preliminary basic paper structure

This commit is contained in:
Trolli Schmittlauch 2018-06-02 18:57:33 +02:00
parent f0dc3fd7b5
commit d90b35bdf9
2 changed files with 45 additions and 20 deletions

2
.gitignore vendored
View file

@ -1,3 +1,5 @@
*.aux
*.log
*.synctex.gz
*.bbl
*.blg

View file

@ -1,11 +1,18 @@
\documentclass[10pt,conference,final]{IEEEtran}
\usepackage[utf8]{inputenc}
\usepackage[T1]{fontenc}
\usepackage{ifxetex}
\ifxetex
\usepackage{fontspec}
\defaultfontfeatures{Ligatures=TeX} % To support LaTeX quoting style
%\setromanfont{Vollkorn}
\else
\usepackage[T1]{fontenc}
\usepackage[utf8]{inputenc}
\fi
\usepackage{clrscode}
\usepackage{xcolor}
\usepackage[pdftex]{graphicx}
\usepackage[luatex]{graphicx}
\newcommand{\comment}[1]{{\parindent0pt\fbox{\begin{minipage}{0.45\textwidth}{\em #1}\end{minipage}}}}
\newenvironment{changed}{\red}{\color{black}}
@ -18,7 +25,7 @@
}
%\renewcommand{\Hide}[1]{}
\newcommand{\documenttitle}{This is a title}
\newcommand{\documenttitle}{An ETSI look at the State of the Art of pseudonym scheme in the vehicles to something (V2X) communication}
\begin{document}
@ -29,22 +36,21 @@
% % %
% In case of double blind submissions:
%\author{
% \IEEEauthorblockN{Anonymous}
% \IEEEauthorblockA{Some Research Group\\
% Some Institution\\
% Some Email Addresses%
% }
%}
\author{
\IEEEauthorblockN{Author 1 ~ and ~ Author 2 ~ and ~ Author 3}
\IEEEauthorblockA{P2P Networks\\
TU Darmstadt\\
$[$login1, login2, login3$][$at$]$cs.tu-darmstadt.de%
}
\IEEEauthorblockN{Anonymous}
\IEEEauthorblockA{Some Research Group\\
Some Institution\\
Some Email Addresses%
}
}
%\author{
% \IEEEauthorblockN{Oliver Schmidt}
% \IEEEauthorblockA{TU Dresden\\
% oliver.schmidt3$[$at$]$mailbox.tu-dresden.de%
% }
%}
\maketitle
@ -73,13 +79,13 @@
% Are NOT: Peer-To-Peer, Anonymity, Privacy.
% BUT TAKEN FROM THIS LIST:
% http://www.ieee.org/organizations/pubs/ani_prod/keywrd98.txt
Networks, Distributed Computing, Distributed Control, Availability, Security
Networks, Intelligent transportation systems, Security, Mesh networks, Privacy
\end{IEEEkeywords}
% }
\maketitle
%\maketitle
%\IEEEpeerreviewmaketitle
\IEEEpeerreviewmaketitle
\section{Introduction}
@ -124,6 +130,23 @@ Networks, Distributed Computing, Distributed Control, Availability, Security
\section{Background}
\label{sec:background}
\subsection{ITS Architecture}
\subsection{Identifiers}
\section{Pseudonym Schemes}
\subsection{Pseudonym Schemes for ETSI ITS Systems}
\subsection{Pseudonym Change Strategies}
\subsection{Further Pseudonym Techniques}
\section{Evaluation}
\subsection{Attacker Model}
\section{Summary}
% % %
% Theory (probably)