BibTeX records: Gerrit Bleumer

download as .bib file

@incollection{DBLP:reference/crypt/Bleumer11,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Anonymity},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {37--38},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_180},
  doi          = {10.1007/978-1-4419-5906-5\_180},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11a,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Blind Signature},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {148--150},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_181},
  doi          = {10.1007/978-1-4419-5906-5\_181},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11b,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Blinding Techniques},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {150--152},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_182},
  doi          = {10.1007/978-1-4419-5906-5\_182},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11c,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Chaffing and Winnowing},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {197--198},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_184},
  doi          = {10.1007/978-1-4419-5906-5\_184},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11d,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Chaum Blind Signature Scheme},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {199--200},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_185},
  doi          = {10.1007/978-1-4419-5906-5\_185},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11e,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Communication Channel Anonymity},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {232},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_187},
  doi          = {10.1007/978-1-4419-5906-5\_187},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11f,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Copy Protection},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {256--259},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_190},
  doi          = {10.1007/978-1-4419-5906-5\_190},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11g,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Credentials},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {272--275},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_191},
  doi          = {10.1007/978-1-4419-5906-5\_191},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11h,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {{DC} Network},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {313--315},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_194},
  doi          = {10.1007/978-1-4419-5906-5\_194},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11i,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Designated Confirmer Signature},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {328--330},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_195},
  doi          = {10.1007/978-1-4419-5906-5\_195},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11j,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Electronic Cash},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {385--387},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_197},
  doi          = {10.1007/978-1-4419-5906-5\_197},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11k,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Electronic Payment},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {387--389},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_198},
  doi          = {10.1007/978-1-4419-5906-5\_198},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11l,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Electronic Postage},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {389--391},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_199},
  doi          = {10.1007/978-1-4419-5906-5\_199},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11m,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Electronic Wallet},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {393--395},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_200},
  doi          = {10.1007/978-1-4419-5906-5\_200},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11n,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Existential Forgery},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {433--434},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_202},
  doi          = {10.1007/978-1-4419-5906-5\_202},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11n.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11o,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Fail-Stop Signature},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {446--447},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_203},
  doi          = {10.1007/978-1-4419-5906-5\_203},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11o.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11p,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Forgery},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {489--490},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_206},
  doi          = {10.1007/978-1-4419-5906-5\_206},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11p.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11q,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {{GMR} Signature},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {514--515},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_207},
  doi          = {10.1007/978-1-4419-5906-5\_207},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11q.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11r,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Group Signatures},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {526--528},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_208},
  doi          = {10.1007/978-1-4419-5906-5\_208},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11r.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11s,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Nonsecret Encryption},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {854--857},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_210},
  doi          = {10.1007/978-1-4419-5906-5\_210},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11t,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Overspender Detection},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {897},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_211},
  doi          = {10.1007/978-1-4419-5906-5\_211},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11t.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11u,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Overspending Prevention},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {898},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_212},
  doi          = {10.1007/978-1-4419-5906-5\_212},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11u.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11v,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Pseudonyms},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {992--994},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_216},
  doi          = {10.1007/978-1-4419-5906-5\_216},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11v.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11w,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Public Key Proxy Encryption},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {997--999},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_217},
  doi          = {10.1007/978-1-4419-5906-5\_217},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11x,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Public Key Proxy Signatures},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {999--1001},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_218},
  doi          = {10.1007/978-1-4419-5906-5\_218},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11x.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11y,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Random Oracle Model},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1027--1028},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_220},
  doi          = {10.1007/978-1-4419-5906-5\_220},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11y.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11z,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Recipient Anonymity},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1034--1035},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_222},
  doi          = {10.1007/978-1-4419-5906-5\_222},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11z.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11aa,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Selective Forgery},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1174--1175},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_225},
  doi          = {10.1007/978-1-4419-5906-5\_225},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11aa.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11ab,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Sender Anonymity},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1177--1178},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_226},
  doi          = {10.1007/978-1-4419-5906-5\_226},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11ab.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11ac,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Threshold Signature},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1294--1296},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_233},
  doi          = {10.1007/978-1-4419-5906-5\_233},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11ac.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11ad,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Undeniable Signatures},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1347--1348},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_235},
  doi          = {10.1007/978-1-4419-5906-5\_235},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11ad.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11ae,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Unlinkability},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1350},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_236},
  doi          = {10.1007/978-1-4419-5906-5\_236},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11ae.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11af,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Untraceability},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1351--1352},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_237},
  doi          = {10.1007/978-1-4419-5906-5\_237},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11af.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer11ag,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Watermarking},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1365--1366},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_238},
  doi          = {10.1007/978-1-4419-5906-5\_238},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer11ag.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/Bleumer07,
  author       = {Gerrit Bleumer},
  title        = {Electronic Postage Systems - Technology, Security, Economics},
  series       = {Advances in Information Security},
  volume       = {26},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-44606-6},
  doi          = {10.1007/978-0-387-44606-6},
  isbn         = {978-0-387-29313-4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/Bleumer07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Anonymity},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_11},
  doi          = {10.1007/0-387-23483-7\_11},
  timestamp    = {Thu, 27 Jun 2019 15:50:13 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05a,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Blind Signature},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_31},
  doi          = {10.1007/0-387-23483-7\_31},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05b,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Blinding Techniques},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_32},
  doi          = {10.1007/0-387-23483-7\_32},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05c,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Chaffing and Winnowing},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_55},
  doi          = {10.1007/0-387-23483-7\_55},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05d,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Chaum Blind Signature Scheme},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_57},
  doi          = {10.1007/0-387-23483-7\_57},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05e,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Communication Channel Anonymity},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_73},
  doi          = {10.1007/0-387-23483-7\_73},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05f,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Copy Protection},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_78},
  doi          = {10.1007/0-387-23483-7\_78},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05g,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Credentials},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_85},
  doi          = {10.1007/0-387-23483-7\_85},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05h,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {{DC} Network},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_97},
  doi          = {10.1007/0-387-23483-7\_97},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05i,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Designated Confirmer Signature},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_104},
  doi          = {10.1007/0-387-23483-7\_104},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05j,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Electronic Cash},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_121},
  doi          = {10.1007/0-387-23483-7\_121},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05k,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Electronic payment},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_124},
  doi          = {10.1007/0-387-23483-7\_124},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05l,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Electronic Postage},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_125},
  doi          = {10.1007/0-387-23483-7\_125},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05m,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Electronic Wallet},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_127},
  doi          = {10.1007/0-387-23483-7\_127},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05n,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Existential Forgery},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_148},
  doi          = {10.1007/0-387-23483-7\_148},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05n.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05o,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Fail-Stop Signature},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_154},
  doi          = {10.1007/0-387-23483-7\_154},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05o.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05p,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Forgery},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_172},
  doi          = {10.1007/0-387-23483-7\_172},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05p.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05q,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {{GMR} Signature},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_176},
  doi          = {10.1007/0-387-23483-7\_176},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05q.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05r,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Group Signatures},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_183},
  doi          = {10.1007/0-387-23483-7\_183},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05r.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05s,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Nonsecret Encryption},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_278},
  doi          = {10.1007/0-387-23483-7\_278},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05t,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Overspender Detection},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_291},
  doi          = {10.1007/0-387-23483-7\_291},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05t.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05u,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Overspending Prevention},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_292},
  doi          = {10.1007/0-387-23483-7\_292},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05u.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05v,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Pseudonyms},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_327},
  doi          = {10.1007/0-387-23483-7\_327},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05v.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05w,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Public Key Proxy Encryption},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_333},
  doi          = {10.1007/0-387-23483-7\_333},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05x,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Public Key Proxy Signatures},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_334},
  doi          = {10.1007/0-387-23483-7\_334},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05x.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05xa,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Selective Forgery},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_380},
  doi          = {10.1007/0-387-23483-7\_380},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05xa.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05xb,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Sender Anonymity},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_384},
  doi          = {10.1007/0-387-23483-7\_384},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05xb.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05xc,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Threshold Signature},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_429},
  doi          = {10.1007/0-387-23483-7\_429},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05xc.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05xd,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Undeniable Signatures},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_446},
  doi          = {10.1007/0-387-23483-7\_446},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05xd.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05xe,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Unlinkability},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_448},
  doi          = {10.1007/0-387-23483-7\_448},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05xe.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05xf,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Untraceability},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_449},
  doi          = {10.1007/0-387-23483-7\_449},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05xf.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05xg,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Watermarking},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_457},
  doi          = {10.1007/0-387-23483-7\_457},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05xg.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05y,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Random Oracle Model},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_343},
  doi          = {10.1007/0-387-23483-7\_343},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05y.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bleumer05z,
  author       = {Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Recipient Anonymity},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_347},
  doi          = {10.1007/0-387-23483-7\_347},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bleumer05z.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/CaddyB05,
  author       = {Tom Caddy and
                  Gerrit Bleumer},
  editor       = {Henk C. A. van Tilborg},
  title        = {Security Evaluation Criteria},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_378},
  doi          = {10.1007/0-387-23483-7\_378},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/CaddyB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/de/Bleumer2004,
  author       = {Gerrit Bleumer},
  title        = {Secure offline legitimation systems},
  school       = {Technical University of Dortmund, Germany},
  year         = {2001},
  url          = {https://hdl.handle.net/2003/2563},
  urn          = {urn:nbn:de:101:1-201105055120},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/de/Bleumer2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vis/BleumerK01,
  author       = {Gerrit Bleumer and
                  Heinrich Kr{\"{u}}ger{-}Gebhard},
  editor       = {Dirk Fox and
                  Marit K{\"{o}}hntopp and
                  Andreas Pfitzmann},
  title        = {Sicherheit moderner Frankiersysteme},
  booktitle    = {Verl{\"{a}}ssliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen,
                  Proceedings der GI-Fachtagung {VIS} 2001, 12.-14.09.2001 in Kiel},
  pages        = {135--146},
  publisher    = {Vieweg+Teubner Verlag},
  year         = {2001},
  url          = {https://doi.org/10.1007/978-3-663-05918-9\_9},
  doi          = {10.1007/978-3-663-05918-9\_9},
  timestamp    = {Thu, 17 Nov 2022 13:36:41 +0100},
  biburl       = {https://dblp.org/rec/conf/vis/BleumerK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecweb/Bleumer00,
  author       = {Gerrit Bleumer},
  editor       = {Kurt Bauknecht and
                  Sanjay Kumar Madria and
                  G{\"{u}}nther Pernul},
  title        = {Secure PC-Franking for Everyone},
  booktitle    = {Electronic Commerce and Web Technologies, First International Conference,
                  EC-Web 2000, London, UK, September 4-6, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1875},
  pages        = {94--109},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44463-7\_9},
