Hybrid security protocol for wireless body area networks CS Jang, DG Lee, J Han, JH Park Wireless Communications and Mobile Computing 11 (2), 277-288, 2011 | 67 | 2011 |
A study on secure RFID mutual authentication scheme in pervasive computing environment SY Kang, DG Lee, IY Lee Computer Communications 31 (18), 4248-4254, 2008 | 65 | 2008 |
A proposal of security framework for wireless body area network C Jang, DG Lee, J Han 2008 International Conference on Security Technology, 202-205, 2008 | 36 | 2008 |
Home network device authentication: Device authentication framework and device certificate profile YK Lee, DG Lee, JW Han, TH Kim The computer journal 52 (8), 871-877, 2009 | 29 | 2009 |
Authentication for single/Multi domain in ubiquitous computing using attribute certification DG Lee, SI Kang, DH Seo, IY Lee Computational Science and Its Applications-ICCSA 2006: International …, 2006 | 25 | 2006 |
A study on contents distribution using electronic cash system DG Lee, HG Oh, IY Lee IEEE International Conference on e-Technology, e-Commerce and e-Service …, 2004 | 21 | 2004 |
Intelligent dynamic workflow support for a ubiquitous Web service-based manufacturing environment M Lee, H Yoon, H Shin, DG Lee Journal of Intelligent Manufacturing 20, 295-302, 2009 | 20 | 2009 |
System architecture for real-time face detection on analog video camera M Kim, D Lee, KY Kim International Journal of Distributed Sensor Networks 11 (5), 251386, 2015 | 18 | 2015 |
Protection method for data communication between ADS-B sensor and next-generation air traffic control systems SH Lee, YK Kim, JW Han, DG Lee Information 5 (4), 622-633, 2014 | 16 | 2014 |
Security technologies based on home gateway for making smart home secure GW Kim, DG Lee, JW Han, SW Kim Emerging Directions in Embedded and Ubiquitous Computing: EUC 2007 Workshops …, 2007 | 15 | 2007 |
Security framework for home network: Authentication, authorization, and security policy GW Kim, DG Lee, JW Han, SC Kim, SW Kim Emerging Technologies in Knowledge Discovery and Data Mining: PAKDD 2007 …, 2007 | 15 | 2007 |
Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing M Kim, DG Lee, J Ryou Personal and ubiquitous computing 17, 921-932, 2013 | 14 | 2013 |
Intelligent multimedia service system based on context awareness in smart home JH Park, HS Park, SJ Lee, J Choi, DG Lee International Conference on Knowledge-Based and Intelligent Information and …, 2005 | 14 | 2005 |
A multi-level behavior network-based dangerous situation recognition method in cloud computing environments DG Lee The Journal of Supercomputing 73 (7), 3291-3306, 2017 | 13 | 2017 |
Intelligent pervasive network authentication: S/key based device authentication DG Lee, JW Han, DS Park 2009 6th IEEE Consumer Communications and Networking Conference, 1-5, 2009 | 13 | 2009 |
PIS-CC RBAC: Patient information service based on CC-RBAC in next generation hospital considering ubiquitous intelligent environment JH Park, DG Lee 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE …, 2007 | 12 | 2007 |
SecureDom: secure mobile-sensitive information protection with domain separation SW Park, JN Kim, DG Lee The Journal of Supercomputing 72, 2682-2702, 2016 | 11 | 2016 |
Medical image segmentation for mobile electronic patient charts using numerical modeling of IoT SH Chae, D Moon, DG Lee, SB Pan Journal of Applied Mathematics 2014 (1), 815039, 2014 | 11 | 2014 |
Smart environment authentication: Multi-domain authentication, authorization, security policy for pervasive network DG Lee, GW Kim, JW Han, YS Jeong, DS Park 2008 International Symposium on Ubiquitous Multimedia Computing, 99-104, 2008 | 11 | 2008 |
Small target detection using morphology and modified Gaussian distance function JH Kim, JJ Park, SH Ahn, DG Lee, D Moon, SK Kim Security and Communication Networks 9 (6), 555-560, 2016 | 10 | 2016 |