Journal: Computers & Security

Volume 29, Issue 5

521 -- 522Dimitris Gritzalis, Javier Lopez. Editorial
523 -- 532Herbert Leitold, Reinhard Posch, Thomas Rössler. Reconstruction of electronic signatures from eDocument printouts
533 -- 547Carlo Blundo, Stelvio Cimato, Sabrina De Capitani di Vimercati, Alfredo De Santis, Sara Foresti, Stefano Paraboschi, Pierangela Samarati. Managing key hierarchies for access control enforcement: Heuristic approaches
548 -- 564Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde. Taming role mining complexity in RBAC
565 -- 579Quan Pham, Jason Reid, Adrian McCullagh, Ed Dawson. On a taxonomy of delegation
580 -- 591Jan Kolter, Thomas Kernchen, Günther Pernul. Collaborative privacy management
592 -- 602Ryan Farley, Xinyuan Wang. Roving bugnet: Distributed surveillance threat and mitigation
603 -- 618Yannis Soupionis, Dimitris Gritzalis. Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony
619 -- 627Alessandro Sorniotti, Refik Molva. A provably secure secret handshake with dynamic controlled matching
628 -- 635Marcel Fernandez, Josep Cotrina, Miguel Soriano, Neus Domingo. A note about the identifier parent property in Reed-Solomon codes