The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Deok-Gyu Lee: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jong Hyuk Park, Jun Choi, Sangjin Lee, Hye-Ung Park, Deok-Gyu Lee
    User-Oriented Multimedia Service Using Smart Sensor Agent Module in the Intelligent Home. [Citation Graph (0, 0)][DBLP]
    CIS (1), 2005, pp:313-320 [Conf]
  2. Deok-Gyu Lee, Hyung-Geun Oh, Im-Yeong Lee
    A Study on Contents Distribution Using Electronic Cash System. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:333-340 [Conf]
  3. Deok-Gyu Lee, Jang-Su Park, Im-Yeong Lee
    Broadcast Encryption Using Efficient Key Distribution and Renewal for Ubiquitous Environments. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:721-730 [Conf]
  4. Deok-Gyu Lee, Im-Yeong Lee, Jong-Keun Ahn, Yong-Hae Kong
    The Illegal Copy Protection Using Hidden Agent. [Citation Graph (0, 0)][DBLP]
    EurAsia-ICT, 2002, pp:832-841 [Conf]
  5. Deok-Gyu Lee, Jong Sik Moon, Jong Hyuk Park, Im-Yeong Lee
    Authentication for Ubiquitous Multi Domain in Pervasive Computing Using PMI. [Citation Graph (0, 0)][DBLP]
    HPCC, 2006, pp:515-524 [Conf]
  6. Dae-Hee Seo, Deok-Gyu Lee, Im-Yeong Lee
    A Study on Scalable Bluetooth Piconet for Secure Ubiquitous. [Citation Graph (0, 0)][DBLP]
    Human.Society@Internet, 2005, pp:45-56 [Conf]
  7. Deok-Gyu Lee, Seo-Il Kang, Dae-Hee Seo, Im-Yeong Lee
    Authentication for Single/Multi Domain in Ubiquitous Computing Using Attribute Certification. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:326-335 [Conf]
  8. Deok-Gyu Lee, Im-Yeong Lee
    A Study on Efficient Key Distribution and Renewal in Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:66-76 [Conf]
  9. Deok-Gyu Lee, Jang-Su Park, Im-Yeong Lee, Yong-Seok Park, Jung-Chul Ahn
    An Efficient Key Distribution for Ubiquitous Environment in Ad-Hoc Network Using Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:370-379 [Conf]
  10. Deok-Gyu Lee, Seo-Il Kang, Im-Yeong Lee
    An Intelligent and Efficient Traitor Tracing for Ubiquitous Environments. [Citation Graph (0, 0)][DBLP]
    KES (2), 2006, pp:793-802 [Conf]
  11. Jong Hyuk Park, Heung-Soo Park, Sangjin Lee, Jun Choi, Deok-Gyu Lee
    Intelligent Multimedia Service System Based on Context Awareness in Smart Home. [Citation Graph (0, 0)][DBLP]
    KES (1), 2005, pp:1146-1152 [Conf]
  12. Jong Hyuk Park, Deok-Gyu Lee
    PIS-CC RBAC: Patient Information Service based on CC-RBAC in Next Generation Hospital considering Ubiquitous Intelligent Environment. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:196-200 [Conf]
  13. Deok-Gyu Lee, Jong Wook Han, Jong Hyuk Park
    User Authentication for Multi Domain in Home Network Environments. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:89-96 [Conf]
  14. Yun-kyung Lee, Deok-Gyu Lee, Jong Wook Han, Kyo-Il Chung
    Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile. [Citation Graph (0, 0)][DBLP]
    APWeb/WAIM Workshops, 2007, pp:573-582 [Conf]
  15. Deok-Gyu Lee, Ilsun You, Sang-Choon Kim, Yun-kyung Lee, Jong Wook Han, Kyo-Il Chung
    Intelligent Home Network Authentication: S/Key-Based Home Device Authentication. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2007, pp:214-223 [Conf]
  16. Seo-Il Kang, Deok-Gyu Lee, Im-Yeong Lee
    A Study on Key Distribution and ID Registration in the AAA System for Ubiquitous Multimedia Environments. [Citation Graph (0, 0)][DBLP]
    MMM (2), 2007, pp:487-493 [Conf]
  17. Eung Nam Ko, Jong Hyuk Park, Deok-Gyu Lee, Kee Chun Bang, Soo Hong Kim
    A Centralized-Abstraction and Replicated-View Architecture Running on Ubiquitous Networks for Collaborative Multimedia Distance Education Services. [Citation Graph (0, 0)][DBLP]
    MMM (2), 2007, pp:528-535 [Conf]
  18. Deok-Gyu Lee, Yun-kyung Lee, Jong-Wook Han, Jong Hyuk Park, Im-Yeong Lee
    Intelligent Home Network Authentication: Home Device Authentication Using Device Certification. [Citation Graph (0, 0)][DBLP]
    OTM Conferences (2), 2007, pp:1688-1700 [Conf]

  19. The Detection and Response Mechanism against Abnormal Traffic Attack in ATN Network. [Citation Graph (, )][DBLP]


  20. Security Technologies Based on Home Gateway for Making Smart Home Secure. [Citation Graph (, )][DBLP]


  21. The home device authentication system construction for pervasive home network. [Citation Graph (, )][DBLP]


  22. Security Framework for Home Network: Authentication, Authorization, and Security Policy. [Citation Graph (, )][DBLP]


  23. Time Stamp Protocol for Smart Environment Services. [Citation Graph (, )][DBLP]


  24. Intelligent Security for Inter-space Surveillance Applications. [Citation Graph (, )][DBLP]


  25. A Hybrid Intelligent Multimedia Service Framework in Next Generation Home Network Environment. [Citation Graph (, )][DBLP]


  26. Home Device Authentication Method Based on PKI. [Citation Graph (, )][DBLP]


  27. The Traceback Method about DoS Attack in Open Grid Computing Environment. [Citation Graph (, )][DBLP]


  28. Anonymous Authentication System Using Group Signature. [Citation Graph (, )][DBLP]


  29. Device Authentication/Authorization Protocol for Home Network in Next Generation Security. [Citation Graph (, )][DBLP]


  30. The Mechanism and Requirements for Detecting the Cross-Service Attack. [Citation Graph (, )][DBLP]


  31. Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile. [Citation Graph (, )][DBLP]


  32. A study on secure RFID mutual authentication scheme in pervasive computing environment. [Citation Graph (, )][DBLP]


Search in 0.076secs, Finished in 0.078secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002