User profiles for Deok-Gyu Lee

Deok Gyu Lee

Seowon University
Verified email at seowon.ac.kr
Cited by 647

Hybrid security protocol for wireless body area networks

CS Jang, DG Lee, J Han, JH Park - … and Mobile Computing, 2011 - Wiley Online Library
Wireless body area networks (WBANs) are receiving a significant interest as an emerging
technology in next generation wireless networks. Security challenges as well as this interest …

A Controlled Transcription-Driven Light-Up Aptamer Amplification for Nucleoside Triphosphate Detection

DG Lee, HJ Lim, HY Lee, DM Kim, KH Lee, JY Byun… - BioChip Journal, 2023 - Springer
In this study, we introduced a simple method for detecting nucleoside triphosphates (NTPs)
using controlled transcription-driven light-up aptamer amplification. Based on the …

A study on secure RFID mutual authentication scheme in pervasive computing environment

SY Kang, DG Lee, IY Lee - Computer Communications, 2008 - Elsevier
RFID, a core technology that can be used to create a ubiquitous society, is a non-contact
recognition system in which a small chip attached to various types of products transmits and …

Small Molecule Detection with Ligation-Dependent Light-Up Aptamer Transcriptional Amplification

DG Lee, YH Min, JY Byun, YB Shin - ACS Applied Bio Materials, 2024 - ACS Publications
ATP and NAD + are small biomolecules that participate in a variety of physiological
functions and are considered as potential biomarkers for disease diagnosis. In this study, we …

A proposal of security framework for wireless body area network

C Jang, DG Lee, J Han - 2008 International Conference on …, 2008 - ieeexplore.ieee.org
Environment of the Next-Generation is organized by various sensors and devices. wireless
body area network (WBAN) is the core technology connecting Next-Generation's …

Anonymous authentication system using group signature

Y Lee, S Han, S Lee, B Chung… - … Conference on Complex …, 2009 - ieeexplore.ieee.org
As the internet has been widely spread, it becomes big issues that an excessive demand of
unnecessary private information at Web servers and invasion of privacy. Anonymous …

Protection method for data communication between ADS-B sensor and next-generation air traffic control systems

SH Lee, YK Kim, JW Han, DG Lee - Information, 2014 - mdpi.com
… -Hyeon Lee has initiated the idea of the work and written the manuscript. Yong-Kyun Kim
collected the references. Jong-Wook Han conducted the literature review. Deok-Gyu Lee

A multi-level behavior network-based dangerous situation recognition method in cloud computing environments

DG Lee - The Journal of Supercomputing, 2017 - Springer
There are a variety of dangerous situations that elementary school students encounter when
they commute to their school. Given that smart phone is the one of devises utilized a lot by …

A study on contents distribution using electronic cash system

DG Lee, HG Oh, IY Lee - … on e-Technology, e-Commerce and e …, 2004 - ieeexplore.ieee.org
Electronic cash systems are used as payment tools of e-commerce. They should be equipped
with independence, transferability, and dividability, which are requirements of digital rights …

Home network device authentication: Device authentication framework and device certificate profile

YK Lee, DG Lee, JW Han, TH Kim - The computer journal, 2009 - academic.oup.com
As home devices have various functions and have improved computing power and networking
ability, home device authentication has become increasingly important for improving the …