preliminary basic paper structure
This commit is contained in:
parent
f0dc3fd7b5
commit
d90b35bdf9
2
.gitignore
vendored
2
.gitignore
vendored
|
@ -1,3 +1,5 @@
|
||||||
*.aux
|
*.aux
|
||||||
*.log
|
*.log
|
||||||
*.synctex.gz
|
*.synctex.gz
|
||||||
|
*.bbl
|
||||||
|
*.blg
|
||||||
|
|
59
main.tex
59
main.tex
|
@ -1,11 +1,18 @@
|
||||||
\documentclass[10pt,conference,final]{IEEEtran}
|
\documentclass[10pt,conference,final]{IEEEtran}
|
||||||
|
|
||||||
\usepackage[utf8]{inputenc}
|
\usepackage{ifxetex}
|
||||||
|
\ifxetex
|
||||||
|
\usepackage{fontspec}
|
||||||
|
\defaultfontfeatures{Ligatures=TeX} % To support LaTeX quoting style
|
||||||
|
%\setromanfont{Vollkorn}
|
||||||
|
\else
|
||||||
\usepackage[T1]{fontenc}
|
\usepackage[T1]{fontenc}
|
||||||
|
\usepackage[utf8]{inputenc}
|
||||||
|
\fi
|
||||||
|
|
||||||
\usepackage{clrscode}
|
\usepackage{clrscode}
|
||||||
\usepackage{xcolor}
|
\usepackage{xcolor}
|
||||||
\usepackage[pdftex]{graphicx}
|
\usepackage[luatex]{graphicx}
|
||||||
|
|
||||||
\newcommand{\comment}[1]{{\parindent0pt\fbox{\begin{minipage}{0.45\textwidth}{\em #1}\end{minipage}}}}
|
\newcommand{\comment}[1]{{\parindent0pt\fbox{\begin{minipage}{0.45\textwidth}{\em #1}\end{minipage}}}}
|
||||||
\newenvironment{changed}{\red}{\color{black}}
|
\newenvironment{changed}{\red}{\color{black}}
|
||||||
|
@ -18,7 +25,7 @@
|
||||||
}
|
}
|
||||||
%\renewcommand{\Hide}[1]{}
|
%\renewcommand{\Hide}[1]{}
|
||||||
|
|
||||||
\newcommand{\documenttitle}{This is a title}
|
\newcommand{\documenttitle}{An ETSI look at the State of the Art of pseudonym scheme in the vehicles to something (V2X) communication}
|
||||||
|
|
||||||
\begin{document}
|
\begin{document}
|
||||||
|
|
||||||
|
@ -29,22 +36,21 @@
|
||||||
|
|
||||||
% % %
|
% % %
|
||||||
% In case of double blind submissions:
|
% In case of double blind submissions:
|
||||||
%\author{
|
|
||||||
% \IEEEauthorblockN{Anonymous}
|
|
||||||
% \IEEEauthorblockA{Some Research Group\\
|
|
||||||
% Some Institution\\
|
|
||||||
% Some Email Addresses%
|
|
||||||
% }
|
|
||||||
%}
|
|
||||||
|
|
||||||
\author{
|
\author{
|
||||||
\IEEEauthorblockN{Author 1 ~ and ~ Author 2 ~ and ~ Author 3}
|
\IEEEauthorblockN{Anonymous}
|
||||||
\IEEEauthorblockA{P2P Networks\\
|
\IEEEauthorblockA{Some Research Group\\
|
||||||
TU Darmstadt\\
|
Some Institution\\
|
||||||
$[$login1, login2, login3$][$at$]$cs.tu-darmstadt.de%
|
Some Email Addresses%
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
%\author{
|
||||||
|
% \IEEEauthorblockN{Oliver Schmidt}
|
||||||
|
% \IEEEauthorblockA{TU Dresden\\
|
||||||
|
% oliver.schmidt3$[$at$]$mailbox.tu-dresden.de%
|
||||||
|
% }
|
||||||
|
%}
|
||||||
|
|
||||||
|
|
||||||
\maketitle
|
\maketitle
|
||||||
|
|
||||||
|
@ -73,13 +79,13 @@
|
||||||
% Are NOT: Peer-To-Peer, Anonymity, Privacy.
|
% Are NOT: Peer-To-Peer, Anonymity, Privacy.
|
||||||
% BUT TAKEN FROM THIS LIST:
|
% BUT TAKEN FROM THIS LIST:
|
||||||
% http://www.ieee.org/organizations/pubs/ani_prod/keywrd98.txt
|
% http://www.ieee.org/organizations/pubs/ani_prod/keywrd98.txt
|
||||||
Networks, Distributed Computing, Distributed Control, Availability, Security
|
Networks, Intelligent transportation systems, Security, Mesh networks, Privacy
|
||||||
\end{IEEEkeywords}
|
\end{IEEEkeywords}
|
||||||
% }
|
% }
|
||||||
|
|
||||||
\maketitle
|
%\maketitle
|
||||||
|
|
||||||
%\IEEEpeerreviewmaketitle
|
\IEEEpeerreviewmaketitle
|
||||||
|
|
||||||
\section{Introduction}
|
\section{Introduction}
|
||||||
|
|
||||||
|
@ -124,6 +130,23 @@ Networks, Distributed Computing, Distributed Control, Availability, Security
|
||||||
\section{Background}
|
\section{Background}
|
||||||
\label{sec:background}
|
\label{sec:background}
|
||||||
|
|
||||||
|
\subsection{ITS Architecture}
|
||||||
|
|
||||||
|
\subsection{Identifiers}
|
||||||
|
|
||||||
|
\section{Pseudonym Schemes}
|
||||||
|
|
||||||
|
\subsection{Pseudonym Schemes for ETSI ITS Systems}
|
||||||
|
|
||||||
|
\subsection{Pseudonym Change Strategies}
|
||||||
|
|
||||||
|
\subsection{Further Pseudonym Techniques}
|
||||||
|
|
||||||
|
\section{Evaluation}
|
||||||
|
|
||||||
|
\subsection{Attacker Model}
|
||||||
|
|
||||||
|
\section{Summary}
|
||||||
% % %
|
% % %
|
||||||
% Theory (probably)
|
% Theory (probably)
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue