![]() |
| 2005 | ||
|---|---|---|
| 42 | EE | Gerrit Bleumer: Anonymity. Encyclopedia of Cryptography and Security 2005 |
| 41 | EE | Gerrit Bleumer: Blind Signature. Encyclopedia of Cryptography and Security 2005 |
| 40 | EE | Gerrit Bleumer: Blinding Techniques. Encyclopedia of Cryptography and Security 2005 |
| 39 | EE | Gerrit Bleumer: Chaffing and Winnowing. Encyclopedia of Cryptography and Security 2005 |
| 38 | EE | Gerrit Bleumer: Chaum Blind Signature Scheme. Encyclopedia of Cryptography and Security 2005 |
| 37 | EE | Gerrit Bleumer: Communication Channel Anonymity. Encyclopedia of Cryptography and Security 2005 |
| 36 | EE | Gerrit Bleumer: Copy Protection. Encyclopedia of Cryptography and Security 2005 |
| 35 | EE | Gerrit Bleumer: Credentials. Encyclopedia of Cryptography and Security 2005 |
| 34 | EE | Gerrit Bleumer: DC Network. Encyclopedia of Cryptography and Security 2005 |
| 33 | EE | Gerrit Bleumer: Designated Confirmer Signature. Encyclopedia of Cryptography and Security 2005 |
| 32 | EE | Gerrit Bleumer: Electronic Cash. Encyclopedia of Cryptography and Security 2005 |
| 31 | EE | Gerrit Bleumer: Electronic Postage. Encyclopedia of Cryptography and Security 2005 |
| 30 | EE | Gerrit Bleumer: Electronic Wallet. Encyclopedia of Cryptography and Security 2005 |
| 29 | EE | Gerrit Bleumer: Electronic payment. Encyclopedia of Cryptography and Security 2005 |
| 28 | EE | Gerrit Bleumer: Existential Forgery. Encyclopedia of Cryptography and Security 2005 |
| 27 | EE | Gerrit Bleumer: Fail-Stop Signature. Encyclopedia of Cryptography and Security 2005 |
| 26 | EE | Gerrit Bleumer: Forgery. Encyclopedia of Cryptography and Security 2005 |
| 25 | EE | Gerrit Bleumer: GMR Signature. Encyclopedia of Cryptography and Security 2005 |
| 24 | EE | Gerrit Bleumer: Group Signatures. Encyclopedia of Cryptography and Security 2005 |
| 23 | EE | Gerrit Bleumer: Nonsecret Encryption. Encyclopedia of Cryptography and Security 2005 |
| 22 | EE | Gerrit Bleumer: Overspender Detection. Encyclopedia of Cryptography and Security 2005 |
| 21 | EE | Gerrit Bleumer: Overspending Prevention. Encyclopedia of Cryptography and Security 2005 |
| 20 | EE | Gerrit Bleumer: Pseudonyms. Encyclopedia of Cryptography and Security 2005 |
| 19 | EE | Gerrit Bleumer: Public Key Proxy Encryption. Encyclopedia of Cryptography and Security 2005 |
| 18 | EE | Gerrit Bleumer: Public Key Proxy Signatures. Encyclopedia of Cryptography and Security 2005 |
| 17 | EE | Gerrit Bleumer: Random Oracle Model. Encyclopedia of Cryptography and Security 2005 |
| 16 | EE | Gerrit Bleumer: Recipient Anonymity. Encyclopedia of Cryptography and Security 2005 |
| 15 | EE | Tom Caddy, Gerrit Bleumer: Security Evaluation Criteria. Encyclopedia of Cryptography and Security 2005 |
| 14 | EE | Gerrit Bleumer: Selective Forgery. Encyclopedia of Cryptography and Security 2005 |
| 13 | EE | Gerrit Bleumer: Sender Anonymity. Encyclopedia of Cryptography and Security 2005 |
| 12 | EE | Gerrit Bleumer: Threshold Signature. Encyclopedia of Cryptography and Security 2005 |
| 11 | EE | Gerrit Bleumer: Undeniable Signatures. Encyclopedia of Cryptography and Security 2005 |
| 10 | EE | Gerrit Bleumer: Unlinkability. Encyclopedia of Cryptography and Security 2005 |
| 9 | EE | Gerrit Bleumer: Untraceability. Encyclopedia of Cryptography and Security 2005 |
| 8 | EE | Gerrit Bleumer: Watermarking. Encyclopedia of Cryptography and Security 2005 |
| 2000 | ||
| 7 | EE | Gerrit Bleumer: Secure PC-Franking for Everyone. EC-Web 2000: 94-109 |
| 1999 | ||
| 6 | Gerrit Bleumer: Biometrische Ausweise - Schutz von Personenidentitäten trotz biometrischer Erkennung. Datenschutz und Datensicherheit 23(3): (1999) | |
| 1998 | ||
| 5 | EE | Matt Blaze, Gerrit Bleumer, Martin Strauss: Divertible Protocols and Atomic Proxy Cryptography. EUROCRYPT 1998: 127-144 |
| 4 | EE | Gerrit Bleumer: Biometric yet Privacy Protecting Person Authentication. Information Hiding 1998: 99-110 |
| 1996 | ||
| 3 | Thilo Baldin, Gerrit Bleumer: Crypto Manager: an object oriented software library for cryptographic mechanisms. SEC 1996: 489-491 | |
| 1994 | ||
| 2 | Joachim Biskup, Gerrit Bleumer: Reflections on Security of Database and Datatransfer Systems in Health Care. IFIP Congress (2) 1994: 549-556 | |
| 1990 | ||
| 1 | EE | Gerrit Bleumer, Birgit Pfitzmann, Michael Waidner: A Remark on a Signature Scheme Where Forgery Can Be Proved. EUROCRYPT 1990: 441-445 |
| 1 | Thilo Baldin | [3] |
| 2 | Joachim Biskup | [2] |
| 3 | Matt Blaze | [5] |
| 4 | Tom Caddy | [15] |
| 5 | Birgit Pfitzmann | [1] |
| 6 | Martin Strauss (Martin J. Strauss) | [5] |
| 7 | Michael Waidner | [1] |