2009 |
25 | EE | Tamir Tassa,
Jorge L. Villar:
On proper secrets, ( t , k )-bases and linear codes.
Des. Codes Cryptography 52(2): 129-154 (2009) |
24 | EE | Aristides Gionis,
Tamir Tassa:
k-Anonymization with Minimal Loss of Information.
IEEE Trans. Knowl. Data Eng. 21(2): 206-219 (2009) |
23 | EE | Tamir Tassa,
Nira Dyn:
Multipartite Secret Sharing by Bivariate Interpolation.
J. Cryptology 22(2): 227-258 (2009) |
2008 |
22 | EE | Aristides Gionis,
Arnon Mazza,
Tamir Tassa:
k-Anonymization Revisited.
ICDE 2008: 744-753 |
21 | EE | Oded Blayer,
Tamir Tassa:
Improved versions of Tardos' fingerprinting scheme.
Des. Codes Cryptography 48(1): 79-103 (2008) |
20 | EE | Jacob Goldberger,
Tamir Tassa:
A hierarchical clustering algorithm based on the Hungarian method.
Pattern Recognition Letters 29(11): 1632-1638 (2008) |
19 | EE | Amos Beimel,
Tamir Tassa,
Enav Weinreb:
Characterizing Ideal Weighted Threshold Secret Sharing.
SIAM J. Discrete Math. 22(1): 360-397 (2008) |
2007 |
18 | EE | Aristides Gionis,
Tamir Tassa:
k -Anonymization with Minimal Loss of Information.
ESA 2007: 439-450 |
17 | EE | Tamir Tassa:
Hierarchical Threshold Secret Sharing.
J. Cryptology 20(2): 237-264 (2007) |
2006 |
16 | EE | Tamir Tassa,
Nira Dyn:
Multipartite Secret Sharing by Bivariate Interpolation.
ICALP (2) 2006: 288-299 |
15 | EE | Alexander Jaffe,
Mor Naaman,
Tamir Tassa,
Marc Davis:
Generating summaries and visualization for large collections of geo-referenced photographs.
Multimedia Information Retrieval 2006: 89-98 |
14 | EE | Alexander Jaffe,
Mor Naaman,
Tamir Tassa,
Marc Davis:
Generating summaries for large collections of geo-referenced photographs.
WWW 2006: 853-854 |
13 | EE | Noam Kogan,
Tamir Tassa:
Improved efficiency for revocation schemes via Newton interpolation.
ACM Trans. Inf. Syst. Secur. 9(4): 461-486 (2006) |
12 | EE | Leah Epstein,
Tamir Tassa:
Vector assignment schemes for asymmetric settings.
Acta Inf. 42(6-7): 501-514 (2006) |
11 | EE | Leah Epstein,
Tamir Tassa:
Optimal preemptive scheduling for general target functions.
J. Comput. Syst. Sci. 72(1): 132-162 (2006) |
2005 |
10 | EE | Amos Beimel,
Tamir Tassa,
Enav Weinreb:
Characterizing Ideal Weighted Threshold Secret Sharing.
TCC 2005: 600-619 |
9 | EE | Tamir Tassa:
Low Bandwidth Dynamic Traitor Tracing Schemes.
J. Cryptology 18(2): 167-183 (2005) |
2004 |
8 | EE | Leah Epstein,
Tamir Tassa:
Optimal Preemptive Scheduling for General Target Functions.
MFCS 2004: 562-573 |
7 | EE | Tamir Tassa:
Hierarchical Threshold Secret Sharing.
TCC 2004: 473-490 |
6 | EE | Leah Epstein,
Tamir Tassa:
Approximation schemes for the Min-Max Starting Time Problem.
Acta Inf. 40(9): 657-674 (2004) |
2003 |
5 | EE | Leah Epstein,
Tamir Tassa:
Approximation Schemes for the Min-Max Starting Time Problem.
MFCS 2003: 408-418 |
4 | EE | Leah Epstein,
Tamir Tassa:
Vector assignment problems: a general framework.
J. Algorithms 48(2): 360-384 (2003) |
2002 |
3 | EE | Leah Epstein,
Tamir Tassa:
Vector Assignment Problems: A General Framework.
ESA 2002: 461-472 |
2001 |
2 | EE | Amos Fiat,
Tamir Tassa:
Dynamic Traitor Tracing.
J. Cryptology 14(3): 211-223 (2001) |
1999 |
1 | EE | Amos Fiat,
Tamir Tassa:
Dynamic Traitor Training.
CRYPTO 1999: 354-371 |