加载中…
个人资料
  • 博客等级:
  • 博客积分:
  • 博客访问:
  • 关注人气:
  • 获赠金笔:0支
  • 赠出金笔:0支
  • 荣誉徽章:
正文 字体大小:

论文参考文献中的中外作者名标注-缩写标注法

(2012-08-23 11:30:45)
标签:

杂谈

分类: 基础理论

Bibliography或Reference

补充示例如下,以姓名缩写来引用的参考文献:最多4个作者标记,即最长有4个大写字母

1.姓在前,名在后的正常记法:只有三个人,因此只3个大写的姓字母

[SRC07] B. Smyth, M. Ryan, and L. Chen. Direct Anonymous Attestation (DAA): Ensuring privacy with corr upt administrators. InProceedings of the 4th European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS'07), volume 4572 ofLecture Notes in Computer Science, pages 218-231, 2007.

四个人就4个字母:

[SSBC09] P. Schaller, B. Schmidt, D. Basin, and S. Capkun. Mo deling and verifying physical prop erties of security proto cols for wireless networks. In Proceedings of the 22nd Computer Security Foundations Symposium (CSF'09). IEEE Computer Society Press, 2009.

特殊姓,比如复姓时:

[vDR09] T. van Deursen and S.Radomirovic. Algebraic attacks on rd proto cols. In Proceedings of the 3rd International Workshop on Information Security Theory and Practice (WISTP'09),  volume 5746 of Lecture Notes in Computer Science,
pages 3851. Springer, 2009.

 

2.只一个作者时,只第一个字母大写

[Sta06] I. Standard. IEEE standard. IEEE Trial-Use Standard for Wireless Access in Vehicular  Environments  Security Services for Applications and Management Messages, Approved 8 June 2006.

 

3.多于四个作者时(只标出三个,其他用+代替)

[YAB+05] P. Youn, B. Adida, M. Bond, J. Clulow, J. Herzog, A. Lin, R. Rivest, and R. Anderson. Robbing the bank with a theorem prover. Technical Rep ort UCAM-CL-TR-644, University of Cambridge, August 2005.

说明:根据需求,也可标出四个,多出来的再使用+表示。

 

4.作者完全相同时

[CKRT03a] Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani. Deciding the security
of proto cols with Die-Hellman exp onentiation and pro duct in exp onents. In Proceedings of the 23rd Conference on Foundations of Software Technology and Theoretical Computer Science (FST&TCS'03), volume 2914 of Lecture Notes in Computer Science, pages 124135, Mumbai (India), 2003. Springer-Verlag.
[CKRT03b] Y. Chevalier, R. Küsters, M. Rusi nowitch, and M. Turuani. An NP decision procedure for proto col insecurity with XOR. InProceedings of the 18th Annual IEEE Symposium on Logic in Computer Science (LICS'03), pages 261-270, Ottawa (Canada), 2003. IEEE Computer So ciety Press.

 

其他如组织机构的表示:

[Tru07] Trusted Computing Group. TPM Sp ecication version 1.2. Parts 1-3, revision 103. http://www.trustedcomputinggroup.org/resources/tpm_main_specification, 2007.

来自网络的链接:

[Cio09] Ciobâc .KiSs, 2009. http://www.lsv.enscachan.fr/~ciobac a/kiss.
[CJ97] J. Clark and J. Jacob. A survey of authentication proto col literature.
http://www.cs.york.ac.uk/~jac/papers/drareviewps.ps. 1997.

[CCA06] CCA Basic Services Reference and Guide, Octob er 2006. Available online http://www-03.ibm.com/security/cryptocards/pdfs/bs327.pdf.

0

阅读 收藏 喜欢 打印举报/Report
  

新浪BLOG意见反馈留言板 欢迎批评指正

新浪简介 | About Sina | 广告服务 | 联系我们 | 招聘信息 | 网站律师 | SINA English | 产品答疑

新浪公司 版权所有