Mining sequential patterns, Proc. of ICDE 95, pp.3-14, 1995. ,
Sequential pattern mining using bitmap representation, Proc. of KDD 02, pp.439-435, 2002. ,
Utilizing network features for privacy violation detection, Proc. of Int. Conf. on Communication System Software and Middleware, 2006. ,
Multiparty unconditionally secure protocols, Proc. of the 20th Annual Symposium on the Theory of Computing (STOC), pp.11-19, 1988. ,
Tools for privacy preserving distributed data mining, SIGKDD Explorations, vol.4, issue.2, pp.28-34, 2003. ,
Secure multi-party computation problems and their applications: A review and open problems, New Security Paradigms Workshop, pp.11-20, 2001. ,
Privacy-preserving multivariate statistical analysis: Linear regression and classification, Proc. of the Fourth SIAM Int. Conf. on Data Mining, pp.222-233, 2004. ,
Privacy-preserving mining of association rules, Information Systems, vol.29, issue.4, 2004. ,
Secure multi-party computation, 2000. ,
Freespan: Frequent pattern-projected sequential pattern mining, Proc. of KDD 00, pp.355-359, 2000. ,
Privacy-preserving distributed k-means clustering over arbitrarily partitioned data, Proc. of KDD 05, 2005. ,
An architecture for privacy-preserving mining of client information, Proc. of the Workshop on Privacy, Security, and Data Mining in conjunction with the 2002 IEEE ICDM Conf, 2002. ,
Privacy preserving data mining, Journal of Cryptology, vol.15, issue.2, 2002. ,
The PSP approach for mining sequential patterns, Proc. of PKDD 98, 1998. ,
of Health & Human Services. Health insurance portability and accountability act of 1996, 1996. ,
Prefixspan: mining sequential patterns efficiently by prefix projected pattern growth, Proc. of ICDE 01, 2001. ,
Cryptographic techniques for privacy preserving data mining, SIGKDD Explorations, vol.4, issue.2, 2002. ,
Mining sequential patterns: Generalizations and performance improvements, Proc. of EDBT 96, pp.3-17, 1996. ,
Privacy preserving association rule mining in vertically partitioned data, Proc. of KDD 02, 2002. ,
Synthesizing high-frequency rules from different data sources, IEEE Trans. on Knowledge and Data Engineering, vol.15, issue.2, pp.353-367, 2003. ,
Protocols for secure computations, Proc. of the 23rd annual IEEE Symposium on Foundations of Computer Science, pp.160-164, 1982. ,
How to generate and exchange secrets, Proc. of the 27th Symposium on Foundations of Computer Science (FOCS), pp.162-167, 1986. ,
SPADE: An efficient algorithm for mining frequent sequences, Machine Learning Journal, vol.42, issue.1, pp.31-60, 2001. ,
Privacy-preserving collaborative sequential pattern mining, Workshop on Link Analysis, Counter-terrorism, and Privacy in conjunction with SIAM Int. Conf. on Data Mining, pp.61-72, 2004. ,
Peculiarity oriented multi-database mining, Proc. of PKDD 99, pp.136-146, 1999. ,