Mohit Sethi
Mohit Sethi
Ericsson Finland, Aalto University Finland, KTH Sweden
Verified email at
Cited by
Cited by
Network slice management
M Opsenica, J Arkko, HM Back, T Mecklin, G Rune, M Sethi, L Wang
US Patent App. 14/787,900, 2017
Internet of Things (IoT) security: State of the art and challenges
O Garcia-Morchon, S Kumar, M Sethi
End-to-end security for sleepy smart object networks
M Sethi, J Arkko, A Keranen
Local Computer Networks Workshops (LCN Workshops), 2012 IEEE 37th Conference†…, 2012
Secure bootstrapping of cloud-managed ubiquitous displays
M Sethi, E Oat, M Di Francesco, T Aura
Proceedings of the 2014 ACM International Joint Conference on Pervasive and†…, 2014
Commitment-based device pairing with synchronized drawing
M Sethi, M Antikainen, T Aura
2014 IEEE International Conference on Pervasive Computing and Communications†…, 2014
Secure Networking for Virtual Machines in the Cloud
M Komu, M Sethi, R Mallavarapu, H Oirola, R Khan, S Tarkoma
The 2012 International Workshop on Power and QoS Aware Computing(PQoSCom’12), 2012
Secure iot bootstrapping: A survey
M Sethi, B Sarikaya, D Garcia-Carrillo
draft-irtf-t2trg-secure-bootstrapping-00, Technical Report, 2021
Misbinding attacks on secure device pairing and bootstrapping
M Sethi, A Peltonen, T Aura
Proceedings of the 2019 ACM Asia Conference on Computer and Communications†…, 2019
RFC 8928: Address-Protected Neighbor Discovery for Low-Power and Lossy Networks
B Sarikaya, M Sethi, R Struik
RFC Editor, 2020
RFC 9140 Nimble Out-of-Band Authentication for EAP
T Aura, M Sethi, A Peltonen
Evaluation of Out-of-Band Channels for IoT Security
S Latvala, M Sethi, T Aura
SN Computer Science 1 (1), 18, 2020
Practical Considerations and Implementation Experiences in Securing Smart Object Networks
M Sethi, J Arkko, A Keranen, HM Rissanen
A survey of identifier–locator split addressing architectures
M Komu, M Sethi, N Beijar
Computer Science Review 17, 25-42, 2015
Communications system, a station, a controller of a light source, and methods therein for authenticating the station to access a network
M Sethi, M Mehrabi, L Wang
US Patent 10,594,680, 2020
Secure and low-power authentication for resource-constrained devices
M Sethi, P Kortoci, M Di Francesco, T Aura
2015 5th International Conference on the Internet of Things (IOT), 30-36, 2015
Methods and devices for bootstrapping of resource constrained devices
P Salmela, M Sethi, A Keršnen
US Patent 10,601,815, 2020
Security in smart object networks
M Sethi
Secure connections establishment
M Sethi, P Salmela
US Patent App. 15/529,539, 2017
Trash collection systems and methods
J Jimťnez, J Arkko, HM Back, A Keršnen, M Sethi
US Patent 11,373,148, 2022
Secure m2m cloud testbed
H Mahkonen, T Rinta-Aho, T Kauppinen, M Sethi, J Kjšllman, P Salmela, ...
Proceedings of the 19th annual international conference on Mobile computing†…, 2013
The system can't perform the operation now. Try again later.
Articles 1–20