Author: Eran Toch
Publications
Co-authors
Productive Colleagues
- Jason Hong
- Vassilis Kostakos
- Aniket Kittur
- 20
- 20
- 27
Publications
Toch, Eran, Gal, Avigdor, Reinhartz-Berger, Iris, Dori, Dov (2007): A semantic approach to approximate service retrieval. In ACM Trans. Internet Techn., 8 (1) pp. . https://dl.acm.org/doi/10.1145/1294148.1294150
Toch, Eran, Ravichandran, Ramprasad, Cranor, Lorrie, Drielsma, Paul, Hong, Jason, Kelley, Patrick, Sadeh, Norman, Tsai, Janice (2009): Analyzing use of privacy policy attributes in a location sharing application. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 32. https://doi.acm.org/10.1145/1572532.1572571
Cranshaw, Justin, Toch, Eran, Hong, Jason, Kittur, Aniket, Sadeh, Norman (2010): Bridging the gap between physical location and online social networks. In: Proceedings of the 2010 International Conference on Uniquitous Computing , 2010, . pp. 119-128. https://doi.acm.org/10.1145/1864349.1864380
Toch, Eran, Cranshaw, Justin, Drielsma, Paul Hankes, Tsai, Janice Y., Kelley, Patrick Gage, Springfield, James, Cranor, Lorrie, Hong, Jason, Sadeh, Norman (2010): Empirical models of privacy in location sharing. In: Proceedings of the 2010 International Conference on Uniquitous Computing , 2010, . pp. 129-138. https://doi.acm.org/10.1145/1864349.1864364
Toch, Eran, Cranshaw, Justin, Hankes-Drielsma, Paul, Springfield, Jay, Kelley, Patrick Gage, Cranor, Lorrie, Hong, Jason, Sadeh, Norman (2010): Locaccino: a privacy-centric location sharing application. In: Proceedings of the 2010 International Conference on Uniquitous Computing , 2010, . pp. 381-382. https://doi.acm.org/10.1145/1864431.1864446
Toch, Eran, Sadeh, Norman M., Hong, Jason (2010): Generating default privacy policies for online social networks. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 4243-4248. https://doi.acm.org/10.1145/1753846.1754133
Kostakos, Vassilis, Venkatanathan, Jayant, Reynolds, Bernardo, Sadeh, Norman, Toch, Eran, Shaikh, Siraj A., Jones, Simon (2011): Who's your best friend?: targeted privacy attacks in location-sharing social networks. In: Proceedings of the 2011 International Conference on Uniquitous Computing , 2011, . pp. 177-186. https://dx.doi.org/10.1145/2030112.2030138
Toch, Eran, Levi, Inbal (2012): What can 'people-nearby' applications teach us about meeting new people?. In: Proceedings of the 2012 International Conference on Uniquitous Computing , 2012, . pp. 802-803.