这些参考文献属于什么类型啊。看不懂啊。求高人教我一下

4.N.SastryandD.Wagner,“SecurityconsiderationsforIEEE802.15.4networks,”inProceedingsof... 4.N. Sastry and D. Wagner, “Security considerations for IEEE 802.15.4 networks,” in Proceedings of the ACM Workshop on Wireless Security (WiSe ’04), pp. 32–42, Philadelphia, Pa, USA,October 2004.
5.R.Watro, D. Kong, S.F.Cuti, C. Gardiner, C. Lynn, andP. Kruus,“TinyPK: securing sensor networks with public key technology,”in Proceedings of the ACMWorkshop on Security of Ad Hoc and Sensor Networks (SASN ’04), pp. 59–64,Washington, DC, USA,October 2004.
6.K. H. M. Wong, Z. Yuan, C. Jiannong, and W. Shengwei,“A dynamic user authentication scheme for wireless sensor networks,” in Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing,pp. 244–251, Taichung, Taiwan, June 2006.
展开
 我来答
tangxiaoxiaomi
2014-05-15 · TA获得超过3.1万个赞
知道大有可为答主
回答量:1.1万
采纳率:94%
帮助的人:7468万
展开全部
这些文献类型都是会议论文[C],常见的参考文献格式如下:如满意还望采纳,如有疑问请追问。

Sastry N, Wagner D. Security considerations for IEEE 802.15. 4 networks[C] Proceedings of the 3rd ACM workshop on Wireless security. ACM, 2004: 32-42.

Watro R, Kong D, Cuti S, et al. TinyPK: securing sensor networks with public key technology[C] Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks. ACM, 2004: 59-64.

Wong K H M, Zheng Y, Cao J, et al. A dynamic user authentication scheme for wireless sensor networks[C] Sensor Networks, Ubiquitous, and Trustworthy Computing, 2006. IEEE International Conference on. IEEE, 2006:244–251
推荐律师服务: 若未解决您的问题,请您详细描述您的问题,通过百度律临进行免费专业咨询

为你推荐:

下载百度知道APP,抢鲜体验
使用百度知道APP,立即抢鲜体验。你的手机镜头里或许有别人想知道的答案。
扫描二维码下载
×

类别

我们会通过消息、邮箱等方式尽快将举报结果通知您。

说明

0/200

提交
取消

辅 助

模 式