Journal
Papers
- E.
Tadmor and T. Tassa, On the piecewise smoothness of entropy
solutions to scalar conservation laws, Communications in Partial
Differential Equations, Vol. 18 (1993), pp. 1631-1652. PS , PDF
- H.
Nessyahu, E. Tadmor and T.Tassa,
The convergence rate of Godunov type schemes, Siam Journal on
Numerical Analysis, Vol. 31 (1994), pp. 1-16. PS , PDF
- H.
Nessyahu and T. Tassa,
Convergence rate of approximate solutions to conservation laws with
initial rarefactions, Siam Journal on Numerical Analysis, Vol. 31
(1994), pp. 628-654. PS , PDF
- T.
Tassa, Regularity of weak solutions of the
nonlinear Fokker-Planck equation, Mathematical Research Letters, Vol.
3 (1996), pp. 475-490. PS , PDF
- E. Tadmor and T. Tassa, On the homogenization of oscillatory
solutions to nonlinear convection-diffusion equations, Advances in Mathematical
Sciences and Applications, Vol. 7 (1997), pp. 93-117. PS , PDF
- T.
Tassa, Uniqueness of piecewise smooth weak solutions of multidimensional degenerate
parabolic equations, Journal of Mathematical Analysis and
Applications, Vol. 210 (1997), pp. 598-608. PS , PDF
- T.
Tassa, Homogenization of two-dimensional
linear flows with integral invariance, Siam Journal on Applied
Mathematics, Vol. 57 (1997), pp. 1390-1405. PS , PDF
- T. Tassa,
On the homogenization of nonlinear
convection-diffusion equations with oscillatory initial and forcing data.
Mathematical Sciences and Applications, Vol. 10 (1997), Nonlinear Waves,
pp. 493-501.
- T.
Tassa, Homogenization with multiple scales,
Asymptotic Analysis, Vol. 20 (1999), pp. 61-96. PS , PDF
- A.
Fiat and T. Tassa, Dynamic traitor tracing,
Journal of Cryptology, Vol. 14 (2001), pp. 211-223. PS , PDF
- T.
Tassa, On
finite closures of homogenized solutions of nonlinear hyperbolic equations,
Asymptotic Analysis, Vol. 34 (2003), pp. 55-76. PS, PDF
- L.
Epstein and T. Tassa, Vector assignment
problems: a general framework, Journal of Algorithms, Vol. 48 (2003),
pp. 360-384. PS, PDF
- L.
Epstein and T. Tassa, Approximation schemes
for the min-max starting time problem, Acta Informatica, Vol. 40 (2004), pp. 657-674. PS, PDF
- T.
Tassa, Low bandwidth dynamic traitor tracing
schemes, Journal of Cryptology, Vol. 18 (2005), pp. 167-183. PS, PDF
- L. Epstein and T. Tassa,
Optimal preemptive scheduling for general target functions, Journal
of Computer and System Sciences, Vol. 72 (2006), pp. 132-162. PS, PDF
- L. Epstein and T. Tassa, Vector assignment schemes in asymmetric
settings, Acta Informatica,
Vol. 42 (2006), pp. 501-514. PS, PDF
- N. Kogan and T. Tassa, Improved
efficiency for revocation schemes via Newton interpolation, ACM
Transactions on Information and System Security, Vol. 9 (2006), pp.
461-486. PS, PDF
- T. Tassa, A linear
algebraic approach in teaching interpolation, Mathematics And Computer Education (2007), pp. 37-45. PDF
- T.
