Generating summaries and visualization for large collections of geo-referenced photographs A Jaffe, M Naaman, T Tassa, M Davis Proceedings of the 8th ACM international workshop on Multimedia information …, 2006 | 351 | 2006 |
Hierarchical threshold secret sharing T Tassa Journal of cryptology 20, 237-264, 2007 | 301 | 2007 |
On syntactic anonymity and differential privacy C Clifton, T Tassa 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW …, 2013 | 272 | 2013 |
Improved bounds on Bell numbers and on moments of sums of random variables D Berend, T Tassa Probability and Mathematical Statistics 30 (2), 185-205, 2010 | 272 | 2010 |
Dynamic traitor tracing A Fiat, T Tassa Annual International Cryptology Conference, 354-371, 1999 | 172 | 1999 |
Anonymization of centralized and distributed social networks by sequential clustering T Tassa, DJ Cohen IEEE Transactions on Knowledge and data Engineering 25 (2), 311-324, 2011 | 163 | 2011 |
Secure mining of association rules in horizontally distributed databases T Tassa IEEE Transactions on Knowledge and Data Engineering 26 (4), 970-983, 2013 | 152 | 2013 |
Injecting uncertainty in graphs for identity obfuscation P Boldi, F Bonchi, A Gionis, T Tassa arXiv preprint arXiv:1208.4145, 2012 | 152 | 2012 |
Dynamic traitor tracing A Fiat, T Tassa Journal of CRYPTOLOGY 14, 211-223, 2001 | 124 | 2001 |
Identity obfuscation in graphs through the information theoretic lens F Bonchi, A Gionis, T Tassa Information Sciences 275, 232-256, 2014 | 121 | 2014 |
k-Anonymization with minimal loss of information A Gionis, T Tassa IEEE Transactions on Knowledge and Data Engineering 21 (2), 206-219, 2008 | 119 | 2008 |
Multipartite secret sharing by bivariate interpolation T Tassa, N Dyn Journal of Cryptology 22, 227-258, 2009 | 114 | 2009 |
Characterizing ideal weighted threshold secret sharing A Beimel, T Tassa, E Weinreb Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005 | 108 | 2005 |
Hierarchical threshold secret sharing T Tassa Theory of Cryptography Conference, 473-490, 2004 | 103 | 2004 |
Generalized oblivious transfer by secret sharing T Tassa Designs, Codes and Cryptography 58, 11-21, 2011 | 101 | 2011 |
Generating summaries for large collections of geo-referenced photographs A Jaffe, M Naaman, T Tassa, M Davis Proceedings of the 15th international conference on World Wide Web, 853-854, 2006 | 95 | 2006 |
Efficient anonymizations with enhanced utility J Goldberger, T Tassa 2009 IEEE International Conference on Data Mining Workshops, 106-113, 2009 | 84 | 2009 |
A hierarchical clustering algorithm based on the Hungarian method J Goldberger, T Tassa Pattern Recognition Letters 29 (11), 1632-1638, 2008 | 78 | 2008 |
Improved versions of Tardos’ fingerprinting scheme O Blayer, T Tassa Designs, Codes and Cryptography 48, 79-103, 2008 | 78 | 2008 |
Characterizing ideal weighted threshold secret sharing A Beimel, T Tassa, E Weinreb SIAM Journal on Discrete Mathematics 22 (1), 360-397, 2008 | 78 | 2008 |