TY - JOUR T1 - A Pauper's Callback Scheme JO - Computers & Security VL - 5 IS - 2 SP - 141 EP - 144 PY - 1986/6// T2 - AU - Bishop, Matt SN - 0167-4048 DO - 10.1016/0167-4048(86)90137-9 UR - http://www.sciencedirect.com/science/article/pii/0167404886901379 KW - challenge protocol KW - pass-algorithm KW - callback AB - This paper discusses the implementation of callback schema in software, including a protocol for having one computer call another, and describes two methods to authenticate users without sending passwords over a telephone line. This decreases the probability of a wiretapper obtaining a valid user password. ER -