyu Lee, Sajid Hussain, Alan Chin-Chen Chang:
Intelligent systems for future generation communications. J. Supercomput. 54(1): 1-3 (2010) - [j9]Deok-Gyu Lee, Sajid Hussain, George Roussos, Yan Zhang:
Editorial: Special Issue on "Security and Multimodality in Pervasive Environments". Wirel. Pers. Commun. 55(1): 1-4 (2010) - [j8]Jong Sik Moon, Jong Hyuk Park, Deok-Gyu Lee, Im-Yeong Lee:
Authentication and ID-Based Key Management Protocol in Pervasive Environment. Wirel. Pers. Commun. 55(1): 91-103 (2010)
2000 – 2009
- 2009
- [j7]Yun-kyung Lee, Deok-Gyu Lee, Jong Wook Han, Tai-Hoon Kim:
Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile. Comput. J. 52(8): 871-877 (2009) - [j6]Geon Woo Kim, Deok-Gyu Lee, Jong Wook Han, Sang Wook Kim:
Security policy specification for home network. Int. J. Ad Hoc Ubiquitous Comput. 4(6): 372-378 (2009) - [j5]Geon Woo Kim, Deok-Gyu Lee, Jong Wook Han, Seung Hyun Lee, Sang Wook Kim:
Security technologies based on a home gateway for making smart homes secure. Internet Res. 19(2): 209-226 (2009) - [j4]Minsoo Lee, Hyejung Yoon, Hyoseop Shin, Deok-Gyu Lee:
Intelligent dynamic workflow support for a ubiquitous Web service-based manufacturing environment. J. Intell. Manuf. 20(3): 295-302 (2009) - [j3]Deok-Gyu Lee, Jong Hyuk Park, Heai-Jo Kang, Bok Yong Choi, Kwang Nam Choi:
RHS-US: Real-Time Hash-Chain Scheme Decreasing Pre-Calculation Mechanism for Ubiquitous Services. Wirel. Pers. Commun. 51(1): 193-207 (2009) - [c31]Deok-Gyu Lee, Jong Wook Han, Doo-Soon Park, Im-Yeong Lee:
Intelligent Pervasive Network Authentication: S/Key Based Device Authentication. CCNC 2009: 1-5 - [c30]Yun-kyung Lee, Seung-wan Han, Sokjoon Lee, Byung-Ho Chung, Deok-Gyu Lee:
Anonymous Authentication System Using Group Signature. CISIS 2009: 1235-1239 - [c29]Seung-Hee Oh, Deok-Gyu Lee, Jong Wook Han, Jong Hyuk Park:
The Detection and Response Mechanism against Abnormal Traffic Attack in ATN Network. Security and Management 2009: 535-540 - [c28]Jong Sik Moon, Deok-Gyu Lee, Im-Yeong Lee:
Device Authentication/Authorization Protocol for Home Network in Next Generation Security. ISA 2009: 760-768 - 2008
- [j2]Soo-Young Kang, Deok-Gyu Lee, Im-Yeong Lee:
A study on secure RFID mutual authentication scheme in pervasive computing environment. Comput. Commun. 31(18): 4248-4254 (2008) - [j1]Deok-Gyu Lee, Jong Hyuk Park, Tai-Hoon Kim, Laurence Tianruo Yang:
U-multimedia framework: a secure and intelligent multimedia service framework based on context information in U-home. J. Supercomput. 45(1): 88-104 (2008) - [c27]Seung-Hee Oh, Deok-Gyu Lee, Jong Wook Han:
The Mechanism and Requirements for Detecting the Cross-Service Attack. APSCC 2008: 656-661 - [c26]Seoung-Hyeon Lee, Cheol-Joo Chae, Deok-Gyu Lee, Jong Wook Han, Jae-Kwang Lee:
The Traceback Method about DoS Attack in Open Grid Computing Environment. FGCN (1) 2008: 391-394 - [c25]Yun-kyung Lee, Deok-Gyu Lee, Jong Wook Han, Jeong-Nyeo Kim:
The home device authentication system construction for pervasive home network. MobiQuitous 2008 - [c24]Geon Woo Kim, Deok-Gyu Lee, Jong Wook Han, Sang Wook Kim:
Intelligent Security for Inter-space Surveillance Applications. MUE 2008: 419-422 - [c23]Deok-Gyu Lee, Jong Wook Han, Jong Hyuk Park, Sang-Soo Yeo, Young-Sik Jeong:
Time Stamp Protocol for Smart Environment Services. UIC 2008: 591-601 - 2007
- [c22]Yun-kyung Lee, Deok-Gyu Lee, Jong Wook Han, Kyo-Il Chung:
Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile. APWeb/WAIM Workshops 2007: 573-582 - [c21]Geon Woo Kim, Deok-Gyu Lee, Jong Wook Han, Sang Wook Kim:
