1、规范的参考文献格式一、参考文献的类型参考文献(即引文出处)的类型以单字母方式标识,具体如下:M专著 C论文集 N报纸文章 J期刊文章D学位论文 R报告 S标准 P专利A文章对于不属于上述的文献类型,采用字母“Z”标识。常用的电子文献及载体类型标识:/OL联机网上数据(database online)DB/MT磁带数据库(database on magnetic tape)/CD光盘图书(monograph on CD ROM)DK磁盘软件(computer program on disk)网上期刊(serial online)/OL网上电子公告(electronic bulletin boar
2、d online)对于英文参考文献,还应注意以下两点:作者姓名采用“姓在前名在后”原则,具体格式是: 姓,名字的首字母. 如: Malcolm Richard Cowley 应为:Cowley, M.R.,如果有两位作者,第一位作者方式不变,&之后第二位作者名字的首字母放在前面,姓放在后面,如:Frank Norris 与 Irving Gordon应为:Norris, F. & I.Gordon.;书名、报刊名使用斜体字,如:Mastering English Literature,English Weekly。二、参考文献的格式及举例1期刊类【格式】序号作者.篇名J.刊名,出版年份,卷号(
3、期号):起止页码.【举例】1 周融,任志国,杨尚雷,厉星星 .对新形势下毕业设计管理工作的思考与实践J.电气电子教学学报,2003(6):107-109.2 夏鲁惠.高等学校毕业设计(论文)教学情况调研报告J. 高等理科教育,2004(1):46-52.3 Heider, E.R.& D.C.Oliver. The structure of color space in naming and memory of two languages J. Foreign Language Teaching and Research, 1999, (3): 62 67.2专著类【格式】序号作者.书名M.出
4、版地:出版社,出版年份:起止页码.【举例】4 刘国钧,王连成.图书馆史研究 .北京:高等教育出版社,1979:15-18,31.5 Gill, R. Mastering English Literature M. London: Macmillan, 1985: 42-45.3报纸类【格式】序号作者.篇名N.报纸名,出版日期(版次).【举例】6 李大伦.经济全球化的重要性N. 光明日报,1998-12-27(3).7 French, W. Between Silences: A Voice from ChinaN. Atlantic Weekly, 1987-8-15(33).4论文集【格式】
5、序号作者.篇名C.出版地:出版者,出版年份:起始页码.【举例】8 伍蠡甫.西方文论选C. 上海:上海译文出版社, 1979:12-17.9 Spivak,G. “Can the Subaltern Speak?”A. In C.Nelson & L. Grossberg(eds.). Victory in Limbo: Imigism C. Urbana: University of Illinois Press, 1988, pp.271-313.10 Almarza, G.G. Student foreign language teachers knowledge growth A. In
6、 D.Freeman and J.C.Richards (eds.). Teacher Learning in Language Teaching C. New York: Cambridge University Press. 1996. pp.50-78.5学位论文【格式】序号作者.篇名D.出版地:保存者,出版年份:起始页码.【举例】11 张筑生.微分半动力系统的不变集D.北京:北京大学数学系数学研究所, 1983:1-7.6研究报告【格式】序号作者.篇名R.出版地:出版者,出版年份:起始页码.【举例】12 冯西桥.核反应堆压力管道与压力容器的 LBB 分析R.北京:清华大学核能技术设计研
7、究院, 1997:9-10.7专利【格式】序号专利所有者.题名P.国别:专利号,发布日期.【举例】13 姜锡洲.一种温热外敷药制备方案P. 中国专利:881056073, 19890726.8标准【格式】序号标准编号,标准名称S.【举例】14 GB/T 161591996, 汉语拼音正词法基本规则 S.9条例【格式】序号颁布单位.条例名称.发布日期【举例】15 中华人民共和国科学技术委员会.科学技术期刊管理办法 Z.1991060510电子文献【格式】序号主要责任者.电子文献题名.电子文献出处电子文献及载体类型标识.或可获得地址,发表或更新日期/引用日期.【举例】16 王明亮.关于中国学术期刊
8、标准化数据库系统工程的进展EB/OL.http: / 19980816/19981004.17 万锦 .中国大学学报论文文摘(19831993).英文版 DB/CD. 北京: 中国大百科全书出版社, 1996.11各种未定义类型的文献【格式】序号 主要责任者.文献题名Z.出版地:出版者, 出版年.三、注释注释是对论文正文中某一特定内容的进一步解释或补充说明。注释应置于本页页脚,前面用圈码、等标识。1 Quinn B, Almeroth K. RFC 3170-2001, IP multicast applications: Challenges and solutions S. USA: IE
9、TF, 2001: 3-12.2 Perrig A, Tygar J D. Secure Broadcast Communication: In Wired and Wireless Networks M. USA: Kluwer Academic Publishers, 2002: 32-76.3 Sun Yan, Liu K J R. Hierarchical Group Access Control for Secure Multicast Communications J. IEEE/ACM Transactions on Networking, 2007, 15(6): 1514-1
