preliminary basic paper structure
This commit is contained in:
parent
f0dc3fd7b5
commit
d90b35bdf9
2
.gitignore
vendored
2
.gitignore
vendored
|
@ -1,3 +1,5 @@
|
|||
*.aux
|
||||
*.log
|
||||
*.synctex.gz
|
||||
*.bbl
|
||||
*.blg
|
||||
|
|
63
main.tex
63
main.tex
|
@ -1,11 +1,18 @@
|
|||
\documentclass[10pt,conference,final]{IEEEtran}
|
||||
|
||||
\usepackage[utf8]{inputenc}
|
||||
\usepackage[T1]{fontenc}
|
||||
\usepackage{ifxetex}
|
||||
\ifxetex
|
||||
\usepackage{fontspec}
|
||||
\defaultfontfeatures{Ligatures=TeX} % To support LaTeX quoting style
|
||||
%\setromanfont{Vollkorn}
|
||||
\else
|
||||
\usepackage[T1]{fontenc}
|
||||
\usepackage[utf8]{inputenc}
|
||||
\fi
|
||||
|
||||
\usepackage{clrscode}
|
||||
\usepackage{xcolor}
|
||||
\usepackage[pdftex]{graphicx}
|
||||
\usepackage[luatex]{graphicx}
|
||||
|
||||
\newcommand{\comment}[1]{{\parindent0pt\fbox{\begin{minipage}{0.45\textwidth}{\em #1}\end{minipage}}}}
|
||||
\newenvironment{changed}{\red}{\color{black}}
|
||||
|
@ -18,7 +25,7 @@
|
|||
}
|
||||
%\renewcommand{\Hide}[1]{}
|
||||
|
||||
\newcommand{\documenttitle}{This is a title}
|
||||
\newcommand{\documenttitle}{An ETSI look at the State of the Art of pseudonym scheme in the vehicles to something (V2X) communication}
|
||||
|
||||
\begin{document}
|
||||
|
||||
|
@ -29,22 +36,21 @@
|
|||
|
||||
% % %
|
||||
% In case of double blind submissions:
|
||||
%\author{
|
||||
% \IEEEauthorblockN{Anonymous}
|
||||
% \IEEEauthorblockA{Some Research Group\\
|
||||
% Some Institution\\
|
||||
% Some Email Addresses%
|
||||
% }
|
||||
%}
|
||||
|
||||
\author{
|
||||
\IEEEauthorblockN{Author 1 ~ and ~ Author 2 ~ and ~ Author 3}
|
||||
\IEEEauthorblockA{P2P Networks\\
|
||||
TU Darmstadt\\
|
||||
$[$login1, login2, login3$][$at$]$cs.tu-darmstadt.de%
|
||||
}
|
||||
\IEEEauthorblockN{Anonymous}
|
||||
\IEEEauthorblockA{Some Research Group\\
|
||||
Some Institution\\
|
||||
Some Email Addresses%
|
||||
}
|
||||
}
|
||||
|
||||
%\author{
|
||||
% \IEEEauthorblockN{Oliver Schmidt}
|
||||
% \IEEEauthorblockA{TU Dresden\\
|
||||
% oliver.schmidt3$[$at$]$mailbox.tu-dresden.de%
|
||||
% }
|
||||
%}
|
||||
|
||||
|
||||
\maketitle
|
||||
|
||||
|
@ -73,13 +79,13 @@
|
|||
% Are NOT: Peer-To-Peer, Anonymity, Privacy.
|
||||
% BUT TAKEN FROM THIS LIST:
|
||||
% http://www.ieee.org/organizations/pubs/ani_prod/keywrd98.txt
|
||||
Networks, Distributed Computing, Distributed Control, Availability, Security
|
||||
Networks, Intelligent transportation systems, Security, Mesh networks, Privacy
|
||||
\end{IEEEkeywords}
|
||||
% }
|
||||
|
||||
\maketitle
|
||||
%\maketitle
|
||||
|
||||
%\IEEEpeerreviewmaketitle
|
||||
\IEEEpeerreviewmaketitle
|
||||
|
||||
\section{Introduction}
|
||||
|
||||
|
@ -124,6 +130,23 @@ Networks, Distributed Computing, Distributed Control, Availability, Security
|
|||
\section{Background}
|
||||
\label{sec:background}
|
||||
|
||||
\subsection{ITS Architecture}
|
||||
|
||||
\subsection{Identifiers}
|
||||
|
||||
\section{Pseudonym Schemes}
|
||||
|
||||
\subsection{Pseudonym Schemes for ETSI ITS Systems}
|
||||
|
||||
\subsection{Pseudonym Change Strategies}
|
||||
|
||||
\subsection{Further Pseudonym Techniques}
|
||||
|
||||
\section{Evaluation}
|
||||
|
||||
\subsection{Attacker Model}
|
||||
|
||||
\section{Summary}
|
||||
% % %
|
||||
% Theory (probably)
|
||||
|
||||
|
|
Loading…
Reference in a new issue