Tassa, Hierarchical threshold secret sharing,
Journal of Cryptology, Vol. 20 (2007), pp. 237-264. PS, PDF
- J. Goldberger and T. Tassa,
A hierarchical clustering algorithm based on the Hungarian method,
Pattern Recognition Letters, Vol. 29 (2008), pp. 1632–1638. PS, PDF
- A. Beimel, T. Tassa and E. Weinreb, Characterizing
ideal weighted threshold secret sharing, SIAM Journal on
Discrete Mathematics, Vol. 22 (2008), pp. 360-397. PS, PDF
- O. Blayer and T. Tassa, Improved versions of Tardos'
fingerprinting scheme, Designs, Codes and Cryptography, Vol. 48
(2008), pp. 79-103. PS, PDF
- T. Tassa and J.L. Villar, On proper secrets, (t,k)-bases and linear codes. Designs, Codes and
Cryptography, Vol. 52 (2009), pp. 129-154. PS, PDF
- T. Tassa and N. Dyn, Multipartite secret sharing by bivariate interpolation. Journal of Cryptology,
Vol. 22 (2009), pp. 227-258. PS, PDF
- A. Gionis and T. Tassa, k-Anonymization
with minimal loss of information. IEEE Transactions on Knowledge and
Data Engineering, Vol. 21 (2009), pp. 206-219. PS, PDF
- J. Goldberger and T. Tassa,
Efficient Anonymizations with Enhanced
Utility. Transactions on Data Privacy, Vol. 3 (2010), pp. 149-175. PS, PDF
- D. Berend and T. Tassa, Improved bounds on Bell numbers and on
moments of sums of random variables. Probability and Mathematical
Statistics, Vol. 30 (2010), pp. 185-205. PS, PDF
- T. Tassa,
Generalized Oblivious Transfer by Secret Sharing. Designs, Codes
and Cryptography, Vol. 58 (2011), pp. 11-21. PS, PDF
Conferences
- T. Tassa, On the
homogenization of nonlinear convection-diffusion equations with
oscillatory initial and forcing data, The Proceedings of the 4th MSJ
International Research Institute on "Nonlinear Waves", July
1995, Sapporo, Japan, pp. 478-486.
- A. Fiat and T. Tassa, Dynamic
traitor tracings, Crypto 99, August 1999, Santa Barbara, CA, pp.
354-371. PS, PDF
- L. Epstein and T. Tassa,
Vector assignment problems: a
general framework, European Symposium on Algorithms, September 2002,
Rome, pp. 461-472. PS, PDF
- L. Epstein and T. Tassa,
Approximation schemes for the min-max starting time problem, The 28th
International Symposium on Mathematical Foundations of Computer Science,
August 2003, Bratislava, pp. 408-418. PS, PDF
- T. Tassa, Hierarchical
threshold secret sharing, The First Theory of Cryptography Conference,
TCC 2004, February 2004, MIT, Cambridge, pp. 473-490. PS, PDF
- L. Epstein and T. Tassa,
Optimal preemptive scheduling for general target functions, The 29th
International Symposium on Mathematical Foundations of Computer Science,
August 2004, Prague, pp. 562-573. PS, PDF
- A. Beimel, T. Tassa and E. Weinreb, Characterizing
ideal weighted threshold secret sharing, The Second Theory of Cryptography
Conference, TCC 2005, February 2005, MIT, Cambridge, pp. 600-619. PS, PDF
- A. Jaffe, M. Naaman, T. Tassa and M.
Davis, Generating summaries for large collections of geo-referenced
photographs, The 15th International World Wide Web Conference 2006
(Poster), pp. 853-854. PS, PDF
- T. Tassa and N. Dyn, Multipartite
secret sharing by bivariate interpolation, ICALP
2006, Part II, LNCS 4052, July 2006, Venice,
pp. 288-299. PS, PDF
- A. Jaffe, M. Naaman, T. Tassa and M.
Davis, Generating summaries and visualization for large collections of
geo-referenced photographs, ACM Multimedia
Workshop On Multimedia Information Retrieval, October 2006, Santa Barbara,
pp. 89-98. PS, PDF
- A. Gionis and T. Tassa, k-Anonymization with minimal loss of information.
European Symposium on Algorithms, October 2007, Eilat,
pp. 439-450. PS, PDF
- A. Gionis, A. Mazza and T. Tassa, k-Anonymization
revisited, The International Conference on Data Engineering, April
2008, Cancun, pp. 744-753. PS, PDF
- J. Goldberger
and T. Tassa, Efficient Anonymizations
with Enhanced Utility, ICDM Workshop on Privacy Aspects of Data
Mining, December 2009, Miami. PS, PDF
- F. Bonchi, A. Gionis and T. Tassa, Identity obfuscation in graphs through the
information theoretic lens. The Proceedings of The
International Conference on Data Engineering, April 2011, Hannover. PDF
Manuscripts
- X.
Liu, E. Tadmor and T. Tassa,
A uniformly third order accurate scheme for genuinely nonlinear scalar
conservation laws. PS, PDF