Browse Source

refactor: move chapter 2 figures to separate folder

develop
Ezerous 3 years ago
parent
commit
32430fde1c
  1. 0
      assets/figures/chapter-2/2.1.hash-functions-1.png
  2. 0
      assets/figures/chapter-2/2.1.hash-functions-2.png
  3. 0
      assets/figures/chapter-2/2.2.asymmetric-end-to-end-communication.png
  4. 0
      assets/figures/chapter-2/2.2.asymmetric-key-generation.png
  5. 0
      assets/figures/chapter-2/2.3.merkle-tree.png
  6. 0
      assets/figures/chapter-2/2.6.ethereum-logo.png
  7. 0
      assets/figures/chapter-2/2.7.ipfs-logo.png
  8. 0
      assets/figures/chapter-2/2.7.merkle-dag.png
  9. 4
      chapters/2.theoretical-background/2.1.hash-functions.tex
  10. 4
      chapters/2.theoretical-background/2.2.asymmetric-cryptography.tex
  11. 2
      chapters/2.theoretical-background/2.3.merkle-trees.tex
  12. 2
      chapters/2.theoretical-background/2.6.ethereum.tex
  13. 6
      chapters/2.theoretical-background/2.7.ipfs.tex
  14. BIN
      thesis.pdf

0
assets/figures/hash-functions-1.png → assets/figures/chapter-2/2.1.hash-functions-1.png

Before

Width:  |  Height:  |  Size: 138 KiB

After

Width:  |  Height:  |  Size: 138 KiB

0
assets/figures/hash-functions-2.png → assets/figures/chapter-2/2.1.hash-functions-2.png

Before

Width:  |  Height:  |  Size: 410 KiB

After

Width:  |  Height:  |  Size: 410 KiB

0
assets/figures/asymmetric-end-to-end-communication.png → assets/figures/chapter-2/2.2.asymmetric-end-to-end-communication.png

Before

Width:  |  Height:  |  Size: 250 KiB

After

Width:  |  Height:  |  Size: 250 KiB

0
assets/figures/asymmetric-key-generation.png → assets/figures/chapter-2/2.2.asymmetric-key-generation.png

Before

Width:  |  Height:  |  Size: 139 KiB

After

Width:  |  Height:  |  Size: 139 KiB

0
assets/figures/merkle-tree.png → assets/figures/chapter-2/2.3.merkle-tree.png

Before

Width:  |  Height:  |  Size: 193 KiB

After

Width:  |  Height:  |  Size: 193 KiB

0
assets/figures/ethereum-logo.png → assets/figures/chapter-2/2.6.ethereum-logo.png

Before

Width:  |  Height:  |  Size: 44 KiB

After

Width:  |  Height:  |  Size: 44 KiB

0
assets/figures/ipfs-logo.png → assets/figures/chapter-2/2.7.ipfs-logo.png

Before

Width:  |  Height:  |  Size: 22 KiB

After

Width:  |  Height:  |  Size: 22 KiB

0
assets/figures/merkle-dag.png → assets/figures/chapter-2/2.7.merkle-dag.png

Before

Width:  |  Height:  |  Size: 120 KiB

After

Width:  |  Height:  |  Size: 120 KiB

4
chapters/2.theoretical-background/2.1.hash-functions.tex

@ -4,7 +4,7 @@
\begin{figure}[H] \begin{figure}[H]
\centering \centering
\includegraphics[width=15cm]{assets/figures/hash-functions-1.png} \includegraphics[width=15cm]{assets/figures/chapter-2/2.1.hash-functions-1.png}
\caption{Λειτουργία συνάρτησης κατακερματισμού} \caption{Λειτουργία συνάρτησης κατακερματισμού}
\end{figure} \end{figure}
@ -19,7 +19,7 @@
\begin{figure}[H] \begin{figure}[H]
\centering \centering
\includegraphics[width=15cm]{assets/figures/hash-functions-2.png} \includegraphics[width=15cm]{assets/figures/chapter-2/2.1.hash-functions-2.png}
\caption{Παράδειγμα λειτουργίας συνάρτησης κατακερματισμού} \caption{Παράδειγμα λειτουργίας συνάρτησης κατακερματισμού}
\end{figure} \end{figure}

