R. Toledo-moreo, D. Bétaille, and F. Peyret, Lane-Level Integrity Provision for Navigation and Map Matching With GNSS, Dead Reckoning, and Enhanced Maps, IEEE Transactions on Intelligent Transportation Systems, vol.11, issue.1, pp.100-112, 2010.
DOI : 10.1109/TITS.2009.2031625

URL : https://hal.archives-ouvertes.fr/hal-00639616

P. Kyasanur and N. Vaidya, Selfish MAC layer misbehavior in wireless networks, IEEE, Int'l Conf. on Dependable Systems and Networks (DSN'03), pp.173-182, 2003.
DOI : 10.1109/TMC.2005.71

J. Tang, Y. Cheng, and W. Zhuang, Real-Time Misbehavior Detection in IEEE 802.11-Based Wireless Networks: An Analytical Approach, IEEE Transactions on Mobile Computing, vol.13, issue.1, pp.146-158, 2014.
DOI : 10.1109/TMC.2012.227

K. Karlsson, C. Bergenhem, and E. Hedin, Field Measurements of IEEE 802.11p Communication in NLOS Environments for a Platooning Application, 2012 IEEE Vehicular Technology Conference (VTC Fall), pp.1-5
DOI : 10.1109/VTCFall.2012.6399065

Y. Yao, Delay analysis and study of IEEE 802.11p based DSRC safety communication in a highway environment, 2013 Proceedings IEEE INFOCOM, pp.1591-1599
DOI : 10.1109/INFCOM.2013.6566955

G. and L. Lann, A collision-free MAC protocol for fast message dissemination in vehicular strings, 2016 IEEE Conference on Standards for Communications and Networking (CSCN), 2016.
DOI : 10.1109/CSCN.2016.7785183

URL : https://hal.archives-ouvertes.fr/hal-01402119

M. Hadded, TDMA-Based MAC Protocols for Vehicular Ad Hoc Networks: A Survey, Qualitative Analysis, and Open Research Issues, IEEE Communications Surveys & Tutorials, vol.17, issue.4, pp.2015-2461
DOI : 10.1109/COMST.2015.2440374

URL : https://hal.archives-ouvertes.fr/hal-01211437

M. J. Fischer, N. A. Lynch, and M. S. Paterson, Impossibility of distributed consensus with one faulty process, Journal of the ACM, vol.32, pp.2-374, 1985.

N. Santoro and P. Widmayer, Agreement in synchronous networks with ubiquitous faults, Theoretical Computer Science, vol.384, issue.2-3, pp.232-249, 2007.
DOI : 10.1016/j.tcs.2007.04.036

U. Schmid, B. Weiss, and I. Keidar, Impossibility Results and Lower Bounds for Consensus under Link Failures, SIAM Journal on Computing, vol.38, issue.5, 1912.
DOI : 10.1137/S009753970443999X

URL : http://theory.lcs.mit.edu/~idish/ftp/SWK-SICOMP08.pdf

G. and L. Lann, Cohorts and groups for safe and efficient autonomous driving on highways, 2011 IEEE Vehicular Networking Conference (VNC), pp.1-8, 2011.
DOI : 10.1109/VNC.2011.6117117

URL : https://hal.archives-ouvertes.fr/hal-00667366

G. and L. Lann, Safety in Vehicular Networks???on the Inevitability of Short-Range Directional Communications, Proc. 14th Intl. Conference on Ad Hoc, Mobile, and Wireless Networks (AdHoc-Now), pp.347-360, 2015.
DOI : 10.1007/978-3-319-19662-6_24

URL : https://hal.archives-ouvertes.fr/hal-01172595

A. Studer, M. Luk, and A. Perrig, Efficient mechanisms to provide convoy member and vehicle sequence authentication in VANETs, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops, SecureComm 2007, pp.422-432, 2007.
DOI : 10.1109/SECCOM.2007.4550363

G. and L. Lann, Fast Distributed Agreements and safety-critical scenarios in VANETs, 2017 International Conference on Computing, Networking and Communications (ICNC), pp.200-206, 2017.
DOI : 10.1109/ICCNC.2017.7876127

URL : https://hal.archives-ouvertes.fr/hal-01402159

J. M. Mccune and A. Perrig, Seeing-Is-Believing: using camera phones for human-verifiable authentication, International Journal of Security and Networks, vol.4, issue.1/2, pp.43-56, 2009.
DOI : 10.1504/IJSN.2009.023425

J. Petit, Pseudonym Schemes in Vehicular Networks: A Survey, IEEE Communications Surveys & Tutorials, vol.17, issue.1, pp.2015-228
DOI : 10.1109/COMST.2014.2345420

B. Wiedersheim, Privacy in inter-vehicular networks: Why simple pseudonym change is not enough, 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS), pp.176-183, 2010.
DOI : 10.1109/WONS.2010.5437115

D. Eckhoff and C. Sommer, Driving for Big Data? Privacy Concerns in Vehicular Networking, IEEE Security & Privacy, vol.12, issue.1, pp.77-79, 2014.
DOI : 10.1109/MSP.2014.2

J. Petit, Connected vehicles: Surveillance threat and mitigation », Black Hat Europe, 2015.