Deok-Gyu Lee

Orcid: 0000-0003-4057-9558

According to our database1, Deok-Gyu Lee authored at least 62 papers between 2002 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
A multi-level behavior network-based dangerous situation recognition method in cloud computing environments.
J. Supercomput., 2017

2016
SecureDom: secure mobile-sensitive information protection with domain separation.
J. Supercomput., 2016

Hybrid app security protocol for high speed mobile communication.
J. Supercomput., 2016

Hierarchical multichannel-based integrated smart metering infrastructure.
J. Supercomput., 2016

Small target detection using morphology and modified Gaussian distance function.
Secur. Commun. Networks, 2016

Single authentication through in convergence space using collaborative smart cameras.
Secur. Commun. Networks, 2016

2015
System Architecture for Real-Time Face Detection on Analog Video Camera.
Int. J. Distributed Sens. Networks, 2015

2014
Automated and coupled services of advanced smart surveillance systems toward green IT: tracking, retrieval and digital evidence.
J. Supercomput., 2014

Medical Image Segmentation for Mobile Electronic Patient Charts Using Numerical Modeling of IoT.
J. Appl. Math., 2014

Protection Method for Data Communication between ADS-B Sensor and Next-Generation Air Traffic Control Systems.
Inf., 2014

Flight Protection Data via Dynamic Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

2013
Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing.
Pers. Ubiquitous Comput., 2013

A Based on Single Image Authentication System in Aviation Security.
Proceedings of the Multimedia and Ubiquitous Engineering, 2013

Trajectory Calculation Based on Position and Speed for Effective Air Traffic Flow Management.
Proceedings of the Multimedia and Ubiquitous Engineering, 2013

Improvement of Lung Segmentation Using Volume Data and Linear Equation.
Proceedings of the Information Technology Convergence, 2013

2012
Efficient scheme of verifying integrity of application binaries in embedded operating systems.
J. Supercomput., 2012

2011
Hybrid security protocol for wireless body area networks.
Wirel. Commun. Mob. Comput., 2011

For Aviation Security Using Surveillance System.
Proceedings of the Secure and Trust Computing, Data Management, and Applications, 2011

A new proposal for a digital evidence container for security convergence.
Proceedings of the 2011 IEEE International Conference on Control System, 2011

2010
Authentication and ID-Based Key Management Protocol in Pervasive Environment.
Wirel. Pers. Commun., 2010

Editorial: Special Issue on "Security and Multimodality in Pervasive Environments".
Wirel. Pers. Commun., 2010

Intelligent systems for future generation communications.
J. Supercomput., 2010

Cryptanalysis of block-wise stream ciphers suitable for the protection of multimedia and ubiquitous systems.
Telecommun. Syst., 2010

Fuzzy-Based Filtering Solution Selection Method For Dynamic Sensor Networks<sup>1</sup>.
Intell. Autom. Soft Comput., 2010

2009
RHS-US: Real-Time Hash-Chain Scheme Decreasing Pre-Calculation Mechanism for Ubiquitous Services.
Wirel. Pers. Commun., 2009

Intelligent dynamic workflow support for a ubiquitous Web service-based manufacturing environment.
J. Intell. Manuf., 2009

Security technologies based on a home gateway for making smart homes secure.
Internet Res., 2009

Security policy specification for home network.
Int. J. Ad Hoc Ubiquitous Comput., 2009

Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile.
Comput. J., 2009

Device Authentication/Authorization Protocol for Home Network in Next Generation Security.
Proceedings of the Advances in Information Security and Assurance, 2009

The Detection and Response Mechanism against Abnormal Traffic Attack in ATN Network.
Proceedings of the 2009 International Conference on Security & Management, 2009

Anonymous Authentication System Using Group Signature.
Proceedings of the 2009 International Conference on Complex, 2009

Intelligent Pervasive Network Authentication: S/Key Based Device Authentication.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
U-multimedia framework: a secure and intelligent multimedia service framework based on context information in U-home.
J. Supercomput., 2008

A study on secure RFID mutual authentication scheme in pervasive computing environment.
Comput. Commun., 2008

Time Stamp Protocol for Smart Environment Services.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

Intelligent Security for Inter-space Surveillance Applications.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

The home device authentication system construction for pervasive home network.
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2008

The Traceback Method about DoS Attack in Open Grid Computing Environment.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

The Mechanism and Requirements for Detecting the Cross-Service Attack.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
Security Framework for Home Network: Authentication, Authorization, and Security Policy.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

Intelligent Home Network Authentication: Home Device Authentication Using Device Certification.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

PIS-CC RBAC: Patient Information Service based on CC-RBAC in Next Generation Hospital considering Ubiquitous Intelligent Environment.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

User Authentication for Multi Domain in Home Network Environments.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

A Centralized-Abstraction and Replicated-View Architecture Running on Ubiquitous Networks for Collaborative Multimedia Distance Education Services.
Proceedings of the Advances in Multimedia Modeling, 2007

A Study on Key Distribution and ID Registration in the AAA System for Ubiquitous Multimedia Environments.
Proceedings of the Advances in Multimedia Modeling, 2007

Intelligent Home Network Authentication: S/Key-Based Home Device Authentication.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007

Home Device Authentication Method Based on PKI.
Proceedings of the Future Generation Communication and Networking, 2007

Security Technologies Based on Home Gateway for Making Smart Home Secure.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007

2006
An Intelligent and Efficient Traitor Tracing for Ubiquitous Environments.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

A Hybrid Intelligent Multimedia Service Framework in Next Generation Home Network Environment.
Proceedings of the Advances in Hybrid Information Technology, 2006

An Efficient Key Distribution for Ubiquitous Environment in Ad-Hoc Network Using Broadcast Encryption.
Proceedings of the Computational Science and Its Applications, 2006

Authentication for Single/Multi Domain in Ubiquitous Computing Using Attribute Certification.
Proceedings of the Computational Science and Its Applications, 2006

Authentication for Ubiquitous Multi Domain in Pervasive Computing Using PMI.
Proceedings of the High Performance Computing and Communications, 2006

Broadcast Encryption Using Efficient Key Distribution and Renewal for Ubiquitous Environments.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

2005
Intelligent Multimedia Service System Based on Context Awareness in Smart Home.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A Study on Scalable Bluetooth Piconet for Secure Ubiquitous.
Proceedings of the Web and Communication Technologies and Internet-Related Social Issues, 2005

User-Oriented Multimedia Service Using Smart Sensor Agent Module in the Intelligent Home.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
A Study on Efficient Key Distribution and Renewal in Broadcast Encryption.
Proceedings of the Computational Science and Its Applications, 2004

A Study on Contents Distribution Using Electronic Cash System.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004

2002
The Illegal Copy Protection Using Hidden Agent.
Proceedings of the EurAsia-ICT 2002: Information and Communication Technology, 2002


  Loading...