buildable with lualatex, titlepage solved

master
Trolli Schmittlauch 2018-07-15 14:26:55 +02:00
parent e9b6ad4570
commit b20923ab31
1 changed files with 31 additions and 14 deletions

View File

@ -1,4 +1,5 @@
% $Header$
% use lualatex for compilation
\documentclass[aspectratio=169]{beamer}
@ -25,36 +26,41 @@
\mode<presentation>
{
\usetheme[cd2018,beamerfonts,noddc,navbar]{tud}
\usetheme[cd2018,noddc,navbar,darktitlepage]{tud}
\usecolortheme{tud}
% or ...
%\setbeamercovered{transparent}
% or whatever (possibly just delete it)
}
% notes on 2nd screen:
\usepackage{pgfpages}
%\setbeameroption{show notes on second screen}
\usepackage[english]{babel}
% or whatever
\usepackage[latin1]{inputenc}
% or whatever
\usepackage{ifluatex}
\usepackage{times}
\usepackage[T1]{fontenc}
\ifluatex
\usepackage{fontspec}
\else
%\usepackage[T1]{fontenc}
%\usepackage[latin1]{inputenc}
% Or whatever. Note that the encoding and the font should match. If T1
% does not look nice, try deleting the line with the fontenc.
\fi
\usepackage{times}
\usepackage{cite}
\usepackage{tikz}
\title[Pseudonym Schemes in ETSI V2X communication] % (optional, use only with long paper titles)
{An ETSI look at the State of the Art of pseudonym
schemes in Vehicle-to-Everything (V2X)
communication}
\subtitle
{Include Only If Paper Has a Subtitle}
\author
{Oliver Schmidt}
% - Give the names in the same order as the appear in the paper.
@ -106,9 +112,8 @@ communication}
\begin{document}
\begin{frame}
\titlepage
\end{frame}
\maketitle
\begin{frame}{Outline}
\tableofcontents
@ -244,7 +249,19 @@ communication}
\subsection{More Advanced Pseudonym Schemes}
\begin{frame}{Make Titles Informative.}
\begin{frame}{Advanced Cryptographic Pseudonym Schemes}
\begin{itemize}
\item ETSI standard uses PKI certificate-based pseudonyms
\item other approaches: \note{all of them have their challenges}
\begin{itemize}
\item identity-based cryptography
\item group signature schemes
\item symmetric MACs
\end{itemize}
\end{itemize}
\end{frame}
\subsection{Evaluation}
@ -266,7 +283,7 @@ communication}
\textbf{attacker} & \textbf{possible countermeasures} \\ \hline
multi-point passive outsider & 3-segment pseudonym change \\ \hline
global passive outsider & cooperative pseudonym change: silent periods or (cryptographic) mix zones \\ \hline
active insider & resistance against pseudonym depletion (e.g. pseudonym reuse) \\ \hline
active attacker & resistance against pseudonym depletion (e.g. pseudonym reuse) \\ \hline
attacking infrastructure & frequent cooperative pseudonym change with real silent periods \\
\end{tabular}