@article{DBLP:journals/popets/TassaY24,
author = {Tamir Tassa and
Avishay Yanai},
title = {The Multiple Millionaires' Problem: New Algorithmic Approaches and
Protocols},
journal = {Proc. Priv. Enhancing Technol.},
volume = {2024},
number = {4},
pages = {784--796},
year = {2024},
url = {https://doi.org/10.56553/popets-2024-0141},
doi = {10.56553/POPETS-2024-0141},
timestamp = {Thu, 18 Jul 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/popets/TassaY24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tist/PessachTS24,
author = {Dana Pessach and
Tamir Tassa and
Erez Shmueli},
title = {Fairness-Driven Private Collaborative Machine Learning},
journal = {{ACM} Trans. Intell. Syst. Technol.},
volume = {15},
number = {2},
pages = {27:1--27:30},
year = {2024},
url = {https://doi.org/10.1145/3639368},
doi = {10.1145/3639368},
timestamp = {Fri, 17 May 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tist/PessachTS24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/TassaD24,
author = {Tamir Tassa and
Lihi Dery},
title = {Towards Secure Virtual Elections: Multiparty Computation of Order
Based Voting Rules},
booktitle = {Proceedings of the 19th International Conference on Availability,
Reliability and Security, {ARES} 2024, Vienna, Austria, 30 July 2024
- 2 August 2024},
pages = {18:1--18:11},
publisher = {{ACM}},
year = {2024},
url = {https://doi.org/10.1145/3664476.3664503},
doi = {10.1145/3664476.3664503},
timestamp = {Fri, 02 Aug 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/IEEEares/TassaD24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TassaY24,
author = {Tamir Tassa and
Avishay Yanai},
title = {The Multiple Millionaires' Problem},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {5},
year = {2024},
url = {https://eprint.iacr.org/2024/005},
timestamp = {Tue, 16 Jan 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/iacr/TassaY24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArieT24,
author = {Aviad Ben Arie and
Tamir Tassa},
title = {Distributed Protocols for Oblivious Transfer and Polynomial Evaluation},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {9},
year = {2024},
url = {https://eprint.iacr.org/2024/009},
timestamp = {Tue, 16 Jan 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/iacr/ArieT24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ai/KoganTG23,
author = {Pablo Kogan and
Tamir Tassa and
Tal Grinshpoun},
title = {Privacy preserving solution of DCOPs by mediation},
journal = {Artif. Intell.},
volume = {319},
pages = {103916},
year = {2023},
url = {https://doi.org/10.1016/j.artint.2023.103916},
doi = {10.1016/J.ARTINT.2023.103916},
timestamp = {Sat, 29 Apr 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ai/KoganTG23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/ArieT23,
author = {Aviad Ben Arie and
Tamir Tassa},
editor = {Anupam Chattopadhyay and
Shivam Bhasin and
Stjepan Picek and
Chester Rebeiro},
title = {Distributed Protocols for Oblivious Transfer and Polynomial Evaluation},
booktitle = {Progress in Cryptology - {INDOCRYPT} 2023 - 24th International Conference
on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings,
Part {II}},
series = {Lecture Notes in Computer Science},
volume = {14460},
pages = {62--83},
publisher = {Springer},
year = {2023},
url = {https://doi.org/10.1007/978-3-031-56235-8\_4},
doi = {10.1007/978-3-031-56235-8\_4},
timestamp = {Sat, 04 May 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/indocrypt/ArieT23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tist/TassaH22,
author = {Tamir Tassa and
Alon Ben Horin},
title = {Privacy-preserving Collaborative Filtering by Distributed Mediation},
journal = {{ACM} Trans. Intell. Syst. Technol.},
volume = {13},
number = {6},
pages = {102:1--102:26},
year = {2022},
url = {https://doi.org/10.1145/3542950},
doi = {10.1145/3542950},
timestamp = {Sun, 15 Jan 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tist/TassaH22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/KoganTG22,
author = {Pablo Kogan and
Tamir Tassa and
Tal Grinshpoun},
editor = {Shlomi Dolev and
Jonathan Katz and
Amnon Meisels},
title = {Privacy Preserving {DCOP} Solving by Mediation},
booktitle = {Cyber Security, Cryptology, and Machine Learning - 6th International
Symposium, {CSCML} 2022, Be'er Sheva, Israel, June 30 - July 1, 2022,
Proceedings},
series = {Lecture Notes in Computer Science},
volume = {13301},
pages = {487--498},
publisher = {Springer},
year = {2022},
url = {https://doi.org/10.1007/978-3-031-07689-3\_34},
doi = {10.1007/978-3-031-07689-3\_34},
timestamp = {Tue, 28 Jun 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/cscml/KoganTG22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-10580,
author = {Tamir Tassa and
Lihi Dery},
title = {Towards Secure Virtual Elections: Multiparty Computation of Order
Based Voting Rules},
journal = {CoRR},
volume = {abs/2205.10580},
year = {2022},
url = {https://doi.org/10.48550/arXiv.2205.10580},
doi = {10.48550/ARXIV.2205.10580},
eprinttype = {arXiv},
eprint = {2205.10580},
timestamp = {Mon, 30 May 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2205-10580.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ai/TassaGY21,
author = {Tamir Tassa and
Tal Grinshpoun and
Avishay Yanai},
title = {PC-SyncBB: {A} privacy preserving collusion secure {DCOP} algorithm},
journal = {Artif. Intell.},
volume = {297},
pages = {103501},
year = {2021},
url = {https://doi.org/10.1016/j.artint.2021.103501},
doi = {10.1016/J.ARTINT.2021.103501},
timestamp = {Tue, 15 Jun 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ai/TassaGY21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/DeryTY21,
author = {Lihi Dery and
Tamir Tassa and
Avishay Yanai},
title = {Fear not, vote truthfully: Secure Multiparty Computation of score
based rules},
journal = {Expert Syst. Appl.},
volume = {168},
pages = {114434},
year = {2021},
url = {https://doi.org/10.1016/j.eswa.2020.114434},
doi = {10.1016/J.ESWA.2020.114434},
timestamp = {Tue, 02 Mar 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/eswa/DeryTY21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DeryTYZ21,
author = {Lihi Dery and
Tamir Tassa and
Avishay Yanai and
Arthur Zamarin},
editor = {Yongdae Kim and
Jong Kim and
Giovanni Vigna and
Elaine Shi},
title = {{DEMO:} {A} Secure Voting System for Score Based Elections},
booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
pages = {2399--2401},
publisher = {{ACM}},
year = {2021},
url = {https://doi.org/10.1145/3460120.3485343},
doi = {10.1145/3460120.3485343},
timestamp = {Sat, 30 Sep 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ccs/DeryTYZ21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/recsys/HorinT21,
author = {Alon Ben Horin and
Tamir Tassa},
editor = {Humberto Jes{\'{u}}s Corona Pamp{\'{\i}}n and
Martha A. Larson and
Martijn C. Willemsen and
Joseph A. Konstan and
Julian J. McAuley and
Jean Garcia{-}Gathright and
Bouke Huurnink and
Even Oldridge},
title = {Privacy Preserving Collaborative Filtering by Distributed Mediation},
booktitle = {RecSys '21: Fifteenth {ACM} Conference on Recommender Systems, Amsterdam,
The Netherlands, 27 September 2021 - 1 October 2021},
pages = {332--341},
publisher = {{ACM}},
year = {2021},
url = {https://doi.org/10.1145/3460231.3474251},
doi = {10.1145/3460231.3474251},
timestamp = {Mon, 20 Sep 2021 17:35:14 +0200},
biburl = {https://dblp.org/rec/conf/recsys/HorinT21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-14376,
author = {Dana Pessach and
Tamir Tassa and
Erez Shmueli},
title = {Fairness-Driven Private Collaborative Machine Learning},
journal = {CoRR},
volume = {abs/2109.14376},
year = {2021},
url = {https://arxiv.org/abs/2109.14376},
eprinttype = {arXiv},
eprint = {2109.14376},
timestamp = {Mon, 04 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2109-14376.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsa/EdizelBHPT20,
author = {Bora Edizel and
Francesco Bonchi and
Sara Hajian and
Andr{\'{e}} Panisson and
Tamir Tassa},
title = {FaiRecSys: mitigating algorithmic bias in recommender systems},
journal = {Int. J. Data Sci. Anal.},
volume = {9},
number = {2},
pages = {197--213},
year = {2020},
url = {https://doi.org/10.1007/s41060-019-00181-5},
doi = {10.1007/S41060-019-00181-5},
timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ijdsa/EdizelBHPT20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tist/ShmueliT20,
author = {Erez Shmueli and
Tamir Tassa},
title = {Mediated Secure Multi-Party Protocols for Collaborative Filtering},
journal = {{ACM} Trans. Intell. Syst. Technol.},
volume = {11},
number = {2},
pages = {15:1--15:25},
year = {2020},
url = {https://doi.org/10.1145/3375402},
doi = {10.1145/3375402},
timestamp = {Sat, 08 Jan 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tist/ShmueliT20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ai/GrinshpounTLZ19,
author = {Tal Grinshpoun and
Tamir Tassa and
Vadim Levit and
Roie Zivan},
title = {Privacy preserving region optimal algorithms for symmetric and asymmetric
DCOPs},
journal = {Artif. Intell.},
volume = {266},
pages = {27--50},
year = {2019},
url = {https://doi.org/10.1016/j.artint.2018.08.002},
doi = {10.1016/J.ARTINT.2018.08.002},
timestamp = {Tue, 12 Dec 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ai/GrinshpounTLZ19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/BarshapT19,
author = {Guy Barshap and
Tamir Tassa},
title = {Privacy-Preserving Planarity Testing of Distributed Graphs},
journal = {Trans. Data Priv.},
volume = {12},
number = {2},
pages = {117--144},
year = {2019},
url = {http://www.tdp.cat/issues16/abs.a338a18.php},
timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tdp/BarshapT19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/TassaGY19,
author = {Tamir Tassa and
Tal Grinshpoun and
Avishay Yanai},
editor = {Sarit Kraus},
title = {A Privacy Preserving Collusion Secure {DCOP} Algorithm},
booktitle = {Proceedings of the Twenty-Eighth International Joint Conference on
Artificial Intelligence, {IJCAI} 2019, Macao, China, August 10-16,
2019},
pages = {4774--4780},
publisher = {ijcai.org},
year = {2019},
url = {https://doi.org/10.24963/ijcai.2019/663},
doi = {10.24963/IJCAI.2019/663},
timestamp = {Tue, 15 Oct 2024 16:43:28 +0200},
biburl = {https://dblp.org/rec/conf/ijcai/TassaGY19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-06472,
author = {Lihi Dery and
Tamir Tassa},
title = {Secure Voting Protocols with Perfect Ballot Secrecy},
journal = {CoRR},
volume = {abs/1903.06472},
year = {2019},
url = {http://arxiv.org/abs/1903.06472},
eprinttype = {arXiv},
eprint = {1903.06472},
timestamp = {Mon, 01 Apr 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1903-06472.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-09013,
author = {Tamir Tassa and
Tal Grinshpoun and
Avishay Yanai},
title = {A Privacy Preserving Collusion Secure {DCOP} Algorithm},
journal = {CoRR},
volume = {abs/1905.09013},
year = {2019},
url = {http://arxiv.org/abs/1905.09013},
eprinttype = {arXiv},
eprint = {1905.09013},
timestamp = {Wed, 29 May 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1905-09013.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BarshapT18,
author = {Guy Barshap and
Tamir Tassa},
editor = {Florian Kerschbaum and
Stefano Paraboschi},
title = {Privacy-Preserving Planarity Testing of Distributed Graphs},
booktitle = {Data and Applications Security and Privacy {XXXII} - 32nd Annual {IFIP}
{WG} 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018,
Proceedings},
series = {Lecture Notes in Computer Science},
volume = {10980},
pages = {131--147},
publisher = {Springer},
year = {2018},
url = {https://doi.org/10.1007/978-3-319-95729-6\_9},
doi = {10.1007/978-3-319-95729-6\_9},
timestamp = {Tue, 14 May 2019 10:00:50 +0200},
biburl = {https://dblp.org/rec/conf/dbsec/BarshapT18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jair/TassaGZ17,
author = {Tamir Tassa and
Tal Grinshpoun and
Roie Zivan},
title = {Privacy Preserving Implementation of the Max-Sum Algorithm and its
Variants},
journal = {J. Artif. Intell. Res.},
volume = {59},
pages = {311--349},
year = {2017},
url = {https://doi.org/10.1613/jair.5504},
doi = {10.1613/JAIR.5504},
timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jair/TassaGZ17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/recsys/ShmueliT17,
author = {Erez Shmueli and
Tamir Tassa},
editor = {Paolo Cremonesi and
Francesco Ricci and
Shlomo Berkovsky and
Alexander Tuzhilin},
title = {Secure Multi-Party Protocols for Item-Based Collaborative Filtering},
booktitle = {Proceedings of the Eleventh {ACM} Conference on Recommender Systems,
RecSys 2017, Como, Italy, August 27-31, 2017},
pages = {89--97},
publisher = {{ACM}},
year = {2017},
url = {https://doi.org/10.1145/3109859.3109881},
doi = {10.1145/3109859.3109881},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/recsys/ShmueliT17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/AsharovBGT17,
author = {Gilad Asharov and
Francesco Bonchi and
David Garc{\'{\i}}a{-}Soriano and
Tamir Tassa},
editor = {Rick Barrett and
Rick Cummings and
Eugene Agichtein and
Evgeniy Gabrilovich},
title = {Secure Centrality Computation Over Multiple Networks},
booktitle = {Proceedings of the 26th International Conference on World Wide Web,
{WWW} 2017, Perth, Australia, April 3-7, 2017},
pages = {957--966},
publisher = {{ACM}},
year = {2017},
url = {https://doi.org/10.1145/3038912.3052602},
doi = {10.1145/3038912.3052602},
timestamp = {Mon, 03 Jan 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/www/AsharovBGT17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jair/GrinshpounT16,
author = {Tal Grinshpoun and
Tamir Tassa},
title = {P-SyncBB: {A} Privacy Preserving Branch and Bound {DCOP} Algorithm},
journal = {J. Artif. Intell. Res.},
volume = {57},
pages = {621--660},
year = {2016},
url = {http://jair.org/papers/paper5322.html},
timestamp = {Wed, 21 Jun 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jair/GrinshpounT16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DavidsonTG16,
author = {Michal Davidson and
Tamir Tassa and
Ehud Gudes},
title = {Content sharing schemes in {DRM} systems with enhanced performance
and privacy preservation},
journal = {J. Comput. Secur.},
volume = {24},
number = {6},
pages = {667--688},
year = {2016},
url = {https://doi.org/10.3233/JCS-15746},
doi = {10.3233/JCS-15746},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jcs/DavidsonTG16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/snam/HajianTB16,
author = {Sara Hajian and
Tamir Tassa and
Francesco Bonchi},
title = {Individual privacy in social influence networks},
journal = {Soc. Netw. Anal. Min.},
volume = {6},
number = {1},
pages = {2:1--2:14},
year = {2016},
url = {https://doi.org/10.1007/s13278-015-0312-y},
doi = {10.1007/S13278-015-0312-Y},
timestamp = {Tue, 08 Sep 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/snam/HajianTB16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/GonenT16,
author = {Rica Gonen and
Tamir Tassa},
title = {Privacy Preserving Computations for Viral Marketing: The Case of Rational
Players},
booktitle = {11th International Conference on Availability, Reliability and Security,
{ARES} 2016, Salzburg, Austria, August 31 - September 2, 2016},
pages = {677--686},
publisher = {{IEEE} Computer Society},
year = {2016},
url = {https://doi.org/10.1109/ARES.2016.5},
doi = {10.1109/ARES.2016.5},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/IEEEares/GonenT16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/TassaZG16,
author = {Tamir Tassa and
Roie Zivan and
Tal Grinshpoun},
editor = {Subbarao Kambhampati},
title = {Preserving Privacy in Region Optimal {DCOP} Algorithms},
booktitle = {Proceedings of the Twenty-Fifth International Joint Conference on
Artificial Intelligence, {IJCAI} 2016, New York, NY, USA, 9-15 July
2016},
pages = {496--502},
publisher = {{IJCAI/AAAI} Press},
year = {2016},
url = {http://www.ijcai.org/Abstract/16/077},
timestamp = {Tue, 20 Aug 2019 16:19:00 +0200},
biburl = {https://dblp.org/rec/conf/ijcai/TassaZG16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/HerranzNRT15,
author = {Javier Herranz and
Jordi Nin and
Pablo Rodr{\'{\i}}guez and
Tamir Tassa},
title = {Revisiting distance-based record linkage for privacy-preserving release
of statistical datasets},
journal = {Data Knowl. Eng.},
volume = {100},
pages = {78--93},
year = {2015},
url = {https://doi.org/10.1016/j.datak.2015.07.009},
doi = {10.1016/J.DATAK.2015.07.009},
timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/dke/HerranzNRT15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ShmueliT15,
author = {Erez Shmueli and
Tamir Tassa},
title = {Privacy by diversity in sequential releases of databases},
journal = {Inf. Sci.},
volume = {298},
pages = {344--372},
year = {2015},
url = {https://doi.org/10.1016/j.ins.2014.11.005},
doi = {10.1016/J.INS.2014.11.005},
timestamp = {Sat, 27 May 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/isci/ShmueliT15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/TassaZG15,
author = {Tamir Tassa and
Roie Zivan and
Tal Grinshpoun},
editor = {Qiang Yang and
Michael J. Wooldridge},
title = {Max-Sum Goes Private},
booktitle = {Proceedings of the Twenty-Fourth International Joint Conference on
Artificial Intelligence, {IJCAI} 2015, Buenos Aires, Argentina, July
25-31, 2015},
pages = {425--431},
publisher = {{AAAI} Press},
year = {2015},
url = {http://ijcai.org/Abstract/15/066},
timestamp = {Tue, 20 Aug 2019 16:16:43 +0200},
biburl = {https://dblp.org/rec/conf/ijcai/TassaZG15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kdd/FeldmanT15,
author = {Dan Feldman and
Tamir Tassa},
editor = {Longbing Cao and
Chengqi Zhang and
Thorsten Joachims and
Geoffrey I. Webb and
Dragos D. Margineantu and
Graham Williams},
title = {More Constraints, Smaller Coresets: Constrained Matrix Approximation
of Sparse Big Data},
booktitle = {Proceedings of the 21th {ACM} {SIGKDD} International Conference on
Knowledge Discovery and Data Mining, Sydney, NSW, Australia, August
10-13, 2015},
pages = {249--258},
publisher = {{ACM}},
year = {2015},
url = {https://doi.org/10.1145/2783258.2783312},
doi = {10.1145/2783258.2783312},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/kdd/FeldmanT15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijrr/EzairTS14,
author = {Ben Ezair and
Tamir Tassa and
Zvi Shiller},
title = {Planning high order trajectories with general initial and final conditions
and asymmetric bounds},
journal = {Int. J. Robotics Res.},
volume = {33},
number = {6},
pages = {898--916},
year = {2014},
url = {https://doi.org/10.1177/0278364913517148},
doi = {10.1177/0278364913517148},
timestamp = {Thu, 17 Sep 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ijrr/EzairTS14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LastTZS14,
author = {Mark Last and
Tamir Tassa and
Alexandra Zhmudyak and
Erez Shmueli},
title = {Improving accuracy of classification models induced from anonymized
datasets},
journal = {Inf. Sci.},
volume = {256},
pages = {138--161},
year = {2014},
url = {https://doi.org/10.1016/j.ins.2013.07.034},
doi = {10.1016/J.INS.2013.07.034},
timestamp = {Sat, 27 May 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/isci/LastTZS14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/BonchiGT14,
author = {Francesco Bonchi and
Aristides Gionis and
Tamir Tassa},
title = {Identity obfuscation in graphs through the information theoretic lens},
journal = {Inf. Sci.},
volume = {275},
pages = {232--256},
year = {2014},
url = {https://doi.org/10.1016/j.ins.2014.02.035},
doi = {10.1016/J.INS.2014.02.035},
timestamp = {Sat, 27 May 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/isci/BonchiGT14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ShmueliZYT14,
author = {Erez Shmueli and
Tomer Zrihen and
Ran Yahalom and
Tamir Tassa},
title = {Constrained obfuscation of relational databases},
journal = {Inf. Sci.},
volume = {286},
pages = {35--62},
year = {2014},
url = {https://doi.org/10.1016/j.ins.2014.07.009},
doi = {10.1016/J.INS.2014.07.009},
timestamp = {Sat, 27 May 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/isci/ShmueliZYT14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/Tassa14,
author = {Tamir Tassa},
title = {Secure Mining of Association Rules inHorizontally Distributed Databases},
journal = {{IEEE} Trans. Knowl. Data Eng.},
volume = {26},
number = {4},
pages = {970--983},
year = {2014},
url = {https://doi.org/10.1109/TKDE.2013.41},
doi = {10.1109/TKDE.2013.41},
timestamp = {Sat, 20 May 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tkde/Tassa14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/GrinshpounT14,
author = {Tal Grinshpoun and
Tamir Tassa},
editor = {Ana L. C. Bazzan and
Michael N. Huhns and
Alessio Lomuscio and
Paul Scerri},
title = {A privacy-preserving algorithm for distributed constraint optimization},
booktitle = {International conference on Autonomous Agents and Multi-Agent Systems,
{AAMAS} '14, Paris, France, May 5-9, 2014},
pages = {909--916},
publisher = {{IFAAMAS/ACM}},
year = {2014},
url = {http://dl.acm.org/citation.cfm?id=2617391},
timestamp = {Thu, 25 Sep 2014 07:46:15 +0200},
biburl = {https://dblp.org/rec/conf/atal/GrinshpounT14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/DavidsonGT14,
author = {Michal Davidson and
Ehud Gudes and
Tamir Tassa},
editor = {Vijay Atluri and
G{\"{u}}nther Pernul},
title = {Efficient and Enhanced Solutions for Content Sharing in {DRM} Systems},
booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
{IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
July 14-16, 2014. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {8566},
pages = {373--381},
publisher = {Springer},
year = {2014},
url = {https://doi.org/10.1007/978-3-662-43936-4\_25},
doi = {10.1007/978-3-662-43936-4\_25},
timestamp = {Tue, 14 May 2019 10:00:50 +0200},
biburl = {https://dblp.org/rec/conf/dbsec/DavidsonGT14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edbt/TassaB14,
author = {Tamir Tassa and
Francesco Bonchi},
editor = {Sihem Amer{-}Yahia and
Vassilis Christophides and
Anastasios Kementsietsidis and
Minos N. Garofalakis and
Stratos Idreos and
Vincent Leroy},
title = {Privacy Preserving Estimation of Social Influence},
booktitle = {Proceedings of the 17th International Conference on Extending Database
Technology, {EDBT} 2014, Athens, Greece, March 24-28, 2014},
pages = {559--570},
publisher = {OpenProceedings.org},
year = {2014},
url = {https://doi.org/10.5441/002/edbt.2014.50},
doi = {10.5441/002/EDBT.2014.50},
timestamp = {Fri, 29 Jan 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/edbt/TassaB14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/TassaJB13,
author = {Tamir Tassa and
Ayman Jarrous and
Yonatan Ben{-}Ya'akov},
title = {Oblivious evaluation of multivariate polynomials},
journal = {J. Math. Cryptol.},
volume = {7},
number = {1},
pages = {1--29},
year = {2013},
url = {https://doi.org/10.1515/jmc-2012-0007},
doi = {10.1515/JMC-2012-0007},
timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/jmc/TassaJB13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/Tassa13,
author = {Tamir Tassa},
title = {Addendum to "Finding all maximally-matchable edges in a bipartite
graph" [Theoret. Comput. Sci. 423 {(2012)} 50-58]},
journal = {Theor. Comput. Sci.},
volume = {491},
pages = {136},
year = {2013},
url = {https://doi.org/10.1016/j.tcs.2013.03.015},
doi = {10.1016/J.TCS.2013.03.015},
timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tcs/Tassa13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/CliftonT13,
author = {Chris Clifton and
Tamir Tassa},
title = {On Syntactic Anonymity and Differential Privacy},
journal = {Trans. Data Priv.},
volume = {6},
number = {2},
pages = {161--183},
year = {2013},
url = {http://www.tdp.cat/issues11/abs.a124a13.php},
timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tdp/CliftonT13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/TassaC13,
author = {Tamir Tassa and
Dror J. Cohen},
title = {Anonymization of Centralized and Distributed Social Networks by Sequential
Clustering},
journal = {{IEEE} Trans. Knowl. Data Eng.},
volume = {25},
number = {2},
pages = {311--324},
year = {2013},
url = {https://doi.org/10.1109/TKDE.2011.232},
doi = {10.1109/TKDE.2011.232},
timestamp = {Sat, 20 May 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tkde/TassaC13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/CliftonT13,
author = {Chris Clifton and
Tamir Tassa},
editor = {Chee Yong Chan and
Jiaheng Lu and
Kjetil N{\o}rv{\aa}g and
Egemen Tanin},
title = {On syntactic anonymity and differential privacy},
booktitle = {Workshops Proceedings of the 29th {IEEE} International Conference
on Data Engineering, {ICDE} 2013, Brisbane, Australia, April 8-12,
2013},
pages = {88--93},
publisher = {{IEEE} Computer Society},
year = {2013},
url = {https://doi.org/10.1109/ICDEW.2013.6547433},
doi = {10.1109/ICDEW.2013.6547433},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icde/CliftonT13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/datamine/KenigT12,
author = {Batya Kenig and
Tamir Tassa},
title = {A practical approximation algorithm for optimal k-anonymity},
journal = {Data Min. Knowl. Discov.},
volume = {25},
number = {1},
pages = {134--168},
year = {2012},
url = {https://doi.org/10.1007/s10618-011-0235-9},
doi = {10.1007/S10618-011-0235-9},
timestamp = {Sun, 02 Jun 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/datamine/KenigT12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ShmueliTWSR12,
author = {Erez Shmueli and
Tamir Tassa and
Raz Wasserstein and
Bracha Shapira and
Lior Rokach},
title = {Limiting disclosure of sensitive data in sequential releases of databases},
journal = {Inf. Sci.},
volume = {191},
pages = {98--127},
year = {2012},
url = {https://doi.org/10.1016/j.ins.2011.12.020},
doi = {10.1016/J.INS.2011.12.020},
timestamp = {Tue, 21 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/isci/ShmueliTWSR12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/BoldiBGT12,
author = {Paolo Boldi and
Francesco Bonchi and
Aristides Gionis and
Tamir Tassa},
title = {Injecting Uncertainty in Graphs for Identity Obfuscation},
journal = {Proc. {VLDB} Endow.},
volume = {5},
number = {11},
pages = {1376--1387},
year = {2012},
url = {http://vldb.org/pvldb/vol5/p1376\_paoloboldi\_vldb2012.pdf},
doi = {10.14778/2350229.2350254},
timestamp = {Sat, 25 Apr 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/pvldb/BoldiBGT12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/Tassa12,
author = {Tamir Tassa},
title = {Finding all maximally-matchable edges in a bipartite graph},
journal = {Theor. Comput. Sci.},
volume = {423},
pages = {50--58},
year = {2012},
url = {https://doi.org/10.1016/j.tcs.2011.12.071},
doi = {10.1016/J.TCS.2011.12.071},
timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tcs/Tassa12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/TassaMG12,
author = {Tamir Tassa and
Arnon Mazza and
Aristides Gionis},
title = {k-Concealment: An Alternative Model of k-Type Anonymity},
journal = {Trans. Data Priv.},
volume = {5},
number = {1},
pages = {189--222},
year = {2012},
url = {http://www.tdp.cat/issues11/abs.a069a11.php},
timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tdp/TassaMG12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tods/TassaG12,
author = {Tamir Tassa and
Ehud Gudes},
title = {Secure distributed computation of anonymized views of shared databases},
journal = {{ACM} Trans. Database Syst.},
volume = {37},
number = {2},
pages = {11:1--11:43},
year = {2012},
url = {https://doi.org/10.1145/2188349.2188353},
doi = {10.1145/2188349.2188353},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tods/TassaG12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1208-4145,
author = {Paolo Boldi and
Francesco Bonchi and
Aristides Gionis and
Tamir Tassa},
title = {Injecting Uncertainty in Graphs for Identity Obfuscation},
journal = {CoRR},
volume = {abs/1208.4145},
year = {2012},
url = {http://arxiv.org/abs/1208.4145},
eprinttype = {arXiv},
eprint = {1208.4145},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1208-4145.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Tassa11,
author = {Tamir Tassa},
title = {Generalized oblivious transfer by secret sharing},
journal = {Des. Codes Cryptogr.},
volume = {58},
number = {1},
pages = {11--21},
year = {2011},
url = {https://doi.org/10.1007/s10623-010-9378-8},
doi = {10.1007/S10623-010-9378-8},
timestamp = {Mon, 17 Jun 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/dcc/Tassa11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/BonchiGT11,
author = {Francesco Bonchi and
Aristides Gionis and
Tamir Tassa},
editor = {Serge Abiteboul and
Klemens B{\"{o}}hm and
Christoph Koch and
Kian{-}Lee Tan},
title = {Identity obfuscation in graphs through the information theoretic lens},
booktitle = {Proceedings of the 27th International Conference on Data Engineering,
{ICDE} 2011, April 11-16, 2011, Hannover, Germany},
pages = {924--935},
publisher = {{IEEE} Computer Society},
year = {2011},
url = {https://doi.org/10.1109/ICDE.2011.5767905},
doi = {10.1109/ICDE.2011.5767905},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icde/BonchiGT11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1106-5113,
author = {Tamir Tassa},
title = {Secure Mining of Association Rules in Horizontally Distributed Databases},
journal = {CoRR},
volume = {abs/1106.5113},
year = {2011},
url = {http://arxiv.org/abs/1106.5113},
eprinttype = {arXiv},
eprint = {1106.5113},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1106-5113.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1107-4711,
author = {Tamir Tassa},
title = {Finding All Allowed Edges in a Bipartite Graph},
journal = {CoRR},
volume = {abs/1107.4711},
year = {2011},
url = {http://arxiv.org/abs/1107.4711},
eprinttype = {arXiv},
eprint = {1107.4711},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1107-4711.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/GoldbergerT10,
author = {Jacob Goldberger and
Tamir Tassa},
title = {Efficient Anonymizations with Enhanced Utility},
journal = {Trans. Data Priv.},
volume = {3},
number = {2},
pages = {149--175},
year = {2010},
url = {http://www.tdp.cat/issues/abs.a047a10.php},
timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tdp/GoldbergerT10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/TassaV09,
author = {Tamir Tassa and
Jorge L. Villar},
title = {On proper secrets, {(} \emph{t} , \emph{k} )-bases and linear codes},
journal = {Des. Codes Cryptogr.},
volume = {52},
number = {2},
pages = {129--154},
year = {2009},
url = {https://doi.org/10.1007/s10623-009-9272-4},
doi = {10.1007/S10623-009-9272-4},
timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/dcc/TassaV09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/TassaD09,
author = {Tamir Tassa and
Nira Dyn},
title = {Multipartite Secret Sharing by Bivariate Interpolation},
journal = {J. Cryptol.},
volume = {22},
number = {2},
pages = {227--258},
year = {2009},
url = {https://doi.org/10.1007/s00145-008-9027-9},
doi = {10.1007/S00145-008-9027-9},
timestamp = {Fri, 18 Sep 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/joc/TassaD09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/GionisT09,
author = {Aristides Gionis and
Tamir Tassa},
title = {k-Anonymization with Minimal Loss of Information},
journal = {{IEEE} Trans. Knowl. Data Eng.},
volume = {21},
number = {2},
pages = {206--219},
year = {2009},
url = {https://doi.org/10.1109/TKDE.2008.129},
doi = {10.1109/TKDE.2008.129},
timestamp = {Sat, 20 May 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tkde/GionisT09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/GoldbergerT09,
author = {Jacob Goldberger and
Tamir Tassa},
editor = {Y{\"{u}}cel Saygin and
Jeffrey Xu Yu and
Hillol Kargupta and
Wei Wang and
Sanjay Ranka and
Philip S. Yu and
Xindong Wu},
title = {Efficient Anonymizations with Enhanced Utility},
booktitle = {{ICDM} Workshops 2009, {IEEE} International Conference on Data Mining
Workshops, Miami, Florida, USA, 6 December 2009},
pages = {106--113},
publisher = {{IEEE} Computer Society},
year = {2009},
url = {https://doi.org/10.1109/ICDMW.2009.15},
doi = {10.1109/ICDMW.2009.15},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icdm/GoldbergerT09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BlayerT08,
author = {Oded Blayer and
Tamir Tassa},
title = {Improved versions of Tardos' fingerprinting scheme},
journal = {Des. Codes Cryptogr.},
volume = {48},
number = {1},
pages = {79--103},
year = {2008},
url = {https://doi.org/10.1007/s10623-008-9200-z},
doi = {10.1007/S10623-008-9200-Z},
timestamp = {Mon, 17 Jun 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/dcc/BlayerT08.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/prl/GoldbergerT08,
author = {Jacob Goldberger and
Tamir Tassa},
title = {A hierarchical clustering algorithm based on the Hungarian method},
journal = {Pattern Recognit. Lett.},
volume = {29},
number = {11},
pages = {1632--1638},
year = {2008},
url = {https://doi.org/10.1016/j.patrec.2008.04.003},
doi = {10.1016/J.PATREC.2008.04.003},
timestamp = {Sat, 22 Feb 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/prl/GoldbergerT08.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamdm/BeimelTW08,
author = {Amos Beimel and
Tamir Tassa and
Enav Weinreb},
title = {Characterizing Ideal Weighted Threshold Secret Sharing},
journal = {{SIAM} J. Discret. Math.},
volume = {22},
number = {1},
pages = {360--397},
year = {2008},
url = {https://doi.org/10.1137/S0895480104445654},
doi = {10.1137/S0895480104445654},
timestamp = {Sat, 25 Apr 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/siamdm/BeimelTW08.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/GionisMT08,
author = {Aristides Gionis and
Arnon Mazza and
Tamir Tassa},
editor = {Gustavo Alonso and
Jos{\'{e}} A. Blakeley and
Arbee L. P. Chen},
title = {k-Anonymization Revisited},
booktitle = {Proceedings of the 24th International Conference on Data Engineering,
{ICDE} 2008, April 7-12, 2008, Canc{\'{u}}n, Mexico},
pages = {744--753},
publisher = {{IEEE} Computer Society},
year = {2008},
url = {https://doi.org/10.1109/ICDE.2008.4497483},
doi = {10.1109/ICDE.2008.4497483},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icde/GionisMT08.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Tassa07,
author = {Tamir Tassa},
title = {Hierarchical Threshold Secret Sharing},
journal = {J. Cryptol.},
volume = {20},
number = {2},
pages = {237--264},
year = {2007},
url = {https://doi.org/10.1007/s00145-006-0334-8},
doi = {10.1007/S00145-006-0334-8},
timestamp = {Fri, 18 Sep 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/joc/Tassa07.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esa/GionisT07,
author = {Aristides Gionis and
Tamir Tassa},
editor = {Lars Arge and
Michael Hoffmann and
Emo Welzl},
title = {\emph{k} -Anonymization with Minimal Loss of Information},
booktitle = {Algorithms - {ESA} 2007, 15th Annual European Symposium, Eilat, Israel,
October 8-10, 2007, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {4698},
pages = {439--450},
publisher = {Springer},
year = {2007},
url = {https://doi.org/10.1007/978-3-540-75520-3\_40},
doi = {10.1007/978-3-540-75520-3\_40},
timestamp = {Tue, 14 May 2019 10:00:54 +0200},
biburl = {https://dblp.org/rec/conf/esa/GionisT07.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/acta/EpsteinT06,
author = {Leah Epstein and
Tamir Tassa},
title = {Vector assignment schemes for asymmetric settings},
journal = {Acta Informatica},
volume = {42},
number = {6-7},
pages = {501--514},
year = {2006},
url = {https://doi.org/10.1007/s00236-005-0003-7},
doi = {10.1007/S00236-005-0003-7},
timestamp = {Sun, 21 Jun 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/acta/EpsteinT06.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/EpsteinT06,
author = {Leah Epstein and
Tamir Tassa},
title = {Optimal preemptive scheduling for general target functions},
journal = {J. Comput. Syst. Sci.},
volume = {72},
number = {1},
pages = {132--162},
year = {2006},
url = {https://doi.org/10.1016/j.jcss.2005.08.002},
doi = {10.1016/J.JCSS.2005.08.002},
timestamp = {Tue, 16 Feb 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/jcss/EpsteinT06.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/KoganT06,
author = {Noam Kogan and
Tamir Tassa},
title = {Improved efficiency for revocation schemes via Newton interpolation},
journal = {{ACM} Trans. Inf. Syst. Secur.},
volume = {9},
number = {4},
pages = {461--486},
year = {2006},
url = {https://doi.org/10.1145/1187441.1187444},
doi = {10.1145/1187441.1187444},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tissec/KoganT06.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/TassaD06,
author = {Tamir Tassa and
Nira Dyn},
editor = {Michele Bugliesi and
Bart Preneel and
Vladimiro Sassone and
Ingo Wegener},
title = {Multipartite Secret Sharing by Bivariate Interpolation},
booktitle = {Automata, Languages and Programming, 33rd International Colloquium,
{ICALP} 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part {II}},
series = {Lecture Notes in Computer Science},
volume = {4052},
pages = {288--299},
publisher = {Springer},
year = {2006},
url = {https://doi.org/10.1007/11787006\_25},
doi = {10.1007/11787006\_25},
timestamp = {Tue, 14 May 2019 10:00:44 +0200},
biburl = {https://dblp.org/rec/conf/icalp/TassaD06.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mir/JaffeNTD06,
author = {Alexander Jaffe and
Mor Naaman and
Tamir Tassa and
Marc Davis},
editor = {James Ze Wang and
Nozha Boujemaa and
Yixin Chen},
title = {Generating summaries and visualization for large collections of geo-referenced
photographs},
booktitle = {Proceedings of the 8th {ACM} {SIGMM} International Workshop on Multimedia
Information Retrieval, {MIR} 2006, October 26-27, 2006, Santa Barbara,
California, {USA}},
pages = {89--98},
publisher = {{ACM}},
year = {2006},
url = {https://doi.org/10.1145/1178677.1178692},
doi = {10.1145/1178677.1178692},
timestamp = {Mon, 05 Feb 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/mir/JaffeNTD06.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/JaffeNTD06,
author = {Alexander Jaffe and
Mor Naaman and
Tamir Tassa and
Marc Davis},
editor = {Les Carr and
David De Roure and
Arun Iyengar and
Carole A. Goble and
Michael Dahlin},
title = {Generating summaries for large collections of geo-referenced photographs},
booktitle = {Proceedings of the 15th international conference on World Wide Web,
{WWW} 2006, Edinburgh, Scotland, UK, May 23-26, 2006},
pages = {853--854},
publisher = {{ACM}},
year = {2006},
url = {https://doi.org/10.1145/1135777.1135911},
doi = {10.1145/1135777.1135911},
timestamp = {Mon, 05 Feb 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/www/JaffeNTD06.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Tassa05,
author = {Tamir Tassa},
title = {Low Bandwidth Dynamic Traitor Tracing Schemes},
journal = {J. Cryptol.},
volume = {18},
number = {2},
pages = {167--183},
year = {2005},
url = {https://doi.org/10.1007/s00145-004-0214-z},
doi = {10.1007/S00145-004-0214-Z},
