M. Bellare and P. Rogaway, Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.62-73, 1993.
DOI : 10.1145/168588.168596

L. Chen, Z. Chen, and N. P. Smart, Identity-based key agreement protocols from pairings, International Journal of Information Security, vol.10, issue.4, pp.213-241, 2007.
DOI : 10.1007/s10207-006-0011-9

X. Chen, F. Zhang, W. Susilo, and Y. Mu, Efficient generic on-line/off-line sinatures without key exposure, ANCS LNCS, vol.4521, pp.18-30, 2007.

M. D. Dikaiakos, A. Florides, T. Nadeem, and L. Iftode, Location-Aware Services over Vehicular Ad-Hoc Networks using Car-to-Car Communication, IEEE Journal on Selected Areas in Communications, vol.25, issue.8, pp.1590-1602, 2007.
DOI : 10.1109/JSAC.2007.071008

M. D. Dikaiakos, S. Iqbal, T. Nadeem, and L. Iftode, VITP, Proceedings of the 2nd ACM international workshop on Vehicular ad hoc networks , VANET '05, pp.30-39, 2005.
DOI : 10.1145/1080754.1080759

D. Galindo and F. D. Garcia, A Schnorr-Like Lightweight Identity-Based Signature Scheme, Africacrypt 2009, pp.135-148, 2009.
DOI : 10.1007/3-540-39568-7_5

C. Gentry and Z. Ramzan, Identity-Based Aggregate Signatures, Public Key Cryptography -PKC 2006, pp.257-273, 2006.
DOI : 10.1007/11745853_17

B. Karp and H. Kung, Greedy perimeter stateless routing for wireless networks, 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp.243-254, 2000.
DOI : 10.21236/ADA440078

W. Kiess, H. Füßler, J. Widmer, and M. Mauve, Hierarchical location service for mobile ad-hoc networks, ACM SIGMOBILE Mobile Computing and Communications Review, vol.8, issue.4, pp.47-58, 2004.
DOI : 10.1145/1052871.1052875

H. Krawczyk and T. Rabin, Chameleon signatures, Symposium on Network and Distributed Systems Security (NDSS 2000), pp.143-154, 2000.

T. Leinmuller, E. Schoch, and F. Kargl, POSITION VERIFICATION APPROACHES FOR VEHICULAR AD HOC NETWORKS, IEEE Wireless Communications, vol.13, issue.5, pp.16-21, 2006.
DOI : 10.1109/WC-M.2006.250353

X. Lin, X. Sun, and X. Shen, GSIS: A secure and privacy preserving protocol for vehicular communications, IEEE Transactions on Vehicular Technology, vol.56, issue.6, pp.3442-3456, 2007.

R. Lu, X. Lin, H. Zhu, P. H. Ho, and X. Shen, ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications, IEEE INFOCOM 2008, The 27th Conference on Computer Communications, pp.1229-1237, 2008.
DOI : 10.1109/INFOCOM.2008.179

T. Nadeem, S. Dashtinezhadd, C. Liao, and L. Iftode, TrafficView, ACM SIGMOBILE Mobile Computing and Communications Review, vol.8, issue.3, pp.6-19, 2004.
DOI : 10.1145/1031483.1031487

Y. Park, C. Sur, C. Jung, and K. H. Rhee, An efficient anonymous authentication protocol for secure vehicular communications, Journal of Information Science and Engineering, vol.26, issue.3, pp.785-800, 2010.

V. Pathak, D. Yao, and L. Iftode, Securing location aware services over VANET using geographical secure path routing, 2008 IEEE International Conference on Vehicular Electronics and Safety, pp.346-353, 2008.
DOI : 10.1109/ICVES.2008.4640905

M. Raya and J. Hubaux, Securing vehicular ad hoc networks, Journal of Computer Security, vol.15, issue.1, pp.39-68, 2007.
DOI : 10.3233/JCS-2007-15103

Z. Ren, W. Li, and Q. Yang, Location Verification for VANETs Routing, 2009 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp.141-146, 2009.
DOI : 10.1109/WiMob.2009.33

S. S. Selvi, S. S. Vivek, J. Shriram, and C. P. Rangan, Efficient and provably secure identity based aggregate signature schemes with partial and full aggregation, Cryptography ePrint Archive, 2010.

A. Shamir and Y. Tauman, Improved online/offline signature schemes Advances in Cryptology -Crypto Available, 21. Dedicated Short Range Communications (DSRC), pp.355-367, 2001.