A. Pfitzmann and M. Hansen, Anonymity, unlinkability, undetectability, unobservability , pseudonymity, and identity management -a consolidated proposal for terminology, 2008.

J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson et al., SIP: Session Initiation Protocol, 2002.
DOI : 10.17487/rfc3261

M. Handley and V. Jacobson, SDP: Session Description Protocol, 1998.

H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson, RTP: A Transport Protocol for Real-Time Applications, 2003.
DOI : 10.17487/rfc3550

I. Johansson and M. Westerlund, Support for Reduced-Size Real-Time Transport Control Protocol (RTCP):Opportunities and Consequences, 2009.
DOI : 10.17487/rfc5506

R. Zopf, Real-time Transport Protocol (RTP) Payload for Comfort Noise (CN), 2002.
DOI : 10.17487/rfc3389

P. Zimmermann, E. A. Johnston, and J. Callas, ZRTP: Media Path Key Agreement for Secure RTP draft-zimmermann-avt-zrtp-15, 2009.

J. Peterson, A Privacy Mechanism for the Session Initiation Protocol (SIP), 2002.
DOI : 10.17487/rfc3323

C. Shen and H. Schulzrinne, A voip privacy mechanism and its application in voip peering for voice service provider topology and identity hiding, 2008.

. Geobytes, http://www.geobytes.com/IpLocator.htm?getlocation, visited at 10th, 2009.

S. Karapantazis and F. Pavlidou, VoIP: A comprehensive survey on a promising technology, Computer Networks, vol.53, issue.12, pp.2050-2090, 2009.
DOI : 10.1016/j.comnet.2009.03.010

R. Dingledine, N. Mathewson, and P. Syverson, Tor: the second-generation onion router, SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium, pp.21-21, 2004.

O. Berthold, H. Federrath, and S. Köpsell, Web MIXes: A System for Anonymous and Unobservable Internet Access, International workshop on Designing privacy enhancing technologies, pp.115-129, 2001.
DOI : 10.1007/3-540-44702-4_7

D. Herrmann, R. Wendolsky, and H. Federrath, Performance comparison of lowlatency anonymisation services from a user perspective, PET'07: Privacy Enhancing Technologies, pp.233-253, 2007.

R. Snader and N. Borisov, A tune-up for tor: Improving security and performance in the tor network, NDSS'08: Proceedings of the Network and Distributed System Security Symposium, NDSS 2008, 2008.

M. Sherr, B. T. Loo, and M. Blaze, Towards application-aware anonymous routing, HOTSEC'07: Proceedings of the 2nd USENIX workshop on Hot topics in security, pp.1-5, 2007.

S. J. Murdoch and R. N. Watson, Metrics for security and performance in lowlatency anonymity systems, PETS '08: Proceedings of the 8th international symposium on Privacy Enhancing Technologies, pp.115-132, 2008.

R. Dingledine and S. J. Murdoch, Performance improvements on tor or, why tor is slow and what we're going to do about it, 2009.

M. Vlachos, A. Anagnostopoulos, O. Verscheure, and P. S. Yu, Online pairing of VoIP conversations, The VLDB Journal, vol.28, issue.4, pp.77-98, 2009.
DOI : 10.1007/s00778-007-0087-5

C. V. Wright, L. Ballard, F. Monrose, and G. M. Masson, Language identification of encrypted voip traffic: Alejandra y roberto or alice and bob?, SS'07: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, pp.1-12, 2007.

C. V. Wright, L. Ballard, S. E. Coull, F. Monrose, and G. M. Masson, Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.35-49, 2008.
DOI : 10.1109/SP.2008.21

C. Wang, B. N. Levine, M. K. Reiter, and M. Wright, Timing attacks in low-latency mix systems (extended abstract), FC '04: Proceedings of the 8th international conference on Financial Cryptography, pp.251-265, 2004.

X. Wang, S. Chen, and S. Jajodia, Tracking anonymous peer-to-peer VoIP calls on the internet, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.81-91, 2005.
DOI : 10.1145/1102120.1102133