iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://dblp.uni-trier.de/pid/04/2852.bib
@article{DBLP:journals/popets/TassaY24, author = {Tamir Tassa and Avishay Yanai}, title = {The Multiple Millionaires' Problem: New Algorithmic Approaches and Protocols}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2024}, number = {4}, pages = {784--796}, year = {2024}, url = {https://doi.org/10.56553/popets-2024-0141}, doi = {10.56553/POPETS-2024-0141}, timestamp = {Thu, 18 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/TassaY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/tist/PessachTS24, author = {Dana Pessach and Tamir Tassa and Erez Shmueli}, title = {Fairness-Driven Private Collaborative Machine Learning}, journal = {{ACM} Trans. Intell. Syst. Technol.}, volume = {15}, number = {2}, pages = {27:1--27:30}, year = {2024}, url = {https://doi.org/10.1145/3639368}, doi = {10.1145/3639368}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tist/PessachTS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/IEEEares/TassaD24, author = {Tamir Tassa and Lihi Dery}, title = {Towards Secure Virtual Elections: Multiparty Computation of Order Based Voting Rules}, booktitle = {Proceedings of the 19th International Conference on Availability, Reliability and Security, {ARES} 2024, Vienna, Austria, 30 July 2024 - 2 August 2024}, pages = {18:1--18:11}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3664476.3664503}, doi = {10.1145/3664476.3664503}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/TassaD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/TassaY24, author = {Tamir Tassa and Avishay Yanai}, title = {The Multiple Millionaires' Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {5}, year = {2024}, url = {https://eprint.iacr.org/2024/005}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/TassaY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/ArieT24, author = {Aviad Ben Arie and Tamir Tassa}, title = {Distributed Protocols for Oblivious Transfer and Polynomial Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {9}, year = {2024}, url = {https://eprint.iacr.org/2024/009}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ArieT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/ai/KoganTG23, author = {Pablo Kogan and Tamir Tassa and Tal Grinshpoun}, title = {Privacy preserving solution of DCOPs by mediation}, journal = {Artif. Intell.}, volume = {319}, pages = {103916}, year = {2023}, url = {https://doi.org/10.1016/j.artint.2023.103916}, doi = {10.1016/J.ARTINT.2023.103916}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ai/KoganTG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/indocrypt/ArieT23, author = {Aviad Ben Arie and Tamir Tassa}, editor = {Anupam Chattopadhyay and Shivam Bhasin and Stjepan Picek and Chester Rebeiro}, title = {Distributed Protocols for Oblivious Transfer and Polynomial Evaluation}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2023 - 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14460}, pages = {62--83}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56235-8\_4}, doi = {10.1007/978-3-031-56235-8\_4}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/ArieT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/tist/TassaH22, author = {Tamir Tassa and Alon Ben Horin}, title = {Privacy-preserving Collaborative Filtering by Distributed Mediation}, journal = {{ACM} Trans. Intell. Syst. Technol.}, volume = {13}, number = {6}, pages = {102:1--102:26}, year = {2022}, url = {https://doi.org/10.1145/3542950}, doi = {10.1145/3542950}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tist/TassaH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/cscml/KoganTG22, author = {Pablo Kogan and Tamir Tassa and Tal Grinshpoun}, editor = {Shlomi Dolev and Jonathan Katz and Amnon Meisels}, title = {Privacy Preserving {DCOP} Solving by Mediation}, booktitle = {Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, {CSCML} 2022, Be'er Sheva, Israel, June 30 - July 1, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13301}, pages = {487--498}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07689-3\_34}, doi = {10.1007/978-3-031-07689-3\_34}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscml/KoganTG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-2205-10580, author = {Tamir Tassa and Lihi Dery}, title = {Towards Secure Virtual Elections: Multiparty Computation of Order Based Voting Rules}, journal = {CoRR}, volume = {abs/2205.10580}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.10580}, doi = {10.48550/ARXIV.2205.10580}, eprinttype = {arXiv}, eprint = {2205.10580}, timestamp = {Mon, 30 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-10580.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/ai/TassaGY21, author = {Tamir Tassa and Tal Grinshpoun and Avishay Yanai}, title = {PC-SyncBB: {A} privacy preserving collusion secure {DCOP} algorithm}, journal = {Artif. Intell.}, volume = {297}, pages = {103501}, year = {2021}, url = {https://doi.org/10.1016/j.artint.2021.103501}, doi = {10.1016/J.ARTINT.2021.103501}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ai/TassaGY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/eswa/DeryTY21, author = {Lihi Dery and Tamir Tassa and Avishay Yanai}, title = {Fear not, vote truthfully: Secure Multiparty Computation of score based rules}, journal = {Expert Syst. Appl.}, volume = {168}, pages = {114434}, year = {2021}, url = {https://doi.org/10.1016/j.eswa.2020.114434}, doi = {10.1016/J.ESWA.2020.114434}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eswa/DeryTY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/ccs/DeryTYZ21, author = {Lihi Dery and Tamir Tassa and Avishay Yanai and Arthur Zamarin}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {{DEMO:} {A} Secure Voting System for Score Based Elections}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {2399--2401}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3485343}, doi = {10.1145/3460120.3485343}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DeryTYZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/recsys/HorinT21, author = {Alon Ben Horin and Tamir Tassa}, editor = {Humberto Jes{\'{u}}s Corona Pamp{\'{\i}}n and Martha A. Larson and Martijn C. Willemsen and Joseph A. Konstan and Julian J. McAuley and Jean Garcia{-}Gathright and Bouke Huurnink and Even Oldridge}, title = {Privacy Preserving Collaborative Filtering by Distributed Mediation}, booktitle = {RecSys '21: Fifteenth {ACM} Conference on Recommender Systems, Amsterdam, The Netherlands, 27 September 2021 - 1 October 2021}, pages = {332--341}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460231.3474251}, doi = {10.1145/3460231.3474251}, timestamp = {Mon, 20 Sep 2021 17:35:14 +0200}, biburl = {https://dblp.org/rec/conf/recsys/HorinT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-2109-14376, author = {Dana Pessach and Tamir Tassa and Erez Shmueli}, title = {Fairness-Driven Private Collaborative Machine Learning}, journal = {CoRR}, volume = {abs/2109.14376}, year = {2021}, url = {https://arxiv.org/abs/2109.14376}, eprinttype = {arXiv}, eprint = {2109.14376}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-14376.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/ijdsa/EdizelBHPT20, author = {Bora Edizel and Francesco Bonchi and Sara Hajian and Andr{\'{e}} Panisson and Tamir Tassa}, title = {FaiRecSys: mitigating algorithmic bias in recommender systems}, journal = {Int. J. Data Sci. Anal.}, volume = {9}, number = {2}, pages = {197--213}, year = {2020}, url = {https://doi.org/10.1007/s41060-019-00181-5}, doi = {10.1007/S41060-019-00181-5}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsa/EdizelBHPT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/tist/ShmueliT20, author = {Erez Shmueli and Tamir Tassa}, title = {Mediated Secure Multi-Party Protocols for Collaborative Filtering}, journal = {{ACM} Trans. Intell. Syst. Technol.}, volume = {11}, number = {2}, pages = {15:1--15:25}, year = {2020}, url = {https://doi.org/10.1145/3375402}, doi = {10.1145/3375402}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tist/ShmueliT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/ai/GrinshpounTLZ19, author = {Tal Grinshpoun and Tamir Tassa and Vadim Levit and Roie Zivan}, title = {Privacy preserving region optimal algorithms for symmetric and asymmetric DCOPs}, journal = {Artif. Intell.}, volume = {266}, pages = {27--50}, year = {2019}, url = {https://doi.org/10.1016/j.artint.2018.08.002}, doi = {10.1016/J.ARTINT.2018.08.002}, timestamp = {Tue, 12 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ai/GrinshpounTLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/tdp/BarshapT19, author = {Guy Barshap and Tamir Tassa}, title = {Privacy-Preserving Planarity Testing of Distributed Graphs}, journal = {Trans. Data Priv.}, volume = {12}, number = {2}, pages = {117--144}, year = {2019}, url = {http://www.tdp.cat/issues16/abs.a338a18.php}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdp/BarshapT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/ijcai/TassaGY19, author = {Tamir Tassa and Tal Grinshpoun and Avishay Yanai}, editor = {Sarit Kraus}, title = {A Privacy Preserving Collusion Secure {DCOP} Algorithm}, booktitle = {Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, {IJCAI} 2019, Macao, China, August 10-16, 2019}, pages = {4774--4780}, publisher = {ijcai.org}, year = {2019}, url = {https://doi.org/10.24963/ijcai.2019/663}, doi = {10.24963/IJCAI.2019/663}, timestamp = {Tue, 15 Oct 2024 16:43:28 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/TassaGY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-1903-06472, author = {Lihi Dery and Tamir Tassa}, title = {Secure Voting Protocols with Perfect Ballot Secrecy}, journal = {CoRR}, volume = {abs/1903.06472}, year = {2019}, url = {http://arxiv.org/abs/1903.06472}, eprinttype = {arXiv}, eprint = {1903.06472}, timestamp = {Mon, 01 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1903-06472.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-1905-09013, author = {Tamir Tassa and Tal Grinshpoun and Avishay Yanai}, title = {A Privacy Preserving Collusion Secure {DCOP} Algorithm}, journal = {CoRR}, volume = {abs/1905.09013}, year = {2019}, url = {http://arxiv.org/abs/1905.09013}, eprinttype = {arXiv}, eprint = {1905.09013}, timestamp = {Wed, 29 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-09013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/dbsec/BarshapT18, author = {Guy Barshap and Tamir Tassa}, editor = {Florian Kerschbaum and Stefano Paraboschi}, title = {Privacy-Preserving Planarity Testing of Distributed Graphs}, booktitle = {Data and Applications Security and Privacy {XXXII} - 32nd Annual {IFIP} {WG} 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10980}, pages = {131--147}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-95729-6\_9}, doi = {10.1007/978-3-319-95729-6\_9}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/BarshapT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/jair/TassaGZ17, author = {Tamir Tassa and Tal Grinshpoun and Roie Zivan}, title = {Privacy Preserving Implementation of the Max-Sum Algorithm and its Variants}, journal = {J. Artif. Intell. Res.}, volume = {59}, pages = {311--349}, year = {2017}, url = {https://doi.org/10.1613/jair.5504}, doi = {10.1613/JAIR.5504}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jair/TassaGZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/recsys/ShmueliT17, author = {Erez Shmueli and Tamir Tassa}, editor = {Paolo Cremonesi and Francesco Ricci and Shlomo Berkovsky and Alexander Tuzhilin}, title = {Secure Multi-Party Protocols for Item-Based Collaborative Filtering}, booktitle = {Proceedings of the Eleventh {ACM} Conference on Recommender Systems, RecSys 2017, Como, Italy, August 27-31, 2017}, pages = {89--97}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3109859.3109881}, doi = {10.1145/3109859.3109881}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/recsys/ShmueliT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/www/AsharovBGT17, author = {Gilad Asharov and Francesco Bonchi and David Garc{\'{\i}}a{-}Soriano and Tamir Tassa}, editor = {Rick Barrett and Rick Cummings and Eugene Agichtein and Evgeniy Gabrilovich}, title = {Secure Centrality Computation Over Multiple Networks}, booktitle = {Proceedings of the 26th International Conference on World Wide Web, {WWW} 2017, Perth, Australia, April 3-7, 2017}, pages = {957--966}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3038912.3052602}, doi = {10.1145/3038912.3052602}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/AsharovBGT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/jair/GrinshpounT16, author = {Tal Grinshpoun and Tamir Tassa}, title = {P-SyncBB: {A} Privacy Preserving Branch and Bound {DCOP} Algorithm}, journal = {J. Artif. Intell. Res.}, volume = {57}, pages = {621--660}, year = {2016}, url = {http://jair.org/papers/paper5322.html}, timestamp = {Wed, 21 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jair/GrinshpounT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/jcs/DavidsonTG16, author = {Michal Davidson and Tamir Tassa and Ehud Gudes}, title = {Content sharing schemes in {DRM} systems with enhanced performance and privacy preservation}, journal = {J. Comput. Secur.}, volume = {24}, number = {6}, pages = {667--688}, year = {2016}, url = {https://doi.org/10.3233/JCS-15746}, doi = {10.3233/JCS-15746}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/DavidsonTG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/snam/HajianTB16, author = {Sara Hajian and Tamir Tassa and Francesco Bonchi}, title = {Individual privacy in social influence networks}, journal = {Soc. Netw. Anal. Min.}, volume = {6}, number = {1}, pages = {2:1--2:14}, year = {2016}, url = {https://doi.org/10.1007/s13278-015-0312-y}, doi = {10.1007/S13278-015-0312-Y}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/snam/HajianTB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/IEEEares/GonenT16, author = {Rica Gonen and Tamir Tassa}, title = {Privacy Preserving Computations for Viral Marketing: The Case of Rational Players}, booktitle = {11th International Conference on Availability, Reliability and Security, {ARES} 2016, Salzburg, Austria, August 31 - September 2, 2016}, pages = {677--686}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ARES.2016.5}, doi = {10.1109/ARES.2016.5}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/GonenT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/ijcai/TassaZG16, author = {Tamir Tassa and Roie Zivan and Tal Grinshpoun}, editor = {Subbarao Kambhampati}, title = {Preserving Privacy in Region Optimal {DCOP} Algorithms}, booktitle = {Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, {IJCAI} 2016, New York, NY, USA, 9-15 July 2016}, pages = {496--502}, publisher = {{IJCAI/AAAI} Press}, year = {2016}, url = {http://www.ijcai.org/Abstract/16/077}, timestamp = {Tue, 20 Aug 2019 16:19:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/TassaZG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/dke/HerranzNRT15, author = {Javier Herranz and Jordi Nin and Pablo Rodr{\'{\i}}guez and Tamir Tassa}, title = {Revisiting distance-based record linkage for privacy-preserving release of statistical datasets}, journal = {Data Knowl. Eng.}, volume = {100}, pages = {78--93}, year = {2015}, url = {https://doi.org/10.1016/j.datak.2015.07.009}, doi = {10.1016/J.DATAK.2015.07.009}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dke/HerranzNRT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/isci/ShmueliT15, author = {Erez Shmueli and Tamir Tassa}, title = {Privacy by diversity in sequential releases of databases}, journal = {Inf. Sci.}, volume = {298}, pages = {344--372}, year = {2015}, url = {https://doi.org/10.1016/j.ins.2014.11.005}, doi = {10.1016/J.INS.2014.11.005}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ShmueliT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/ijcai/TassaZG15, author = {Tamir Tassa and Roie Zivan and Tal Grinshpoun}, editor = {Qiang Yang and Michael J. Wooldridge}, title = {Max-Sum Goes Private}, booktitle = {Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, {IJCAI} 2015, Buenos Aires, Argentina, July 25-31, 2015}, pages = {425--431}, publisher = {{AAAI} Press}, year = {2015}, url = {http://ijcai.org/Abstract/15/066}, timestamp = {Tue, 20 Aug 2019 16:16:43 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/TassaZG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/kdd/FeldmanT15, author = {Dan Feldman and Tamir Tassa}, editor = {Longbing Cao and Chengqi Zhang and Thorsten Joachims and Geoffrey I. Webb and Dragos D. Margineantu and Graham Williams}, title = {More Constraints, Smaller Coresets: Constrained Matrix Approximation of Sparse Big Data}, booktitle = {Proceedings of the 21th {ACM} {SIGKDD} International Conference on Knowledge Discovery and Data Mining, Sydney, NSW, Australia, August 10-13, 2015}, pages = {249--258}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2783258.2783312}, doi = {10.1145/2783258.2783312}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kdd/FeldmanT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/ijrr/EzairTS14, author = {Ben Ezair and Tamir Tassa and Zvi Shiller}, title = {Planning high order trajectories with general initial and final conditions and asymmetric bounds}, journal = {Int. J. Robotics Res.}, volume = {33}, number = {6}, pages = {898--916}, year = {2014}, url = {https://doi.org/10.1177/0278364913517148}, doi = {10.1177/0278364913517148}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijrr/EzairTS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/isci/LastTZS14, author = {Mark Last and Tamir Tassa and Alexandra Zhmudyak and Erez Shmueli}, title = {Improving accuracy of classification models induced from anonymized datasets}, journal = {Inf. Sci.}, volume = {256}, pages = {138--161}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2013.07.034}, doi = {10.1016/J.INS.2013.07.034}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/LastTZS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/isci/BonchiGT14, author = {Francesco Bonchi and Aristides Gionis and Tamir Tassa}, title = {Identity obfuscation in graphs through the information theoretic lens}, journal = {Inf. Sci.}, volume = {275}, pages = {232--256}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.02.035}, doi = {10.1016/J.INS.2014.02.035}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/BonchiGT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/isci/ShmueliZYT14, author = {Erez Shmueli and Tomer Zrihen and Ran Yahalom and Tamir Tassa}, title = {Constrained obfuscation of relational databases}, journal = {Inf. Sci.}, volume = {286}, pages = {35--62}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.07.009}, doi = {10.1016/J.INS.2014.07.009}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ShmueliZYT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/tkde/Tassa14, author = {Tamir Tassa}, title = {Secure Mining of Association Rules inHorizontally Distributed Databases}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {26}, number = {4}, pages = {970--983}, year = {2014}, url = {https://doi.org/10.1109/TKDE.2013.41}, doi = {10.1109/TKDE.2013.41}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/Tassa14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/atal/GrinshpounT14, author = {Tal Grinshpoun and Tamir Tassa}, editor = {Ana L. C. Bazzan and Michael N. Huhns and Alessio Lomuscio and Paul Scerri}, title = {A privacy-preserving algorithm for distributed constraint optimization}, booktitle = {International conference on Autonomous Agents and Multi-Agent Systems, {AAMAS} '14, Paris, France, May 5-9, 2014}, pages = {909--916}, publisher = {{IFAAMAS/ACM}}, year = {2014}, url = {http://dl.acm.org/citation.cfm?id=2617391}, timestamp = {Thu, 25 Sep 2014 07:46:15 +0200}, biburl = {https://dblp.org/rec/conf/atal/GrinshpounT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/dbsec/DavidsonGT14, author = {Michal Davidson and Ehud Gudes and Tamir Tassa}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Efficient and Enhanced Solutions for Content Sharing in {DRM} Systems}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {373--381}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_25}, doi = {10.1007/978-3-662-43936-4\_25}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/DavidsonGT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/edbt/TassaB14, author = {Tamir Tassa and Francesco Bonchi}, editor = {Sihem Amer{-}Yahia and Vassilis Christophides and Anastasios Kementsietsidis and Minos N. Garofalakis and Stratos Idreos and Vincent Leroy}, title = {Privacy Preserving Estimation of Social Influence}, booktitle = {Proceedings of the 17th International Conference on Extending Database Technology, {EDBT} 2014, Athens, Greece, March 24-28, 2014}, pages = {559--570}, publisher = {OpenProceedings.org}, year = {2014}, url = {https://doi.org/10.5441/002/edbt.2014.50}, doi = {10.5441/002/EDBT.2014.50}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edbt/TassaB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/jmc/TassaJB13, author = {Tamir Tassa and Ayman Jarrous and Yonatan Ben{-}Ya'akov}, title = {Oblivious evaluation of multivariate polynomials}, journal = {J. Math. Cryptol.}, volume = {7}, number = {1}, pages = {1--29}, year = {2013}, url = {https://doi.org/10.1515/jmc-2012-0007}, doi = {10.1515/JMC-2012-0007}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/TassaJB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/tcs/Tassa13, author = {Tamir Tassa}, title = {Addendum to "Finding all maximally-matchable edges in a bipartite graph" [Theoret. Comput. Sci. 423 {(2012)} 50-58]}, journal = {Theor. Comput. Sci.}, volume = {491}, pages = {136}, year = {2013}, url = {https://doi.org/10.1016/j.tcs.2013.03.015}, doi = {10.1016/J.TCS.2013.03.015}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/Tassa13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/tdp/CliftonT13, author = {Chris Clifton and Tamir Tassa}, title = {On Syntactic Anonymity and Differential Privacy}, journal = {Trans. Data Priv.}, volume = {6}, number = {2}, pages = {161--183}, year = {2013}, url = {http://www.tdp.cat/issues11/abs.a124a13.php}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdp/CliftonT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/tkde/TassaC13, author = {Tamir Tassa and Dror J. Cohen}, title = {Anonymization of Centralized and Distributed Social Networks by Sequential Clustering}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {25}, number = {2}, pages = {311--324}, year = {2013}, url = {https://doi.org/10.1109/TKDE.2011.232}, doi = {10.1109/TKDE.2011.232}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/TassaC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/icde/CliftonT13, author = {Chris Clifton and Tamir Tassa}, editor = {Chee Yong Chan and Jiaheng Lu and Kjetil N{\o}rv{\aa}g and Egemen Tanin}, title = {On syntactic anonymity and differential privacy}, booktitle = {Workshops Proceedings of the 29th {IEEE} International Conference on Data Engineering, {ICDE} 2013, Brisbane, Australia, April 8-12, 2013}, pages = {88--93}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICDEW.2013.6547433}, doi = {10.1109/ICDEW.2013.6547433}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/CliftonT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/datamine/KenigT12, author = {Batya Kenig and Tamir Tassa}, title = {A practical approximation algorithm for optimal k-anonymity}, journal = {Data Min. Knowl. Discov.}, volume = {25}, number = {1}, pages = {134--168}, year = {2012}, url = {https://doi.org/10.1007/s10618-011-0235-9}, doi = {10.1007/S10618-011-0235-9}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/datamine/KenigT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/isci/ShmueliTWSR12, author = {Erez Shmueli and Tamir Tassa and Raz Wasserstein and Bracha Shapira and Lior Rokach}, title = {Limiting disclosure of sensitive data in sequential releases of databases}, journal = {Inf. Sci.}, volume = {191}, pages = {98--127}, year = {2012}, url = {https://doi.org/10.1016/j.ins.2011.12.020}, doi = {10.1016/J.INS.2011.12.020}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/ShmueliTWSR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/pvldb/BoldiBGT12, author = {Paolo Boldi and Francesco Bonchi and Aristides Gionis and Tamir Tassa}, title = {Injecting Uncertainty in Graphs for Identity Obfuscation}, journal = {Proc. {VLDB} Endow.}, volume = {5}, number = {11}, pages = {1376--1387}, year = {2012}, url = {http://vldb.org/pvldb/vol5/p1376\_paoloboldi\_vldb2012.pdf}, doi = {10.14778/2350229.2350254}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/BoldiBGT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/tcs/Tassa12, author = {Tamir Tassa}, title = {Finding all maximally-matchable edges in a bipartite graph}, journal = {Theor. Comput. Sci.}, volume = {423}, pages = {50--58}, year = {2012}, url = {https://doi.org/10.1016/j.tcs.2011.12.071}, doi = {10.1016/J.TCS.2011.12.071}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/Tassa12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/tdp/TassaMG12, author = {Tamir Tassa and Arnon Mazza and Aristides Gionis}, title = {k-Concealment: An Alternative Model of k-Type Anonymity}, journal = {Trans. Data Priv.}, volume = {5}, number = {1}, pages = {189--222}, year = {2012}, url = {http://www.tdp.cat/issues11/abs.a069a11.php}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdp/TassaMG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/tods/TassaG12, author = {Tamir Tassa and Ehud Gudes}, title = {Secure distributed computation of anonymized views of shared databases}, journal = {{ACM} Trans. Database Syst.}, volume = {37}, number = {2}, pages = {11:1--11:43}, year = {2012}, url = {https://doi.org/10.1145/2188349.2188353}, doi = {10.1145/2188349.2188353}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tods/TassaG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-1208-4145, author = {Paolo Boldi and Francesco Bonchi and Aristides Gionis and Tamir Tassa}, title = {Injecting Uncertainty in Graphs for Identity Obfuscation}, journal = {CoRR}, volume = {abs/1208.4145}, year = {2012}, url = {http://arxiv.org/abs/1208.4145}, eprinttype = {arXiv}, eprint = {1208.4145}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1208-4145.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/dcc/Tassa11, author = {Tamir Tassa}, title = {Generalized oblivious transfer by secret sharing}, journal = {Des. Codes Cryptogr.}, volume = {58}, number = {1}, pages = {11--21}, year = {2011}, url = {https://doi.org/10.1007/s10623-010-9378-8}, doi = {10.1007/S10623-010-9378-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Tassa11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/icde/BonchiGT11, author = {Francesco Bonchi and Aristides Gionis and Tamir Tassa}, editor = {Serge Abiteboul and Klemens B{\"{o}}hm and Christoph Koch and Kian{-}Lee Tan}, title = {Identity obfuscation in graphs through the information theoretic lens}, booktitle = {Proceedings of the 27th International Conference on Data Engineering, {ICDE} 2011, April 11-16, 2011, Hannover, Germany}, pages = {924--935}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICDE.2011.5767905}, doi = {10.1109/ICDE.2011.5767905}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/BonchiGT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-1106-5113, author = {Tamir Tassa}, title = {Secure Mining of Association Rules in Horizontally Distributed Databases}, journal = {CoRR}, volume = {abs/1106.5113}, year = {2011}, url = {http://arxiv.org/abs/1106.5113}, eprinttype = {arXiv}, eprint = {1106.5113}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1106-5113.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-1107-4711, author = {Tamir Tassa}, title = {Finding All Allowed Edges in a Bipartite Graph}, journal = {CoRR}, volume = {abs/1107.4711}, year = {2011}, url = {http://arxiv.org/abs/1107.4711}, eprinttype = {arXiv}, eprint = {1107.4711}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1107-4711.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/tdp/GoldbergerT10, author = {Jacob Goldberger and Tamir Tassa}, title = {Efficient Anonymizations with Enhanced Utility}, journal = {Trans. Data Priv.}, volume = {3}, number = {2}, pages = {149--175}, year = {2010}, url = {http://www.tdp.cat/issues/abs.a047a10.php}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdp/GoldbergerT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/dcc/TassaV09, author = {Tamir Tassa and Jorge L. Villar}, title = {On proper secrets, {(} \emph{t} , \emph{k} )-bases and linear codes}, journal = {Des. Codes Cryptogr.}, volume = {52}, number = {2}, pages = {129--154}, year = {2009}, url = {https://doi.org/10.1007/s10623-009-9272-4}, doi = {10.1007/S10623-009-9272-4}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/TassaV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/joc/TassaD09, author = {Tamir Tassa and Nira Dyn}, title = {Multipartite Secret Sharing by Bivariate Interpolation}, journal = {J. Cryptol.}, volume = {22}, number = {2}, pages = {227--258}, year = {2009}, url = {https://doi.org/10.1007/s00145-008-9027-9}, doi = {10.1007/S00145-008-9027-9}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/TassaD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/tkde/GionisT09, author = {Aristides Gionis and Tamir Tassa}, title = {k-Anonymization with Minimal Loss of Information}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {21}, number = {2}, pages = {206--219}, year = {2009}, url = {https://doi.org/10.1109/TKDE.2008.129}, doi = {10.1109/TKDE.2008.129}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/GionisT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/icdm/GoldbergerT09, author = {Jacob Goldberger and Tamir Tassa}, editor = {Y{\"{u}}cel Saygin and Jeffrey Xu Yu and Hillol Kargupta and Wei Wang and Sanjay Ranka and Philip S. Yu and Xindong Wu}, title = {Efficient Anonymizations with Enhanced Utility}, booktitle = {{ICDM} Workshops 2009, {IEEE} International Conference on Data Mining Workshops, Miami, Florida, USA, 6 December 2009}, pages = {106--113}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICDMW.2009.15}, doi = {10.1109/ICDMW.2009.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdm/GoldbergerT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/dcc/BlayerT08, author = {Oded Blayer and Tamir Tassa}, title = {Improved versions of Tardos' fingerprinting scheme}, journal = {Des. Codes Cryptogr.}, volume = {48}, number = {1}, pages = {79--103}, year = {2008}, url = {https://doi.org/10.1007/s10623-008-9200-z}, doi = {10.1007/S10623-008-9200-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BlayerT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/prl/GoldbergerT08, author = {Jacob Goldberger and Tamir Tassa}, title = {A hierarchical clustering algorithm based on the Hungarian method}, journal = {Pattern Recognit. Lett.}, volume = {29}, number = {11}, pages = {1632--1638}, year = {2008}, url = {https://doi.org/10.1016/j.patrec.2008.04.003}, doi = {10.1016/J.PATREC.2008.04.003}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/prl/GoldbergerT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/siamdm/BeimelTW08, author = {Amos Beimel and Tamir Tassa and Enav Weinreb}, title = {Characterizing Ideal Weighted Threshold Secret Sharing}, journal = {{SIAM} J. Discret. Math.