Weak String Erasure: Difference between revisions

Line 32: Line 32:


==Further Information==
==Further Information==
* The Bounded Storage Model was introduced in [[Weak String Erasure#References|(5), (4)]]
* The Bounded Storage Model can generalized into the Noisy Storage Models [[Weak String Erasure#References|(3), (1)]]
* The security of Weak String Erasure has been analyzed in the presence of noise and losses [[Weak String Erasure#References|(2)]]
==References==
#[https://dl.acm.org/citation.cfm?id=2332405 KWW (2012)]
#[https://journals.aps.org/pra/abstract/10.1103/PhysRevA.81.052336 WCSL (2010)]
#[https://journals.aps.org/prl/abstract/10.1103/PhysRevLett.100.220502 WST (2008)]
#[https://arxiv.org/abs/0709.0289 Schaffner(2007)]
#[https://dl.acm.org/citation.cfm?id=1097480 DFSS (2005)]
<div style='text-align: right;'>''*contributed by Jeremy Ribeiro''</div>
<div style='text-align: right;'>''*contributed by Jeremy Ribeiro''</div>
Write, autoreview, editor, reviewer
3,129

edits