Anonymity, unlinkability, undetectability, unobservability , pseudonymity, and identity management -a consolidated proposal for terminology, 2008. ,
SIP: Session Initiation Protocol, 2002. ,
DOI : 10.17487/rfc3261
SDP: Session Description Protocol, 1998. ,
RTP: A Transport Protocol for Real-Time Applications, 2003. ,
DOI : 10.17487/rfc3550
Support for Reduced-Size Real-Time Transport Control Protocol (RTCP):Opportunities and Consequences, 2009. ,
DOI : 10.17487/rfc5506
Real-time Transport Protocol (RTP) Payload for Comfort Noise (CN), 2002. ,
DOI : 10.17487/rfc3389
ZRTP: Media Path Key Agreement for Secure RTP draft-zimmermann-avt-zrtp-15, 2009. ,
A Privacy Mechanism for the Session Initiation Protocol (SIP), 2002. ,
DOI : 10.17487/rfc3323
A voip privacy mechanism and its application in voip peering for voice service provider topology and identity hiding, 2008. ,
http://www.geobytes.com/IpLocator.htm?getlocation, visited at 10th, 2009. ,
VoIP: A comprehensive survey on a promising technology, Computer Networks, vol.53, issue.12, pp.2050-2090, 2009. ,
DOI : 10.1016/j.comnet.2009.03.010
Tor: the second-generation onion router, SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium, pp.21-21, 2004. ,
Web MIXes: A System for Anonymous and Unobservable Internet Access, International workshop on Designing privacy enhancing technologies, pp.115-129, 2001. ,
DOI : 10.1007/3-540-44702-4_7
Performance comparison of lowlatency anonymisation services from a user perspective, PET'07: Privacy Enhancing Technologies, pp.233-253, 2007. ,
A tune-up for tor: Improving security and performance in the tor network, NDSS'08: Proceedings of the Network and Distributed System Security Symposium, NDSS 2008, 2008. ,
Towards application-aware anonymous routing, HOTSEC'07: Proceedings of the 2nd USENIX workshop on Hot topics in security, pp.1-5, 2007. ,
Metrics for security and performance in lowlatency anonymity systems, PETS '08: Proceedings of the 8th international symposium on Privacy Enhancing Technologies, pp.115-132, 2008. ,
Performance improvements on tor or, why tor is slow and what we're going to do about it, 2009. ,
Online pairing of VoIP conversations, The VLDB Journal, vol.28, issue.4, pp.77-98, 2009. ,
DOI : 10.1007/s00778-007-0087-5
Language identification of encrypted voip traffic: Alejandra y roberto or alice and bob?, SS'07: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, pp.1-12, 2007. ,
Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.35-49, 2008. ,
DOI : 10.1109/SP.2008.21
Timing attacks in low-latency mix systems (extended abstract), FC '04: Proceedings of the 8th international conference on Financial Cryptography, pp.251-265, 2004. ,
Tracking anonymous peer-to-peer VoIP calls on the internet, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.81-91, 2005. ,
DOI : 10.1145/1102120.1102133