这些参考文献属于什么类型啊。看不懂啊。求高人教我一下
4.N.SastryandD.Wagner,“SecurityconsiderationsforIEEE802.15.4networks,”inProceedingsof...
4.N. Sastry and D. Wagner, “Security considerations for IEEE 802.15.4 networks,” in Proceedings of the ACM Workshop on Wireless Security (WiSe ’04), pp. 32–42, Philadelphia, Pa, USA,October 2004.
5.R.Watro, D. Kong, S.F.Cuti, C. Gardiner, C. Lynn, andP. Kruus,“TinyPK: securing sensor networks with public key technology,”in Proceedings of the ACMWorkshop on Security of Ad Hoc and Sensor Networks (SASN ’04), pp. 59–64,Washington, DC, USA,October 2004.
6.K. H. M. Wong, Z. Yuan, C. Jiannong, and W. Shengwei,“A dynamic user authentication scheme for wireless sensor networks,” in Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing,pp. 244–251, Taichung, Taiwan, June 2006. 展开
5.R.Watro, D. Kong, S.F.Cuti, C. Gardiner, C. Lynn, andP. Kruus,“TinyPK: securing sensor networks with public key technology,”in Proceedings of the ACMWorkshop on Security of Ad Hoc and Sensor Networks (SASN ’04), pp. 59–64,Washington, DC, USA,October 2004.
6.K. H. M. Wong, Z. Yuan, C. Jiannong, and W. Shengwei,“A dynamic user authentication scheme for wireless sensor networks,” in Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing,pp. 244–251, Taichung, Taiwan, June 2006. 展开
展开全部
这些文献类型都是会议论文[C],常见的参考文献格式如下:如满意还望采纳,如有疑问请追问。
Sastry N, Wagner D. Security considerations for IEEE 802.15. 4 networks[C] Proceedings of the 3rd ACM workshop on Wireless security. ACM, 2004: 32-42.
Watro R, Kong D, Cuti S, et al. TinyPK: securing sensor networks with public key technology[C] Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks. ACM, 2004: 59-64.
Wong K H M, Zheng Y, Cao J, et al. A dynamic user authentication scheme for wireless sensor networks[C] Sensor Networks, Ubiquitous, and Trustworthy Computing, 2006. IEEE International Conference on. IEEE, 2006:244–251
Sastry N, Wagner D. Security considerations for IEEE 802.15. 4 networks[C] Proceedings of the 3rd ACM workshop on Wireless security. ACM, 2004: 32-42.
Watro R, Kong D, Cuti S, et al. TinyPK: securing sensor networks with public key technology[C] Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks. ACM, 2004: 59-64.
Wong K H M, Zheng Y, Cao J, et al. A dynamic user authentication scheme for wireless sensor networks[C] Sensor Networks, Ubiquitous, and Trustworthy Computing, 2006. IEEE International Conference on. IEEE, 2006:244–251
推荐律师服务:
若未解决您的问题,请您详细描述您的问题,通过百度律临进行免费专业咨询