Presentation Information

[D-19-01]Authentication methods using the changes of configuration information

○Hiroaki Ohtsuka1, Naoto Fujiki1, Kensuke Nakata1, Yukio Nagafuchi1, Ryota Sato1, Takuya Minami1, Yoshiaki Nakajima1 (1. NTT Social Informatics Laboratories)
PDF DownloadDownload PDF

Keywords:

Authentication,Configuration information,SBOM(Software Bill of Materials)