A Pauper’s Callback Scheme



Bibliographic Information


This paper discusses the implementation of callback schema in software, including a protocol for having one computer call another, and describes two methods to authenticate users without sending passwords over a telephone line. This decreases the probability of a wiretapper obtaining a valid user password.

Copyright Notice

©1986 by Elsevier Science Ltd. The definitive version was published in Computers & Security 5(2), June 1986 and is available at 10.1016/0167-4048(86)90137-9.