4
chapters/2.theoretical-background/2.2.asymmetric-cryptography.tex

@ -11,7 +11,7 @@
\begin{figure}[H] \begin{figure}[H]
\centering \centering
\includegraphics[width=15cm]{assets/figures/asymmetric-key-generation.png} \includegraphics[width=15cm]{assets/figures/chapter-2/2.2.asymmetric-key-generation.png}
\caption{Παραγωγή ασύμμετρου ζεύγους κλειδιών} \caption{Παραγωγή ασύμμετρου ζεύγους κλειδιών}
\end{figure} \end{figure}
@ -30,7 +30,7 @@
\begin{figure}[H] \begin{figure}[H]
\centering \centering
\includegraphics[width=15cm]{assets/figures/asymmetric-end-to-end-communication.png} \includegraphics[width=15cm]{assets/figures/chapter-2/2.2.asymmetric-end-to-end-communication.png}
\caption{Κρυπτογράφηση απ' άκρη σ' άκρη} \caption{Κρυπτογράφηση απ' άκρη σ' άκρη}
\end{figure} \end{figure}

2
chapters/2.theoretical-background/2.3.merkle-trees.tex

@ -6,7 +6,7 @@
\begin{figure}[H] \begin{figure}[H]
\centering \centering
\includegraphics[width=15cm]{assets/figures/merkle-tree.png} \includegraphics[width=15cm]{assets/figures/chapter-2/2.3.merkle-tree.png}
\caption{Παράδειγμα δυαδικού δένδρου Merkle} \caption{Παράδειγμα δυαδικού δένδρου Merkle}
\end{figure} \end{figure}

2
chapters/2.theoretical-background/2.6.ethereum.tex

@ -2,7 +2,7 @@
\begin{figure}[H] \begin{figure}[H]
\centering \centering
\includegraphics[width=2cm]{assets/figures/ethereum-logo.png} \includegraphics[width=2cm]{assets/figures/chapter-2/2.6.ethereum-logo.png}
\caption{Ethereum logo} \caption{Ethereum logo}
\end{figure} \end{figure}

6
chapters/2.theoretical-background/2.7.ipfs.tex

@ -1,8 +1,8 @@
\section{IPFS} \section{IPFS} \label{section:2-7-ipfs}
\begin{figure}[H] \begin{figure}[H]
\centering \centering
\includegraphics[width=2cm]{assets/figures/ipfs-logo.png} \includegraphics[width=2cm]{assets/figures/chapter-2/2.7.ipfs-logo.png}
\caption{IPFS logo} \caption{IPFS logo}
\end{figure} \end{figure}
@ -16,7 +16,7 @@
\item \textbf{Σύνδεση περιεχομένου μέσω κατευθυνόμενων άκυκλων γράφων (Directed Acyclic Graphs ή DAGs)}. Το IPFS αξιοποιεί DAGs (και συγκεκριμένα Merkle DAGs), μίας δομής δεδομένων της οποίας κάθε κόμβος έχει ως μοναδικό αναγνωριστικό το hash του περιεχομένου του (το CID). \item \textbf{Σύνδεση περιεχομένου μέσω κατευθυνόμενων άκυκλων γράφων (Directed Acyclic Graphs ή DAGs)}. Το IPFS αξιοποιεί DAGs (και συγκεκριμένα Merkle DAGs), μίας δομής δεδομένων της οποίας κάθε κόμβος έχει ως μοναδικό αναγνωριστικό το hash του περιεχομένου του (το CID).
\begin{enumitemcenteredfigure} \begin{enumitemcenteredfigure}
\includegraphics[width=15cm]{assets/figures/merkle-dag.png} \includegraphics[width=15cm]{assets/figures/chapter-2/2.7.merkle-dag.png}
\caption{Merkle DAG\cite{2.7-merkle-dags-proto-school}} \caption{Merkle DAG\cite{2.7-merkle-dags-proto-school}}
\end{enumitemcenteredfigure} \end{enumitemcenteredfigure}

BIN
thesis.pdf

Binary file not shown.
Loading…
Cancel
Save