A Pauper’s Callback Scheme


Citation

Paper

Bibliographic Information

Abstract

This paper discusses the implementation of callback schema in software, including a protocol for having one computer call another, and describes two methods to authenticate users without sending passwords over a telephone line. This decreases the probability of a wiretapper obtaining a valid user password.