timestamp = {Fri, 18 Sep 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/joc/Tassa05.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BeimelTW05,
author = {Amos Beimel and
Tamir Tassa and
Enav Weinreb},
editor = {Joe Kilian},
title = {Characterizing Ideal Weighted Threshold Secret Sharing},
booktitle = {Theory of Cryptography, Second Theory of Cryptography Conference,
{TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {3378},
pages = {600--619},
publisher = {Springer},
year = {2005},
url = {https://doi.org/10.1007/978-3-540-30576-7\_32},
doi = {10.1007/978-3-540-30576-7\_32},
timestamp = {Sun, 02 Jun 2019 21:21:22 +0200},
biburl = {https://dblp.org/rec/conf/tcc/BeimelTW05.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/acta/EpsteinT04,
author = {Leah Epstein and
Tamir Tassa},
title = {Approximation schemes for the Min-Max Starting Time Problem},
journal = {Acta Informatica},
volume = {40},
number = {9},
pages = {657--674},
year = {2004},
url = {https://doi.org/10.1007/s00236-004-0145-z},
doi = {10.1007/S00236-004-0145-Z},
timestamp = {Sun, 21 Jun 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/acta/EpsteinT04.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mfcs/EpsteinT04,
author = {Leah Epstein and
Tamir Tassa},
editor = {Jir{\'{\i}} Fiala and
V{\'{a}}clav Koubek and
Jan Kratochv{\'{\i}}l},
title = {Optimal Preemptive Scheduling for General Target Functions},
booktitle = {Mathematical Foundations of Computer Science 2004, 29th International
Symposium, {MFCS} 2004, Prague, Czech Republic, August 22-27, 2004,
Proceedings},
series = {Lecture Notes in Computer Science},
volume = {3153},
pages = {562--573},
publisher = {Springer},
year = {2004},
url = {https://doi.org/10.1007/978-3-540-28629-5\_43},
doi = {10.1007/978-3-540-28629-5\_43},
timestamp = {Tue, 14 May 2019 10:00:37 +0200},
biburl = {https://dblp.org/rec/conf/mfcs/EpsteinT04.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Tassa04,
author = {Tamir Tassa},
editor = {Moni Naor},
title = {Hierarchical Threshold Secret Sharing},
booktitle = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC}
2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {2951},
pages = {473--490},
publisher = {Springer},
year = {2004},
url = {https://doi.org/10.1007/978-3-540-24638-1\_26},
doi = {10.1007/978-3-540-24638-1\_26},
timestamp = {Tue, 14 May 2019 10:00:47 +0200},
biburl = {https://dblp.org/rec/conf/tcc/Tassa04.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jal/EpsteinT03,
author = {Leah Epstein and
Tamir Tassa},
title = {Vector assignment problems: a general framework},
journal = {J. Algorithms},
volume = {48},
number = {2},
pages = {360--384},
year = {2003},
url = {https://doi.org/10.1016/S0196-6774(03)00055-5},
doi = {10.1016/S0196-6774(03)00055-5},
timestamp = {Sun, 28 May 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jal/EpsteinT03.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mfcs/EpsteinT03,
author = {Leah Epstein and
Tamir Tassa},
editor = {Branislav Rovan and
Peter Vojt{\'{a}}s},
title = {Approximation Schemes for the Min-Max Starting Time Problem},
booktitle = {Mathematical Foundations of Computer Science 2003, 28th International
Symposium, {MFCS} 2003, Bratislava, Slovakia, August 25-29, 2003,
Proceedings},
series = {Lecture Notes in Computer Science},
volume = {2747},
pages = {408--418},
publisher = {Springer},
year = {2003},
url = {https://doi.org/10.1007/978-3-540-45138-9\_35},
doi = {10.1007/978-3-540-45138-9\_35},
timestamp = {Tue, 14 May 2019 10:00:37 +0200},
biburl = {https://dblp.org/rec/conf/mfcs/EpsteinT03.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esa/EpsteinT02,
author = {Leah Epstein and
Tamir Tassa},
editor = {Rolf H. M{\"{o}}hring and
Rajeev Raman},
title = {Vector Assignment Problems: {A} General Framework},
booktitle = {Algorithms - {ESA} 2002, 10th Annual European Symposium, Rome, Italy,
September 17-21, 2002, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {2461},
pages = {461--472},
publisher = {Springer},
year = {2002},
url = {https://doi.org/10.1007/3-540-45749-6\_42},
doi = {10.1007/3-540-45749-6\_42},
timestamp = {Tue, 14 May 2019 10:00:54 +0200},
biburl = {https://dblp.org/rec/conf/esa/EpsteinT02.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/FiatT01,
author = {Amos Fiat and
Tamir Tassa},
title = {Dynamic Traitor Tracing},
journal = {J. Cryptol.},
volume = {14},
number = {3},
pages = {211--223},
year = {2001},
url = {https://doi.org/10.1007/s00145-001-0006-7},
doi = {10.1007/S00145-001-0006-7},
timestamp = {Fri, 18 Sep 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/joc/FiatT01.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FiatT99,
author = {Amos Fiat and
Tamir Tassa},
editor = {Michael J. Wiener},
title = {Dynamic Traitor Training},
booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {1666},
pages = {354--371},
publisher = {Springer},
year = {1999},
url = {https://doi.org/10.1007/3-540-48405-1\_23},
doi = {10.1007/3-540-48405-1\_23},
timestamp = {Tue, 14 May 2019 10:00:48 +0200},
biburl = {https://dblp.org/rec/conf/crypto/FiatT99.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamam/Tassa97,
author = {Tamir Tassa},
title = {Homogenization of Two-Dimensional Linear Flows with Integral Invariance},
journal = {{SIAM} J. Appl. Math.},
volume = {57},
number = {5},
pages = {1390--1405},
year = {1997},
url = {https://doi.org/10.1137/S0036139996299820},
doi = {10.1137/S0036139996299820},
timestamp = {Wed, 20 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/siamam/Tassa97.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}