I. Recommendation and G. , 114 -One-way Transmission Time, 2003.

B. N. Wang, M. K. Levine, M. Reiter, and . Wright, Timing attacks in lowlatency MIX systems (extended abstract), Proceedings of the 8 th international conference on Financial Cryptography, pp.251-265, 2004.

O. Berthold, H. Federrath, and S. Köpsell, Web MIXes: A System for Anonymous and Unobservable Internet Access, Proceedings of the 2001 International workshop on Designing Privacy Enhancing Technologies, pp.115-129, 2001.
DOI : 10.1007/3-540-44702-4_7

D. L. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, pp.84-90, 1981.
DOI : 10.1145/358549.358563

C. A. Melchor, Y. D. , and J. Iguchi-cartigny, Closed-Circuit Unobservable Voice over IP, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp.119-128, 2007.
DOI : 10.1109/ACSAC.2007.34

URL : https://hal.archives-ouvertes.fr/hal-00335236

J. Peterson, A privacy mechanism for the Session Initiation Protocol (SIP), 2002.
DOI : 10.17487/rfc3323

J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson et al., SIP: Session Initiation Protocol, 2002.
DOI : 10.17487/rfc3261

H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson, RTP: A transport protocol for real-time applications, 2003.
DOI : 10.17487/rfc3550

C. Shen and H. Schulzrinne, A VoIP privacy mechanism and its application in VoIP peering for voice service provider topology and identity hiding, 2008.

M. Srivatsa, L. Liu, and A. Iyengar, Preserving Caller Anonymity in Voice-over-IP Networks, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.50-63, 2008.
DOI : 10.1109/SP.2008.10

M. Srivatsa, L. Liu, and A. Iyengar, Privacy in VoIP Networks: A k-Anonymity Approach, IEEE INFOCOM 2009, The 28th Conference on Computer Communications, 2009.
DOI : 10.1109/INFCOM.2009.5062246

. Yu and . Finding, Who is talking to whom " in VoIP networks via progressive stream clustering, Proceedings of the 6 th International Conference on Data Mining (ICDM '06), pp.667-677, 2006.

M. Vlachos, A. Anagnostopoulos, O. Verscheure, and P. S. Yu, Online pairing of VoIP conversations, The VLDB Journal, vol.28, issue.4, pp.77-98, 2009.
DOI : 10.1007/s00778-007-0087-5

X. Wang, S. Chen, and S. Jajodia, Tracking anonymous peer-to-peer VoIP calls on the internet, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.81-91, 2005.
DOI : 10.1145/1102120.1102133

C. V. Wright, L. Ballard, S. E. Coull, F. Monrose, and G. M. Masson, Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.35-49, 2008.
DOI : 10.1109/SP.2008.21

C. V. Wright, L. Ballard, F. Monrose, and G. M. Masson, Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob?, Proceedings of 16 th USENIX Security Symposium on USENIX Security Symposium (SS '07), pp.1-12, 2007.

R. Zopf, Real-time Transport Protocol (RTP) payload for Comfort Noise (CN), 2002.
DOI : 10.17487/rfc3389