英文参考文献格式 5
请帮我把参考文献格式改成正确格式。[3]G.Atenieseetal.”Provabledatapossessionatuntrustedstores,”inProc.1...
请帮我把参考文献格式改成正确格式。
[3]G. Ateniese et al.”Provable data possession at untrusted stores,” inProc.14thACM Conf. Comput. Commun. Security[M], 2007, pp. 598–609.
[4]G. Ateniese et al., “Remote data checking using provable data pos- session,” ACM Trans. Inf. Syst. Security[J],vol. 14,no. 1, May 2011,art. no. 12.
[5]Y. Deswarte, J. J. Quisquater, A. Saidane. Remote Integrity Checking[C].Proceedings of the IFIP TC11/WG11.5 6th Working Conference on Integrity and Internal Control on Information Systems (IICIS),Lausanne, Switzerland. 2004: 1-11.
[6]Q. Wang, C. Wang, K. Ren, et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing[J]. IEEE Transactions on Parallel and Distributed Systems, 2011,22(5):847-859.
[7]C. C. Erway, C. Papamanthou, R. Tamassia. Dynamic Provable Data Possession[C], Acm Conference on Computer & Communications Security, 2015, 17(4): 1-29.
[10]D. Boneh, C. Gentry, B. Lynn, et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps[J], Lecture Notes in Computer Science, 2003, 2656(1): 416-432. 展开
[3]G. Ateniese et al.”Provable data possession at untrusted stores,” inProc.14thACM Conf. Comput. Commun. Security[M], 2007, pp. 598–609.
[4]G. Ateniese et al., “Remote data checking using provable data pos- session,” ACM Trans. Inf. Syst. Security[J],vol. 14,no. 1, May 2011,art. no. 12.
[5]Y. Deswarte, J. J. Quisquater, A. Saidane. Remote Integrity Checking[C].Proceedings of the IFIP TC11/WG11.5 6th Working Conference on Integrity and Internal Control on Information Systems (IICIS),Lausanne, Switzerland. 2004: 1-11.
[6]Q. Wang, C. Wang, K. Ren, et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing[J]. IEEE Transactions on Parallel and Distributed Systems, 2011,22(5):847-859.
[7]C. C. Erway, C. Papamanthou, R. Tamassia. Dynamic Provable Data Possession[C], Acm Conference on Computer & Communications Security, 2015, 17(4): 1-29.
[10]D. Boneh, C. Gentry, B. Lynn, et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps[J], Lecture Notes in Computer Science, 2003, 2656(1): 416-432. 展开
11个回答
2022-07-25 · 百度认证:北京惠企网络技术有限公司官方账号
关注
展开全部
[序号]主要责任者.文献题名[J].刊名,年,卷(期):起止页码。
例如:[1]何龄修.读南明史[J].中国史研究,1998,(3):167-173。
[2]OU J P,SOONG T T,et al.Recent advance in research on applications of passive energy dissipation systems[J].Earthquack Eng,1997,38(3):358-361。
例如:[1]何龄修.读南明史[J].中国史研究,1998,(3):167-173。
[2]OU J P,SOONG T T,et al.Recent advance in research on applications of passive energy dissipation systems[J].Earthquack Eng,1997,38(3):358-361。
已赞过
已踩过<
评论
收起
你对这个回答的评价是?
推荐律师服务:
若未解决您的问题,请您详细描述您的问题,通过百度律临进行免费专业咨询
广告 您可能关注的内容 |