Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Christophe Gustave is active.

Publication


Featured researches published by Christophe Gustave.


new security paradigms workshop | 2008

Authenticated names

Stanley Taihai Chow; Christophe Gustave; Dmitri Vinokurov

Currently, most means of communication include some form of identification of the sender/originator, but none of these identifications are securely authenticated (at least not conveniently or in wide use). Legitimate business entities can be misrepresented by their name, and this creates opportunities for various scams known as phishing. We propose a new end-to-end authentication scheme that can be used to authenticate companies over many means of communication including telephony, email, web, and Instant Messaging. The framework is flexible and gives concerned legitimate institutions the ability to delegate their authenticated names to employees outside the office as well as outsourcing companies.


military communications conference | 2006

Situation Monitoring and Analysis of Security Risk for Networked Services

Stanley Taihai Chow; Christophe Gustave; Brad McFarlane; Douglas Wiemer; Jean-Marc Robert

This paper discusses a model of security situational analysis that allows for the effective prioritization of security vulnerabilities for action by operations. Key topics include the analysis of the application interdependence at all levels from within the individual systems to the higher level service or mission interdependence. The research associated with this paper is the result of collaboration between Alcatel and Defence R&D Canada (DRDC) under the Defence Industrial Research (DIR) Program. Alcatel would like to express its thanks to DRDC, an agency within the Department of National Defence, for its support and efforts


Archive | 2006

Information system service-level security risk analysis

Douglas Wiemer; Christophe Gustave; Stanley Taihai Chow; Bradley Kenneth Mcfarlane


Archive | 2004

Method of authenticating a mobile network node in establishing a peer-to-peer secure context between a pair of communicating mobile network nodes

Christophe Gustave; Vinod Kumar Choyi; Frederic Gariador


Archive | 2007

Verifying authenticity of webpages

Stanley Taihai Chow; Jeff Smith; Christophe Gustave


Archive | 2005

Mechanism to avoid expensive double-encryption in mobile networks

Christophe Gustave; Vinod Kumar Choyi; Mladen Gavrilovic


Archive | 2006

Application of cut-sets to network interdependency security risk assessment

Douglas Wiemer; Jean-Marc Robert; Bradley Kenneth Mcfarlane; Christophe Gustave; Stanley Taihai Chow; Jian Tang


Archive | 2008

Authentication of access points in wireless local area networks

Shu-Lin Chen; Stanley Taihai Chow; Christophe Gustave


Archive | 2007

Policy-enabled aggregation of IM User communities

Christophe Gustave; Brad McFarlane; Stanley Taihai Chow


Archive | 2007

On-demand authentication of call session party information during a telephone call

Stanley Taihai Chow; Vinod Kumar Choyi; Christophe Gustave; Dmitri Vinokurov

Collaboration


Dive into the Christophe Gustave's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge