ÆÈ·Î¿ì
Tamir Tassa
Tamir Tassa
Professor of Computer Science, The Open University of Israel
openu.ac.ilÀÇ À̸ÞÀÏ È®ÀεÊ
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Generating summaries and visualization for large collections of geo-referenced photographs
A Jaffe, M Naaman, T Tassa, M Davis
Proceedings of the 8th ACM international workshop on Multimedia information ¡¦, 2006
3492006
Hierarchical threshold secret sharing
T Tassa
Journal of cryptology 20, 237-264, 2007
2932007
On syntactic anonymity and differential privacy
C Clifton, T Tassa
2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW ¡¦, 2013
2582013
Improved bounds on Bell numbers and on moments of sums of random variables
D Berend, T Tassa
Probability and Mathematical Statistics 30 (2), 185-205, 2010
2542010
Dynamic traitor tracing
A Fiat, T Tassa
Annual International Cryptology Conference, 354-371, 1999
1711999
Anonymization of centralized and distributed social networks by sequential clustering
T Tassa, DJ Cohen
IEEE Transactions on Knowledge and data Engineering 25 (2), 311-324, 2011
1532011
Secure mining of association rules in horizontally distributed databases
T Tassa
IEEE Transactions on Knowledge and Data Engineering 26 (4), 970-983, 2013
1482013
Injecting uncertainty in graphs for identity obfuscation
P Boldi, F Bonchi, A Gionis, T Tassa
arXiv preprint arXiv:1208.4145, 2012
1422012
Injecting uncertainty in graphs for identity obfuscation
P Boldi, F Bonchi, A Gionis, T Tassa
arXiv preprint arXiv:1208.4145, 2012
1422012
Dynamic traitor tracing
A Fiat, T Tassa
Journal of CRYPTOLOGY 14, 211-223, 2001
1262001
Identity obfuscation in graphs through the information theoretic lens
F Bonchi, A Gionis, T Tassa
Information Sciences 275, 232-256, 2014
1162014
k-Anonymization with minimal loss of information
A Gionis, T Tassa
IEEE Transactions on Knowledge and Data Engineering 21 (2), 206-219, 2008
1142008
Multipartite secret sharing by bivariate interpolation
T Tassa, N Dyn
Journal of Cryptology 22, 227-258, 2009
1092009
Characterizing ideal weighted threshold secret sharing
A Beimel, T Tassa, E Weinreb
Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 ¡¦, 2005
1032005
Hierarchical threshold secret sharing
T Tassa
Theory of Cryptography Conference, 473-490, 2004
1012004
Generalized oblivious transfer by secret sharing
T Tassa
Designs, Codes and Cryptography 58, 11-21, 2011
962011
Generating summaries for large collections of geo-referenced photographs
A Jaffe, M Naaman, T Tassa, M Davis
Proceedings of the 15th international conference on World Wide Web, 853-854, 2006
952006
Efficient anonymizations with enhanced utility
J Goldberger, T Tassa
2009 IEEE International Conference on Data Mining Workshops, 106-113, 2009
792009
Improved versions of Tardos¡¯ fingerprinting scheme
O Blayer, T Tassa
Designs, Codes and Cryptography 48, 79-103, 2008
782008
A practical approximation algorithm for optimal k-anonymity
B Kenig, T Tassa
Data Mining and Knowledge Discovery 25, 134-168, 2012
752012
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20