The SCEAS System
| |||||||

## Search the dblp DataBase
Tamir Tassa:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Amos Fiat, Tamir Tassa
**Dynamic Traitor Training.**[Citation Graph (0, 0)][DBLP] CRYPTO, 1999, pp:354-371 [Conf] - Leah Epstein, Tamir Tassa
**Vector Assignment Problems: A General Framework.**[Citation Graph (0, 0)][DBLP] ESA, 2002, pp:461-472 [Conf] - Tamir Tassa, Nira Dyn
**Multipartite Secret Sharing by Bivariate Interpolation.**[Citation Graph (0, 0)][DBLP] ICALP (2), 2006, pp:288-299 [Conf] - Leah Epstein, Tamir Tassa
**Approximation Schemes for the Min-Max Starting Time Problem.**[Citation Graph (0, 0)][DBLP] MFCS, 2003, pp:408-418 [Conf] - Leah Epstein, Tamir Tassa
**Optimal Preemptive Scheduling for General Target Functions.**[Citation Graph (0, 0)][DBLP] MFCS, 2004, pp:562-573 [Conf] - Amos Beimel, Tamir Tassa, Enav Weinreb
**Characterizing Ideal Weighted Threshold Secret Sharing.**[Citation Graph (0, 0)][DBLP] TCC, 2005, pp:600-619 [Conf] - Tamir Tassa
**Hierarchical Threshold Secret Sharing.**[Citation Graph (0, 0)][DBLP] TCC, 2004, pp:473-490 [Conf] - Alexander Jaffe, Mor Naaman, Tamir Tassa, Marc Davis
**Generating summaries for large collections of geo-referenced photographs.**[Citation Graph (0, 0)][DBLP] WWW, 2006, pp:853-854 [Conf] - Leah Epstein, Tamir Tassa
**Approximation schemes for the Min-Max Starting Time Problem.**[Citation Graph (0, 0)][DBLP] Acta Inf., 2004, v:40, n:9, pp:657-674 [Journal] - Leah Epstein, Tamir Tassa
**Vector assignment schemes for asymmetric settings.**[Citation Graph (0, 0)][DBLP] Acta Inf., 2006, v:42, n:6-7, pp:501-514 [Journal] - Leah Epstein, Tamir Tassa
**Vector assignment problems: a general framework.**[Citation Graph (0, 0)][DBLP] J. Algorithms, 2003, v:48, n:2, pp:360-384 [Journal] - Leah Epstein, Tamir Tassa
**Optimal preemptive scheduling for general target functions.**[Citation Graph (0, 0)][DBLP] J. Comput. Syst. Sci., 2006, v:72, n:1, pp:132-162 [Journal] - Amos Fiat, Tamir Tassa
**Dynamic Traitor Tracing.**[Citation Graph (0, 0)][DBLP] J. Cryptology, 2001, v:14, n:3, pp:211-223 [Journal] - Tamir Tassa
**Low Bandwidth Dynamic Traitor Tracing Schemes.**[Citation Graph (0, 0)][DBLP] J. Cryptology, 2005, v:18, n:2, pp:167-183 [Journal] - Noam Kogan, Tamir Tassa
**Improved efficiency for revocation schemes via Newton interpolation.**[Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2006, v:9, n:4, pp:461-486 [Journal] - Aristides Gionis, Tamir Tassa
[Citation Graph (0, 0)][DBLP]*k*-Anonymization with Minimal Loss of Information. ESA, 2007, pp:439-450 [Conf] - Alexander Jaffe, Mor Naaman, Tamir Tassa, Marc Davis
**Generating summaries and visualization for large collections of geo-referenced photographs.**[Citation Graph (0, 0)][DBLP] Multimedia Information Retrieval, 2006, pp:89-98 [Conf] - Tamir Tassa
**Hierarchical Threshold Secret Sharing.**[Citation Graph (0, 0)][DBLP] J. Cryptology, 2007, v:20, n:2, pp:237-264 [Journal] **k-Anonymization Revisited.**[Citation Graph (, )][DBLP]**Efficient Anonymizations with Enhanced Utility.**[Citation Graph (, )][DBLP]**Improved versions of Tardos' fingerprinting scheme.**[Citation Graph (, )][DBLP]**On proper secrets, (**[Citation Graph (, )][DBLP]*t*,*k*)-bases and linear codes.
Search in 0.002secs, Finished in 0.003secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |