![]() | ![]() |
2005 | ||
---|---|---|
42 | EE | Gerrit Bleumer: Anonymity. Encyclopedia of Cryptography and Security 2005 |
41 | EE | Gerrit Bleumer: Blind Signature. Encyclopedia of Cryptography and Security 2005 |
40 | EE | Gerrit Bleumer: Blinding Techniques. Encyclopedia of Cryptography and Security 2005 |
39 | EE | Gerrit Bleumer: Chaffing and Winnowing. Encyclopedia of Cryptography and Security 2005 |
38 | EE | Gerrit Bleumer: Chaum Blind Signature Scheme. Encyclopedia of Cryptography and Security 2005 |
37 | EE | Gerrit Bleumer: Communication Channel Anonymity. Encyclopedia of Cryptography and Security 2005 |
36 | EE | Gerrit Bleumer: Copy Protection. Encyclopedia of Cryptography and Security 2005 |
35 | EE | Gerrit Bleumer: Credentials. Encyclopedia of Cryptography and Security 2005 |
34 | EE | Gerrit Bleumer: DC Network. Encyclopedia of Cryptography and Security 2005 |
33 | EE | Gerrit Bleumer: Designated Confirmer Signature. Encyclopedia of Cryptography and Security 2005 |
32 | EE | Gerrit Bleumer: Electronic Cash. Encyclopedia of Cryptography and Security 2005 |
31 | EE | Gerrit Bleumer: Electronic Postage. Encyclopedia of Cryptography and Security 2005 |
30 | EE | Gerrit Bleumer: Electronic Wallet. Encyclopedia of Cryptography and Security 2005 |
29 | EE | Gerrit Bleumer: Electronic payment. Encyclopedia of Cryptography and Security 2005 |
28 | EE | Gerrit Bleumer: Existential Forgery. Encyclopedia of Cryptography and Security 2005 |
27 | EE | Gerrit Bleumer: Fail-Stop Signature. Encyclopedia of Cryptography and Security 2005 |
26 | EE | Gerrit Bleumer: Forgery. Encyclopedia of Cryptography and Security 2005 |
25 | EE | Gerrit Bleumer: GMR Signature. Encyclopedia of Cryptography and Security 2005 |
24 | EE | Gerrit Bleumer: Group Signatures. Encyclopedia of Cryptography and Security 2005 |
23 | EE | Gerrit Bleumer: Nonsecret Encryption. Encyclopedia of Cryptography and Security 2005 |
22 | EE | Gerrit Bleumer: Overspender Detection. Encyclopedia of Cryptography and Security 2005 |
21 | EE | Gerrit Bleumer: Overspending Prevention. Encyclopedia of Cryptography and Security 2005 |
20 | EE | Gerrit Bleumer: Pseudonyms. Encyclopedia of Cryptography and Security 2005 |
19 | EE | Gerrit Bleumer: Public Key Proxy Encryption. Encyclopedia of Cryptography and Security 2005 |
18 | EE | Gerrit Bleumer: Public Key Proxy Signatures. Encyclopedia of Cryptography and Security 2005 |
17 | EE | Gerrit Bleumer: Random Oracle Model. Encyclopedia of Cryptography and Security 2005 |
16 | EE | Gerrit Bleumer: Recipient Anonymity. Encyclopedia of Cryptography and Security 2005 |
15 | EE | Tom Caddy, Gerrit Bleumer: Security Evaluation Criteria. Encyclopedia of Cryptography and Security 2005 |
14 | EE | Gerrit Bleumer: Selective Forgery. Encyclopedia of Cryptography and Security 2005 |
13 | EE | Gerrit Bleumer: Sender Anonymity. Encyclopedia of Cryptography and Security 2005 |
12 | EE | Gerrit Bleumer: Threshold Signature. Encyclopedia of Cryptography and Security 2005 |
11 | EE | Gerrit Bleumer: Undeniable Signatures. Encyclopedia of Cryptography and Security 2005 |
10 | EE | Gerrit Bleumer: Unlinkability. Encyclopedia of Cryptography and Security 2005 |
9 | EE | Gerrit Bleumer: Untraceability. Encyclopedia of Cryptography and Security 2005 |
8 | EE | Gerrit Bleumer: Watermarking. Encyclopedia of Cryptography and Security 2005 |
2000 | ||
7 | EE | Gerrit Bleumer: Secure PC-Franking for Everyone. EC-Web 2000: 94-109 |
1999 | ||
6 | Gerrit Bleumer: Biometrische Ausweise - Schutz von Personenidentitäten trotz biometrischer Erkennung. Datenschutz und Datensicherheit 23(3): (1999) | |
1998 | ||
5 | EE | Matt Blaze, Gerrit Bleumer, Martin Strauss: Divertible Protocols and Atomic Proxy Cryptography. EUROCRYPT 1998: 127-144 |
4 | EE | Gerrit Bleumer: Biometric yet Privacy Protecting Person Authentication. Information Hiding 1998: 99-110 |
1996 | ||
3 | Thilo Baldin, Gerrit Bleumer: Crypto Manager: an object oriented software library for cryptographic mechanisms. SEC 1996: 489-491 | |
1994 | ||
2 | Joachim Biskup, Gerrit Bleumer: Reflections on Security of Database and Datatransfer Systems in Health Care. IFIP Congress (2) 1994: 549-556 | |
1990 | ||
1 | EE | Gerrit Bleumer, Birgit Pfitzmann, Michael Waidner: A Remark on a Signature Scheme Where Forgery Can Be Proved. EUROCRYPT 1990: 441-445 |
1 | Thilo Baldin | [3] |
2 | Joachim Biskup | [2] |
3 | Matt Blaze | [5] |
4 | Tom Caddy | [15] |
5 | Birgit Pfitzmann | [1] |
6 | Martin Strauss (Martin J. Strauss) | [5] |
7 | Michael Waidner | [1] |