A Pauper’s Callback Scheme
- M. Bishop, “A Pauper’s Callback Scheme,”
Computers & Security 5(2)
pp. 141–144 (June 1986). doi: 10.1016/0167-4048(86)90137-9.
This paper discusses the implementation of callback schema in software, including a protocol for having one computer call another, and describes two methods to authenticate users without sending passwords over a telephone line. This decreases the probability of a wiretapper obtaining a valid user password.