Tamir Tassa
Tamir Tassa
Professor of Computer Science, The Open University of Israel
Email verificata su openu.ac.il
TitoloCitata daAnno
Generating summaries and visualization for large collections of geo-referenced photographs
A Jaffe, M Naaman, T Tassa, M Davis
Proceedings of the 8th ACM international workshop on Multimedia information …, 2006
3072006
Hierarchical threshold secret sharing
T Tassa
Journal of cryptology 20 (2), 237-264, 2007
2012007
Improved bounds on Bell numbers and on moments of sums of random variables
D Berend, T Tassa
Probability and Mathematical Statistics 30 (2), 185-205, 2010
1772010
Dynamic traitor tracing
A Fiat, T Tassa
Annual International Cryptology Conference, 354-371, 1999
1561999
On syntactic anonymity and differential privacy
C Clifton, T Tassa
2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW …, 2013
1512013
Secure mining of association rules in horizontally distributed databases
T Tassa
IEEE Transactions on Knowledge and Data Engineering 26 (4), 970-983, 2013
1282013
Anonymization of centralized and distributed social networks by sequential clustering
T Tassa, DJ Cohen
IEEE Transactions on Knowledge and Data Engineering 25 (2), 311-324, 2011
1172011
Dynamic traitor tracing
A Fiat, T Tassa
Journal of CRYPTOLOGY 14 (3), 211-223, 2001
1132001
Generating summaries for large collections of geo-referenced photographs
A Jaffe, M Naaman, T Tassa, M Davis
Proceedings of the 15th international conference on World Wide Web, 853-854, 2006
902006
Identity obfuscation in graphs through the information theoretic lens
F Bonchi, A Gionis, T Tassa
Information Sciences 275, 232-256, 2014
882014
Injecting uncertainty in graphs for identity obfuscation
P Boldi, F Bonchi, A Gionis, T Tassa
Proceedings of the VLDB Endowment 5 (11), 1376-1387, 2012
832012
Injecting uncertainty in graphs for identity obfuscation
P Boldi, F Bonchi, A Gionis, T Tassa
Proceedings of the VLDB Endowment 5 (11), 1376-1387, 2012
832012
k-Anonymization with minimal loss of information
A Gionis, T Tassa
IEEE Transactions on Knowledge and Data Engineering 21 (2), 206-219, 2008
792008
Improved versions of Tardos’ fingerprinting scheme
O Blayer, T Tassa
Designs, Codes and Cryptography 48 (1), 79-103, 2008
752008
Hierarchical threshold secret sharing
T Tassa
Theory of Cryptography Conference, 473-490, 2004
752004
Characterizing ideal weighted threshold secret sharing
A Beimel, T Tassa, E Weinreb
Theory of Cryptography Conference, 600-619, 2005
742005
Multipartite secret sharing by bivariate interpolation
T Tassa, N Dyn
Journal of Cryptology 22 (2), 227-258, 2009
722009
Characterizing ideal weighted threshold secret sharing
A Beimel, T Tassa, E Weinreb
SIAM Journal on Discrete Mathematics 22 (1), 360-397, 2008
652008
Generalized oblivious transfer by secret sharing
T Tassa
Designs, Codes and Cryptography 58 (1), 11-21, 2011
642011
k-Anonymization revisited
A Gionis, A Mazza, T Tassa
2008 IEEE 24th International Conference on Data Engineering, 744-753, 2008
602008
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20