buildable with lualatex, titlepage solved
This commit is contained in:
parent
e9b6ad4570
commit
b20923ab31
|
@ -1,4 +1,5 @@
|
||||||
% $Header$
|
% $Header$
|
||||||
|
% use lualatex for compilation
|
||||||
|
|
||||||
\documentclass[aspectratio=169]{beamer}
|
\documentclass[aspectratio=169]{beamer}
|
||||||
|
|
||||||
|
@ -25,36 +26,41 @@
|
||||||
|
|
||||||
\mode<presentation>
|
\mode<presentation>
|
||||||
{
|
{
|
||||||
\usetheme[cd2018,beamerfonts,noddc,navbar]{tud}
|
\usetheme[cd2018,noddc,navbar,darktitlepage]{tud}
|
||||||
|
\usecolortheme{tud}
|
||||||
% or ...
|
% or ...
|
||||||
|
|
||||||
%\setbeamercovered{transparent}
|
%\setbeamercovered{transparent}
|
||||||
% or whatever (possibly just delete it)
|
% or whatever (possibly just delete it)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
% notes on 2nd screen:
|
||||||
|
\usepackage{pgfpages}
|
||||||
|
%\setbeameroption{show notes on second screen}
|
||||||
|
|
||||||
\usepackage[english]{babel}
|
\usepackage[english]{babel}
|
||||||
% or whatever
|
% or whatever
|
||||||
|
|
||||||
\usepackage[latin1]{inputenc}
|
\usepackage{ifluatex}
|
||||||
% or whatever
|
|
||||||
|
|
||||||
\usepackage{times}
|
\ifluatex
|
||||||
\usepackage[T1]{fontenc}
|
\usepackage{fontspec}
|
||||||
|
|
||||||
|
\else
|
||||||
|
%\usepackage[T1]{fontenc}
|
||||||
|
%\usepackage[latin1]{inputenc}
|
||||||
% Or whatever. Note that the encoding and the font should match. If T1
|
% Or whatever. Note that the encoding and the font should match. If T1
|
||||||
% does not look nice, try deleting the line with the fontenc.
|
% does not look nice, try deleting the line with the fontenc.
|
||||||
|
\fi
|
||||||
|
|
||||||
|
\usepackage{times}
|
||||||
\usepackage{cite}
|
\usepackage{cite}
|
||||||
\usepackage{tikz}
|
|
||||||
|
|
||||||
\title[Pseudonym Schemes in ETSI V2X communication] % (optional, use only with long paper titles)
|
\title[Pseudonym Schemes in ETSI V2X communication] % (optional, use only with long paper titles)
|
||||||
{An ETSI look at the State of the Art of pseudonym
|
{An ETSI look at the State of the Art of pseudonym
|
||||||
schemes in Vehicle-to-Everything (V2X)
|
schemes in Vehicle-to-Everything (V2X)
|
||||||
communication}
|
communication}
|
||||||
|
|
||||||
\subtitle
|
|
||||||
{Include Only If Paper Has a Subtitle}
|
|
||||||
|
|
||||||
\author
|
\author
|
||||||
{Oliver Schmidt}
|
{Oliver Schmidt}
|
||||||
% - Give the names in the same order as the appear in the paper.
|
% - Give the names in the same order as the appear in the paper.
|
||||||
|
@ -106,9 +112,8 @@ communication}
|
||||||
|
|
||||||
\begin{document}
|
\begin{document}
|
||||||
|
|
||||||
\begin{frame}
|
\maketitle
|
||||||
\titlepage
|
|
||||||
\end{frame}
|
|
||||||
|
|
||||||
\begin{frame}{Outline}
|
\begin{frame}{Outline}
|
||||||
\tableofcontents
|
\tableofcontents
|
||||||
|
@ -244,7 +249,19 @@ communication}
|
||||||
|
|
||||||
\subsection{More Advanced Pseudonym Schemes}
|
\subsection{More Advanced Pseudonym Schemes}
|
||||||
|
|
||||||
\begin{frame}{Make Titles Informative.}
|
\begin{frame}{Advanced Cryptographic Pseudonym Schemes}
|
||||||
|
\begin{itemize}
|
||||||
|
\item ETSI standard uses PKI certificate-based pseudonyms
|
||||||
|
\item other approaches: \note{all of them have their challenges}
|
||||||
|
\begin{itemize}
|
||||||
|
\item identity-based cryptography
|
||||||
|
\item group signature schemes
|
||||||
|
\item symmetric MACs
|
||||||
|
\end{itemize}
|
||||||
|
|
||||||
|
\end{itemize}
|
||||||
|
|
||||||
|
|
||||||
\end{frame}
|
\end{frame}
|
||||||
|
|
||||||
\subsection{Evaluation}
|
\subsection{Evaluation}
|
||||||
|
@ -266,7 +283,7 @@ communication}
|
||||||
\textbf{attacker} & \textbf{possible countermeasures} \\ \hline
|
\textbf{attacker} & \textbf{possible countermeasures} \\ \hline
|
||||||
multi-point passive outsider & 3-segment pseudonym change \\ \hline
|
multi-point passive outsider & 3-segment pseudonym change \\ \hline
|
||||||
global passive outsider & cooperative pseudonym change: silent periods or (cryptographic) mix zones \\ \hline
|
global passive outsider & cooperative pseudonym change: silent periods or (cryptographic) mix zones \\ \hline
|
||||||
active insider & resistance against pseudonym depletion (e.g. pseudonym reuse) \\ \hline
|
active attacker & resistance against pseudonym depletion (e.g. pseudonym reuse) \\ \hline
|
||||||
attacking infrastructure & frequent cooperative pseudonym change with real silent periods \\
|
attacking infrastructure & frequent cooperative pseudonym change with real silent periods \\
|
||||||
|
|
||||||
\end{tabular}
|
\end{tabular}
|
||||||
|
|
Loading…
Reference in a new issue