Write
262
edits
Line 68: | Line 68: | ||
* The security of Weak String Erasure has been analyzed in the presence of noise and losses [[Weak String Erasure#References|[2] ]] | * The security of Weak String Erasure has been analyzed in the presence of noise and losses [[Weak String Erasure#References|[2] ]] | ||
==References== | ==References== | ||
#[https://dl.acm.org/citation.cfm?id=2332405 KWW (2012)] | #[https://dl.acm.org/citation.cfm?id=2332405 KWW (2012)] |