关注
Mohit Sethi
Mohit Sethi
Ericsson Finland, Aalto University Finland, KTH Sweden
在 aalto.fi 的电子邮件经过验证
标题
引用次数
引用次数
年份
Network slice management
M Opsenica, J Arkko, HM Back, T Mecklin, G Rune, M Sethi, L Wang
US Patent App. 14/787,900, 2017
1042017
Internet of Things (IoT) security: State of the art and challenges
O Garcia-Morchon, S Kumar, M Sethi
88*2019
End-to-end security for sleepy smart object networks
M Sethi, J Arkko, A Keranen
Local Computer Networks Workshops (LCN Workshops), 2012 IEEE 37th Conference …, 2012
822012
Commitment-based device pairing with synchronized drawing
M Sethi, M Antikainen, T Aura
2014 IEEE International Conference on Pervasive Computing and Communications …, 2014
402014
Secure bootstrapping of cloud-managed ubiquitous displays
M Sethi, E Oat, M Di Francesco, T Aura
Proceedings of the 2014 ACM International Joint Conference on Pervasive and …, 2014
392014
Secure Networking for Virtual Machines in the Cloud
M Komu, M Sethi, R Mallavarapu, H Oirola, R Khan, S Tarkoma
The 2012 International Workshop on Power and QoS Aware Computing(PQoSCom’12), 2012
332012
Secure iot bootstrapping: A survey
M Sethi, B Sarikaya, D Garcia-Carillo
draft-irtf-t2trg-secure-bootstrapping-00, Technical Report, 2021
31*2021
RFC 8928: Address-Protected Neighbor Discovery for Low-Power and Lossy Networks
B Sarikaya, M Sethi, R Struik
RFC Editor, 2020
30*2020
Misbinding attacks on secure device pairing and bootstrapping
M Sethi, A Peltonen, T Aura
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
292019
Evaluation of Out-of-Band Channels for IoT Security
S Latvala, M Sethi, T Aura
SN Computer Science 1 (1), 18, 2020
272020
RFC 9140 Nimble Out-of-Band Authentication for EAP
T Aura, M Sethi, A Peltonen
25*2021
Practical Considerations and Implementation Experiences in Securing Smart Object Networks
M Sethi, J Arkko, A Keranen, HM Rissanen
232018
A survey of identifier–locator split addressing architectures
M Komu, M Sethi, N Beijar
Computer Science Review 17, 25-42, 2015
202015
Communications system, a station, a controller of a light source, and methods therein for authenticating the station to access a network
M Sethi, M Mehrabi, L Wang
US Patent 10,594,680, 2020
162020
Methods and devices for bootstrapping of resource constrained devices
P Salmela, M Sethi, A Keränen
US Patent 10,601,815, 2020
152020
Secure and low-power authentication for resource-constrained devices
M Sethi, P Kortoci, M Di Francesco, T Aura
2015 5th International Conference on the Internet of Things (IOT), 30-36, 2015
152015
Security in smart object networks
M Sethi
122012
Trash collection systems and methods
J Jiménez, J Arkko, HM Back, A Keränen, M Sethi
US Patent 11,373,148, 2022
112022
Secure connections establishment
M Sethi, P Salmela
US Patent App. 15/529,539, 2017
112017
Secure m2m cloud testbed
H Mahkonen, T Rinta-Aho, T Kauppinen, M Sethi, J Kjällman, P Salmela, ...
Proceedings of the 19th annual international conference on Mobile computing …, 2013
102013
系统目前无法执行此操作,请稍后再试。
文章 1–20