Gerrit Bleumer

According to our database1, Gerrit Bleumer authored at least 83 papers between 1990 and 2011.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2011
Recipient Anonymity.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Random Oracle Model.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Public Key Proxy Signatures.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Public Key Proxy Encryption.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Pseudonyms.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Overspending Prevention.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Overspender Detection.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Nonsecret Encryption.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Group Signatures.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

GMR Signature.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Forgery.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Fail-Stop Signature.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Existential Forgery.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Electronic Wallet.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Electronic Postage.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Electronic Payment.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Electronic Cash.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Designated Confirmer Signature.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

DC Network.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Credentials.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Copy Protection.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Communication Channel Anonymity.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Chaum Blind Signature Scheme.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Chaffing and Winnowing.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Blinding Techniques.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Watermarking.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Untraceability.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Unlinkability.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Undeniable Signatures.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Threshold Signature.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Sender Anonymity.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Selective Forgery.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Blind Signature.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Anonymity.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2007
Electronic Postage Systems - Technology, Security, Economics
Advances in Information Security 26, Springer, ISBN: 978-0-387-29313-4, 2007

2005
Security Evaluation Criteria.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Recipient Anonymity.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Random Oracle Model.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Watermarking.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Untraceability.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Unlinkability.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Undeniable Signatures.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Threshold Signature.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Sender Anonymity.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Selective Forgery.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Public Key Proxy Signatures.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Public Key Proxy Encryption.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Pseudonyms.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Overspending Prevention.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Overspender Detection.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Nonsecret Encryption.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Group Signatures.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

GMR Signature.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Forgery.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Fail-Stop Signature.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Existential Forgery.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Electronic Wallet.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Electronic Postage.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Electronic payment.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Electronic Cash.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Designated Confirmer Signature.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

DC Network.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Credentials.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Copy Protection.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Communication Channel Anonymity.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Chaum Blind Signature Scheme.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Chaffing and Winnowing.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Blinding Techniques.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Blind Signature.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Anonymity.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

2001
Secure offline legitimation systems.
PhD thesis, 2001

2000
Secure PC-Franking for Everyone.
Proceedings of the Electronic Commerce and Web Technologies, 2000

1999
Biometrische Ausweise - Schutz von Personenidentitäten trotz biometrischer Erkennung.
Datenschutz und Datensicherheit, 1999

1998
On Protocol Divertibility.
IACR Cryptology ePrint Archive, 1998

Biometric yet Privacy Protecting Person Authentication.
Proceedings of the Information Hiding, 1998

Divertible Protocols and Atomic Proxy Cryptography.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

1996
An Overview of SEISMED.
Proceedings of the Towards Security in Medical Telematics - Legal and Technical Aspects, 1996

Annex: Guideline for Cryptographic Mechanisms for Health Care Management.
Proceedings of the Data Security for Health Care - Volume I: Management Guidelines, 1996

Introduction to the SEISMED Guidelines.
Proceedings of the Data Security for Health Care - Volume I: Management Guidelines, 1996

Cryptographic Mechanisms for Health Care IT-Systems.
Proceedings of the Towards Security in Medical Telematics - Legal and Technical Aspects, 1996

Crypto Manager: an object oriented software library for cryptographic mechanisms.
Proceedings of the Information Systems Security, 1996

1994
Reflections on Security of Database and Datatransfer Systems in Health Care.
Proceedings of the Applications and Impacts, Information Processing '94, Volume 2, Proceedings of the IFIP 13th World Computer Congress, Hamburg, Germany, 28 August, 1994

1990
A Remark on a Signature Scheme Where Forgery Can Be Proved.
Proceedings of the Advances in Cryptology, 1990


  Loading...