Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Andrew P. Wyskida is active.

Publication


Featured researches published by Andrew P. Wyskida.


Ibm Journal of Research and Development | 2013

Mobile optimized digital identity (MODI): a framework for easier digital certificate use

Colm Malone; Eric J. Barkie; Benjamin L. Fletcher; N. Wei; A. Keren; Andrew P. Wyskida

Traditional authentication methods such as passwords no longer meet all the security requirements of todays enterprise. Digital certificates provide a much more secure, resilient alternative solution. However, digital certificates are cumbersome to use for an end-user and are complex to implement for a resource provider. In this paper, we describe the Mobile Optimized Digital Identity (MODI) framework, which aims to solve the logistical issues of using certificates as an authentication method for both the end-user and the resource provider. The MODI framework consists of three tightly integrated components that work in concert: a mobile device application (MDA), an authentication toolkit, and a trusted third-party the security broker (SB). With a dedicated MODI MDA, certificate deployment, maintenance, and use are greatly simplified for the end-user. The MODI authentication toolkit enables resource providers to easily integrate with the framework, thus shielding developers from needing any knowledge of digital certificates and their implementation. Using mobile devices, the end-user authentication tool allows the MODI solution to expand its scope beyond conventional network access to novel physical access scenarios with the aid of proximity scanning technologies such as near-field communication (NFC).


Archive | 2013

Authentication in virtual private networks

Eric J. Barkie; Benjamin L. Fletcher; Marco Pistoia; John Ponzo; Andrew P. Wyskida


Archive | 2010

SECURE ACCESS TO A PRIVATE NETWORK THROUGH A PUBLIC WIRELESS NETWORK

Marc Segre; Andrew P. Wyskida


Archive | 2011

Systems and methods for generating and validating configuration files for computing devices

Eric J. Barkie; Gary Thomas Leonardi; Andrew P. Wyskida


Archive | 2013

Enhancing directory service authentication and authorization using contextual information

Eric J. Barkie; Benjamin L. Fletcher; Colm Malone; Andrew P. Wyskida


Archive | 2011

SYSTEMS AND METHODS FOR ESTABLISHING SECURE VIRTUAL PRIVATE NETWORK COMMUNICATIONS USING NON-PRIVILEGED VPN CLIENT

Eric J. Barkie; Benjamin L. Fletcher; Andrew P. Wyskida


Archive | 2014

CONTEMPORANEOUS GESTURE AND KEYBOARD ENTRY AUTHENTICATION

Lorraine M. Herger; Neal M. Keller; James R. Kozloski; Matthew A. McCarthy; Clifford A. Pickover; Andrew P. Wyskida


Archive | 2017

EMAIL CHAIN NAVIGATION

Lorraine M. Herger; Neal M. Keller; James R. Kozloski; Matthew A. McCarthy; Clifford A. Pickover; Andrew P. Wyskida


Archive | 2015

USER AUTHENTICATION RELYING ON RECURRING PUBLIC EVENTS FOR SHARED SECRETS

Eric J. Barkie; Benjamin L. Fletcher; Andrew P. Wyskida


Archive | 2012

SYSTEM AND METHOD FOR SAFEGUARDING WAFERS AND PHOTOMASKS

Paul D. Hand; George M. Harmuth; Gary Thomas Leonardi; Glenn M. Stefanski; Andrew P. Wyskida

Researchain Logo
Decentralizing Knowledge