规范的参考文献格式一、参考文献的类型参考文献(即引文出处)的类型以单字母方式标识,具体如下:M——专著 C——论文集 N——报纸文章 J——期刊文章D——学位论文 R——报告 S——标准 P——专利A——文章对于不属于上述的文献类型,采用字母“Z”标识。常用的电子文献及载体类型标识:[DB/OL]——联机网上数据(database online)[DB/MT]——磁带数据库(database on magnetic tape)[M/CD]——光盘图书(monograph on CDROM)[CP/DK]——磁盘软件(computer program on disk)[J/OL]——网上期刊(serial online)[EB/OL]——网上电子公告(electronic bulletin board online)对于英文参考文献,还应注意以下两点:①作者姓名采用“姓在前名在后”原则,具体格式是: 姓,名字的首字母. 如: Malcolm Richard Cowley 应为:Cowley, M.R.,如果有两位作者,第一位作者方式不变,&之后第二位作者名字的首字母放在前面,姓放在后面,如:Frank Norris 与Irving Gordon应为:Norris, F. & I.Gordon.;②书名、报刊名使用斜体字,如:Mastering English Literature,English Weekly。二、参考文献的格式及举例1.期刊类【格式】[序号]作者.篇名[J].刊名,出版年份,卷号(期号):起止页码.【举例】[1] 周融,任志国,杨尚雷,厉星星.对新形势下毕业设计管理工作的思考与实践[J].电气电子教学学报,2003(6):107-109.[2] 夏鲁惠.高等学校毕业设计(论文)教学情况调研报告[J].高等理科教育,2004(1):46-52.[3] Heider, E.R.& D.C.Oliver. The structure of color space in naming and memory of two languages [J]. Foreign Language Teaching and Research, 1999, (3): 62 – 67.2.专著类【格式】[序号]作者.书名[M].出版地:出版社,出版年份:起止页码.【举例】[4] 刘国钧,王连成.图书馆史研究[M].北京:高等教育出版社,1979:15-18,31.[5] Gill, R. Mastering English Literature [M]. London: Macmillan, 1985: 42-45.3.报纸类【格式】[序号]作者.篇名[N].报纸名,出版日期(版次).【举例】[6] 李大伦.经济全球化的重要性[N]. 光明日报,1998-12-27(3).[7] French, W. Between Silences: A Voice from China[N]. Atlantic Weekly, 1987-8-15(33).4.论文集【格式】[序号]作者.篇名[C].出版地:出版者,出版年份:起始页码.【举例】[8] 伍蠡甫.西方文论选[C]. 上海:上海译文出版社,1979:12-17.[9] Spivak,G. “Can the Subaltern Speak?”[A]. In C.Nelson & L. Grossberg(eds.). Victory in Limbo: Imigism [C]. Urbana: University of Illinois Press, 1988, pp.271-313.[10] Almarza, G.G. Student foreign language teacher’s knowledge growth [A]. In D.Freeman and J.C.Richards (eds.). Teacher Learning in Language Teaching [C]. New York: Cambridge University Press. 1996. pp.50-78.5.学位论文【格式】[序号]作者.篇名[D].出版地:保存者,出版年份:起始页码.【举例】[11] 张筑生.微分半动力系统的不变集[D].北京:北京大学数学系数学研究所, 1983:1-7.6.研究报告【格式】[序号]作者.篇名[R].出版地:出版者,出版年份:起始页码.【举例】[12] 冯西桥.核反应堆压力管道与压力容器的LBB分析[R].北京:清华大学核能技术设计研究院, 1997:9-10.7.专利【格式】[序号]专利所有者.题名[P].国别:专利号,发布日期.【举例】[13] 姜锡洲.一种温热外敷药制备方案[P].中国专利:881056073, 1989–07–26.8.标准【格式】[序号]标准编号,标准名称[S].【举例】[14] GB/T 16159—1996, 汉语拼音正词法基本规则 [S].9.条例【格式】[序号]颁布单位.条例名称.发布日期【举例】[15] 中华人民共和国科学技术委员会.科学技术期刊管理办法[Z].1991—06—0510.电子文献【格式】[序号]主要责任者.电子文献题名.电子文献出处[电子文献及载体类型标识].或可获得地址,发表或更新日期/引用日期.【举例】[16] 王明亮.关于中国学术期刊标准化数据库系统工程的进展[EB/OL].http: //www.cajcd.edu.cn/pub/wml.txt/980810–2.html, 1998–08–16/1998–10–04.[17] 万锦.中国大学学报论文文摘(1983–1993).英文版 [DB/CD]. 北京: 中国大百科全书出版社, 1996.11.各种未定义类型的文献【格式】[序号] 主要责任者.文献题名[Z].出版地:出版者, 出版年.三、注释注释是对论文正文中某一特定内容的进一步解释或补充说明。注释应置于本页页脚,前面用圈码①、②、③等标识。Quinn B, Almeroth K. RFC 3170-2001, IP multicast applications: Challenges and solutions [S]. USA: IETF, 2001: 3-12.Perrig A, Tygar J D. Secure Broadcast Communication: In Wired and Wireless Networks [M]. USA: Kluwer Academic Publishers, 2002: 32-76.Sun Yan, Liu K J R. Hierarchical Group Access Control for Secure Multicast Communications [J]. IEEE/ACM Transactions on Networking, 2007, 15(6): 1514-1526.Harney H, Muckenhirn C. RFC 2093-1997, Group Key Management