Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A pauper’s callback scheme
Bishop M. Computers and Security5 (2):141-144,1986.Type:Article
Date Reviewed: Mar 1 1987

This short paper contains two sections. The first suggests that a callback modem can be replaced by a program in which a caller can specify the phone number to be called. This seems to defeat the very purpose of callback modems, however, which is to prevent an unauthorized user, who may have captured a password, from signing on. The second section reviews some other work regarding authentication protocols that does not seem to relate to the suggestion in the first section. In summary, the paper does not seem to offer any new and useful ideas.

Reviewer:  Glenn H. MacEwen Review #: CR123332
Bookmark and Share
 
Authentication (D.4.6 ... )
 
 
Schema And Subschema (H.2.1 ... )
 
 
Security and Protection (C.2.0 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Authentication": Date
Showing credentials without identification: transferring signatures between unconditionally unlinkable pseudonyms
Chaum D. (ed)  Advances in cryptology (, Sydney, Australia, Jan 8-11, 1990)2641990. Type: Proceedings
Jan 1 1992
Some constructions and bounds for authentication codes
Stinson D.  Advances in cryptology--CRYPTO ’86 (, Santa Barbara, CA, Aug 11-15, 1987)4251987. Type: Proceedings
Sep 1 1988
A taxonomy of computer program security flaws
Landwehr C. (ed), Bull A., McDermott J., Choi W. ACM Computing Surveys 26(3): 211-254, 1994. Type: Article
May 1 1995
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy