default search action
BibTeX records: Gerrit Bleumer
@incollection{DBLP:reference/crypt/Bleumer11, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Anonymity}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {37--38}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_180}, doi = {10.1007/978-1-4419-5906-5\_180}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11a, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Blind Signature}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {148--150}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_181}, doi = {10.1007/978-1-4419-5906-5\_181}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11b, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Blinding Techniques}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {150--152}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_182}, doi = {10.1007/978-1-4419-5906-5\_182}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11c, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Chaffing and Winnowing}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {197--198}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_184}, doi = {10.1007/978-1-4419-5906-5\_184}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11d, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Chaum Blind Signature Scheme}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {199--200}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_185}, doi = {10.1007/978-1-4419-5906-5\_185}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11e, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Communication Channel Anonymity}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {232}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_187}, doi = {10.1007/978-1-4419-5906-5\_187}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11f, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Copy Protection}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {256--259}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_190}, doi = {10.1007/978-1-4419-5906-5\_190}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11g, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Credentials}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {272--275}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_191}, doi = {10.1007/978-1-4419-5906-5\_191}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11h, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {{DC} Network}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {313--315}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_194}, doi = {10.1007/978-1-4419-5906-5\_194}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11i, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Designated Confirmer Signature}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {328--330}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_195}, doi = {10.1007/978-1-4419-5906-5\_195}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11j, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Electronic Cash}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {385--387}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_197}, doi = {10.1007/978-1-4419-5906-5\_197}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11k, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Electronic Payment}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {387--389}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_198}, doi = {10.1007/978-1-4419-5906-5\_198}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11l, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Electronic Postage}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {389--391}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_199}, doi = {10.1007/978-1-4419-5906-5\_199}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11m, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Electronic Wallet}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {393--395}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_200}, doi = {10.1007/978-1-4419-5906-5\_200}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11m.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11n, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Existential Forgery}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {433--434}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_202}, doi = {10.1007/978-1-4419-5906-5\_202}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11n.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11o, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Fail-Stop Signature}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {446--447}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_203}, doi = {10.1007/978-1-4419-5906-5\_203}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11o.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11p, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Forgery}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {489--490}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_206}, doi = {10.1007/978-1-4419-5906-5\_206}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11p.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11q, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {{GMR} Signature}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {514--515}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_207}, doi = {10.1007/978-1-4419-5906-5\_207}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11q.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11r, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Group Signatures}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {526--528}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_208}, doi = {10.1007/978-1-4419-5906-5\_208}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11r.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11s, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Nonsecret Encryption}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {854--857}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_210}, doi = {10.1007/978-1-4419-5906-5\_210}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11t, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Overspender Detection}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {897}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_211}, doi = {10.1007/978-1-4419-5906-5\_211}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11t.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11u, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Overspending Prevention}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {898}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_212}, doi = {10.1007/978-1-4419-5906-5\_212}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11u.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11v, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Pseudonyms}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {992--994}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_216}, doi = {10.1007/978-1-4419-5906-5\_216}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11v.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11w, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Public Key Proxy Encryption}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {997--999}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_217}, doi = {10.1007/978-1-4419-5906-5\_217}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11x, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Public Key Proxy Signatures}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {999--1001}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_218}, doi = {10.1007/978-1-4419-5906-5\_218}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11x.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11y, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Random Oracle Model}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1027--1028}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_220}, doi = {10.1007/978-1-4419-5906-5\_220}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11y.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11z, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Recipient Anonymity}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1034--1035}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_222}, doi = {10.1007/978-1-4419-5906-5\_222}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11z.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11aa, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Selective Forgery}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1174--1175}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_225}, doi = {10.1007/978-1-4419-5906-5\_225}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11aa.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11ab, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Sender Anonymity}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1177--1178}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_226}, doi = {10.1007/978-1-4419-5906-5\_226}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11ab.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11ac, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Threshold Signature}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1294--1296}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_233}, doi = {10.1007/978-1-4419-5906-5\_233}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11ac.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11ad, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Undeniable Signatures}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1347--1348}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_235}, doi = {10.1007/978-1-4419-5906-5\_235}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11ad.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11ae, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Unlinkability}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1350}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_236}, doi = {10.1007/978-1-4419-5906-5\_236}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11ae.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11af, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Untraceability}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1351--1352}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_237}, doi = {10.1007/978-1-4419-5906-5\_237}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11af.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer11ag, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Watermarking}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1365--1366}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_238}, doi = {10.1007/978-1-4419-5906-5\_238}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer11ag.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/Bleumer07, author = {Gerrit Bleumer}, title = {Electronic Postage Systems - Technology, Security, Economics}, series = {Advances in Information Security}, volume = {26}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-44606-6}, doi = {10.1007/978-0-387-44606-6}, isbn = {978-0-387-29313-4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/Bleumer07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Anonymity}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_11}, doi = {10.1007/0-387-23483-7\_11}, timestamp = {Thu, 27 Jun 2019 15:50:13 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05a, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Blind Signature}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_31}, doi = {10.1007/0-387-23483-7\_31}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05b, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Blinding Techniques}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_32}, doi = {10.1007/0-387-23483-7\_32}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05c, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Chaffing and Winnowing}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_55}, doi = {10.1007/0-387-23483-7\_55}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05d, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Chaum Blind Signature Scheme}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_57}, doi = {10.1007/0-387-23483-7\_57}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05e, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Communication Channel Anonymity}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_73}, doi = {10.1007/0-387-23483-7\_73}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05f, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Copy Protection}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_78}, doi = {10.1007/0-387-23483-7\_78}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05g, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Credentials}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_85}, doi = {10.1007/0-387-23483-7\_85}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05h, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {{DC} Network}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_97}, doi = {10.1007/0-387-23483-7\_97}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05i, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Designated Confirmer Signature}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_104}, doi = {10.1007/0-387-23483-7\_104}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05j, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Electronic Cash}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_121}, doi = {10.1007/0-387-23483-7\_121}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05k, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Electronic payment}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_124}, doi = {10.1007/0-387-23483-7\_124}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05l, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Electronic Postage}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_125}, doi = {10.1007/0-387-23483-7\_125}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05m, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Electronic Wallet}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_127}, doi = {10.1007/0-387-23483-7\_127}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05m.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05n, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Existential Forgery}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_148}, doi = {10.1007/0-387-23483-7\_148}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05n.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05o, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Fail-Stop Signature}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_154}, doi = {10.1007/0-387-23483-7\_154}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05o.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05p, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Forgery}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_172}, doi = {10.1007/0-387-23483-7\_172}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05p.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05q, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {{GMR} Signature}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_176}, doi = {10.1007/0-387-23483-7\_176}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05q.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05r, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Group Signatures}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_183}, doi = {10.1007/0-387-23483-7\_183}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05r.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05s, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Nonsecret Encryption}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_278}, doi = {10.1007/0-387-23483-7\_278}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05t, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Overspender Detection}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_291}, doi = {10.1007/0-387-23483-7\_291}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05t.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05u, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Overspending Prevention}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_292}, doi = {10.1007/0-387-23483-7\_292}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05u.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05v, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Pseudonyms}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_327}, doi = {10.1007/0-387-23483-7\_327}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05v.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05w, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Public Key Proxy Encryption}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_333}, doi = {10.1007/0-387-23483-7\_333}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05x, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Public Key Proxy Signatures}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_334}, doi = {10.1007/0-387-23483-7\_334}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05x.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05xa, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Selective Forgery}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_380}, doi = {10.1007/0-387-23483-7\_380}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05xa.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05xb, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Sender Anonymity}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_384}, doi = {10.1007/0-387-23483-7\_384}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05xb.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05xc, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Threshold Signature}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_429}, doi = {10.1007/0-387-23483-7\_429}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05xc.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05xd, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Undeniable Signatures}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_446}, doi = {10.1007/0-387-23483-7\_446}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05xd.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05xe, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Unlinkability}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_448}, doi = {10.1007/0-387-23483-7\_448}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05xe.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05xf, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Untraceability}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_449}, doi = {10.1007/0-387-23483-7\_449}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05xf.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05xg, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Watermarking}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_457}, doi = {10.1007/0-387-23483-7\_457}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05xg.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05y, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Random Oracle Model}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_343}, doi = {10.1007/0-387-23483-7\_343}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05y.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bleumer05z, author = {Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Recipient Anonymity}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_347}, doi = {10.1007/0-387-23483-7\_347}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bleumer05z.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/CaddyB05, author = {Tom Caddy and Gerrit Bleumer}, editor = {Henk C. A. van Tilborg}, title = {Security Evaluation Criteria}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_378}, doi = {10.1007/0-387-23483-7\_378}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/CaddyB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/de/Bleumer2004, author = {Gerrit Bleumer}, title = {Secure offline legitimation systems}, school = {Technical University of Dortmund, Germany}, year = {2001}, url = {https://hdl.handle.net/2003/2563}, urn = {urn:nbn:de:101:1-201105055120}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/de/Bleumer2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vis/BleumerK01, author = {Gerrit Bleumer and Heinrich Kr{\"{u}}ger{-}Gebhard}, editor = {Dirk Fox and Marit K{\"{o}}hntopp and Andreas Pfitzmann}, title = {Sicherheit moderner Frankiersysteme}, booktitle = {Verl{\"{a}}ssliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen, Proceedings der GI-Fachtagung {VIS} 2001, 12.-14.09.2001 in Kiel}, pages = {135--146}, publisher = {Vieweg+Teubner Verlag}, year = {2001}, url = {https://doi.org/10.1007/978-3-663-05918-9\_9}, doi = {10.1007/978-3-663-05918-9\_9}, timestamp = {Thu, 17 Nov 2022 13:36:41 +0100}, biburl = {https://dblp.org/rec/conf/vis/BleumerK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecweb/Bleumer00, author = {Gerrit Bleumer}, editor = {Kurt Bauknecht and Sanjay Kumar Madria and G{\"{u}}nther Pernul}, title = {Secure PC-Franking for Everyone}, booktitle = {Electronic Commerce and Web Technologies, First International Conference, EC-Web 2000, London, UK, September 4-6, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1875}, pages = {94--109}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44463-7\_9}, doi = {10.1007/3-540-44463-7\_9}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ecweb/Bleumer00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Bleumer99, author = {Gerrit Bleumer}, title = {Biometrische Ausweise - Schutz von Personenidentit{\"{a}}ten trotz biometrischer Erkennung}, journal = {Datenschutz und Datensicherheit}, volume = {23}, number = {3}, year = {1999}, timestamp = {Thu, 18 Dec 2003 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Bleumer99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BlazeBS98, author = {Matt Blaze and Gerrit Bleumer and Martin Strauss}, editor = {Kaisa Nyberg}, title = {Divertible Protocols and Atomic Proxy Cryptography}, booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1403}, pages = {127--144}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054122}, doi = {10.1007/BFB0054122}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BlazeBS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Bleumer98, author = {Gerrit Bleumer}, editor = {David Aucsmith}, title = {Biometric yet Privacy Protecting Person Authentication}, booktitle = {Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1525}, pages = {99--110}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49380-8\_8}, doi = {10.1007/3-540-49380-8\_8}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/Bleumer98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bleumer98, author = {Gerrit Bleumer}, title = {On Protocol Divertibility}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1}, year = {1998}, url = {http://eprint.iacr.org/1998/001}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bleumer98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/97/BleumerS97, author = {Gerrit Bleumer and Matthias Schunter}, editor = {Ross Anderson}, title = {Privacy Oriented Clearing for the German Health-Care System}, booktitle = {Personal Medical Information - Security, Engineering, and Ethics}, pages = {175--194}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/978-3-642-59023-8\_14}, doi = {10.1007/978-3-642-59023-8\_14}, timestamp = {Fri, 15 May 2020 12:41:35 +0200}, biburl = {https://dblp.org/rec/books/sp/97/BleumerS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/BaldinB96, author = {Thilo Baldin and Gerrit Bleumer}, editor = {Sokratis K. Katsikas and Dimitris Gritzalis}, title = {Crypto Manager: an object oriented software library for cryptographic mechanisms}, booktitle = {Information Systems Security, Facing the information society of the 21st Century}, series = {{IFIP} Conference Proceedings}, volume = {54}, pages = {489--491}, publisher = {Chapman {\&} Hall}, year = {1996}, timestamp = {Thu, 03 Jan 2002 12:08:24 +0100}, biburl = {https://dblp.org/rec/conf/sec/BaldinB96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/shti/Bleumer96a, author = {Gerrit Bleumer}, title = {Introduction to the {SEISMED} Guidelines}, booktitle = {Data Security for Health Care - Volume {I:} Management Guidelines}, series = {Studies in Health Technology and Informatics}, volume = {31}, pages = {1--10}, publisher = {{IOS} Press}, year = {1996}, url = {https://doi.org/10.3233/978-1-60750-875-5-1}, doi = {10.3233/978-1-60750-875-5-1}, timestamp = {Mon, 19 Mar 2018 07:49:39 +0100}, biburl = {https://dblp.org/rec/series/shti/Bleumer96a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/shti/TreacherB96, author = {Alison Treacher and Gerrit Bleumer}, editor = {Barry Barber and Alison Treacher and C. P. Louwerse}, title = {An Overview of {SEISMED}}, booktitle = {Towards Security in Medical Telematics - Legal and Technical Aspects}, series = {Studies in Health Technology and Informatics}, volume = {27}, pages = {4--8}, publisher = {{IOS} Press}, year = {1996}, url = {https://doi.org/10.3233/978-1-60750-871-7-4}, doi = {10.3233/978-1-60750-871-7-4}, timestamp = {Mon, 19 Mar 2018 07:49:46 +0100}, biburl = {https://dblp.org/rec/series/shti/TreacherB96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/shti/Bleumer96b, author = {Gerrit Bleumer}, title = {Annex: Guideline for Cryptographic Mechanisms for Health Care Management}, booktitle = {Data Security for Health Care - Volume {I:} Management Guidelines}, series = {Studies in Health Technology and Informatics}, volume = {31}, pages = {227--234}, publisher = {{IOS} Press}, year = {1996}, url = {https://doi.org/10.3233/978-1-60750-875-5-227}, doi = {10.3233/978-1-60750-875-5-227}, timestamp = {Mon, 19 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/shti/Bleumer96b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/shti/Bleumer96, author = {Gerrit Bleumer}, editor = {Barry Barber and Alison Treacher and C. P. Louwerse}, title = {Cryptographic Mechanisms for Health Care IT-Systems}, booktitle = {Towards Security in Medical Telematics - Legal and Technical Aspects}, series = {Studies in Health Technology and Informatics}, volume = {27}, pages = {233--237}, publisher = {{IOS} Press}, year = {1996}, url = {https://doi.org/10.3233/978-1-60750-871-7-233}, doi = {10.3233/978-1-60750-871-7-233}, timestamp = {Mon, 19 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/shti/Bleumer96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip/BiskupB94, author = {Joachim Biskup and Gerrit Bleumer}, editor = {Klaus Brunnstein and Eckart Raubold}, title = {Reflections on Security of Database and Datatransfer Systems in Health Care}, booktitle = {Applications and Impacts, Information Processing '94, Volume 2, Proceedings of the {IFIP} 13th World Computer Congress, Hamburg, Germany, 28 August - 2 September, 1994}, series = {{IFIP} Transactions}, volume = {{A-52}}, pages = {549--556}, publisher = {North-Holland}, year = {1994}, timestamp = {Tue, 15 Mar 2016 13:03:03 +0100}, biburl = {https://dblp.org/rec/conf/ifip/BiskupB94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BleumerPW90, author = {Gerrit Bleumer and Birgit Pfitzmann and Michael Waidner}, editor = {Ivan Damg{\aa}rd}, title = {A Remark on a Signature Scheme Where Forgery Can Be Proved}, booktitle = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {473}, pages = {441--445}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-46877-3\_39}, doi = {10.1007/3-540-46877-3\_39}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BleumerPW90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.