default search action
Florian Hahn 0001
Person information
- affiliation: University of Twente, Enschede, The Netherlands
- affiliation (former): SAP, Karlsruhe, Germany
- affiliation (PhD 2019): Karlsruhe Institute of Technology, Germany
Other persons with the same name
- Florian Hahn 0002 — Bielefeld University, Germany
- Florian Hahn 0003 — TU Dortmund University, Department of Mechanical Engineering, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Amina Bassit, Florian Hahn, Raymond N. J. Veldhuis, Andreas Peter:
Improved Multiplication-Free Biometric Recognition Under Encryption. IEEE Trans. Biom. Behav. Identity Sci. 6(3): 314-325 (2024) - [i6]Federico Mazzone, Ahmad Al Badawi, Yuriy Polyakov, Maarten H. Everts, Florian Hahn, Andreas Peter:
Investigating Privacy Attacks in the Gray-Box Setting to Enhance Collaborative Learning Schemes. CoRR abs/2409.17283 (2024) - 2023
- [j4]César Sabater, Florian Hahn, Andreas Peter, Jan Ramon:
Private Sampling with Identifiable Cheaters. Proc. Priv. Enhancing Technol. 2023(2): 361-383 (2023) - [c17]Amina Bassit, Florian Hahn, Zohra Rezgui, Una M. Kelly, Raymond N. J. Veldhuis, Andreas Peter:
Template Recovery Attack on Homomorphically Encrypted Biometric Recognition Systems with Unprotected Threshold Comparison. IJCB 2023: 1-10 - [c16]Vitomir Pavlov, Florian Hahn, Mohammad El-Hajj:
Security Aspects of Digital Twins in IoT. ICISSP 2023: 560-567 - [c15]Floris Breggeman, Mohammad El-Hajj, Florian Hahn:
A Comparison of Authentication Protocols for Unified Client Applications. ISNCC 2023: 1-7 - [c14]Carlotta Tagliaro, Florian Hahn, Riccardo Sepe, Alessio Aceti, Martina Lindorfer:
I Still Know What You Watched Last Sunday: Privacy of the HbbTV Protocol in the European Smart TV Landscape. NDSS 2023 - [i5]Marc Damie, Florian Hahn, Andreas Peter:
A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents. CoRR abs/2306.15302 (2023) - [i4]Marco Dijkslag, Marc Damie, Florian Hahn, Andreas Peter:
Passive Query-Recovery Attack Against Secure Conjunctive Keyword Search Schemes. CoRR abs/2307.01131 (2023) - [i3]Marc Damie, Jean-Benoist Leger, Florian Hahn, Andreas Peter:
The statistical nature of leakage in SSE schemes and its role in passive attacks. IACR Cryptol. ePrint Arch. 2023: 1883 (2023) - 2022
- [j3]Amina Bassit, Florian Hahn, Raymond N. J. Veldhuis, Andreas Peter:
Hybrid biometric template protection: Resolving the agony of choice between bloom filters and homomorphic encryption. IET Biom. 11(5): 430-444 (2022) - [c13]Marco Dijkslag, Marc Damie, Florian Hahn, Andreas Peter:
Passive Query-Recovery Attack Against Secure Conjunctive Keyword Search Schemes. ACNS 2022: 126-146 - [c12]Federico Mazzone, Leander van den Heuvel, Maximilian Huber, Cristian Verdecchia, Maarten H. Everts, Florian Hahn, Andreas Peter:
Repeated Knowledge Distillation with Confidence Masking to Mitigate Membership Inference Attacks. AISec@CCS 2022: 13-24 - [c11]Jeroen Weener, Florian Hahn, Andreas Peter:
Libertas: Backward Private Dynamic Searchable Symmetric Encryption Supporting Wildcards. DBSec 2022: 215-235 - [c10]Amina Bassit, Florian Hahn, Raymond N. J. Veldhuis, Andreas Peter:
Multiplication-Free Biometric Recognition for Faster Processing under Encryption. IJCB 2022: 1-9 - 2021
- [j2]Amina Bassit, Florian Hahn, Joep Peeters, Tom Kevenaar, Raymond N. J. Veldhuis, Andreas Peter:
Fast and Accurate Likelihood Ratio-Based Biometric Verification Secure Against Malicious Adversaries. IEEE Trans. Inf. Forensics Secur. 16: 5045-5060 (2021) - [c9]Ruben Groot Roessink, Andreas Peter, Florian Hahn:
Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements. ACNS (2) 2021: 155-183 - [c8]Amina Bassit, Florian Hahn, Chris G. Zeinstra, Raymond N. J. Veldhuis, Andreas Peter:
Bloom Filter vs Homomorphic Encryption: Which approach protects the biometric data and satisfies ISO/IEC 24745? BIOSIG 2021: 101-112 - [c7]Marc Damie, Florian Hahn, Andreas Peter:
A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents. USENIX Security Symposium 2021: 143-160 - [i2]Amina Bassit, Florian Hahn, Joep Peeters, Tom Kevenaar, Raymond N. J. Veldhuis, Andreas Peter:
Biometric Verification Secure Against Malicious Adversaries. CoRR abs/2101.10631 (2021) - 2020
- [c6]Timon Hackenjos, Florian Hahn, Florian Kerschbaum:
SAGMA: Secure Aggregation Grouped by Multiple Attributes. SIGMOD Conference 2020: 587-601
2010 – 2019
- 2019
- [b1]Florian Hahn:
Practical yet Provably Secure: Complex Database Query Execution over Encrypted Data. Karlsruhe Institute of Technology, Germany, 2019 - [c5]Florian Hahn, Nicolas Loza, Florian Kerschbaum:
Joins Over Encrypted Data with Fine Granular Security. ICDE 2019: 674-685 - 2018
- [j1]Benny Fuhry, Raad Bahmani, Ferdinand Brasser, Florian Hahn, Florian Kerschbaum, Ahmad-Reza Sadeghi:
HardIDX: Practical and secure index with SGX in a malicious environment. J. Comput. Secur. 26(5): 677-706 (2018) - [c4]Florian Hahn, Nicolas Loza, Florian Kerschbaum:
Practical and Secure Substring Search. SIGMOD Conference 2018: 163-176 - 2017
- [c3]Benny Fuhry, Raad Bahmani, Ferdinand Brasser, Florian Hahn, Florian Kerschbaum, Ahmad-Reza Sadeghi:
HardIDX: Practical and Secure Index with SGX. DBSec 2017: 386-408 - [i1]Benny Fuhry, Raad Bahmani, Ferdinand Brasser, Florian Hahn, Florian Kerschbaum, Ahmad-Reza Sadeghi:
HardIDX: Practical and Secure Index with SGX. CoRR abs/1703.04583 (2017) - 2016
- [c2]Florian Hahn, Florian Kerschbaum:
Poly-Logarithmic Range Queries on Encrypted Data with Small Leakage. CCSW 2016: 23-34 - 2014
- [c1]Florian Hahn, Florian Kerschbaum:
Searchable Encryption with Secure and Efficient Updates. CCS 2014: 310-320
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 19:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint