Network slice management M Opsenica, J Arkko, HM Back, T Mecklin, G Rune, M Sethi, L Wang US Patent App. 14/787,900, 2017 | 104 | 2017 |
Internet of Things (IoT) security: State of the art and challenges O Garcia-Morchon, S Kumar, M Sethi | 88* | 2019 |
End-to-end security for sleepy smart object networks M Sethi, J Arkko, A Keranen Local Computer Networks Workshops (LCN Workshops), 2012 IEEE 37th Conference …, 2012 | 82 | 2012 |
Commitment-based device pairing with synchronized drawing M Sethi, M Antikainen, T Aura 2014 IEEE International Conference on Pervasive Computing and Communications …, 2014 | 40 | 2014 |
Secure bootstrapping of cloud-managed ubiquitous displays M Sethi, E Oat, M Di Francesco, T Aura Proceedings of the 2014 ACM International Joint Conference on Pervasive and …, 2014 | 39 | 2014 |
Secure Networking for Virtual Machines in the Cloud M Komu, M Sethi, R Mallavarapu, H Oirola, R Khan, S Tarkoma The 2012 International Workshop on Power and QoS Aware Computing(PQoSCom’12), 2012 | 33 | 2012 |
Secure iot bootstrapping: A survey M Sethi, B Sarikaya, D Garcia-Carillo draft-irtf-t2trg-secure-bootstrapping-00, Technical Report, 2021 | 31* | 2021 |
RFC 8928: Address-Protected Neighbor Discovery for Low-Power and Lossy Networks B Sarikaya, M Sethi, R Struik RFC Editor, 2020 | 30* | 2020 |
Misbinding attacks on secure device pairing and bootstrapping M Sethi, A Peltonen, T Aura Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019 | 29 | 2019 |
Evaluation of Out-of-Band Channels for IoT Security S Latvala, M Sethi, T Aura SN Computer Science 1 (1), 18, 2020 | 27 | 2020 |
RFC 9140 Nimble Out-of-Band Authentication for EAP T Aura, M Sethi, A Peltonen | 25* | 2021 |
Practical Considerations and Implementation Experiences in Securing Smart Object Networks M Sethi, J Arkko, A Keranen, HM Rissanen | 23 | 2018 |
A survey of identifier–locator split addressing architectures M Komu, M Sethi, N Beijar Computer Science Review 17, 25-42, 2015 | 20 | 2015 |
Communications system, a station, a controller of a light source, and methods therein for authenticating the station to access a network M Sethi, M Mehrabi, L Wang US Patent 10,594,680, 2020 | 16 | 2020 |
Methods and devices for bootstrapping of resource constrained devices P Salmela, M Sethi, A Keränen US Patent 10,601,815, 2020 | 15 | 2020 |
Secure and low-power authentication for resource-constrained devices M Sethi, P Kortoci, M Di Francesco, T Aura 2015 5th International Conference on the Internet of Things (IOT), 30-36, 2015 | 15 | 2015 |
Security in smart object networks M Sethi | 12 | 2012 |
Trash collection systems and methods J Jiménez, J Arkko, HM Back, A Keränen, M Sethi US Patent 11,373,148, 2022 | 11 | 2022 |
Secure connections establishment M Sethi, P Salmela US Patent App. 15/529,539, 2017 | 11 | 2017 |
Secure m2m cloud testbed H Mahkonen, T Rinta-Aho, T Kauppinen, M Sethi, J Kjällman, P Salmela, ... Proceedings of the 19th annual international conference on Mobile computing …, 2013 | 10 | 2013 |