Mohit Sethi

Postdoctoral Researcher

Research outputs

  1. 2019
  2. Published

    Misbinding attacks on secure device pairing and bootstrapping

    Sethi, M., Peltonen, A. & Aura, T., 2 Jul 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. p. 453-464 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  3. 2016
  4. Published

    A Communications System, A Station, A Controller Of A Light Source, And Methods Therein For Authenticating The Station To Access A Network

    Mehrabi, M., Wang, L. & Sethi, M., 24 Nov 2016, IPC No. H04W 84/ 12 A I, Patent No. WO2016186539, Priority date 19 May 2015, Priority No. WO2015SE50566

    Research output: PatentScientific

  5. Published

    Methods And Devices For Bootstrapping Of Resource Constrained Devices

    Salmela, P., Sethi, M. & Keränen, A., 6 Oct 2016, IPC No. H04W 12/ 04 A I, Patent No. US2016294819, Priority date 15 Nov 2013, Priority No. WO2013SE51344

    Research output: PatentScientific

  6. Published

    Methods and Nodes for Mapping Subscription to Service User Identity

    Salmela, P., Lehtovirta, V. & Sethi, M., 29 Sep 2016, IPC No. H04L 29/ 08 A I, Patent No. US2016286378, Priority date 15 Aug 2014, Priority No. WO2014SE50939

    Research output: PatentScientific

  7. Published

    Establishing a Secure Connection between a Master Device and a Slave Device

    Sethi, M. & Salmela, P., 11 Aug 2016, IPC No. H04W 12/ 06 A I, Patent No. US2016234214, Priority date 15 Oct 2013, Priority No. WO2013SE51205

    Research output: PatentScientific

  8. Published

    Replication of web-based pervasive display applications

    Montoya Freire, M. L., Tatiraju, V. P., Sethi, M. & Di Francesco, M., 20 Jun 2016, PerDis 2016 - Proceedings of the 5th ACM International Symposium on Pervasive Displays. p. 204-211 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  9. Published

    Security for Ubiquitous Internet-Connected Smart Objects

    Sethi, M., 2016, Aalto University. 182 p.

    Research output: ThesisDoctoral ThesisCollection of Articles

  10. 2015
  11. Published

    A survey of identifier-locator split addressing architectures

    Komu, M., Sethi, M. & Beijar, N., 1 Aug 2015, In : Computer Science Review. 17, p. 25-42 18 p.

    Research output: Contribution to journalReview ArticleScientificpeer-review

  12. Published

    Commitment-based device-pairing protocol with synchronized drawings and comparison metrics

    Antikainen, M., Sethi, M., Matetic, S. & Aura, T., 2015, In : Pervasive and Mobile Computing. 16, Part B, p. 205-219

    Research output: Contribution to journalArticleScientificpeer-review

  13. Published

    Flexible Management of Cloud-Connected Digital Signage

    Sethi, M., Lijding, M., Di Francesco, M. & Aura, T., 2015, 12th IEEE International Conference on Ubiquitous Intelligence and Computing (UIC), Beijing, China, 10-14 August 2015. IEEE, p. 205-212

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  14. Published

    Secure and Low-Power Authentication for Resource-Constrained Devices

    Sethi, M., Kortoci, P., Di Francesco, M. & Aura, T., 2015, 5th International Conference on the Internet of Things (IoT), 26-28 October 2015, Seoul, South Korea. p. 30-36

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  15. 2014
  16. Published

    Commitment-based device pairing with synchronized drawing

    Sethi, M., Antikainen, M. & Aura, T., 2014, IEEE International Conference on Pervasive Computing and Communications (PerCom 2014), Budapest, Hungary, March 24-28, 2014. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  17. Published

    Secure Bootstrapping of Cloud-Managed Ubiquitous Displays

    Sethi, M., Oat, E., Di Francesco, M. & Aura, T., 2014, The 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2014), Seattle, WA, USA. p. 739-750

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  18. 2013
  19. Published

    Demo: Secure M2M cloud testbed

    Mahkonen, H., Rinta-Aho, T., Kauppinen, T., Sethi, M., Kjällman, J., Salmela, P. & Jokikyyny, T., 11 Nov 2013, MobiCom 2013 - Proceedings of the 19th Annual International Conference on Mobile Computing and Networking. p. 135-138 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  20. 2012
  21. Published

    End-to-end security for sleepy smart object networks

    Sethi, M., Arkko, J. & Keranen, A., 2012, 2012 IEEE 37th Conference on Local Computer Networks Workshops, LCN Workshops 2012. p. 964-972 9 p. 6424089

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  22. Published

    Secure Networking for Virtual Machines in the Cloud

    Komu, M., Sethi, M., Mallavarapu, R., Oirola, H., Khan, R. & Tarkoma, S., 2012, International Workshop on Power and QoS Aware Computing (PQoSCom2012), in IEEE International Conference on Cluster Computing, Beijing, September 2012. IEEE Computer Society

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

ID: 4763695