Searchable encryption with secure and efficient updates F Hahn, F Kerschbaum Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 257 | 2014 |
HardIDX: Practical and secure index with SGX B Fuhry, R Bahmani, F Brasser, F Hahn, F Kerschbaum, AR Sadeghi Data and Applications Security and Privacy XXXI: 31st Annual IFIP WG 11.3 …, 2017 | 145 | 2017 |
A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents M Damie, F Hahn, A Peter 30th USENIX Security Symposium (USENIX Security 21), 143-160, 2021 | 39 | 2021 |
Practical and secure substring search F Hahn, N Loza, F Kerschbaum Proceedings of the 2018 International Conference on Management of Data, 163-176, 2018 | 32 | 2018 |
Fast and accurate likelihood ratio-based biometric verification secure against malicious adversaries A Bassit, F Hahn, J Peeters, T Kevenaar, R Veldhuis, A Peter IEEE transactions on information forensics and security 16, 5045-5060, 2021 | 23 | 2021 |
Join operations on encrypted database tables N Loza, F Hahn, F Kerschbaum US Patent 10,769,295, 2020 | 20 | 2020 |
Tracking privacy budget with distributed ledger D Bernau, F Hahn, J Boehler US Patent 10,380,366, 2019 | 19 | 2019 |
Adjustable proxy re-encryption I Hang, F Kerschbaum, M Kohler, M Haerterich, F Hahn, A Schroepfer, ... US Patent 9,537,838, 2017 | 19 | 2017 |
Poly-logarithmic range queries on encrypted data with small leakage F Hahn, F Kerschbaum Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 23-34, 2016 | 19 | 2016 |
SAGMA: secure aggregation grouped by multiple attributes T Hackenjos, F Hahn, F Kerschbaum Proceedings of the 2020 ACM SIGMOD international conference on management of …, 2020 | 17 | 2020 |
Hardidx: Practical and secure index with SGX in a malicious environment B Fuhry, R Bahmani, F Brasser, F Hahn, F Kerschbaum, AR Sadeghi Journal of Computer Security 26 (5), 677-706, 2018 | 16 | 2018 |
Joins over encrypted data with fine granular security F Hahn, N Loza, F Kerschbaum 2019 IEEE 35th international conference on data engineering (ICDE), 674-685, 2019 | 15 | 2019 |
Searchable encryption with secure and efficient updates F Hahn, F Kerschbaum US Patent 9,740,879, 2017 | 12 | 2017 |
Hybrid biometric template protection: Resolving the agony of choice between bloom filters and homomorphic encryption A Bassit, F Hahn, R Veldhuis, A Peter IET biometrics 11 (5), 430-444, 2022 | 11 | 2022 |
I Still Know What You Watched Last Sunday: Privacy of the HbbTV Protocol in the European Smart TV Landscape C Tagliaro, F Hahn, R Sepe, A Aceti, M Lindorfer Network and Distributed System Security Symposium (NDSS), 2023 | 10 | 2023 |
Repeated knowledge distillation with confidence masking to mitigate membership inference attacks F Mazzone, L van den Heuvel, M Huber, C Verdecchia, M Everts, F Hahn, ... Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security …, 2022 | 9 | 2022 |
Security Aspects of Digital Twins in IoT M El-hajj, F Hahn 9th International Conference on Information Systems Security and Privacy …, 2023 | 6* | 2023 |
Multiplication-free biometric recognition for faster processing under encryption A Bassit, F Hahn, R Veldhuis, A Peter 2022 IEEE International Joint Conference on Biometrics (IJCB), 1-9, 2022 | 6 | 2022 |
Experimental review of the IKK query recovery attack: Assumptions, recovery rate and improvements R Groot Roessink, A Peter, F Hahn International Conference on Applied Cryptography and Network Security, 155-183, 2021 | 6 | 2021 |
Private Sampling with Identifiable Cheaters C Sabater, F Hahn, A Peter, J Ramon Proceedings on Privacy Enhancing Technologies 2023 (2), 2023 | 4 | 2023 |