dblp.uni-trier.dewww.uni-trier.de

Tamir Tassa

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
25EETamir Tassa, Jorge L. Villar: On proper secrets, ( t , k )-bases and linear codes. Des. Codes Cryptography 52(2): 129-154 (2009)
24EEAristides Gionis, Tamir Tassa: k-Anonymization with Minimal Loss of Information. IEEE Trans. Knowl. Data Eng. 21(2): 206-219 (2009)
23EETamir Tassa, Nira Dyn: Multipartite Secret Sharing by Bivariate Interpolation. J. Cryptology 22(2): 227-258 (2009)
2008
22EEAristides Gionis, Arnon Mazza, Tamir Tassa: k-Anonymization Revisited. ICDE 2008: 744-753
21EEOded Blayer, Tamir Tassa: Improved versions of Tardos' fingerprinting scheme. Des. Codes Cryptography 48(1): 79-103 (2008)
20EEJacob Goldberger, Tamir Tassa: A hierarchical clustering algorithm based on the Hungarian method. Pattern Recognition Letters 29(11): 1632-1638 (2008)
19EEAmos Beimel, Tamir Tassa, Enav Weinreb: Characterizing Ideal Weighted Threshold Secret Sharing. SIAM J. Discrete Math. 22(1): 360-397 (2008)
2007
18EEAristides Gionis, Tamir Tassa: k -Anonymization with Minimal Loss of Information. ESA 2007: 439-450
17EETamir Tassa: Hierarchical Threshold Secret Sharing. J. Cryptology 20(2): 237-264 (2007)
2006
16EETamir Tassa, Nira Dyn: Multipartite Secret Sharing by Bivariate Interpolation. ICALP (2) 2006: 288-299
15EEAlexander Jaffe, Mor Naaman, Tamir Tassa, Marc Davis: Generating summaries and visualization for large collections of geo-referenced photographs. Multimedia Information Retrieval 2006: 89-98
14EEAlexander Jaffe, Mor Naaman, Tamir Tassa, Marc Davis: Generating summaries for large collections of geo-referenced photographs. WWW 2006: 853-854
13EENoam Kogan, Tamir Tassa: Improved efficiency for revocation schemes via Newton interpolation. ACM Trans. Inf. Syst. Secur. 9(4): 461-486 (2006)
12EELeah Epstein, Tamir Tassa: Vector assignment schemes for asymmetric settings. Acta Inf. 42(6-7): 501-514 (2006)
11EELeah Epstein, Tamir Tassa: Optimal preemptive scheduling for general target functions. J. Comput. Syst. Sci. 72(1): 132-162 (2006)
2005
10EEAmos Beimel, Tamir Tassa, Enav Weinreb: Characterizing Ideal Weighted Threshold Secret Sharing. TCC 2005: 600-619
9EETamir Tassa: Low Bandwidth Dynamic Traitor Tracing Schemes. J. Cryptology 18(2): 167-183 (2005)
2004
8EELeah Epstein, Tamir Tassa: Optimal Preemptive Scheduling for General Target Functions. MFCS 2004: 562-573
7EETamir Tassa: Hierarchical Threshold Secret Sharing. TCC 2004: 473-490
6EELeah Epstein, Tamir Tassa: Approximation schemes for the Min-Max Starting Time Problem. Acta Inf. 40(9): 657-674 (2004)
2003
5EELeah Epstein, Tamir Tassa: Approximation Schemes for the Min-Max Starting Time Problem. MFCS 2003: 408-418
4EELeah Epstein, Tamir Tassa: Vector assignment problems: a general framework. J. Algorithms 48(2): 360-384 (2003)
2002
3EELeah Epstein, Tamir Tassa: Vector Assignment Problems: A General Framework. ESA 2002: 461-472
2001
2EEAmos Fiat, Tamir Tassa: Dynamic Traitor Tracing. J. Cryptology 14(3): 211-223 (2001)
1999
1EEAmos Fiat, Tamir Tassa: Dynamic Traitor Training. CRYPTO 1999: 354-371

Coauthor Index

1Amos Beimel [10] [19]
2Oded Blayer [21]
3Marc Davis [14] [15]
4Nira Dyn [16] [23]
5Leah Epstein [3] [4] [5] [6] [8] [11] [12]
6Amos Fiat [1] [2]
7Aristides Gionis [18] [22] [24]
8Jacob Goldberger [20]
9Alexander Jaffe [14] [15]
10Noam Kogan [13]
11Arnon Mazza [22]
12Mor Naaman [14] [15]
13Jorge L. Villar [25]
14Enav Weinreb [10] [19]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)