Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Design Considerations for an Intelligent Video Surveillance System Using Cloud Computing

    Recently, deep neural network and cloud computing based intelligent video surveillance technology are growing interests in the industrial and academia. The synergy with both technologies emerges as a key role ...

    Kyung-Soo Lim, Seoung-Hyeon Lee in Parallel and Distributed Computing, Applic… (2019)

  2. No Access

    Chapter and Conference Paper

    The ADS-B Protection Method for Next-Generation Air Traffic Management System

    ADS-B data is an important data to effectively utilize limited airspace as it contains main flight information including the location, altitude, speed, and others of plane but it is very vulnerable to hacking ...

    Seoung-Hyeon Lee, Jong-Wook Han in Ubiquitous Computing Application and Wirel… (2015)

  3. No Access

    Chapter and Conference Paper

    Trajectory Prediction for Using Real Data and Real Meteorological Data

    Trajectory prediction is basic work for 4D-trajectory modeling, conflict detection and air traffic flow management. This paper proposes a novel algorithm based distance calculation formula (vincenty formula) f...

    Yong Kyun Kim, Jong Wook Han, Hyodal Park in Ubiquitous Computing Application and Wirel… (2015)

  4. No Access

    Article

    Automated and coupled services of advanced smart surveillance systems toward green IT: tracking, retrieval and digital evidence

    Green Security is a new research field defining and investigating security solutions using an energy-aware perspective. Growing efforts and interests for an intelligent or smart surveillance system which is ca...

    Su-Wan Park, Deok Gyu Lee, Jong Wook Han, JeongNyeo Kim in The Journal of Supercomputing (2014)

  5. No Access

    Chapter and Conference Paper

    Object Retrieval Scheme Using Color Features in Surveillance System

    In this paper, we have described the object retrieval scheme based on color for video surveillance that is influenced by the different light changes and overlap**/non-overlap** view cameras setting. The pr...

    Su-wan Park, JeongNyeo Kim, Jong Wook Han in Future Information Technology (2014)

  6. No Access

    Chapter and Conference Paper

    ID Globalization Across Multiple Convergence Spaces Using Smart Cameras

    This paper suggests a scheme for ID globalization, wherein the single successful authentication at initial stage requires no further authentication check while traversing multiple convergence spaces. This is d...

    Geon Woo Kim, Jong Wook Han in Ubiquitous Information Technologies and Applications (2013)

  7. No Access

    Chapter and Conference Paper

    Trajectory Calculation Based on Position and Speed for Effective Air Traffic Flow Management

    Trajectory modeling is basic work for 4D-Route modeling, conflict detection and air traffic flow management. This paper proposes a novel algorithm based on coordinate prediction for trajectory calculation. We ...

    Yong-Kyun Kim, Deok Gyu Lee, Jong Wook Han in Multimedia and Ubiquitous Engineering (2013)

  8. No Access

    Chapter and Conference Paper

    A Based on Single Image Authentication System in Aviation Security

    An image protection apparatus includes an information collecting unit for collecting personally identifiable information to be embedded in images captured by an image capturing instrument; and an information p...

    Deok Gyu Lee, Jong Wook Han in Multimedia and Ubiquitous Engineering (2013)

  9. No Access

    Chapter and Conference Paper

    A Based on Identity Surveillance System in Aviation Security

    An image protection apparatus includes an information collecting unit for collecting personally identifiable information to be embedded in images captured by an image capturing instrument; and an information p...

    Deok Gyu Lee, Jong Wook Han in Future Information Technology, Application, and Service (2012)

  10. No Access

    Chapter and Conference Paper

    Videos Analytic Retrieval System for CCTV Surveillance

    The proposed system demonstrates an efficient framework of video retrieval system and the video analysis retrieval scheme using object color for CCTV surveillance. The video analysis retrieval scheme consists ...

    Su-wan Park, Kyung-Soo Lim, Jong Wook Han in Future Information Technology, Application… (2012)

  11. No Access

    Chapter and Conference Paper

    For Aviation Security Using Surveillance System

    As the national airspace system grows increasingly interconnected to partners and customers both within and outside the Rep. of Korea government, the danger of cyber-attacks on the system is increasing. Becaus...

    Deok Gyu Lee in Secure and Trust Computing, Data Management, and Applications (2011)

  12. No Access

    Chapter and Conference Paper

    Time Stamp Protocol for Smart Environment Services

    By development of wireless mobile communication, many users incr-eased. But, in case of 1st generation or 2nd generation, transfer communication service was not satisfying high speed wireless internet Communic...

    Deok-Gyu Lee, Jong-Wook Han, Jong Hyuk Park in Ubiquitous Intelligence and Computing (2008)

  13. Chapter and Conference Paper

    Security Technologies Based on Home Gateway for Making Smart Home Secure

    As home network is expanding into ubiquitous computing environment and lots of private information is accessible, it is required to protect home network system from illegal accesses and security threats in ope...

    Geon Woo Kim, Deok Gyu Lee, Jong Wook Han in Emerging Directions in Embedded and Ubiqui… (2007)

  14. No Access

    Chapter and Conference Paper

    Security Framework for Home Network: Authentication, Authorization, and Security Policy

    As a number of home network services are available and home network is expanding into ubiquitous computing environment, we need to protect home network system from illegal accesses and a variety of threats. Ho...

    Geon Woo Kim, Deok Gyu Lee, Jong Wook Han in Emerging Technologies in Knowledge Discove… (2007)

  15. No Access

    Chapter and Conference Paper

    Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile

    As home network service is popularized, the interest in home network security is going up. Many people interested in home network security usually consider user authentication and authorization. But the consid...

    Yun-kyung Lee, Deok Gyu Lee, Jong-wook Han in Advances in Web and Network Technologies, … (2007)

  16. No Access

    Chapter and Conference Paper

    Intelligent Home Network Authentication: S/Key-Based Home Device Authentication

    The intelligent home network environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. As home network service is p...

    Deok-Gyu Lee, Ilsun You, Sang-Choon Kim in Frontiers of High Performance Computing an… (2007)

  17. No Access

    Chapter and Conference Paper

    Intelligent Home Network Authentication: Home Device Authentication Using Device Certification

    The intelligent home network environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. As home network service is p...

    Deok-Gyu Lee, Yun-kyung Lee, Jong-wook Han in On the Move to Meaningful Internet Systems… (2007)

  18. No Access

    Chapter and Conference Paper

    Efficient and User Friendly Inter-domain Device Authentication/Access Control for Home Networks

    Device authentication can reinforce the security of the home network services by ensuring that only specific authorized devices by specific authorized users can access the services. And it is also a mandatory ...

    **-Bum Hwang, Hyung-Kyu Lee, Jong-Wook Han in Embedded and Ubiquitous Computing (2006)

  19. No Access

    Chapter and Conference Paper

    A Security Model for Home Networks with Authority Delegation

    In this paper, we propose a security model that deal with the authentication and authorization problems for home networks. First, we examine existing researches for home network security and summarize their sh...

    **-Bum Hwang, Jong-Wook Han in Computational Science and Its Applications - ICCSA 2006 (2006)