|
Search the dblp DataBase
Tamir Tassa:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Amos Fiat, Tamir Tassa
Dynamic Traitor Training. [Citation Graph (0, 0)][DBLP] CRYPTO, 1999, pp:354-371 [Conf]
- Leah Epstein, Tamir Tassa
Vector Assignment Problems: A General Framework. [Citation Graph (0, 0)][DBLP] ESA, 2002, pp:461-472 [Conf]
- Tamir Tassa, Nira Dyn
Multipartite Secret Sharing by Bivariate Interpolation. [Citation Graph (0, 0)][DBLP] ICALP (2), 2006, pp:288-299 [Conf]
- Leah Epstein, Tamir Tassa
Approximation Schemes for the Min-Max Starting Time Problem. [Citation Graph (0, 0)][DBLP] MFCS, 2003, pp:408-418 [Conf]
- Leah Epstein, Tamir Tassa
Optimal Preemptive Scheduling for General Target Functions. [Citation Graph (0, 0)][DBLP] MFCS, 2004, pp:562-573 [Conf]
- Amos Beimel, Tamir Tassa, Enav Weinreb
Characterizing Ideal Weighted Threshold Secret Sharing. [Citation Graph (0, 0)][DBLP] TCC, 2005, pp:600-619 [Conf]
- Tamir Tassa
Hierarchical Threshold Secret Sharing. [Citation Graph (0, 0)][DBLP] TCC, 2004, pp:473-490 [Conf]
- Alexander Jaffe, Mor Naaman, Tamir Tassa, Marc Davis
Generating summaries for large collections of geo-referenced photographs. [Citation Graph (0, 0)][DBLP] WWW, 2006, pp:853-854 [Conf]
- Leah Epstein, Tamir Tassa
Approximation schemes for the Min-Max Starting Time Problem. [Citation Graph (0, 0)][DBLP] Acta Inf., 2004, v:40, n:9, pp:657-674 [Journal]
- Leah Epstein, Tamir Tassa
Vector assignment schemes for asymmetric settings. [Citation Graph (0, 0)][DBLP] Acta Inf., 2006, v:42, n:6-7, pp:501-514 [Journal]
- Leah Epstein, Tamir Tassa
Vector assignment problems: a general framework. [Citation Graph (0, 0)][DBLP] J. Algorithms, 2003, v:48, n:2, pp:360-384 [Journal]
- Leah Epstein, Tamir Tassa
Optimal preemptive scheduling for general target functions. [Citation Graph (0, 0)][DBLP] J. Comput. Syst. Sci., 2006, v:72, n:1, pp:132-162 [Journal]
- Amos Fiat, Tamir Tassa
Dynamic Traitor Tracing. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2001, v:14, n:3, pp:211-223 [Journal]
- Tamir Tassa
Low Bandwidth Dynamic Traitor Tracing Schemes. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2005, v:18, n:2, pp:167-183 [Journal]
- Noam Kogan, Tamir Tassa
Improved efficiency for revocation schemes via Newton interpolation. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2006, v:9, n:4, pp:461-486 [Journal]
- Aristides Gionis, Tamir Tassa
k -Anonymization with Minimal Loss of Information. [Citation Graph (0, 0)][DBLP] ESA, 2007, pp:439-450 [Conf]
- Alexander Jaffe, Mor Naaman, Tamir Tassa, Marc Davis
Generating summaries and visualization for large collections of geo-referenced photographs. [Citation Graph (0, 0)][DBLP] Multimedia Information Retrieval, 2006, pp:89-98 [Conf]
- Tamir Tassa
Hierarchical Threshold Secret Sharing. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2007, v:20, n:2, pp:237-264 [Journal]
k-Anonymization Revisited. [Citation Graph (, )][DBLP]
Efficient Anonymizations with Enhanced Utility. [Citation Graph (, )][DBLP]
Improved versions of Tardos' fingerprinting scheme. [Citation Graph (, )][DBLP]
On proper secrets, ( t , k )-bases and linear codes. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|