Security Technologies Based on Home Gateway for Making Smart Home Secure. EUC Workshops 2007: 124-135 - [c20]Yun-kyung Lee, Deok-Gyu Lee, Jong Wook Han:
Home Device Authentication Method Based on PKI. FGCN (2) 2007: 7-11 - [c19]Deok-Gyu Lee, Ilsun You, Sang-Choon Kim, Yun-kyung Lee, Jong Wook Han, Kyo-Il Chung:
Intelligent Home Network Authentication: S/Key-Based Home Device Authentication. ISPA Workshops 2007: 214-223 - [c18]Seo-Il Kang, Deok-Gyu Lee, Im-Yeong Lee:
A Study on Key Distribution and ID Registration in the AAA System for Ubiquitous Multimedia Environments. MMM (2) 2007: 487-493 - [c17]Eung Nam Ko, Jong Hyuk Park, Deok-Gyu Lee, Kee Chun Bang, Soo Hong Kim:
A Centralized-Abstraction and Replicated-View Architecture Running on Ubiquitous Networks for Collaborative Multimedia Distance Education Services. MMM (2) 2007: 528-535 - [c16]Deok-Gyu Lee, Jong Wook Han, Jong Hyuk Park:
User Authentication for Multi Domain in Home Network Environments. MUE 2007: 89-96 - [c15]Jong Hyuk Park, Deok-Gyu Lee:
PIS-CC RBAC: Patient Information Service based on CC-RBAC in Next Generation Hospital considering Ubiquitous Intelligent Environment. MUE 2007: 196-200 - [c14]Deok-Gyu Lee, Yun-kyung Lee, Jong Wook Han, Jong Hyuk Park, Im-Yeong Lee:
Intelligent Home Network Authentication: Home Device Authentication Using Device Certification. OTM Conferences (2) 2007: 1688-1700 - [c13]Geon Woo Kim, Deok-Gyu Lee, Jong Wook Han, Sang-Choon Kim, Sang Wook Kim:
Security Framework for Home Network: Authentication, Authorization, and Security Policy. PAKDD Workshops 2007: 621-628 - 2006
- [c12]Deok-Gyu Lee, Jang-Su Park, Im-Yeong Lee:
Broadcast Encryption Using Efficient Key Distribution and Renewal for Ubiquitous Environments. EUC Workshops 2006: 721-730 - [c11]Deok-Gyu Lee, Jong Sik Moon, Jong Hyuk Park, Im-Yeong Lee:
Authentication for Ubiquitous Multi Domain in Pervasive Computing Using PMI. HPCC 2006: 515-524 - [c10]Deok-Gyu Lee, Seo-Il Kang, Dae-Hee Seo, Im-Yeong Lee:
Authentication for Single/Multi Domain in Ubiquitous Computing Using Attribute Certification. ICCSA (4) 2006: 326-335 - [c9]Deok-Gyu Lee, Jang-Su Park, Im-Yeong Lee, Yong-Seok Park, Jung-Chul Ahn:
An Efficient Key Distribution for Ubiquitous Environment in Ad-Hoc Network Using Broadcast Encryption. ICCSA (4) 2006: 370-379 - [c8]Jong Hyuk Park, Jungsuk Song, Byoung-Soo Koh, Deok-Gyu Lee, Byoung-Ha Park:
A Hybrid Intelligent Multimedia Service Framework in Next Generation Home Network Environment. ICHIT 2006: 395-403 - [c7]Deok-Gyu Lee, Seo-Il Kang, Im-Yeong Lee:
An Intelligent and Efficient Traitor Tracing for Ubiquitous Environments. KES (2) 2006: 793-802 - 2005
- [c6]Jong Hyuk Park, Jun Choi, Sangjin Lee, Hye-Ung Park, Deok-Gyu Lee:
User-Oriented Multimedia Service Using Smart Sensor Agent Module in the Intelligent Home. CIS (1) 2005: 313-320 - [c5]Dae-Hee Seo, Deok-Gyu Lee, Im-Yeong Lee:
A Study on Scalable Bluetooth Piconet for Secure Ubiquitous. Human.Society@Internet 2005: 45-56 - [c4]Jong Hyuk Park, Heung-Soo Park, Sangjin Lee, Jun Choi, Deok-Gyu Lee:
Intelligent Multimedia Service System Based on Context Awareness in Smart Home. KES (1) 2005: 1146-1152 - 2004
- [c3]Deok-Gyu Lee, Hyung-Geun Oh, Im-Yeong Lee:
A Study on Contents Distribution Using Electronic Cash System. EEE 2004: 333-340 - [c2]Deok-Gyu Lee, Im-Yeong Lee:
A Study on Efficient Key Distribution and Renewal in Broadcast Encryption. ICCSA (4) 2004: 66-76 - 2002
- [c1]Deok-Gyu Lee, Im-Yeong Lee, Jong-Keun Ahn, Yong-Hae Kong:
The Illegal Copy Protection Using Hidden Agent. EurAsia-ICT 2002: 832-841
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint