buildable with lualatex, titlepage solved
This commit is contained in:
parent
e9b6ad4570
commit
b20923ab31
|
@ -1,4 +1,5 @@
|
|||
% $Header$
|
||||
% use lualatex for compilation
|
||||
|
||||
\documentclass[aspectratio=169]{beamer}
|
||||
|
||||
|
@ -25,36 +26,41 @@
|
|||
|
||||
\mode<presentation>
|
||||
{
|
||||
\usetheme[cd2018,beamerfonts,noddc,navbar]{tud}
|
||||
\usetheme[cd2018,noddc,navbar,darktitlepage]{tud}
|
||||
\usecolortheme{tud}
|
||||
% or ...
|
||||
|
||||
%\setbeamercovered{transparent}
|
||||
% or whatever (possibly just delete it)
|
||||
}
|
||||
|
||||
% notes on 2nd screen:
|
||||
\usepackage{pgfpages}
|
||||
%\setbeameroption{show notes on second screen}
|
||||
|
||||
\usepackage[english]{babel}
|
||||
% or whatever
|
||||
|
||||
\usepackage[latin1]{inputenc}
|
||||
% or whatever
|
||||
\usepackage{ifluatex}
|
||||
|
||||
\usepackage{times}
|
||||
\usepackage[T1]{fontenc}
|
||||
\ifluatex
|
||||
\usepackage{fontspec}
|
||||
|
||||
\else
|
||||
%\usepackage[T1]{fontenc}
|
||||
%\usepackage[latin1]{inputenc}
|
||||
% Or whatever. Note that the encoding and the font should match. If T1
|
||||
% does not look nice, try deleting the line with the fontenc.
|
||||
\fi
|
||||
|
||||
\usepackage{times}
|
||||
\usepackage{cite}
|
||||
\usepackage{tikz}
|
||||
|
||||
\title[Pseudonym Schemes in ETSI V2X communication] % (optional, use only with long paper titles)
|
||||
{An ETSI look at the State of the Art of pseudonym
|
||||
schemes in Vehicle-to-Everything (V2X)
|
||||
communication}
|
||||
|
||||
\subtitle
|
||||
{Include Only If Paper Has a Subtitle}
|
||||
|
||||
\author
|
||||
{Oliver Schmidt}
|
||||
% - Give the names in the same order as the appear in the paper.
|
||||
|
@ -106,9 +112,8 @@ communication}
|
|||
|
||||
\begin{document}
|
||||
|
||||
\begin{frame}
|
||||
\titlepage
|
||||
\end{frame}
|
||||
\maketitle
|
||||
|
||||
|
||||
\begin{frame}{Outline}
|
||||
\tableofcontents
|
||||
|
@ -244,7 +249,19 @@ communication}
|
|||
|
||||
\subsection{More Advanced Pseudonym Schemes}
|
||||
|
||||
\begin{frame}{Make Titles Informative.}
|
||||
\begin{frame}{Advanced Cryptographic Pseudonym Schemes}
|
||||
\begin{itemize}
|
||||
\item ETSI standard uses PKI certificate-based pseudonyms
|
||||
\item other approaches: \note{all of them have their challenges}
|
||||
\begin{itemize}
|
||||
\item identity-based cryptography
|
||||
\item group signature schemes
|
||||
\item symmetric MACs
|
||||
\end{itemize}
|
||||
|
||||
\end{itemize}
|
||||
|
||||
|
||||
\end{frame}
|
||||
|
||||
\subsection{Evaluation}
|
||||
|
@ -266,7 +283,7 @@ communication}
|
|||
\textbf{attacker} & \textbf{possible countermeasures} \\ \hline
|
||||
multi-point passive outsider & 3-segment pseudonym change \\ \hline
|
||||
global passive outsider & cooperative pseudonym change: silent periods or (cryptographic) mix zones \\ \hline
|
||||
active insider & resistance against pseudonym depletion (e.g. pseudonym reuse) \\ \hline
|
||||
active attacker & resistance against pseudonym depletion (e.g. pseudonym reuse) \\ \hline
|
||||
attacking infrastructure & frequent cooperative pseudonym change with real silent periods \\
|
||||
|
||||
\end{tabular}
|
||||
|
|
Loading…
Reference in a new issue