10、526.4 Harney H, Muckenhirn C. RFC 2093-1997, Group Key Management Protocol (GKMP) Specification S. USA: IETF, 1997: 2-3.5 Wong C K, Gouda M, Lam S S. Secure Group Communications Using Key Graphs J. IEEE/ACM Transactions on Networking, 2000, 8(1): 16-30.6 Rafaeli S, Mathy L, Hutchison D. draft-rafael
11、i-lkh2-00-2002, LKH+2: An improvement on the LKH+ algorithm for removal operations S. USA: IETF, 2002: 8-11.7 Lin Jenchiun, Tzeng Chienhua, Lai Feipei. Optimizing Centralized Secure Group Communications with Binary Key Tree Recomposition C/Proceedings of AINA04. Fukuoka: IEEE Press, 2004:202-207.8 Z
12、hu Wentao. Optimizing the Tree Structure in Secure Multicast Key Management J. Communications Letters, IEEE, 2005, 9(5): 477-479.9 Sherman A T, McGrew D A. Key Establishment in Large Dynamic Groups Using One-Way Function Trees J. IEEE Transactions on Software Engineering, 2003, 29(5): 444-458.10 Kan
13、g Qiaoyan, Meng Xiangru, Wang Jianfeng. AN Optimized LKH Scheme Based on One-Way Hash Function for Secure Group Communications C/Proceedings of ICCT06. Guilin: IEEE Press, 2006: 1-4.11 Ghanem S M, Abdel-Wahab H. A Simple XOR-based Technique for Distributing Group Key in Secure Multicasting C/Proceed
14、ings of ISCC00. Antibes: IEEE Press, 2000: 166-171.12 Duma C, Shahmehri N, Lambrix P. A Hybrid Key Tree Scheme for Multicast to Balance Security and Efficiency Requirements C/Proceedings of the WETICE03. Linz: IEEE Press, 2003: 208-213.13 Onen M, Molva R. Reliable Group Rekeying with a Customer Pers
15、pective C/Proceedings of GLOBECOM 04. Dallas: IEEE Press, 2004: 2072-2076.14 Ng W H D, Howarth M, Sun Zhili, Cruickshank H. Dynamic Balanced Key Tree Management for Secure Multicast Communications J. IEEE Transactions on Computers, 2007, 56(5): 590-605.15 Kwak D W, Lee S J, Kim J W, E J. An efficien
16、t LKH tree balancing algorithm for group key management J. Communications Letters, IEEE, 2006, 10(3): 222-224.16 Xu Lihao, Huang Cheng. Computation-Efficient Multicast Key Distribution J. IEEE Transactions on Parallel and Distributed Systems, 2008, 19(5): 577-587.17 Khabiri E, Bettayeb S. Efficient
17、Algorithms for Secure Multicast key Management C/Proceedings of 31st IEEE Conference on Local Computer Networks. Tampa: IEEE Press, 2006: 787-792.18 Aye W, Siddiqi M U. ESKD: An Efficient and Scalable Key Distribution Scheme for Secure Group Communication C/Proceedings of ICN/ICONS/MCL06. Morne: IEE
18、E Press, 2006: 75-75.19 Abdulhadi S, Ralf L, Sorin A H. Reliable Performance Evaluation of Rekeying Algorithms in Secure Multicast C/Proceedings of WoWMoM06. Espoo: IEEE Press, 2007: 1-8.20 Gau Runghung. Performance analysis of multicast key backbone for secure group communications J. Communications Letters, IEEE, 2006, 10(7): 555-557.