Presentation Information
[D-19-01]Authentication methods using the changes of configuration information
○Hiroaki Ohtsuka1, Naoto Fujiki1, Kensuke Nakata1, Yukio Nagafuchi1, Ryota Sato1, Takuya Minami1, Yoshiaki Nakajima1 (1. NTT Social Informatics Laboratories)
Keywords:
Authentication,Configuration information,SBOM(Software Bill of Materials)