User profiles for Deok-Gyu Lee
Deok Gyu LeeSeowon University Verified email at seowon.ac.kr Cited by 647 |
Hybrid security protocol for wireless body area networks
Wireless body area networks (WBANs) are receiving a significant interest as an emerging
technology in next generation wireless networks. Security challenges as well as this interest …
technology in next generation wireless networks. Security challenges as well as this interest …
A Controlled Transcription-Driven Light-Up Aptamer Amplification for Nucleoside Triphosphate Detection
DG Lee, HJ Lim, HY Lee, DM Kim, KH Lee, JY Byun… - BioChip Journal, 2023 - Springer
In this study, we introduced a simple method for detecting nucleoside triphosphates (NTPs)
using controlled transcription-driven light-up aptamer amplification. Based on the …
using controlled transcription-driven light-up aptamer amplification. Based on the …
A study on secure RFID mutual authentication scheme in pervasive computing environment
SY Kang, DG Lee, IY Lee - Computer Communications, 2008 - Elsevier
RFID, a core technology that can be used to create a ubiquitous society, is a non-contact
recognition system in which a small chip attached to various types of products transmits and …
recognition system in which a small chip attached to various types of products transmits and …
Small Molecule Detection with Ligation-Dependent Light-Up Aptamer Transcriptional Amplification
DG Lee, YH Min, JY Byun, YB Shin - ACS Applied Bio Materials, 2024 - ACS Publications
ATP and NAD + are small biomolecules that participate in a variety of physiological
functions and are considered as potential biomarkers for disease diagnosis. In this study, we …
functions and are considered as potential biomarkers for disease diagnosis. In this study, we …
A proposal of security framework for wireless body area network
C Jang, DG Lee, J Han - 2008 International Conference on …, 2008 - ieeexplore.ieee.org
Environment of the Next-Generation is organized by various sensors and devices. wireless
body area network (WBAN) is the core technology connecting Next-Generation's …
body area network (WBAN) is the core technology connecting Next-Generation's …
Anonymous authentication system using group signature
Y Lee, S Han, S Lee, B Chung… - … Conference on Complex …, 2009 - ieeexplore.ieee.org
As the internet has been widely spread, it becomes big issues that an excessive demand of
unnecessary private information at Web servers and invasion of privacy. Anonymous …
unnecessary private information at Web servers and invasion of privacy. Anonymous …
Protection method for data communication between ADS-B sensor and next-generation air traffic control systems
SH Lee, YK Kim, JW Han, DG Lee - Information, 2014 - mdpi.com
… -Hyeon Lee has initiated the idea of the work and written the manuscript. Yong-Kyun Kim
collected the references. Jong-Wook Han conducted the literature review. Deok-Gyu Lee …
collected the references. Jong-Wook Han conducted the literature review. Deok-Gyu Lee …
A multi-level behavior network-based dangerous situation recognition method in cloud computing environments
DG Lee - The Journal of Supercomputing, 2017 - Springer
There are a variety of dangerous situations that elementary school students encounter when
they commute to their school. Given that smart phone is the one of devises utilized a lot by …
they commute to their school. Given that smart phone is the one of devises utilized a lot by …
A study on contents distribution using electronic cash system
DG Lee, HG Oh, IY Lee - … on e-Technology, e-Commerce and e …, 2004 - ieeexplore.ieee.org
Electronic cash systems are used as payment tools of e-commerce. They should be equipped
with independence, transferability, and dividability, which are requirements of digital rights …
with independence, transferability, and dividability, which are requirements of digital rights …
Home network device authentication: Device authentication framework and device certificate profile
YK Lee, DG Lee, JW Han, TH Kim - The computer journal, 2009 - academic.oup.com
As home devices have various functions and have improved computing power and networking
ability, home device authentication has become increasingly important for improving the …
ability, home device authentication has become increasingly important for improving the …