Tamir Tassa

Orcid: 0000-0001-9681-8824

According to our database1, Tamir Tassa authored at least 71 papers between 1997 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Fairness-Driven Private Collaborative Machine Learning.
ACM Trans. Intell. Syst. Technol., April, 2024

The Multiple Millionaires' Problem: New Algorithmic Approaches and Protocols.
Proc. Priv. Enhancing Technol., 2024

The Multiple Millionaires' Problem.
IACR Cryptol. ePrint Arch., 2024

Distributed Protocols for Oblivious Transfer and Polynomial Evaluation.
IACR Cryptol. ePrint Arch., 2024

Towards Secure Virtual Elections: Multiparty Computation of Order Based Voting Rules.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Privacy preserving solution of DCOPs by mediation.
Artif. Intell., June, 2023

2022
Privacy-preserving Collaborative Filtering by Distributed Mediation.
ACM Trans. Intell. Syst. Technol., 2022

Privacy Preserving DCOP Solving by Mediation.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022

2021
Fear not, vote truthfully: Secure Multiparty Computation of score based rules.
Expert Syst. Appl., 2021

PC-SyncBB: A privacy preserving collusion secure DCOP algorithm.
Artif. Intell., 2021

DEMO: A Secure Voting System for Score Based Elections.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Mediated Secure Multi-Party Protocols for Collaborative Filtering.
ACM Trans. Intell. Syst. Technol., 2020

FaiRecSys: mitigating algorithmic bias in recommender systems.
Int. J. Data Sci. Anal., 2020

2019
Privacy-Preserving Planarity Testing of Distributed Graphs.
Trans. Data Priv., 2019

Secure Voting Protocols with Perfect Ballot Secrecy.
CoRR, 2019

Privacy preserving region optimal algorithms for symmetric and asymmetric DCOPs.
Artif. Intell., 2019

A Privacy Preserving Collusion Secure DCOP Algorithm.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

2017
Privacy Preserving Implementation of the Max-Sum Algorithm and its Variants.
J. Artif. Intell. Res., 2017

Secure Centrality Computation Over Multiple Networks.
Proceedings of the 26th International Conference on World Wide Web, 2017

Secure Multi-Party Protocols for Item-Based Collaborative Filtering.
Proceedings of the Eleventh ACM Conference on Recommender Systems, 2017

2016
Individual privacy in social influence networks.
Soc. Netw. Anal. Min., 2016

Content sharing schemes in DRM systems with enhanced performance and privacy preservation.
J. Comput. Secur., 2016

P-SyncBB: A Privacy Preserving Branch and Bound DCOP Algorithm.
J. Artif. Intell. Res., 2016

Preserving Privacy in Region Optimal DCOP Algorithms.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Privacy Preserving Computations for Viral Marketing: The Case of Rational Players.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Privacy by diversity in sequential releases of databases.
Inf. Sci., 2015

Revisiting distance-based record linkage for privacy-preserving release of statistical datasets.
Data Knowl. Eng., 2015

More Constraints, Smaller Coresets: Constrained Matrix Approximation of Sparse Big Data.
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2015

Max-Sum Goes Private.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

2014
Secure Mining of Association Rules inHorizontally Distributed Databases.
IEEE Trans. Knowl. Data Eng., 2014

Constrained obfuscation of relational databases.
Inf. Sci., 2014

Improving accuracy of classification models induced from anonymized datasets.
Inf. Sci., 2014

Identity obfuscation in graphs through the information theoretic lens.
Inf. Sci., 2014

Planning high order trajectories with general initial and final conditions and asymmetric bounds.
Int. J. Robotics Res., 2014

Privacy Preserving Estimation of Social Influence.
Proceedings of the 17th International Conference on Extending Database Technology, 2014

Efficient and Enhanced Solutions for Content Sharing in DRM Systems.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

A privacy-preserving algorithm for distributed constraint optimization.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

2013
Anonymization of Centralized and Distributed Social Networks by Sequential Clustering.
IEEE Trans. Knowl. Data Eng., 2013

On Syntactic Anonymity and Differential Privacy.
Trans. Data Priv., 2013

Addendum to "Finding all maximally-matchable edges in a bipartite graph" [Theoret. Comput. Sci. 423 (2012) 50-58]
Theor. Comput. Sci., 2013

Oblivious evaluation of multivariate polynomials.
J. Math. Cryptol., 2013

2012
Secure distributed computation of anonymized views of shared databases.
ACM Trans. Database Syst., 2012

k-Concealment: An Alternative Model of k-Type Anonymity.
Trans. Data Priv., 2012

Finding all maximally-matchable edges in a bipartite graph.
Theor. Comput. Sci., 2012

Injecting Uncertainty in Graphs for Identity Obfuscation.
Proc. VLDB Endow., 2012

Limiting disclosure of sensitive data in sequential releases of databases.
Inf. Sci., 2012

A practical approximation algorithm for optimal k-anonymity.
Data Min. Knowl. Discov., 2012

2011
Generalized oblivious transfer by secret sharing.
Des. Codes Cryptogr., 2011

Finding All Allowed Edges in a Bipartite Graph
CoRR, 2011

Secure Mining of Association Rules in Horizontally Distributed Databases
CoRR, 2011

2010
Efficient Anonymizations with Enhanced Utility.
Trans. Data Priv., 2010

2009
k-Anonymization with Minimal Loss of Information.
IEEE Trans. Knowl. Data Eng., 2009

Multipartite Secret Sharing by Bivariate Interpolation.
J. Cryptol., 2009

On proper secrets, ( <i>t</i> , <i>k</i> )-bases and linear codes.
Des. Codes Cryptogr., 2009

2008
Characterizing Ideal Weighted Threshold Secret Sharing.
SIAM J. Discret. Math., 2008

A hierarchical clustering algorithm based on the Hungarian method.
Pattern Recognit. Lett., 2008

Improved versions of Tardos' fingerprinting scheme.
Des. Codes Cryptogr., 2008

k-Anonymization Revisited.
Proceedings of the 24th International Conference on Data Engineering, 2008

2007
Hierarchical Threshold Secret Sharing.
J. Cryptol., 2007

<i>k</i> -Anonymization with Minimal Loss of Information.
Proceedings of the Algorithms, 2007

2006
Improved efficiency for revocation schemes via Newton interpolation.
ACM Trans. Inf. Syst. Secur., 2006

Optimal preemptive scheduling for general target functions.
J. Comput. Syst. Sci., 2006

Vector assignment schemes for asymmetric settings.
Acta Informatica, 2006

Generating summaries for large collections of geo-referenced photographs.
Proceedings of the 15th international conference on World Wide Web, 2006

Generating summaries and visualization for large collections of geo-referenced photographs.
Proceedings of the 8th ACM SIGMM International Workshop on Multimedia Information Retrieval, 2006

2005
Low Bandwidth Dynamic Traitor Tracing Schemes.
J. Cryptol., 2005

2004
Approximation schemes for the Min-Max Starting Time Problem.
Acta Informatica, 2004

2003
Vector assignment problems: a general framework.
J. Algorithms, 2003

2001
Dynamic Traitor Tracing.
J. Cryptol., 2001

1999
Dynamic Traitor Training.
Proceedings of the Advances in Cryptology, 1999

1997
Homogenization of Two-Dimensional Linear Flows with Integral Invariance.
SIAM J. Appl. Math., 1997


  Loading...