The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Tamir Tassa: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Amos Fiat, Tamir Tassa
    Dynamic Traitor Training. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:354-371 [Conf]
  2. Leah Epstein, Tamir Tassa
    Vector Assignment Problems: A General Framework. [Citation Graph (0, 0)][DBLP]
    ESA, 2002, pp:461-472 [Conf]
  3. Tamir Tassa, Nira Dyn
    Multipartite Secret Sharing by Bivariate Interpolation. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:288-299 [Conf]
  4. Leah Epstein, Tamir Tassa
    Approximation Schemes for the Min-Max Starting Time Problem. [Citation Graph (0, 0)][DBLP]
    MFCS, 2003, pp:408-418 [Conf]
  5. Leah Epstein, Tamir Tassa
    Optimal Preemptive Scheduling for General Target Functions. [Citation Graph (0, 0)][DBLP]
    MFCS, 2004, pp:562-573 [Conf]
  6. Amos Beimel, Tamir Tassa, Enav Weinreb
    Characterizing Ideal Weighted Threshold Secret Sharing. [Citation Graph (0, 0)][DBLP]
    TCC, 2005, pp:600-619 [Conf]
  7. Tamir Tassa
    Hierarchical Threshold Secret Sharing. [Citation Graph (0, 0)][DBLP]
    TCC, 2004, pp:473-490 [Conf]
  8. Alexander Jaffe, Mor Naaman, Tamir Tassa, Marc Davis
    Generating summaries for large collections of geo-referenced photographs. [Citation Graph (0, 0)][DBLP]
    WWW, 2006, pp:853-854 [Conf]
  9. Leah Epstein, Tamir Tassa
    Approximation schemes for the Min-Max Starting Time Problem. [Citation Graph (0, 0)][DBLP]
    Acta Inf., 2004, v:40, n:9, pp:657-674 [Journal]
  10. Leah Epstein, Tamir Tassa
    Vector assignment schemes for asymmetric settings. [Citation Graph (0, 0)][DBLP]
    Acta Inf., 2006, v:42, n:6-7, pp:501-514 [Journal]
  11. Leah Epstein, Tamir Tassa
    Vector assignment problems: a general framework. [Citation Graph (0, 0)][DBLP]
    J. Algorithms, 2003, v:48, n:2, pp:360-384 [Journal]
  12. Leah Epstein, Tamir Tassa
    Optimal preemptive scheduling for general target functions. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 2006, v:72, n:1, pp:132-162 [Journal]
  13. Amos Fiat, Tamir Tassa
    Dynamic Traitor Tracing. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2001, v:14, n:3, pp:211-223 [Journal]
  14. Tamir Tassa
    Low Bandwidth Dynamic Traitor Tracing Schemes. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2005, v:18, n:2, pp:167-183 [Journal]
  15. Noam Kogan, Tamir Tassa
    Improved efficiency for revocation schemes via Newton interpolation. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2006, v:9, n:4, pp:461-486 [Journal]
  16. Aristides Gionis, Tamir Tassa
    k -Anonymization with Minimal Loss of Information. [Citation Graph (0, 0)][DBLP]
    ESA, 2007, pp:439-450 [Conf]
  17. Alexander Jaffe, Mor Naaman, Tamir Tassa, Marc Davis
    Generating summaries and visualization for large collections of geo-referenced photographs. [Citation Graph (0, 0)][DBLP]
    Multimedia Information Retrieval, 2006, pp:89-98 [Conf]
  18. Tamir Tassa
    Hierarchical Threshold Secret Sharing. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2007, v:20, n:2, pp:237-264 [Journal]

  19. k-Anonymization Revisited. [Citation Graph (, )][DBLP]


  20. Efficient Anonymizations with Enhanced Utility. [Citation Graph (, )][DBLP]


  21. Improved versions of Tardos' fingerprinting scheme. [Citation Graph (, )][DBLP]


  22. On proper secrets, ( t , k )-bases and linear codes. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002