1. Abadi, M., Burrows, M., Manasse, M., Wobber, T., 2003. Moderately hard, memory-bound functions. In: Proc. of the 10th Annual Network and Distributed System Security Symposium, pp. 25–39.
2. Armknecht, F., Festag, A., Westhoff, D., Zeng, K., 2007. Cross-layer privacy enhancement and non-repudiation in vehicular communication. In: Proc. of the 4th Workshop on Mobile Ad-Hoc Networks (WMAN).
3. The threat of intelligent collisions;Blum;IT Professional,2004
4. Computational puzzles as sybil defenses;Borisov,2006
5. Efficient and robust pseudonymous authentication in vanet;Calandriello,2007