X. Wu and S. Zhang, Synthesizing high-frequency rules from different data sources, IEEE Trans. on Knowledge and Data Engineering, vol.15, issue.2, pp.353-367, 2003.

N. Zhong, Y. Yao, and S. Ohsuga, Peculiarity oriented multi-database mining, Proc. of PKDD 99, pp.136-146, 1999.

. Health-&-human and U. S. Services, Health insurance portability and accountability act of 1996, 1996.

J. Bhattacharya, S. Gupta, V. Kapoor, and R. Dass, Utilizing network features for privacy violation detection, Proc. of Int. Conf. on Communication System Software and Middleware, 2006.
DOI : 10.1109/comswa.2006.1665184

B. Pinkas, Cryptographic techniques for privacy preserving data mining, SIGKDD Explorations, vol.4, issue.2, 2002.
DOI : 10.1145/772862.772865

C. Clifton, M. Kantarcioglu, X. Lin, J. Vaidya, and M. Zhu, Tools for privacy preserving distributed data mining, SIGKDD Explorations, vol.4, issue.2, pp.28-34, 2003.
DOI : 10.1145/772862.772867

URL : http://www.cs.purdue.edu/homes/clifton/DistDM/kddexp.pdf

W. Du, Y. Han, and S. Chen, Privacy-preserving multivariate statistical analysis: Linear regression and classification, Proc. of the Fourth SIAM Int. Conf. on Data Mining, pp.222-233, 2004.
DOI : 10.1137/1.9781611972740.21

URL : https://epubs.siam.org/doi/pdf/10.1137/1.9781611972740.21

A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke, Privacy-preserving mining of association rules, Information Systems, vol.29, issue.4, 2004.
DOI : 10.1145/775079.775080

G. Jagannathan and R. Wright, Privacy-preserving distributed k-means clustering over arbitrarily partitioned data, Proc. of KDD 05, 2005.
DOI : 10.1145/1081870.1081942

Y. Lindell and B. Pinkas, Privacy preserving data mining, Journal of Cryptology, vol.15, issue.2, 2002.

J. Vaidya and C. Clifton, Privacy preserving association rule mining in vertically partitioned data, Proc. of KDD 02, 2002.
DOI : 10.1145/775107.775142

M. Kantarcioglu and J. Vaidya, An architecture for privacy-preserving mining of client information, Proc. of the Workshop on Privacy, Security, and Data Mining in conjunction with the 2002 IEEE ICDM Conf, 2002.

A. C. Yao, Protocols for secure computations, Proc. of the 23rd annual IEEE Symposium on Foundations of Computer Science, pp.160-164, 1982.
DOI : 10.1109/sfcs.1982.38

A. C. Yao, How to generate and exchange secrets, Proc. of the 27th Symposium on Foundations of Computer Science (FOCS, pp.162-167, 1986.
DOI : 10.1109/sfcs.1986.25

W. Du and M. J. Atallah, Secure multi-party computation problems and their applications: A review and open problems, New Security Paradigms Workshop, pp.11-20, 2001.
DOI : 10.1145/508172.508174

O. Goldreich, Secure multi-party computation, 2000.

D. Chaum, C. Crepeau, and I. Damgard, Multiparty unconditionally secure protocols, Proc. of the 20th Annual Symposium on the Theory of Computing (STOC), pp.11-19, 1988.
DOI : 10.1145/62212.62214

URL : http://crypto.cs.mcgill.ca/~crepeau/PDF/ASPUBLISHED/CCD88A.pdf

R. Agrawal and R. , Srikant: Mining sequential patterns, Proc. of ICDE 95, pp.3-14, 1995.

R. Srikant and R. Agrawal, Mining sequential patterns: Generalizations and performance improvements, Proc. of EDBT 96, pp.3-17, 1996.
DOI : 10.1007/bfb0014140

R. Agrawal, T. Imielinski, and A. Swami, Mining association rules between sets of items in large database, Proc. of ACM SIGMOD 93, pp.207-216, 1993.
DOI : 10.1145/170036.170072

J. Pei, J. Han, and W. Wang, Mining sequential patterns with constraints in large databases, Proc. of CIKM 02, pp.18-25, 2002.
DOI : 10.1145/584796.584799

F. Masseglia, F. Cathala, and P. Poncelet, The PSP approach for mining sequential patterns, Proc. of PKDD 98, 1998.
DOI : 10.1007/bfb0094818

URL : https://link.springer.com/content/pdf/10.1007%2FBFb0094818.pdf

J. Pei, J. Han, H. Pinto, Q. Chen, U. Dayal et al., Prefixspan: mining sequential patterns efficiently by prefix projected pattern growth, Proc. of ICDE 01, 2001.

M. Zaki, SPADE: An efficient algorithm for mining frequent sequences, Machine Learning Journal, vol.42, issue.1, pp.31-60, 2001.

J. Han, J. Pei, B. Mortazavi-asl, Q. Chen, U. Dayal et al., Freespan: Frequent pattern-projected sequential pattern mining, Proc. of KDD 00, pp.355-359, 2000.

J. Ayres, J. Flannick, J. Gehrke, and T. Yiu, Sequential pattern mining using bitmap representation, Proc. of KDD 02, pp.439-435, 2002.

X. Yan, J. Han, and R. Afshar, Clospan: Mining closed sequential patterns in large datasets, In: In SDM, pp.166-177, 2003.

K. Gouda, M. Hassaan, and M. J. Zaki, Prism: A primal-encoding approach for frequent sequence mining, ICDM'07, pp.487-492, 2007.

C. Raissi and P. Poncelet, Sampling for sequential pattern mining: From static databases to data streams, ICDM'07, pp.631-636, 2007.
URL : https://hal.archives-ouvertes.fr/lirmm-00204524

J. Zhan, L. Chang, and S. Matwin, Privacy-preserving collaborative sequential pattern mining, Workshop on Link Analysis, Counter-terrorism, and Privacy in conjunction with SIAM Int. Conf. on Data Mining, pp.61-72, 2004.

V. Kapoor, P. Poncelet, F. Trousset, and M. Teisseire, Privacy preserving sequential pattern mining in distributed databases, 15th ACM International Conference on Information and Knowledge Management, CIKM 06, 2008.
URL : https://hal.archives-ouvertes.fr/lirmm-00135021

Q. H. Huang, Privacy preserving sequential pattern mining in data stream, 4th International Conference on Intelligent Computing, 2008.

K. Seung-woo, P. Sanghyun, W. Jung-im, and K. Sang-wook, Privacy preserving data mining of sequential patterns for network tra?c data, Information Sciences: an International Journal, vol.178, issue.3, pp.694-713, 2008.