Welkom...

dr.ing. F.W. Hahn (Florian)

Universitair docent

Expertises

Engineering & Materials Science
Agglomeration
Biometrics
Cryptography
Query Processing
Recovery
Mathematics
Attack
Query
Recovery

Publicaties

Recent
El-hajj, M. , & Hahn, F. (2023). Security Aspects of Digital Twins in IoT. 560-567. Paper presented at The 9th International Conference on Information Systems Security and Privacy, Lisbon, Portugal. https://doi.org/10.5220/0011714500003405
Bassit, A. , Hahn, F. , Veldhuis, R. N. J. , & Peter, A. (2023). Multiplication-Free Biometric Recognition for Faster Processing under Encryption. In 2022 IEEE International Joint Conference on Biometrics (IJCB) (IEEE International Joint Conference on Biometrics (IJCB); Vol. 2022). IEEE. https://doi.org/10.1109/IJCB54206.2022.10007958
Weener, J. , Hahn, F. , & Peter, A. (2022). Libertas: Backward Private Dynamic Searchable Symmetric Encryption Supporting Wildcards. In Data and Applications Security and Privacy XXXVI : 36th Annual IFIP WG 11.3 Conference, DBSec 2022, Newark, NJ, USA, July 18–20, 2022, Proceedings (pp. 215-235) https://doi.org/10.1007/978-3-031-10684-2_13
Mazzone, F., van den Heuvel, L., Huber, M., Verdecchia, C. , Everts, M. H. , Hahn, F. , & Peter, A. (2022). Repeated Knowledge Distillation with Confidence Masking to Mitigate Membership Inference Attacks. In AISec 2022 - Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2022 (pp. 13-24). Association for Computing Machinery. https://doi.org/10.1145/3560830.3563721
Dijkslag, M., Damie, M. , Hahn, F. , & Peter, A. (2022). Passive Query-Recovery Attack Against Secure Conjunctive Keyword Search Schemes. In G. Ateniese, & D. Venturi (Eds.), Conference Proeedings Applied Cryptography and Network Security (pp. 126-146). Springer. https://doi.org/10.1007/978-3-031-09234-3_7
Groot Roessink, R. , Peter, A. , & Hahn, F. (2021). Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements. In K. Sako, & N. O. Tippenhauer (Eds.), Applied Cryptography and Network Security: 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings (Vol. I, pp. 155-183). (Lecture Notes in Computer Science; Vol. 12727). Springer. https://doi.org/10.1007/978-3-030-78375-4_7
Bassit, A. , Hahn, F., Peeters, J., Kevenaar, T. , Veldhuis, R. , & Peter, A. (2021). Fast and Accurate Likelihood Ratio Based Biometric Verification Secure Against Malicious Adversaries. IEEE transactions on information forensics and security, 16, 5045-5060. https://doi.org/10.1109/TIFS.2021.3122823
Bassit, A. , Hahn, F. , Zeinstra, C. , Veldhuis, R. , & Peter, A. (2021). Bloom Filter vs Homomorphic Encryption: Which approach protects the biometric data and satisfies ISO/IEC 24745? In BIOSIG 2021 - Proceedings of the 20th International Conference of the Biometrics Special Interest Group: 15.-17. September 2021 International Digital Conference IEEE. https://doi.org/10.1109/BIOSIG52210.2021.9548304

Pure Link

Google Scholar Link

Verbonden aan Opleidingen

Master

Vakken Collegejaar  2022/2023

Vakken in het huidig collegejaar worden toegevoegd op het moment dat zij definitief zijn in het Osiris systeem. Daarom kan het zijn dat de lijst nog niet compleet is voor het gehele collegejaar.
 

Vakken Collegejaar  2021/2022

Contactgegevens

Bezoekadres

Universiteit Twente
Faculty of Electrical Engineering, Mathematics and Computer Science
Zilverling (gebouwnr. 11), kamer 2025
Hallenweg 19
7522NH  Enschede

Navigeer naar locatie

Postadres

Universiteit Twente
Faculty of Electrical Engineering, Mathematics and Computer Science
Zilverling  2025
Postbus 217
7500 AE Enschede