  doi          = {10.1007/3-540-44463-7\_9},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ecweb/Bleumer00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bleumer99,
  author       = {Gerrit Bleumer},
  title        = {Biometrische Ausweise - Schutz von Personenidentit{\"{a}}ten
                  trotz biometrischer Erkennung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {23},
  number       = {3},
  year         = {1999},
  timestamp    = {Thu, 18 Dec 2003 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Bleumer99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BlazeBS98,
  author       = {Matt Blaze and
                  Gerrit Bleumer and
                  Martin Strauss},
  editor       = {Kaisa Nyberg},
  title        = {Divertible Protocols and Atomic Proxy Cryptography},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
                  on the Theory and Application of Cryptographic Techniques, Espoo,
                  Finland, May 31 - June 4, 1998, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {127--144},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054122},
  doi          = {10.1007/BFB0054122},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BlazeBS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Bleumer98,
  author       = {Gerrit Bleumer},
  editor       = {David Aucsmith},
  title        = {Biometric yet Privacy Protecting Person Authentication},
  booktitle    = {Information Hiding, Second International Workshop, Portland, Oregon,
                  USA, April 14-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1525},
  pages        = {99--110},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49380-8\_8},
  doi          = {10.1007/3-540-49380-8\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Bleumer98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bleumer98,
  author       = {Gerrit Bleumer},
  title        = {On Protocol Divertibility},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/001},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bleumer98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/97/BleumerS97,
  author       = {Gerrit Bleumer and
                  Matthias Schunter},
  editor       = {Ross Anderson},
  title        = {Privacy Oriented Clearing for the German Health-Care System},
  booktitle    = {Personal Medical Information - Security, Engineering, and Ethics},
  pages        = {175--194},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/978-3-642-59023-8\_14},
  doi          = {10.1007/978-3-642-59023-8\_14},
  timestamp    = {Fri, 15 May 2020 12:41:35 +0200},
  biburl       = {https://dblp.org/rec/books/sp/97/BleumerS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BaldinB96,
  author       = {Thilo Baldin and
                  Gerrit Bleumer},
  editor       = {Sokratis K. Katsikas and
                  Dimitris Gritzalis},
  title        = {Crypto Manager: an object oriented software library for cryptographic
                  mechanisms},
  booktitle    = {Information Systems Security, Facing the information society of the
                  21st Century},
  series       = {{IFIP} Conference Proceedings},
  volume       = {54},
  pages        = {489--491},
  publisher    = {Chapman {\&} Hall},
  year         = {1996},
  timestamp    = {Thu, 03 Jan 2002 12:08:24 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/BaldinB96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/shti/Bleumer96a,
  author       = {Gerrit Bleumer},
  title        = {Introduction to the {SEISMED} Guidelines},
  booktitle    = {Data Security for Health Care - Volume {I:} Management Guidelines},
  series       = {Studies in Health Technology and Informatics},
  volume       = {31},
  pages        = {1--10},
  publisher    = {{IOS} Press},
  year         = {1996},
  url          = {https://doi.org/10.3233/978-1-60750-875-5-1},
  doi          = {10.3233/978-1-60750-875-5-1},
  timestamp    = {Mon, 19 Mar 2018 07:49:39 +0100},
  biburl       = {https://dblp.org/rec/series/shti/Bleumer96a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/shti/TreacherB96,
  author       = {Alison Treacher and
                  Gerrit Bleumer},
  editor       = {Barry Barber and
                  Alison Treacher and
                  C. P. Louwerse},
  title        = {An Overview of {SEISMED}},
  booktitle    = {Towards Security in Medical Telematics - Legal and Technical Aspects},
  series       = {Studies in Health Technology and Informatics},
  volume       = {27},
  pages        = {4--8},
  publisher    = {{IOS} Press},
  year         = {1996},
  url          = {https://doi.org/10.3233/978-1-60750-871-7-4},
  doi          = {10.3233/978-1-60750-871-7-4},
  timestamp    = {Mon, 19 Mar 2018 07:49:46 +0100},
  biburl       = {https://dblp.org/rec/series/shti/TreacherB96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/shti/Bleumer96b,
  author       = {Gerrit Bleumer},
  title        = {Annex: Guideline for Cryptographic Mechanisms for Health Care Management},
  booktitle    = {Data Security for Health Care - Volume {I:} Management Guidelines},
  series       = {Studies in Health Technology and Informatics},
  volume       = {31},
  pages        = {227--234},
  publisher    = {{IOS} Press},
  year         = {1996},
  url          = {https://doi.org/10.3233/978-1-60750-875-5-227},
  doi          = {10.3233/978-1-60750-875-5-227},
  timestamp    = {Mon, 19 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/shti/Bleumer96b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/shti/Bleumer96,
  author       = {Gerrit Bleumer},
  editor       = {Barry Barber and
                  Alison Treacher and
                  C. P. Louwerse},
  title        = {Cryptographic Mechanisms for Health Care IT-Systems},
  booktitle    = {Towards Security in Medical Telematics - Legal and Technical Aspects},
  series       = {Studies in Health Technology and Informatics},
  volume       = {27},
  pages        = {233--237},
  publisher    = {{IOS} Press},
  year         = {1996},
  url          = {https://doi.org/10.3233/978-1-60750-871-7-233},
  doi          = {10.3233/978-1-60750-871-7-233},
  timestamp    = {Mon, 19 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/shti/Bleumer96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip/BiskupB94,
  author       = {Joachim Biskup and
                  Gerrit Bleumer},
  editor       = {Klaus Brunnstein and
                  Eckart Raubold},
  title        = {Reflections on Security of Database and Datatransfer Systems in Health
                  Care},
  booktitle    = {Applications and Impacts, Information Processing '94, Volume 2, Proceedings
                  of the {IFIP} 13th World Computer Congress, Hamburg, Germany, 28 August
                  - 2 September, 1994},
  series       = {{IFIP} Transactions},
  volume       = {{A-52}},
  pages        = {549--556},
  publisher    = {North-Holland},
  year         = {1994},
  timestamp    = {Tue, 15 Mar 2016 13:03:03 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip/BiskupB94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BleumerPW90,
  author       = {Gerrit Bleumer and
                  Birgit Pfitzmann and
                  Michael Waidner},
  editor       = {Ivan Damg{\aa}rd},
  title        = {A Remark on a Signature Scheme Where Forgery Can Be Proved},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24,
                  1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {473},
  pages        = {441--445},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-46877-3\_39},
  doi          = {10.1007/3-540-46877-3\_39},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BleumerPW90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}