Journal Papers

 

  • E. Tadmor and T. Tassa, On the piecewise smoothness of entropy solutions to scalar conservation laws, Communications in Partial Differential Equations, Vol. 18 (1993), pp. 1631-1652. PS , PDF
  • H. Nessyahu, E. Tadmor and T.Tassa, The convergence rate of Godunov type schemes, Siam Journal on Numerical Analysis, Vol. 31 (1994), pp. 1-16. PS , PDF
  • H. Nessyahu and T. Tassa, Convergence rate of approximate solutions to conservation laws with initial rarefactions, Siam Journal on Numerical Analysis, Vol. 31 (1994), pp. 628-654. PS , PDF   
  • T. Tassa, Regularity of weak solutions of the nonlinear Fokker-Planck equation, Mathematical Research Letters, Vol. 3 (1996), pp. 475-490. PS , PDF
  • E. Tadmor and T. Tassa, On the homogenization of oscillatory solutions to nonlinear convection-diffusion equations, Advances in Mathematical Sciences and Applications, Vol. 7 (1997), pp. 93-117. PS , PDF
  • T. Tassa, Uniqueness of piecewise smooth weak solutions of multidimensional degenerate parabolic equations, Journal of Mathematical Analysis and Applications, Vol. 210 (1997), pp. 598-608. PS , PDF
  • T. Tassa, Homogenization of two-dimensional linear flows with integral invariance, Siam Journal on Applied Mathematics, Vol. 57 (1997), pp. 1390-1405. PS , PDF
  • T. Tassa, On the homogenization of nonlinear convection-diffusion equations with oscillatory initial and forcing data. Mathematical Sciences and Applications, Vol. 10 (1997), Nonlinear Waves, pp. 493-501.
  • T. Tassa, Homogenization with multiple scales, Asymptotic Analysis, Vol. 20 (1999), pp. 61-96. PS , PDF   
  • A. Fiat and T. Tassa, Dynamic traitor tracing, Journal of Cryptology, Vol. 14 (2001), pp. 211-223. PS , PDF
  • T. Tassa, On finite closures of homogenized solutions of nonlinear hyperbolic equations, Asymptotic Analysis, Vol. 34 (2003), pp. 55-76. PS, PDF
  • L. Epstein and T. Tassa, Vector assignment problems: a general framework, Journal of Algorithms, Vol. 48 (2003), pp. 360-384. PS, PDF
  • L. Epstein and T. Tassa, Approximation schemes for the min-max starting time problem, Acta Informatica, Vol. 40 (2004), pp. 657-674. PS, PDF
  • T. Tassa, Low bandwidth dynamic traitor tracing schemes, Journal of Cryptology, Vol. 18 (2005), pp. 167-183. PS, PDF
  • L. Epstein and T. Tassa, Optimal preemptive scheduling for general target functions, Journal of Computer and System Sciences, Vol. 72 (2006), pp. 132-162. PS, PDF
  • L. Epstein and T. Tassa, Vector assignment schemes in asymmetric settings, Acta Informatica, Vol. 42 (2006), pp. 501-514. PS, PDF
  • N. Kogan and T. Tassa, Improved efficiency for revocation schemes via Newton interpolation, ACM Transactions on Information and System Security, Vol. 9 (2006), pp. 461-486. PS, PDF
  • T. Tassa, A linear algebraic approach in teaching interpolation, Mathematics And Computer Education (2007), pp. 37-45. PDF
  • T. Tassa, Hierarchical threshold secret sharing, Journal of Cryptology, Vol. 20 (2007), pp. 237-264. PS, PDF
  • J. Goldberger and T. Tassa, A hierarchical clustering algorithm based on the Hungarian method, Pattern Recognition Letters, Vol. 29 (2008), pp. 1632–1638. PS, PDF
  • A. Beimel, T. Tassa and E. Weinreb, Characterizing ideal weighted threshold secret sharing, SIAM Journal on Discrete Mathematics, Vol. 22 (2008), pp. 360-397. PS, PDF
  • O. Blayer and T. Tassa, Improved versions of Tardos' fingerprinting scheme, Designs, Codes and Cryptography, Vol. 48 (2008), pp. 79-103.  PS, PDF
  • T. Tassa and J.L. Villar, On proper secrets, (t,k)-bases and linear codes. Designs, Codes and Cryptography, Vol. 52 (2009), pp. 129-154. PS, PDF
  • T. Tassa and N. Dyn, Multipartite secret sharing by bivariate interpolation. Journal of Cryptology, Vol. 22 (2009), pp. 227-258. PS, PDF
  • A. Gionis and T. Tassa, k-Anonymization with minimal loss of information. IEEE Transactions on Knowledge and Data Engineering, Vol. 21 (2009), pp. 206-219. PS, PDF
  • J. Goldberger and T. Tassa, Efficient Anonymizations with Enhanced Utility. Transactions on Data Privacy, Vol. 3 (2010), pp. 149-175. PS, PDF
  • D. Berend and T. Tassa, Improved bounds on Bell numbers and on moments of sums of random variables. Probability and Mathematical Statistics, Vol. 30 (2010), pp. 185-205. PS, PDF
  • T. Tassa, Generalized Oblivious Transfer by Secret Sharing. Designs, Codes and Cryptography, Vol. 58 (2011), pp. 11-21. PS, PDF

 

Conferences

 

  • T. Tassa, On the homogenization of nonlinear convection-diffusion equations with oscillatory initial and forcing data, The Proceedings of the 4th MSJ International Research Institute on "Nonlinear Waves", July 1995, Sapporo, Japan, pp. 478-486.
  • A. Fiat and T. Tassa, Dynamic traitor tracings, Crypto 99, August 1999, Santa Barbara, CA, pp. 354-371. PS, PDF
  • L. Epstein and T. Tassa, Vector assignment problems:  a general framework, European Symposium on Algorithms, September 2002, Rome, pp. 461-472. PS, PDF
  • L. Epstein and T. Tassa, Approximation schemes for the min-max starting time problem, The 28th International Symposium on Mathematical Foundations of Computer Science, August 2003, Bratislava, pp. 408-418. PS, PDF
  • T. Tassa, Hierarchical threshold secret sharing, The First Theory of Cryptography Conference, TCC 2004, February 2004, MIT, Cambridge, pp. 473-490. PS, PDF
  • L. Epstein and T. Tassa, Optimal preemptive scheduling for general target functions, The 29th International Symposium on Mathematical Foundations of Computer Science, August 2004, Prague, pp. 562-573. PS, PDF
  • A. Beimel, T. Tassa and E. Weinreb, Characterizing ideal weighted threshold secret sharing, The Second Theory of Cryptography Conference, TCC 2005, February 2005, MIT, Cambridge, pp. 600-619. PS, PDF
  • A. Jaffe, M. Naaman, T. Tassa and M. Davis, Generating summaries for large collections of geo-referenced photographs, The 15th International World Wide Web Conference 2006 (Poster), pp. 853-854. PS, PDF
  • T. Tassa and N. Dyn, Multipartite secret sharing by bivariate interpolation, ICALP 2006, Part II, LNCS 4052, July 2006, Venice, pp. 288-299. PS, PDF
  • A. Jaffe, M. Naaman, T. Tassa and M. Davis, Generating summaries and visualization for large collections of geo-referenced photographs, ACM Multimedia Workshop On Multimedia Information Retrieval, October 2006, Santa Barbara, pp. 89-98. PS, PDF
  • A. Gionis and T. Tassa, k-Anonymization with minimal loss of information. European Symposium on Algorithms, October 2007, Eilat, pp. 439-450. PS, PDF
  • A. Gionis, A. Mazza and T. Tassa, k-Anonymization revisited, The International Conference on Data Engineering, April 2008, Cancun, pp. 744-753. PS, PDF
  • J. Goldberger and T. Tassa, Efficient Anonymizations with Enhanced Utility, ICDM Workshop on Privacy Aspects of Data Mining, December 2009, Miami. PS, PDF
  • F. Bonchi, A. Gionis and T. Tassa, Identity obfuscation in graphs through the information theoretic lens. The Proceedings of The International Conference on Data Engineering, April 2011, Hannover. PDF

 

 

Manuscripts

 

  • X. Liu, E. Tadmor and T. Tassa, A uniformly third order accurate scheme for genuinely nonlinear scalar conservation laws. PS, PDF