论文参考文献中的中外作者名标注-缩写标注法
(2012-08-23 11:30:45)
标签:
杂谈 |
分类: 基础理论 |
Bibliography或Reference
补充示例如下,以姓名缩写来引用的参考文献:最多4个作者标记,即最长有4个大写字母
1.姓在前,名在后的正常记法:只有三个人,因此只3个大写的姓字母
[SRC07] B. Smyth, M. Ryan, and L. Chen. Direct Anonymous Attestation (DAA): Ensuring privacy with corr upt administrators. InProceedings of the 4th European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS'07), volume 4572 ofLecture Notes in Computer Science, pages 218-231, 2007.
四个人就4个字母:
[SSBC09] P. Schaller, B. Schmidt, D. Basin, and S. Capkun. Mo deling and verifying physical prop erties of security proto cols for wireless networks. In Proceedings of the 22nd Computer Security Foundations Symposium (CSF'09). IEEE Computer Society Press, 2009.
特殊姓,比如复姓时:
[vDR09] T. van Deursen and S.Radomirovic. Algebraic attacks on
rd proto cols. In Proceedings of the 3rd International Workshop on
Information Security Theory and Practice
(WISTP'09),
pages 3851. Springer, 2009.
2.只一个作者时,只第一个字母大写
[Sta06] I. Standard. IEEE standard. IEEE Trial-Use Standard for
Wireless Access in Vehicular
3.多于四个作者时(只标出三个,其他用+代替)
[YAB+05] P. Youn, B. Adida, M. Bond, J. Clulow, J. Herzog, A. Lin, R. Rivest, and R. Anderson. Robbing the bank with a theorem prover. Technical Rep ort UCAM-CL-TR-644, University of Cambridge, August 2005.
说明:根据需求,也可标出四个,多出来的再使用+表示。
4.作者完全相同时
[CKRT03a] Y. Chevalier, R. Küsters,
M. Rusinowitch, and M. Turuani. Deciding the security
of proto cols with Die-Hellman exp onentiation and pro duct in exp
onents. In Proceedings of the 23rd Conference on Foundations of
Software Technology and Theoretical Computer Science
(FST&TCS'03), volume 2914 of Lecture Notes in
Computer Science, pages 124135, Mumbai (India), 2003.
Springer-Verlag.
[CKRT03b] Y. Chevalier, R. Küsters, M.
Rusi nowitch, and M. Turuani. An NP decision procedure for proto
col insecurity with XOR. InProceedings of the 18th Annual IEEE
Symposium on Logic in Computer Science (LICS'03), pages 261-270,
Ottawa (Canada), 2003. IEEE Computer So ciety Press.
其他如组织机构的表示:
[Tru07] Trusted Computing Group. TPM Sp ecication version 1.2. Parts 1-3, revision 103. http://www.trustedcomputinggroup.org/resources/tpm_main_specification, 2007.
来自网络的链接:
[Cio09] Ciobâc
[CJ97] J. Clark and J. Jacob. A survey of authentication proto col
literature.
http://www.cs.york.ac.uk/~jac/papers/drareviewps.ps.
1997.
[CCA06] CCA Basic Services Reference and Guide, Octob er 2006. Available online http://www-03.ibm.com/security/cryptocards/pdfs/bs327.pdf.

加载中…