}, volume = {22}, number = {1}, pages = {360--397}, year = {2008}, url = {https://doi.org/10.1137/S0895480104445654}, doi = {10.1137/S0895480104445654}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamdm/BeimelTW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/icde/GionisMT08, author = {Aristides Gionis and Arnon Mazza and Tamir Tassa}, editor = {Gustavo Alonso and Jos{\'{e}} A. Blakeley and Arbee L. P. Chen}, title = {k-Anonymization Revisited}, booktitle = {Proceedings of the 24th International Conference on Data Engineering, {ICDE} 2008, April 7-12, 2008, Canc{\'{u}}n, Mexico}, pages = {744--753}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICDE.2008.4497483}, doi = {10.1109/ICDE.2008.4497483}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/GionisMT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/joc/Tassa07, author = {Tamir Tassa}, title = {Hierarchical Threshold Secret Sharing}, journal = {J. Cryptol.}, volume = {20}, number = {2}, pages = {237--264}, year = {2007}, url = {https://doi.org/10.1007/s00145-006-0334-8}, doi = {10.1007/S00145-006-0334-8}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Tassa07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/esa/GionisT07, author = {Aristides Gionis and Tamir Tassa}, editor = {Lars Arge and Michael Hoffmann and Emo Welzl}, title = {\emph{k} -Anonymization with Minimal Loss of Information}, booktitle = {Algorithms - {ESA} 2007, 15th Annual European Symposium, Eilat, Israel, October 8-10, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4698}, pages = {439--450}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75520-3\_40}, doi = {10.1007/978-3-540-75520-3\_40}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/esa/GionisT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/acta/EpsteinT06, author = {Leah Epstein and Tamir Tassa}, title = {Vector assignment schemes for asymmetric settings}, journal = {Acta Informatica}, volume = {42}, number = {6-7}, pages = {501--514}, year = {2006}, url = {https://doi.org/10.1007/s00236-005-0003-7}, doi = {10.1007/S00236-005-0003-7}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acta/EpsteinT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/jcss/EpsteinT06, author = {Leah Epstein and Tamir Tassa}, title = {Optimal preemptive scheduling for general target functions}, journal = {J. Comput. Syst. Sci.}, volume = {72}, number = {1}, pages = {132--162}, year = {2006}, url = {https://doi.org/10.1016/j.jcss.2005.08.002}, doi = {10.1016/J.JCSS.2005.08.002}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/EpsteinT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/tissec/KoganT06, author = {Noam Kogan and Tamir Tassa}, title = {Improved efficiency for revocation schemes via Newton interpolation}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {9}, number = {4}, pages = {461--486}, year = {2006}, url = {https://doi.org/10.1145/1187441.1187444}, doi = {10.1145/1187441.1187444}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/KoganT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/icalp/TassaD06, author = {Tamir Tassa and Nira Dyn}, editor = {Michele Bugliesi and Bart Preneel and Vladimiro Sassone and Ingo Wegener}, title = {Multipartite Secret Sharing by Bivariate Interpolation}, booktitle = {Automata, Languages and Programming, 33rd International Colloquium, {ICALP} 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4052}, pages = {288--299}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11787006\_25}, doi = {10.1007/11787006\_25}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/TassaD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/mir/JaffeNTD06, author = {Alexander Jaffe and Mor Naaman and Tamir Tassa and Marc Davis}, editor = {James Ze Wang and Nozha Boujemaa and Yixin Chen}, title = {Generating summaries and visualization for large collections of geo-referenced photographs}, booktitle = {Proceedings of the 8th {ACM} {SIGMM} International Workshop on Multimedia Information Retrieval, {MIR} 2006, October 26-27, 2006, Santa Barbara, California, {USA}}, pages = {89--98}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1178677.1178692}, doi = {10.1145/1178677.1178692}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mir/JaffeNTD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/www/JaffeNTD06, author = {Alexander Jaffe and Mor Naaman and Tamir Tassa and Marc Davis}, editor = {Les Carr and David De Roure and Arun Iyengar and Carole A. Goble and Michael Dahlin}, title = {Generating summaries for large collections of geo-referenced photographs}, booktitle = {Proceedings of the 15th international conference on World Wide Web, {WWW} 2006, Edinburgh, Scotland, UK, May 23-26, 2006}, pages = {853--854}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1135777.1135911}, doi = {10.1145/1135777.1135911}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/JaffeNTD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/joc/Tassa05, author = {Tamir Tassa}, title = {Low Bandwidth Dynamic Traitor Tracing Schemes}, journal = {J. Cryptol.