Follow
Mohit Sethi
Mohit Sethi
Ericsson Finland, Aalto University Finland, KTH Sweden
Verified email at aalto.fi
Title
Cited by
Cited by
Year
Network slice management
M Opsenica, J Arkko, HM Back, T Mecklin, G Rune, M Sethi, L Wang
US Patent App. 14/787,900, 2017
1132017
Internet of Things (IoT) security: State of the art and challenges
O Garcia-Morchon, S Kumar, M Sethi
96*2019
End-to-end security for sleepy smart object networks
M Sethi, J Arkko, A Keranen
Local Computer Networks Workshops (LCN Workshops), 2012 IEEE 37th Conference …, 2012
832012
Commitment-based device pairing with synchronized drawing
M Sethi, M Antikainen, T Aura
2014 IEEE International Conference on Pervasive Computing and Communications …, 2014
432014
RFC 8928: Address-Protected Neighbor Discovery for Low-Power and Lossy Networks
B Sarikaya, M Sethi, R Struik
RFC Editor, 2020
41*2020
Secure bootstrapping of cloud-managed ubiquitous displays
M Sethi, E Oat, M Di Francesco, T Aura
Proceedings of the 2014 ACM International Joint Conference on Pervasive and …, 2014
392014
Secure Networking for Virtual Machines in the Cloud
M Komu, M Sethi, R Mallavarapu, H Oirola, R Khan, S Tarkoma
The 2012 International Workshop on Power and QoS Aware Computing(PQoSCom’12), 2012
342012
Misbinding attacks on secure device pairing and bootstrapping
M Sethi, A Peltonen, T Aura
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
322019
Secure iot bootstrapping: A survey
M Sethi, B Sarikaya, D Garcia-Carillo
draft-irtf-t2trg-secure-bootstrapping-00, Technical Report, 2021
31*2021
Evaluation of Out-of-Band Channels for IoT Security
S Latvala, M Sethi, T Aura
SN Computer Science 1 (1), 18, 2020
272020
RFC 9140 Nimble Out-of-Band Authentication for EAP
T Aura, M Sethi, A Peltonen
26*2021
Practical Considerations and Implementation Experiences in Securing Smart Object Networks
M Sethi, J Arkko, A Keranen, HM Rissanen
242018
Communications system, a station, a controller of a light source, and methods therein for authenticating the station to access a network
M Sethi, M Mehrabi, L Wang
US Patent 10,594,680, 2020
222020
A survey of identifier–locator split addressing architectures
M Komu, M Sethi, N Beijar
Computer Science Review 17, 25-42, 2015
212015
Secure and low-power authentication for resource-constrained devices
M Sethi, P Kortoci, M Di Francesco, T Aura
2015 5th International Conference on the Internet of Things (IOT), 30-36, 2015
162015
Methods and devices for bootstrapping of resource constrained devices
P Salmela, M Sethi, A Keränen
US Patent 10,601,815, 2020
152020
Security in smart object networks
M Sethi
122012
Trash collection systems and methods
J Jiménez, J Arkko, HM Back, A Keränen, M Sethi
US Patent 11,373,148, 2022
112022
EAP-TLS 1.3: using the extensible authentication protocol with TLS 1.3
JP Mattsson, M Sethi
RFC 9190, 2022
11*2022
Secure connections establishment
M Sethi, P Salmela
US Patent App. 15/529,539, 2017
112017
The system can't perform the operation now. Try again later.
Articles 1–20