F. Dressler, F. Kargl, J. Ott, O. K. Tonguz, and L. Wischhof, Researchchallenges in intervehicular communication: lessons of the 2010 dagstuhl seminar, IEEE Communications Magazine, vol.49, issue.5, pp.158-164, 2011.

, Ieee standard for wireless access in vehicular environments security services for applications and management messages, IEEE Std, pp.1-289, 2013.

. Etsi, Etsi ts 102 941 v1.1.1-intelligent transport systems (its)

, security; trust and privacy management, Standard, TC ITS, 2012.

E. Schoch, F. Kargl, T. Leinmller, S. Schlott, and P. Papadimitratos, Impact of pseudonym changes on geographic routing in vanets, Proceedings of the Third European Conference on Security and Privacy in Ad-Hoc and Sensor Networks, ser. ESAS'06, pp.43-57, 2006.

P. Papadimitratos, L. Buttyan, J. Hubaux, F. Kargl, A. Kung et al., Architecture for secure and private vehicular communications, Telecommunications, 2007. ITST'07. 7th International Conference on ITS, pp.1-6, 2007.

J. Petit, F. Schaub, M. Feiri, and F. Kargl, Pseudonym schemes in vehicular networks: A survey, Communications Surveys Tutorials, IEEE, issue.99, pp.1-32, 2014.

B. Wiedersheim, Z. Ma, F. Kargl, and P. Papadimitratos, Privacy in inter-vehicular networks: why simple pseudonym change is not enough, Proceedings of the 7th international conference on Wireless on-demand network systems and services, ser. WONS'10, pp.176-183, 2010.

R. Lu, X. Lin, T. H. Luan, X. Liang, and X. Shen, Pseudonym changing at social spots: An effective strategy for location privacy in vanets, IEEE Transactions on Vehicular Technology, vol.61, issue.1, pp.86-96, 2012.

B. Ying and D. Makrakis, Pseudonym changes scheme based on candidate-location-list in vehicular networks, 2015 IEEE International Conference on, pp.7292-7297, 2015.

B. Ying, D. Makrakis, Z. Hou, ;. Boualouache, and S. Moussaoui, Motivation for protecting selfish vehicles' location privacy in vehicular networks, Advanced Networking Distributed Systems and Applications (INDS), 2014 International Conference on, vol.64, pp.70-75, 2014.

D. Eckhoff and C. Sommer, Driving for big data? privacy concerns in vehicular networking, IEEE Security and Privacy, vol.12, issue.1, pp.77-79, 2014.

J. Freudiger, M. H. Manshaei, J. Hubaux, and D. C. Parkes, Non-cooperative location privacy, IEEE Transactions on, vol.10, issue.2, pp.84-98, 2013.

Z. Ma, F. Kargl, and M. Weber, Pseudonym-on-demand: a new pseudonym refill strategy for vehicular communications, Vehicular Technology Conference, pp.1-5, 2008.

G. Yan, S. Olariu, J. Wang, and S. Arif, Towards providing scalable and robust privacy in vehicular networks, IEEE Transactions on, vol.25, issue.7, pp.1896-1906, 2014.

H. Artail and N. Abbani, A pseudonym management system to achieve anonymity in vehicular ad hoc networks, IEEE Transactions on Dependable and Secure Computing, vol.13, issue.1, pp.106-119, 2016.

A. Boualouache, S. Senouci, and S. Moussaoui, Vlpz: The vehicular location privacy zone, The 7th International Conference on Ambient Systems, Networks and Technologies (ANT 2016). Procedia Computer Science, 2016.

A. Studer, F. Bai, B. Bellur, and A. Perrig, Flexible, extensible, and efficient vanet authentication, Communications and Networks, Journal, vol.11, issue.6, pp.574-588, 2009.

S. Lefevre, J. Petit, R. Bajcsy, C. Laugier, and F. Kargl, Impact of v2x privacy strategies on intersection collision avoidance systems, Vehicular Networking Conference (VNC), pp.71-78, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00905936

P. P. Papadimitratos, G. Mezzour, and J. Hubaux, Certificate revocation list distribution in vehicular communication systems, Proceedings of the Fifth ACM International Workshop on VehiculAr Inter-NETworking, ser. VANET '08, pp.86-87, 2008.

A. Boualouache, S. Senouci, and S. Moussaoui, Hpdm: A hybrid pseudonym distribution method for vehicular ad-hoc networks, The 7th International Conference on Ambient Systems, Networks and Technologies (ANT 2016). Procedia Computer Science Elsevier, 2016.

T. Aura, Cryptographically generated addresses (CGA), vol.3972, 2005.

S. Qadir and M. U. Siddiqi, Cryptographically generated addresses (cgas): A survey and an analysis of performance for use in mobile environment, IJCSNS Int. J. Comput. Sci. Netw. Secur, vol.11, issue.2, pp.24-31, 2011.

C. Sommer, R. German, and F. Dressler, Bidirectionally coupled network and road traffic simulation for improved ivc analysis, IEEE Transactions on Mobile Computing, vol.10, issue.1, pp.3-15, 2011.

D. Krajzewicz, J. Erdmann, M. Behrisch, and L. Bieker, Recent development and applications of sumo -simulation of urban mobility, International Journal on Advances in Systems and Measurements, vol.5, issue.3, pp.128-138, 2012.

C. Díaz, Anonymity metrics revisited, Anonymous Communication and its Applications, vol.05411, 2005.