A Pauper’s Callback Scheme
- M. Bishop, “A Pauper’s Callback Scheme,”
Computers & Security 5(2)
pp. 141–144 (June 1986). DOI: 10.1016/0167-4048(86)90137-9.
This paper discusses the implementation of callback schema in software, including a protocol for having one computer call another, and describes two methods to authenticate users without sending passwords over a telephone line. This decreases the probability of a wiretapper obtaining a valid user password.
©1986 by Elsevier Science Ltd.
The definitive version was published in
Computers & Security 5
June 1986 and is available at 10.1016/0167-4048(86)90137-9