}, volume = {18}, number = {2}, pages = {167--183}, year = {2005}, url = {https://doi.org/10.1007/s00145-004-0214-z}, doi = {10.1007/S00145-004-0214-Z}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Tassa05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/tcc/BeimelTW05, author = {Amos Beimel and Tamir Tassa and Enav Weinreb}, editor = {Joe Kilian}, title = {Characterizing Ideal Weighted Threshold Secret Sharing}, booktitle = {Theory of Cryptography, Second Theory of Cryptography Conference, {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3378}, pages = {600--619}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30576-7\_32}, doi = {10.1007/978-3-540-30576-7\_32}, timestamp = {Sun, 02 Jun 2019 21:21:22 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BeimelTW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/acta/EpsteinT04, author = {Leah Epstein and Tamir Tassa}, title = {Approximation schemes for the Min-Max Starting Time Problem}, journal = {Acta Informatica}, volume = {40}, number = {9}, pages = {657--674}, year = {2004}, url = {https://doi.org/10.1007/s00236-004-0145-z}, doi = {10.1007/S00236-004-0145-Z}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acta/EpsteinT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/mfcs/EpsteinT04, author = {Leah Epstein and Tamir Tassa}, editor = {Jir{\'{\i}} Fiala and V{\'{a}}clav Koubek and Jan Kratochv{\'{\i}}l}, title = {Optimal Preemptive Scheduling for General Target Functions}, booktitle = {Mathematical Foundations of Computer Science 2004, 29th International Symposium, {MFCS} 2004, Prague, Czech Republic, August 22-27, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3153}, pages = {562--573}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28629-5\_43}, doi = {10.1007/978-3-540-28629-5\_43}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/mfcs/EpsteinT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/tcc/Tassa04, author = {Tamir Tassa}, editor = {Moni Naor}, title = {Hierarchical Threshold Secret Sharing}, booktitle = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC} 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2951}, pages = {473--490}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24638-1\_26}, doi = {10.1007/978-3-540-24638-1\_26}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Tassa04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/jal/EpsteinT03, author = {Leah Epstein and Tamir Tassa}, title = {Vector assignment problems: a general framework}, journal = {J. Algorithms}, volume = {48}, number = {2}, pages = {360--384}, year = {2003}, url = {https://doi.org/10.1016/S0196-6774(03)00055-5}, doi = {10.1016/S0196-6774(03)00055-5}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jal/EpsteinT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/mfcs/EpsteinT03, author = {Leah Epstein and Tamir Tassa}, editor = {Branislav Rovan and Peter Vojt{\'{a}}s}, title = {Approximation Schemes for the Min-Max Starting Time Problem}, booktitle = {Mathematical Foundations of Computer Science 2003, 28th International Symposium, {MFCS} 2003, Bratislava, Slovakia, August 25-29, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2747}, pages = {408--418}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45138-9\_35}, doi = {10.1007/978-3-540-45138-9\_35}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/mfcs/EpsteinT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/esa/EpsteinT02, author = {Leah Epstein and Tamir Tassa}, editor = {Rolf H. M{\"{o}}hring and Rajeev Raman}, title = {Vector Assignment Problems: {A} General Framework}, booktitle = {Algorithms - {ESA} 2002, 10th Annual European Symposium, Rome, Italy, September 17-21, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2461}, pages = {461--472}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45749-6\_42}, doi = {10.1007/3-540-45749-6\_42}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/esa/EpsteinT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/joc/FiatT01, author = {Amos Fiat and Tamir Tassa}, title = {Dynamic Traitor Tracing}, journal = {J. Cryptol.}, volume = {14}, number = {3}, pages = {211--223}, year = {2001}, url = {https://doi.org/10.1007/s00145-001-0006-7}, doi = {10.1007/S00145-001-0006-7}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/FiatT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/crypto/FiatT99, author = {Amos Fiat and Tamir Tassa}, editor = {Michael J. Wiener}, title = {Dynamic Traitor Training}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {354--371}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_23}, doi = {10.1007/3-540-48405-1\_23}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FiatT99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/siamam/Tassa97, author = {Tamir Tassa}, title = {Homogenization of Two-Dimensional Linear Flows with Integral Invariance}, journal = {{SIAM} J. Appl. Math.}, volume = {57}, number = {5}, pages = {1390--1405}, year = {1997}, url = {https://doi.org/10.1137/S0036139996299820}, doi = {10.1137/S0036139996299820}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamam/Tassa97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }