Generating summaries and visualization for large collections of geo-referenced photographs A Jaffe, M Naaman, T Tassa, M Davis Proceedings of the 8th ACM international workshop on Multimedia information …, 2006 | 343 | 2006 |
Hierarchical threshold secret sharing T Tassa Journal of cryptology 20, 237-264, 2007 | 287 | 2007 |
On syntactic anonymity and differential privacy C Clifton, T Tassa 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW …, 2013 | 249 | 2013 |
Improved bounds on Bell numbers and on moments of sums of random variables D Berend, T Tassa Probability and Mathematical Statistics 30 (2), 185-205, 2010 | 244 | 2010 |
Dynamic traitor tracing A Fiat, T Tassa Lecture notes in computer science, 354-371, 1999 | 169 | 1999 |
Anonymization of centralized and distributed social networks by sequential clustering T Tassa, DJ Cohen IEEE Transactions on Knowledge and data Engineering 25 (2), 311-324, 2011 | 150 | 2011 |
Secure mining of association rules in horizontally distributed databases T Tassa IEEE Transactions on Knowledge and Data Engineering 26 (4), 970-983, 2013 | 147 | 2013 |
Injecting uncertainty in graphs for identity obfuscation P Boldi, F Bonchi, A Gionis, T Tassa arXiv preprint arXiv:1208.4145, 2012 | 133 | 2012 |
Injecting uncertainty in graphs for identity obfuscation P Boldi, F Bonchi, A Gionis, T Tassa arXiv preprint arXiv:1208.4145, 2012 | 133 | 2012 |
Dynamic traitor tracing A Fiat, T Tassa Journal of CRYPTOLOGY 14, 211-223, 2001 | 124 | 2001 |
Identity obfuscation in graphs through the information theoretic lens F Bonchi, A Gionis, T Tassa Information Sciences 275, 232-256, 2014 | 114 | 2014 |
k-Anonymization with minimal loss of information A Gionis, T Tassa IEEE Transactions on Knowledge and Data Engineering 21 (2), 206-219, 2008 | 106 | 2008 |
Characterizing ideal weighted threshold secret sharing A Beimel, T Tassa, E Weinreb Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005 | 102 | 2005 |
Hierarchical threshold secret sharing T Tassa Theory of Cryptography: First Theory of Cryptography Conference, TCC 2004 …, 2004 | 100 | 2004 |
Multipartite secret sharing by bivariate interpolation T Tassa, N Dyn Journal of Cryptology 22, 227-258, 2009 | 99 | 2009 |
Generating summaries for large collections of geo-referenced photographs A Jaffe, M Naaman, T Tassa, M Davis Proceedings of the 15th international conference on World Wide Web, 853-854, 2006 | 94 | 2006 |
Generalized oblivious transfer by secret sharing T Tassa Designs, Codes and Cryptography 58, 11-21, 2011 | 91 | 2011 |
Efficient anonymizations with enhanced utility J Goldberger, T Tassa 2009 IEEE International Conference on Data Mining Workshops, 106-113, 2009 | 78 | 2009 |
Improved versions of Tardos’ fingerprinting scheme O Blayer, T Tassa Designs, Codes and Cryptography 48, 79-103, 2008 | 78 | 2008 |
A hierarchical clustering algorithm based on the Hungarian method J Goldberger, T Tassa Pattern Recognition Letters 29 (11), 1632-1638, 2008 | 76 | 2008 |