R. Agrawal and R. Srikant, Mining sequential patterns, Proc. of ICDE 95, pp.3-14, 1995.

J. Ayres, J. Flannick, J. Gehrke, and T. Yiu, Sequential pattern mining using bitmap representation, Proc. of KDD 02, pp.439-435, 2002.

J. Bhattacharya, S. Gupta, V. Kapoor, and R. Dass, Utilizing network features for privacy violation detection, Proc. of Int. Conf. on Communication System Software and Middleware, 2006.

D. Chaum, C. Crepeau, and I. Damgard, Multiparty unconditionally secure protocols, Proc. of the 20th Annual Symposium on the Theory of Computing (STOC), pp.11-19, 1988.

C. Clifton, M. Kantarcioglu, X. Lin, J. Vaidya, and M. Zhu, Tools for privacy preserving distributed data mining, SIGKDD Explorations, vol.4, issue.2, pp.28-34, 2003.

W. Du and M. J. Atallah, Secure multi-party computation problems and their applications: A review and open problems, New Security Paradigms Workshop, pp.11-20, 2001.

W. Du, Y. Han, and S. Chen, Privacy-preserving multivariate statistical analysis: Linear regression and classification, Proc. of the Fourth SIAM Int. Conf. on Data Mining, pp.222-233, 2004.

A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke, Privacy-preserving mining of association rules, Information Systems, vol.29, issue.4, 2004.

O. Goldreich, Secure multi-party computation, 2000.

J. Han, J. Pei, B. Mortazavi-asl, Q. Chen, U. Dayal et al., Freespan: Frequent pattern-projected sequential pattern mining, Proc. of KDD 00, pp.355-359, 2000.

G. Jagannathan and R. Wright, Privacy-preserving distributed k-means clustering over arbitrarily partitioned data, Proc. of KDD 05, 2005.

M. Kantarcioglu and J. Vaidya, An architecture for privacy-preserving mining of client information, Proc. of the Workshop on Privacy, Security, and Data Mining in conjunction with the 2002 IEEE ICDM Conf, 2002.

Y. Lindell and B. Pinkas, Privacy preserving data mining, Journal of Cryptology, vol.15, issue.2, 2002.

F. Masseglia, F. Cathala, and P. Poncelet, The PSP approach for mining sequential patterns, Proc. of PKDD 98, 1998.

U. S. , of Health & Human Services. Health insurance portability and accountability act of 1996, 1996.

J. Pei, J. Han, H. Pinto, Q. Chen, U. Dayal et al., Prefixspan: mining sequential patterns efficiently by prefix projected pattern growth, Proc. of ICDE 01, 2001.

B. Pinkas, Cryptographic techniques for privacy preserving data mining, SIGKDD Explorations, vol.4, issue.2, 2002.

R. Srikant and R. , Mining sequential patterns: Generalizations and performance improvements, Proc. of EDBT 96, pp.3-17, 1996.

J. Vaidya and C. Clifton, Privacy preserving association rule mining in vertically partitioned data, Proc. of KDD 02, 2002.

X. Wu and S. Zhang, Synthesizing high-frequency rules from different data sources, IEEE Trans. on Knowledge and Data Engineering, vol.15, issue.2, pp.353-367, 2003.

A. C. Yao, Protocols for secure computations, Proc. of the 23rd annual IEEE Symposium on Foundations of Computer Science, pp.160-164, 1982.

A. C. Yao, How to generate and exchange secrets, Proc. of the 27th Symposium on Foundations of Computer Science (FOCS), pp.162-167, 1986.

M. Zaki, SPADE: An efficient algorithm for mining frequent sequences, Machine Learning Journal, vol.42, issue.1, pp.31-60, 2001.

J. Zhan, L. Chang, and S. Matwin, Privacy-preserving collaborative sequential pattern mining, Workshop on Link Analysis, Counter-terrorism, and Privacy in conjunction with SIAM Int. Conf. on Data Mining, pp.61-72, 2004.

N. Zhong, Y. Yao, and S. Ohsuga, Peculiarity oriented multi-database mining, Proc. of PKDD 99, pp.136-146, 1999.