4. Tian, J., Coletti, L.: Routing approach in cartalk 2000 project. In: Proceedings of the IST
Mobile & Wireless Communications Summit 2003. Volume 2. (2003)
5. Pl
¨
oßl, K., Nowey, T., Mletzko, C.: Towards a security architecture for vehicular ad hoc
networks. In: Proceedings of ARES 2006, IEEE Computer Society (2006)
6. EU: The Galilei Project - GALILEO Design Consolidation (2003)
7. Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming
attacks in wireless networks. In: MobiHoc 05: Proc. of the 6th ACM internat. symposium
on Mobile ad hoc networking and computing, ACM (2005)
8. Council of the EU: Council Regulation (EC) No 2135/98 (1998)
9. Tian, J., Maihoefer, C., Nelisse, M., Provera, M., Dagli, I., Tepfenhart, M., Brenzel, C.:
Routing protocol implementation (2003)
10. Lenstra, A.K., Verheul, E.R.: Selecting cryptographic key sizes. Journal of Cryptology 14
(2001)
11. Parno, B., Perrig, A.: Challenges in securing vehicular networks. In: Proceedings of Work-
shop on Hot Topics in Networks (HotNets-IV), ACM (2005)
12. Raya, M., Papadimitratos, P., Hubaux, J.P.: Securing vehicular communications. IEEE Wire-
less Communications, Special Issue on Inter-Vehicular Communications (2006)
13. Choi, J.Y., Jakobsson, M., Wetzel, S.: Balancing auditability and privacy in vehicular net-
works. In: Q2SWinet 2005: Proc. of the 1st ACM international workshop on quality of
service and security in wireless and mobile networks, ACM (2005)
14. D
¨
otzer, F.: Privacy issues in vehicular ad hoc networks (2005)
15. Zarki, M.E., Mehrotra, S., Tsudik, G., Venkatasubramanian, N.: Security issues in a future
vehicular network. In: Proc. of European Wireless 2002 Conference, Florence, Italy, Febru-
ary 2002. (2002)
16. Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in mobile ad hoc networks: Challenges
and solutions. IEEE Wireless Communications 11 (2004)
154