From d90b35bdf9d4fc62f2ad61e54c8cb3e60afea481 Mon Sep 17 00:00:00 2001 From: Trolli Schmittlauch Date: Sat, 2 Jun 2018 18:57:33 +0200 Subject: [PATCH] preliminary basic paper structure --- .gitignore | 2 ++ main.tex | 63 +++++++++++++++++++++++++++++++++++++----------------- 2 files changed, 45 insertions(+), 20 deletions(-) diff --git a/.gitignore b/.gitignore index 8e9cb04..6e87b53 100644 --- a/.gitignore +++ b/.gitignore @@ -1,3 +1,5 @@ *.aux *.log *.synctex.gz +*.bbl +*.blg diff --git a/main.tex b/main.tex index 07e881e..02c7262 100755 --- a/main.tex +++ b/main.tex @@ -1,11 +1,18 @@ \documentclass[10pt,conference,final]{IEEEtran} -\usepackage[utf8]{inputenc} -\usepackage[T1]{fontenc} +\usepackage{ifxetex} +\ifxetex + \usepackage{fontspec} + \defaultfontfeatures{Ligatures=TeX} % To support LaTeX quoting style + %\setromanfont{Vollkorn} +\else + \usepackage[T1]{fontenc} + \usepackage[utf8]{inputenc} +\fi \usepackage{clrscode} \usepackage{xcolor} -\usepackage[pdftex]{graphicx} +\usepackage[luatex]{graphicx} \newcommand{\comment}[1]{{\parindent0pt\fbox{\begin{minipage}{0.45\textwidth}{\em #1}\end{minipage}}}} \newenvironment{changed}{\red}{\color{black}} @@ -18,7 +25,7 @@ } %\renewcommand{\Hide}[1]{} -\newcommand{\documenttitle}{This is a title} +\newcommand{\documenttitle}{An ETSI look at the State of the Art of pseudonym scheme in the vehicles to something (V2X) communication} \begin{document} @@ -29,22 +36,21 @@ % % % % In case of double blind submissions: -%\author{ -% \IEEEauthorblockN{Anonymous} -% \IEEEauthorblockA{Some Research Group\\ -% Some Institution\\ -% Some Email Addresses% -% } -%} - \author{ - \IEEEauthorblockN{Author 1 ~ and ~ Author 2 ~ and ~ Author 3} - \IEEEauthorblockA{P2P Networks\\ - TU Darmstadt\\ - $[$login1, login2, login3$][$at$]$cs.tu-darmstadt.de% - } + \IEEEauthorblockN{Anonymous} + \IEEEauthorblockA{Some Research Group\\ + Some Institution\\ + Some Email Addresses% + } } +%\author{ +% \IEEEauthorblockN{Oliver Schmidt} +% \IEEEauthorblockA{TU Dresden\\ +% oliver.schmidt3$[$at$]$mailbox.tu-dresden.de% +% } +%} + \maketitle @@ -73,13 +79,13 @@ % Are NOT: Peer-To-Peer, Anonymity, Privacy. % BUT TAKEN FROM THIS LIST: % http://www.ieee.org/organizations/pubs/ani_prod/keywrd98.txt -Networks, Distributed Computing, Distributed Control, Availability, Security +Networks, Intelligent transportation systems, Security, Mesh networks, Privacy \end{IEEEkeywords} % } -\maketitle +%\maketitle -%\IEEEpeerreviewmaketitle +\IEEEpeerreviewmaketitle \section{Introduction} @@ -124,6 +130,23 @@ Networks, Distributed Computing, Distributed Control, Availability, Security \section{Background} \label{sec:background} +\subsection{ITS Architecture} + +\subsection{Identifiers} + +\section{Pseudonym Schemes} + +\subsection{Pseudonym Schemes for ETSI ITS Systems} + +\subsection{Pseudonym Change Strategies} + +\subsection{Further Pseudonym Techniques} + +\section{Evaluation} + +\subsection{Attacker Model} + +\section{Summary} % % % % Theory (probably)