Generating summaries and visualization for large collections of geo-referenced photographs A Jaffe, M Naaman, T Tassa, M Davis Proceedings of the 8th ACM international workshop on Multimedia information …, 2006 | 325 | 2006 |
Hierarchical threshold secret sharing T Tassa Journal of cryptology 20 (2), 237-264, 2007 | 229 | 2007 |
Improved bounds on Bell numbers and on moments of sums of random variables D Berend, T Tassa Probability and Mathematical Statistics 30 (2), 185-205, 2010 | 195 | 2010 |
On syntactic anonymity and differential privacy C Clifton, T Tassa 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW …, 2013 | 183 | 2013 |
Dynamic traitor tracing A Fiat, T Tassa Annual International Cryptology Conference, 354-371, 1999 | 159 | 1999 |
Anonymization of centralized and distributed social networks by sequential clustering T Tassa, DJ Cohen IEEE Transactions on Knowledge and data Engineering 25 (2), 311-324, 2011 | 134 | 2011 |
Secure mining of association rules in horizontally distributed databases T Tassa IEEE Transactions on Knowledge and Data Engineering 26 (4), 970-983, 2013 | 131 | 2013 |
Dynamic traitor tracing A Fiat, T Tassa Journal of CRYPTOLOGY 14 (3), 211-223, 2001 | 118 | 2001 |
Injecting uncertainty in graphs for identity obfuscation P Boldi, F Bonchi, A Gionis, T Tassa arXiv preprint arXiv:1208.4145, 2012 | 97 | 2012 |
Injecting uncertainty in graphs for identity obfuscation P Boldi, F Bonchi, A Gionis, T Tassa arXiv preprint arXiv:1208.4145, 2012 | 97 | 2012 |
Identity obfuscation in graphs through the information theoretic lens F Bonchi, A Gionis, T Tassa Information Sciences 275, 232-256, 2014 | 94 | 2014 |
Generating summaries for large collections of geo-referenced photographs A Jaffe, M Naaman, T Tassa, M Davis Proceedings of the 15th international conference on World Wide Web, 853-854, 2006 | 89 | 2006 |
k-Anonymization with minimal loss of information A Gionis, T Tassa IEEE Transactions on Knowledge and Data Engineering 21 (2), 206-219, 2008 | 88 | 2008 |
Multipartite secret sharing by bivariate interpolation T Tassa, N Dyn Journal of Cryptology 22 (2), 227-258, 2009 | 85 | 2009 |
Hierarchical threshold secret sharing T Tassa Theory of Cryptography Conference, 473-490, 2004 | 83 | 2004 |
Characterizing ideal weighted threshold secret sharing A Beimel, T Tassa, E Weinreb Theory of Cryptography Conference, 600-619, 2005 | 82 | 2005 |
Generalized oblivious transfer by secret sharing T Tassa Designs, Codes and Cryptography 58 (1), 11-21, 2011 | 77 | 2011 |
Improved versions of Tardos’ fingerprinting scheme O Blayer, T Tassa Designs, Codes and Cryptography 48 (1), 79-103, 2008 | 76 | 2008 |
Characterizing ideal weighted threshold secret sharing A Beimel, T Tassa, E Weinreb SIAM Journal on Discrete Mathematics 22 (1), 360-397, 2008 | 71 | 2008 |
k-Anonymization revisited A Gionis, A Mazza, T Tassa 2008 IEEE 24th International Conference on Data Engineering, 744-753, 2008 | 69 | 2008 |