Provably secure grouping-proofs for RFID tags M Burmester, B de Medeiros, R Motta International Conference on Smart Card Research and Advanced Applications …, 2008 | 135 | 2008 |
Robust, anonymous RFID authentication with constant key-lookup M Burmester, B De Medeiros, R Motta Proceedings of the 2008 ACM symposium on Information, computer and …, 2008 | 86 | 2008 |
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries M Burmester, B De Medeiros, R Motta International Journal of Applied Cryptography 1 (2), 79-90, 2008 | 47 | 2008 |
Wireless P2P: Problem or opportunity R Motta, J Pasquale Proceedings of the second IARIA conference on advances in P2P systems, 32-37, 2010 | 34 | 2010 |
Gnutella: integrating performance and security in fully decentralized p2p models R Motta, W Nienaber, J Jenkins Proceedings of the 46th Annual Southeast Regional Conference on XX, 272-277, 2008 | 3 | 2008 |
A file protection method for peer-to-peer systems A Liotta, R Motta, L Lin Advances in Computer Science and Engineering, 151, 2006 | 2 | 2006 |
Storage and network resource usage in reactive and proactive replicated storage systems R Motta, J Pasquale 2013 International Conference on Computing, Networking and Communications …, 2013 | 1 | 2013 |
A Quantitative Comparison of Reactive and Proactive Replicated Storage Systems R Motta, J Pasquale 2012 IEEE 31st Symposium on Reliable Distributed Systems, 384-389, 2012 | | 2012 |
Biomeccanica in assenza di gravità M Bordone, R Motta | | |
CSE 20 Discrete Mathematics J Lu, R Motta | | |