stands for Digital Object Identifier
and is the unique identifier for objects on the internet. It can be used to create persistent link and to cite articles.
Using DOI as a persistent link
To create a persistent link, add「http://dx.doi.org/」
before a DOI.
For instance, if the DOI of an article is 10.5297/ser.1201.002 , you can link persistently to the article by entering the following link in your browser: http://dx.doi.org/ 10.5297/ser.1201.002 。
The DOI link will always direct you to the most updated article page no matter how the publisher changes the document's position, avoiding errors when engaging in important research.
Cite a document with DOI
When citing references, you should also cite the DOI if the article has one. If your citation guideline does not include DOIs, you may cite the DOI link.
DOIs allow accurate citations, improve academic contents connections, and allow users to gain better experience across different platforms. Currently, there are more than 70 million DOIs registered for academic contents. If you want to understand more about DOI, please visit airiti DOI Registration （ doi.airiti.com ） 。
歐俠宏 , Ph.D Advisor：詹進科 Co-advisor ：黃明祥
英文 DOI： 10.6845/NCHU.2009.00977
-  3rd Generation Partnership Project, “Technical Specification Group Services and Systems Aspects, generic authentication architecture (GAA), generic bootstrapping architecture (release 7),” 3GPP TS 33.220, 2006.
-  Ahmed Abdel-Hafez, Ali Miri1, and Luis Orozco-Barbosa, “Authenticated group key agreement protocols for ad hoc wireless networks,” International Journal of Network Security, vol. 4, pp. 90-98, January 2007.
-  C.J. Adler, S. Eichler, T. Kosch, C. Schroth, , and M. Strassberger, “The scalability problem of vehicular ad hoc networks and how to solve it,” IEEE Wireless Communications, vol. 13, pp. 22-28, October 2006.
-  A. Agah and S. K. Das, “Preventing DoS attacks in wireless sensor networks: A repeated game theory approach,” International Journal of Network Security, vol. 5, pp. 145-153, 2007.
-  A. Alrabady, M. Gruteser, B. Hoh, and H. Xiong, “Enhancing security and privacy in tra±c-monitoring systems,” IEEE Pervasive Computing, vol. 5, pp. 38 - 46, October -December 2006.
The cart has had several articles, so do you want to clear it, or add together to the cart?