Y. Abueh and H. Liu, Message authentication in driverless cars, 2016 IEEE Symposium on Technologies for Homeland Security (HST), 2016.
DOI : 10.1109/THS.2016.7568882

M. Mutaz, L. Malott, and S. Chellappan, Leveraging platoon dispersion for Sybil detection in vehicular networks, 2013 Eleventh Annual Conference on Privacy, Security and Trust, pp.340-347, 2013.
DOI : 10.1109/PST.2013.6596086

S. Checkoway, D. Mccoy, B. Kantor, D. Anderson, H. Shacham et al., Comprehensive experimental analyses of automotive attack surfaces, Proceedings of the Twentieth USENIX Conference on Security, 2011.

G. Howser and B. Mcmillin, A multiple security domain model of a driveby-wire system, Proceedings of the Thirty-Seventh IEEE Computer Software and Applications Conference, pp.369-374, 2013.

G. Howser and B. Mcmillin, A modal model of Stuxnet attacks on cyberphysical systems: A matter of trust, Proceedings of the Eighth International Conference on Software Security and Reliability, pp.225-234, 2014.

H. Hu, R. Lu, Z. Zhang, and J. Shao, REPLACE: A Reliable Trust-Based Platoon Service Recommendation Scheme in VANET, IEEE Transactions on Vehicular Technology, vol.66, issue.2, pp.1786-1797, 2017.
DOI : 10.1109/TVT.2016.2565001

URL : https://hal.archives-ouvertes.fr/hal-01731411

D. Huang, S. Misra, M. Verma, and G. Xue, PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs, IEEE Transactions on Intelligent Transportation Systems, vol.12, issue.3, pp.736-746, 2011.
DOI : 10.1109/TITS.2011.2156790

K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno et al., Experimental Security Analysis of a Modern Automobile, 2010 IEEE Symposium on Security and Privacy, pp.447-462, 2010.
DOI : 10.1109/SP.2010.34

URL : http://www.autosec.org/pubs/cars-oakland2010.pdf

U. Lang and R. Schreiner, Managing Security in Intelligent Transport Systems, 2015 IEEE 18th International Conference on Intelligent Transportation Systems, pp.48-53, 2015.
DOI : 10.1109/ITSC.2015.16

N. Lyamin, A. Vinel, M. Jonsson, and J. Loo, Real-Time Detection of Denial-of-Service Attacks in IEEE 802.11p Vehicular Networks, 11p vehicular networks, pp.110-113, 2014.
DOI : 10.1109/LCOMM.2013.102213.132056

URL : http://www2.hh.se/staff/magnusj/papers/2014_IEEECommLett_DoS.pdf

C. Miller and C. Valasek, Remote exploitation of an unaltered passenger vehicle, presented at DEF CON 23, 2015.

G. Patounas, Y. Zhang, and S. Gjessing, Evaluating defense schemes against jamming in vehicle platoon networks, Proceedings of the Eighteenth IEEE International Conference on Intelligent Transportation Systems, pp.2153-2158, 2015.
DOI : 10.1109/itsc.2015.348

S. Shladover, The California PATH Program of IVHS research and its approach to vehicle-highway automation, Proceedings of the Intelligent Vehicles `92 Symposium, pp.347-352, 1992.
DOI : 10.1109/IVS.1992.252284

Z. Sun, B. Zan, J. Ban, M. Gruteser, and P. Hao, Evaluation of privacy preserving algorithms using traffic knowledge based adversary models, Proceedings of the Fourteenth IEEE International Conference on Intelligent Transportation Systems, pp.1075-1082, 2011.

D. Sutherland, A model of information, Proceedings of the Ninth National Computer Security Conference, pp.175-183, 1986.

A. Wasef and X. Shen, PPGCV: Privacy Preserving Group Communications Protocol for Vehicular Ad Hoc Networks, 2008 IEEE International Conference on Communications, pp.1458-1463, 2008.
DOI : 10.1109/ICC.2008.282