M. A. Javed, D. T. Ngo, and J. Y. Khan, Distributed spatial reuse distance control for basic safety messages in SDMA-based VANETs, Vehicular Communications, vol.2, issue.1, pp.27-35, 2015.
DOI : 10.1016/j.vehcom.2014.12.001

E. B. Hamida, H. Noura, and W. Znaidi, Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures, Electronics, vol.3, issue.3, pp.3802079-9292380, 2015.
DOI : 10.3390/electronics3030521

URL : http://www.mdpi.com/2079-9292/4/3/380/pdf

L. B. Othmane, A. Al-fuqaha, E. B. Hamida, and M. Van-den-brand, Towards extended safety in connected vehicles, 16th International IEEE Conference on Intelligent Transportation Systems (ITSC 2013), pp.652-657, 2013.
DOI : 10.1109/ITSC.2013.6728305

M. A. Javed, E. B. Hamida, and W. Znaidi, Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice, Sensors, vol.16, issue.6, 2016.
DOI : 10.1109/MCOM.2015.7180506

E. B. Hamida and M. A. Javed, Channel-aware ECDSA signature verification of basic safety messages with kmeans clustering in VANETs, Proc. IEEE Intl. Conf. on Advanced Information Networking and Applications, pp.1-8, 2016.

M. A. Javed and E. B. Hamida, Adaptive security mechanisms for safety applications in Internet of Vehicles, 2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp.1-7, 2016.
DOI : 10.1109/WiMOB.2016.7763268

M. Raya, P. Papadimitratos, J. Hubaux-]-s, J. Biswas, and . Misic, SECURING VEHICULAR COMMUNICATIONS, Personal Indoor and Mobile Radio Communications (PIMRC), 2011 IEEE 22nd International Symposium on, pp.8-15, 2006.
DOI : 10.1109/WC-M.2006.250352

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.116.954

Y. Jiang, M. Shi, X. Shen, and C. Lin, BAT: A robust signature scheme for vehicular networks using Binary Authentication Tree, IEEE Transactions on Wireless Communications, vol.8, issue.4, pp.1974-1983, 2009.
DOI : 10.1109/T-WC.2008.080280

C. Zhang, R. Lu, X. Lin, P. Ho, and X. Shen, An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks, IEEE INFOCOM 2008, The 27th Conference on Computer Communications, 2008.
DOI : 10.1109/INFOCOM.2008.58

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.566.1630

Z. Li and C. Chigan, On Resource-Aware Message Verification in VANETs, 2010 IEEE International Conference on Communications, pp.1-6, 2010.
DOI : 10.1109/ICC.2010.5502129

S. Biswas and J. Misic, Relevance-based verification of VANET safety messages, 2012 IEEE International Conference on Communications (ICC), pp.5124-5128, 2012.
DOI : 10.1109/ICC.2012.6364399

S. Banani and S. Gordon, Selecting basic safety messages to verify in VANETs using zone priority, The 20th Asia-Pacific Conference on Communication (APCC2014), pp.423-428, 2014.
DOI : 10.1109/APCC.2014.7092849

B. P. Rocha, D. N. Costa, R. A. Moreira, C. G. Rezende, A. A. Loureiro et al., Adaptive security protocol selection for mobile computing, middleware Trends for Network Applications, pp.569-587, 2010.
DOI : 10.1016/j.jnca.2010.03.028

W. Aman and E. Snekkenes, Managing security tradeoffs in the internet of things using adaptive security, Proc. International Conference for Internet Technology and Secured Transactions, pp.362-368, 2015.

S. Slijepcevic, M. Potkonjak, V. Tsiatsis, S. Zimbeck, and M. B. Srivastava, On communication security in wireless ad-hoc sensor networks, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp.139-144, 2002.
DOI : 10.1109/ENABL.2002.1030000

L. Zhou, A. V. Vasilakos, N. Xiong, Y. Zhang, and S. Lian, Scheduling security-critical multimedia applications in heterogeneous networks, Issue of Computer Communications on Information and Future Communication Security, pp.429-435, 2011.
DOI : 10.1016/j.comcom.2010.01.009

URL : https://hal.archives-ouvertes.fr/hal-00830767

M. Saadatmand, A. Cicchetti, and M. Sjödin, Design of Adaptive Security Mechanisms for Real-Time Embedded Systems, pp.121-134
DOI : 10.1109/TC.2006.110

M. A. Javed and E. B. Hamida, Measuring safety awareness in cooperative ITS applications, 2016 IEEE Wireless Communications and Networking Conference, pp.1-7, 2016.
DOI : 10.1109/WCNC.2016.7564927

E. , B. Hamida, and G. Chelius, Investigating the impact of human activity on the performance of wireless networks -an experimental approach, World of Wireless Mobile and Multimedia Networks (WoWMoM), 2010 IEEE International Symposium on a, pp.1-8, 2010.
URL : https://hal.archives-ouvertes.fr/inria-00483773

R. Meireles, M. Boban, P. Steenkiste, O. Tonguz, and J. Barros, Experimental study on the impact of vehicular obstructions in VANETs, 2010 IEEE Vehicular Networking Conference, pp.338-345, 2010.
DOI : 10.1109/VNC.2010.5698233

T. Abbas, F. Tufvesson, and J. Karedal, A Measurement Based Shadow Fading Model for Vehicle-to-Vehicle Network Simulations, International Journal of Antennas and Propagation, vol.39, issue.1, 1203.
DOI : 10.1155/2013/459323

URL : http://doi.org/10.1155/2015/190607

S. Lloyd, Least squares quantization in PCM, IEEE Transactions on Information Theory, vol.28, issue.2, pp.129-137, 2006.
DOI : 10.1109/TIT.1982.1056489

URL : http://www.cs.toronto.edu/~roweis/csc2515-2006/readings/lloyd57.pdf

M. B. Brahim, E. B. Hamida, F. Filali, and N. Hamdi, Performance impact of security on cooperative awareness in dense urban vehicular networks, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp.268-274, 2015.
DOI : 10.1109/WiMOB.2015.7347971

Y. Ding, Y. Zhao, X. Shen, M. Musuvathi, T. Mytkowicz et al., Yinyang k-means: A drop-in replacement of the classic k-means with consistent speedup, Proceedings of the 32nd International Conference on Machine Learning, ICML 2015, pp.6-11, 2015.

E. Lee, E. K. Lee, M. Gerla, and S. Y. Oh, Vehicular cloud networking: architecture and design principles, IEEE Communications Magazine, vol.52, issue.2, pp.148-155, 2014.
DOI : 10.1109/MCOM.2014.6736756

S. Dhurandher, M. Obaidat, A. Jaiswal, A. Tiwari, and A. Tyagi, Vehicular Security Through Reputation and Plausibility Checks, IEEE Systems Journal, vol.8, issue.2, pp.384-394, 2014.
DOI : 10.1109/JSYST.2013.2245971

M. A. Javed, J. Y. Khan, and D. T. Ngo, Joint space-division multiple access and adaptive rate control for basic safety messages in VANETs, 2014 IEEE Wireless Communications and Networking Conference (WCNC), pp.1-5, 2014.
DOI : 10.1109/WCNC.2014.6952853

M. A. Javed and J. Y. Khan, A geocasting technique in an IEEE802.11p based vehicular ad hoc network for road traffic management, 2011 Australasian Telecommunication Networks and Applications Conference (ATNAC), pp.1-6, 2011.
DOI : 10.1109/ATNAC.2011.6096639

M. Inaba, N. Katoh, and H. Imai, -clustering, Proceedings of the tenth annual symposium on Computational geometry , SCG '94, pp.332-339, 1994.
DOI : 10.1145/177424.178042

URL : https://hal.archives-ouvertes.fr/in2p3-01333933

E. B. Hamida, W. Znaidi, and H. Menouar, Implementation and evaluation of the ETSI security architecture for cooperative intelligent transport systems, Proc. IEEE Vehicular Technology Conference (VTC-Fall), pp.1-5, 2015.

M. A. Javed and E. B. Hamida, On the interrelation of security, qos, and safety in cooperative its [36] The European Telecommunications Standards Institute, " ETSI TR 102 861 v1.1.1 -Intelligent transport systems (ITS) -STDMA recommended parameters and settings for cooperative ITS; Access Layer Part, IEEE Transactions on Intelligent Transportation Systems, vol.PP, issue.99, pp.1-15, 2012.

J. Karedal, N. Czink, A. Paier, F. Tufvesson, and A. Molisch, Path Loss Modeling for Vehicle-to-Vehicle Communications, IEEE Transactions on Vehicular Technology, vol.60, issue.1, pp.323-328, 2011.
DOI : 10.1109/TVT.2010.2094632

URL : http://lup.lub.lu.se/search/ws/files/1614288/1763502.pdf

M. Feiri, J. Petit, R. Schmidt, and F. Kargl, The impact of security on cooperative awareness in VANET, 2013 IEEE Vehicular Networking Conference, pp.127-134, 2013.
DOI : 10.1109/VNC.2013.6737599