Follow
Tamir Tassa
Tamir Tassa
Professor of Computer Science, The Open University of Israel
Verified email at openu.ac.il
Title
Cited by
Cited by
Year
Generating summaries and visualization for large collections of geo-referenced photographs
A Jaffe, M Naaman, T Tassa, M Davis
Proceedings of the 8th ACM international workshop on Multimedia information …, 2006
3522006
Hierarchical threshold secret sharing
T Tassa
Journal of cryptology 20, 237-264, 2007
3052007
Improved bounds on Bell numbers and on moments of sums of random variables
D Berend, T Tassa
Probability and Mathematical Statistics 30 (2), 185-205, 2010
2812010
On syntactic anonymity and differential privacy
C Clifton, T Tassa
2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW …, 2013
2752013
Dynamic traitor tracing
A Fiat, T Tassa
Annual International Cryptology Conference, 354-371, 1999
1721999
Anonymization of centralized and distributed social networks by sequential clustering
T Tassa, DJ Cohen
IEEE Transactions on Knowledge and data Engineering 25 (2), 311-324, 2011
1662011
Secure mining of association rules in horizontally distributed databases
T Tassa
IEEE Transactions on Knowledge and Data Engineering 26 (4), 970-983, 2013
1542013
Injecting uncertainty in graphs for identity obfuscation
P Boldi, F Bonchi, A Gionis, T Tassa
arXiv preprint arXiv:1208.4145, 2012
1522012
Dynamic traitor tracing
A Fiat, T Tassa
Journal of CRYPTOLOGY 14, 211-223, 2001
1252001
Identity obfuscation in graphs through the information theoretic lens
F Bonchi, A Gionis, T Tassa
Information Sciences 275, 232-256, 2014
1242014
k-Anonymization with minimal loss of information
A Gionis, T Tassa
IEEE Transactions on Knowledge and Data Engineering 21 (2), 206-219, 2008
1222008
Multipartite secret sharing by bivariate interpolation
T Tassa, N Dyn
Journal of Cryptology 22, 227-258, 2009
1172009
Characterizing ideal weighted threshold secret sharing
A Beimel, T Tassa, E Weinreb
Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005
1082005
Hierarchical threshold secret sharing
T Tassa
Theory of Cryptography Conference, 473-490, 2004
1062004
Generalized oblivious transfer by secret sharing
T Tassa
Designs, Codes and Cryptography 58, 11-21, 2011
1022011
Generating summaries for large collections of geo-referenced photographs
A Jaffe, M Naaman, T Tassa, M Davis
Proceedings of the 15th international conference on World Wide Web, 853-854, 2006
952006
Efficient anonymizations with enhanced utility
J Goldberger, T Tassa
2009 IEEE International Conference on Data Mining Workshops, 106-113, 2009
842009
FaiRecSys: mitigating algorithmic bias in recommender systems
B Edizel, F Bonchi, S Hajian, A Panisson, T Tassa
International Journal of Data Science and Analytics 9, 197-213, 2020
832020
A hierarchical clustering algorithm based on the Hungarian method
J Goldberger, T Tassa
Pattern Recognition Letters 29 (11), 1632-1638, 2008
792008
Improved versions of Tardos’ fingerprinting scheme
O Blayer, T Tassa
Designs, Codes and Cryptography 48, 79-103, 2008
782008
The system can't perform the operation now. Try again later.
Articles 1–20