C
Christophe Gustave
Researcher at Alcatel-Lucent
Publications - 33
Citations - 663
Christophe Gustave is an academic researcher from Alcatel-Lucent. The author has contributed to research in topics: Authentication & Wireless network. The author has an hindex of 13, co-authored 33 publications receiving 662 citations. Previous affiliations of Christophe Gustave include Bell Labs.
Papers
More filters
Patent
Information system service-level security risk analysis
TL;DR: In this article, a service-level security risk analysis system, methods, and Graphical User Interfaces (GUI) is described, and at least one security risk to the service is determined by analyzing security vulnerabilities associated with the identified assets.
Patent
Verifying authenticity of webpages
TL;DR: A certificate registry system is configured to issue authentication certificates issued to each one of a plurality of information providers and to maintain a root certificate corresponding to all of the authentication certificates as mentioned in this paper.
Patent
Security vulnerability information aggregation
TL;DR: In this article, security vulnerability information aggregation techniques are disclosed, where the vulnerability information associated with one or more security vulnerabilities is obtained from multiple sources and aggregated into respective unified vulnerability definitions.
Patent
Method of authenticating a mobile network node in establishing a peer-to-peer secure context between a pair of communicating mobile network nodes
TL;DR: In this article, the authors presented a method for authenticating peer mobile network nodes for establishing a secure peer-to-peer communications context in an ad-hoc network, by accessing wireless infrastructure network entities at low bandwidth and for a short time duration.
Patent
Application of cut-sets to network interdependency security risk assessment
Douglas Wiemer,Jean-Marc Robert,Bradley Kenneth Mcfarlane,Christophe Gustave,Stanley T. Chow,Jian Tang +5 more
TL;DR: In this paper, a threat and risk analysis for a network that has a high degree of inter-relationships and interdependencies among the assets comprising it, using a "cut set" enumeration method, is presented.