Synthesizing high-frequency rules from different data sources, IEEE Trans. on Knowledge and Data Engineering, vol.15, issue.2, pp.353-367, 2003. ,

Peculiarity oriented multi-database mining, Proc. of PKDD 99, pp.136-146, 1999. ,

Health insurance portability and accountability act of 1996, 1996. ,

Utilizing network features for privacy violation detection, Proc. of Int. Conf. on Communication System Software and Middleware, 2006. ,

DOI : 10.1109/comswa.2006.1665184

Cryptographic techniques for privacy preserving data mining, SIGKDD Explorations, vol.4, issue.2, 2002. ,

DOI : 10.1145/772862.772865

Tools for privacy preserving distributed data mining, SIGKDD Explorations, vol.4, issue.2, pp.28-34, 2003. ,

DOI : 10.1145/772862.772867

URL : http://www.cs.purdue.edu/homes/clifton/DistDM/kddexp.pdf

Privacy-preserving multivariate statistical analysis: Linear regression and classification, Proc. of the Fourth SIAM Int. Conf. on Data Mining, pp.222-233, 2004. ,

DOI : 10.1137/1.9781611972740.21

URL : https://epubs.siam.org/doi/pdf/10.1137/1.9781611972740.21

Privacy-preserving mining of association rules, Information Systems, vol.29, issue.4, 2004. ,

DOI : 10.1145/775079.775080

Privacy-preserving distributed k-means clustering over arbitrarily partitioned data, Proc. of KDD 05, 2005. ,

DOI : 10.1145/1081870.1081942

Privacy preserving data mining, Journal of Cryptology, vol.15, issue.2, 2002. ,

Privacy preserving association rule mining in vertically partitioned data, Proc. of KDD 02, 2002. ,

DOI : 10.1145/775107.775142

An architecture for privacy-preserving mining of client information, Proc. of the Workshop on Privacy, Security, and Data Mining in conjunction with the 2002 IEEE ICDM Conf, 2002. ,

Protocols for secure computations, Proc. of the 23rd annual IEEE Symposium on Foundations of Computer Science, pp.160-164, 1982. ,

DOI : 10.1109/sfcs.1982.38

How to generate and exchange secrets, Proc. of the 27th Symposium on Foundations of Computer Science (FOCS, pp.162-167, 1986. ,

DOI : 10.1109/sfcs.1986.25

Secure multi-party computation problems and their applications: A review and open problems, New Security Paradigms Workshop, pp.11-20, 2001. ,

DOI : 10.1145/508172.508174

Secure multi-party computation, 2000. ,

Multiparty unconditionally secure protocols, Proc. of the 20th Annual Symposium on the Theory of Computing (STOC), pp.11-19, 1988. ,

DOI : 10.1145/62212.62214

URL : http://crypto.cs.mcgill.ca/~crepeau/PDF/ASPUBLISHED/CCD88A.pdf

Srikant: Mining sequential patterns, Proc. of ICDE 95, pp.3-14, 1995. ,

Mining sequential patterns: Generalizations and performance improvements, Proc. of EDBT 96, pp.3-17, 1996. ,

DOI : 10.1007/bfb0014140

Mining association rules between sets of items in large database, Proc. of ACM SIGMOD 93, pp.207-216, 1993. ,

DOI : 10.1145/170036.170072

Mining sequential patterns with constraints in large databases, Proc. of CIKM 02, pp.18-25, 2002. ,

DOI : 10.1145/584796.584799

The PSP approach for mining sequential patterns, Proc. of PKDD 98, 1998. ,

DOI : 10.1007/bfb0094818

URL : https://link.springer.com/content/pdf/10.1007%2FBFb0094818.pdf

Prefixspan: mining sequential patterns efficiently by prefix projected pattern growth, Proc. of ICDE 01, 2001. ,

SPADE: An efficient algorithm for mining frequent sequences, Machine Learning Journal, vol.42, issue.1, pp.31-60, 2001. ,

Freespan: Frequent pattern-projected sequential pattern mining, Proc. of KDD 00, pp.355-359, 2000. ,

Sequential pattern mining using bitmap representation, Proc. of KDD 02, pp.439-435, 2002. ,

Clospan: Mining closed sequential patterns in large datasets, In: In SDM, pp.166-177, 2003. ,

Prism: A primal-encoding approach for frequent sequence mining, ICDM'07, pp.487-492, 2007. ,

Sampling for sequential pattern mining: From static databases to data streams, ICDM'07, pp.631-636, 2007. ,

URL : https://hal.archives-ouvertes.fr/lirmm-00204524

Privacy-preserving collaborative sequential pattern mining, Workshop on Link Analysis, Counter-terrorism, and Privacy in conjunction with SIAM Int. Conf. on Data Mining, pp.61-72, 2004. ,

Privacy preserving sequential pattern mining in distributed databases, 15th ACM International Conference on Information and Knowledge Management, CIKM 06, 2008. ,

URL : https://hal.archives-ouvertes.fr/lirmm-00135021

Privacy preserving sequential pattern mining in data stream, 4th International Conference on Intelligent Computing, 2008. ,

Privacy preserving data mining of sequential patterns for network tra?c data, Information Sciences: an International Journal, vol.178, issue.3, pp.694-713, 2008. ,