Protocol (GKMP) Specification [S]. USA: IETF, 1997: 2-3.Wong C K, Gouda M, Lam S S. Secure Group Communications Using Key Graphs [J]. IEEE/ACM Transactions on Networking, 2000, 8(1): 16-30.Rafaeli S, Mathy L, Hutchison D. draft-rafaeli-lkh2-00-2002, LKH+2: An improvement on the LKH+ algorithm for removal operations [S]. USA: IETF, 2002: 8-11.Lin Jenchiun, Tzeng Chienhua, Lai Feipei. Optimizing Centralized Secure Group Communications with Binary Key Tree Recomposition [C]//Proceedings of AINA’04. Fukuoka: IEEE Press, 2004:202-207.Zhu Wentao. Optimizing the Tree Structure in Secure Multicast Key Management [J]. Communications Letters, IEEE, 2005, 9(5): 477-479.Sherman A T, McGrew D A. Key Establishment in Large Dynamic Groups Using One-Way Function Trees [J]. IEEE Transactions on Software Engineering, 2003, 29(5): 444-458.Kang Qiaoyan, Meng Xiangru, Wang Jianfeng. AN Optimized LKH Scheme Based on One-Way Hash Function for Secure Group Communications [C]//Proceedings of ICCT’06. Guilin: IEEE Press, 2006: 1-4.Ghanem S M, Abdel-Wahab H. A Simple XOR-based Technique for Distributing Group Key in Secure Multicasting [C]//Proceedings of ISCC’00. Antibes: IEEE Press, 2000: 166-171.Duma C, Shahmehri N, Lambrix P. A Hybrid Key Tree Scheme for Multicast to Balance Security and Efficiency Requirements [C]//Proceedings of the WETICE’03. Linz: IEEE Press, 2003: 208-213.Onen M, Molva R. Reliable Group Rekeying with a Customer Perspective [C]// HYPERLINK "http://ieeexplore.ieee.org/xpl/RecentCon.jsp?punumber=9481" Proceedings of GLOBECOM '04. Dallas: IEEE Press, 2004: 2072-2076.Ng W H D, Howarth M, Sun Zhili, Cruickshank H. Dynamic Balanced Key Tree Management for Secure Multicast Communications [J]. IEEE Transactions on Computers, 2007, 56(5): 590-605.Kwak D W, Lee S J, Kim J W, E J. An efficient LKH tree balancing algorithm for group key management [J]. Communications Letters, IEEE, 2006, 10(3): 222-224.Xu Lihao, Huang Cheng. Computation-Efficient Multicast Key Distribution [J]. IEEE Transactions on Parallel and Distributed Systems, 2008, 19(5): 577-587.Khabiri E, Bettayeb S. Efficient Algorithms for Secure Multicast key Management [C]// HYPERLINK "http://ieeexplore.ieee.org/xpl/RecentCon.jsp?punumber=9481" Proceedings of 31st IEEE Conference on Local Computer Networks. Tampa: IEEE Press, 2006: 787-792.Aye W, Siddiqi M U. ESKD: An Efficient and Scalable Key Distribution Scheme for Secure Group Communication [C]// HYPERLINK "http://ieeexplore.ieee.org/xpl/RecentCon.jsp?punumber=9481" Proceedings of ICN/ICONS/MCL’06. Morne: IEEE Press, 2006: 75-75.Abdulhadi S, Ralf L, Sorin A H. Reliable Performance Evaluation of Rekeying Algorithms in Secure Multicast [C]// HYPERLINK "http://ieeexplore.ieee.org/xpl/RecentCon.jsp?punumber=9481" Proceedings of WoWMoM’06. Espoo: IEEE Press, 2007: 1-8.Gau Runghung. Performance analysis of multicast key backbone for secure group communications [J]. Communications Letters, IEEE, 2006, 10(7): 555-557.
温馨提示
请用电脑打开本网页,即可以免费获取你想要的了。