scispace - formally typeset
C

Christophe Gustave

Researcher at Alcatel-Lucent

Publications -  33
Citations -  663

Christophe Gustave is an academic researcher from Alcatel-Lucent. The author has contributed to research in topics: Authentication & Wireless network. The author has an hindex of 13, co-authored 33 publications receiving 662 citations. Previous affiliations of Christophe Gustave include Bell Labs.

Papers
More filters
Patent

Information system service-level security risk analysis

TL;DR: In this article, a service-level security risk analysis system, methods, and Graphical User Interfaces (GUI) is described, and at least one security risk to the service is determined by analyzing security vulnerabilities associated with the identified assets.
Patent

Verifying authenticity of webpages

TL;DR: A certificate registry system is configured to issue authentication certificates issued to each one of a plurality of information providers and to maintain a root certificate corresponding to all of the authentication certificates as mentioned in this paper.
Patent

Security vulnerability information aggregation

TL;DR: In this article, security vulnerability information aggregation techniques are disclosed, where the vulnerability information associated with one or more security vulnerabilities is obtained from multiple sources and aggregated into respective unified vulnerability definitions.
Patent

Method of authenticating a mobile network node in establishing a peer-to-peer secure context between a pair of communicating mobile network nodes

TL;DR: In this article, the authors presented a method for authenticating peer mobile network nodes for establishing a secure peer-to-peer communications context in an ad-hoc network, by accessing wireless infrastructure network entities at low bandwidth and for a short time duration.
Patent

Application of cut-sets to network interdependency security risk assessment

TL;DR: In this paper, a threat and risk analysis for a network that has a high degree of inter-relationships and interdependencies among the assets comprising it, using a "cut set" enumeration method, is presented.