Mohit Sethi

Orcid: 0000-0002-9730-1955

According to our database1, Mohit Sethi authored at least 25 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Machine Unlearning for Causal Inference.
CoRR, 2023

2022
Guidance for External Pre-Shared Key (PSK) Usage in TLS.
RFC, July, 2022

Handling Large Certificates and Long Certificate Chains in TLS-Based EAP Methods.
RFC, February, 2022

EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3.
RFC, February, 2022

Security Analysis of the Consumer Remote SIM Provisioning Protocol.
CoRR, 2022

2021
Nimble Out-of-Band Authentication for EAP (EAP-NOOB).
RFC, December, 2021

Secure Network Access Authentication for IoT Devices: EAP Framework vs. Individual Protocols.
IEEE Commun. Stand. Mag., 2021

2020
Address-Protected Neighbor Discovery for Low-Power and Lossy Networks.
RFC, November, 2020

Evaluation of Out-of-Band Channels for IoT Security.
SN Comput. Sci., 2020

Enterprise Security for the Internet of Things (IoT): Lightweight Bootstrapping with EAP-NOOB.
Sensors, 2020

Formal verification of misbinding attacks on secure device pairing and bootstrapping.
J. Inf. Secur. Appl., 2020

2019
Internet of Things (IoT) Security: State of the Art and Challenges.
RFC, April, 2019

Misbinding Attacks on Secure Device Pairing.
CoRR, 2019

Misbinding Attacks on Secure Device Pairing and Bootstrapping.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Practical Considerations and Implementation Experiences in Securing Smart Object Networks.
RFC, May, 2018

2016
Security for Ubiquitous Internet-Connected Smart Objects.
PhD thesis, 2016

Replication of web-based pervasive display applications.
Proceedings of the 5th ACM International Symposium on Pervasive Displays, 2016

2015
A survey of identifier-locator split addressing architectures.
Comput. Sci. Rev., 2015

Flexible Management of Cloud-Connected Digital Signage.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Secure and low-power authentication for resource-constrained devices.
Proceedings of the 5th International Conference on the Internet of Things, 2015

2014
Commitment-based device pairing with synchronized drawing.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2014

Secure bootstrapping of cloud-managed ubiquitous displays.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

2013
Secure M2M cloud testbed.
Proceedings of the 19th Annual International Conference on Mobile Computing and Networking, 2013

2012
End-to-end security for sleepy smart object networks.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Secure Networking for Virtual Machines in the Cloud.
Proceedings of the 2012 IEEE International Conference on Cluster Computing Workshops, 2012


  Loading...