Write, autoreview, editor, reviewer
3,129
edits
Line 32: | Line 32: | ||
==Further Information== | ==Further Information== | ||
* The Bounded Storage Model was introduced in [[Weak String Erasure#References|(5), (4)]] | |||
* The Bounded Storage Model can generalized into the Noisy Storage Models [[Weak String Erasure#References|(3), (1)]] | |||
* The security of Weak String Erasure has been analyzed in the presence of noise and losses [[Weak String Erasure#References|(2)]] | |||
==References== | |||
#[https://dl.acm.org/citation.cfm?id=2332405 KWW (2012)] | |||
#[https://journals.aps.org/pra/abstract/10.1103/PhysRevA.81.052336 WCSL (2010)] | |||
#[https://journals.aps.org/prl/abstract/10.1103/PhysRevLett.100.220502 WST (2008)] | |||
#[https://arxiv.org/abs/0709.0289 Schaffner(2007)] | |||
#[https://dl.acm.org/citation.cfm?id=1097480 DFSS (2005)] | |||
<div style='text-align: right;'>''*contributed by Jeremy Ribeiro''</div> | <div style='text-align: right;'>''*contributed by Jeremy Ribeiro''</div> |