Cryptographers' World
 

Tamir Tassa


Author's Web Page Link

7 papers in database with 225 citations 

H-number: 5

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Oded Blayer,  Tamir Tassa,  Improved versions of Tardos' fingerprinting scheme, Designs, Codes and Cryptography, Volume 48(1), pp. 79 - 103, Springer, 2008.

[Electronic Edition][Cited 3 times ]

2. Tamir Tassa,  Hierarchical Threshold Secret Sharing, Journal of Cryptology, Volume 20(2), pp. 237 - 264, Springer, 2007.

[Cited 17 times ]

3. Tamir Tassa,  Low Bandwidth Dynamic Traitor Tracing Schemes, Journal of Cryptology, Volume 18(2), pp. 167 - 183, Springer, 2005.

[Cited 7 times ]

4. Amos Fiat,  Tamir Tassa,  Dynamic Traitor Tracing, Journal of Cryptology, Volume 14(3), pp. 211 - 223, Springer, 2001.

[Cited 116 times Red StarRed Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Amos Beimel,  Tamir Tassa,  Enav Weinreb,  Characterizing Ideal Weighted Threshold Secret Sharing, pp. 600 - 619, TCC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 42 times ]

2. Tamir Tassa,  Hierarchical Threshold Secret Sharing, pp. 473 - 490, TCC 2004.

[Electronic Edition][Cited 37 times ]

3. Amos Fiat,  Tamir Tassa,  Dynamic Traitor Training, pp. 354 - 371, CRYPTO 1999.

[Electronic Edition][Cited 20 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...