Synthesizing high-frequency rules from different data sources, IEEE Trans. on Knowledge and Data Engineering, vol.15, issue.2, pp.353-367, 2003. ,
Peculiarity oriented multi-database mining, Proc. of PKDD 99, pp.136-146, 1999. ,
Health insurance portability and accountability act of 1996, 1996. ,
Utilizing network features for privacy violation detection, Proc. of Int. Conf. on Communication System Software and Middleware, 2006. ,
DOI : 10.1109/comswa.2006.1665184
Cryptographic techniques for privacy preserving data mining, SIGKDD Explorations, vol.4, issue.2, 2002. ,
DOI : 10.1145/772862.772865
Tools for privacy preserving distributed data mining, SIGKDD Explorations, vol.4, issue.2, pp.28-34, 2003. ,
DOI : 10.1145/772862.772867
URL : http://www.cs.purdue.edu/homes/clifton/DistDM/kddexp.pdf
Privacy-preserving multivariate statistical analysis: Linear regression and classification, Proc. of the Fourth SIAM Int. Conf. on Data Mining, pp.222-233, 2004. ,
DOI : 10.1137/1.9781611972740.21
URL : https://epubs.siam.org/doi/pdf/10.1137/1.9781611972740.21
Privacy-preserving mining of association rules, Information Systems, vol.29, issue.4, 2004. ,
DOI : 10.1145/775079.775080
Privacy-preserving distributed k-means clustering over arbitrarily partitioned data, Proc. of KDD 05, 2005. ,
DOI : 10.1145/1081870.1081942
Privacy preserving data mining, Journal of Cryptology, vol.15, issue.2, 2002. ,
Privacy preserving association rule mining in vertically partitioned data, Proc. of KDD 02, 2002. ,
DOI : 10.1145/775107.775142
An architecture for privacy-preserving mining of client information, Proc. of the Workshop on Privacy, Security, and Data Mining in conjunction with the 2002 IEEE ICDM Conf, 2002. ,
Protocols for secure computations, Proc. of the 23rd annual IEEE Symposium on Foundations of Computer Science, pp.160-164, 1982. ,
DOI : 10.1109/sfcs.1982.38
How to generate and exchange secrets, Proc. of the 27th Symposium on Foundations of Computer Science (FOCS, pp.162-167, 1986. ,
DOI : 10.1109/sfcs.1986.25
Secure multi-party computation problems and their applications: A review and open problems, New Security Paradigms Workshop, pp.11-20, 2001. ,
DOI : 10.1145/508172.508174
Secure multi-party computation, 2000. ,
Multiparty unconditionally secure protocols, Proc. of the 20th Annual Symposium on the Theory of Computing (STOC), pp.11-19, 1988. ,
DOI : 10.1145/62212.62214
URL : http://crypto.cs.mcgill.ca/~crepeau/PDF/ASPUBLISHED/CCD88A.pdf
Srikant: Mining sequential patterns, Proc. of ICDE 95, pp.3-14, 1995. ,
Mining sequential patterns: Generalizations and performance improvements, Proc. of EDBT 96, pp.3-17, 1996. ,
DOI : 10.1007/bfb0014140
Mining association rules between sets of items in large database, Proc. of ACM SIGMOD 93, pp.207-216, 1993. ,
DOI : 10.1145/170036.170072
Mining sequential patterns with constraints in large databases, Proc. of CIKM 02, pp.18-25, 2002. ,
DOI : 10.1145/584796.584799
The PSP approach for mining sequential patterns, Proc. of PKDD 98, 1998. ,
DOI : 10.1007/bfb0094818
URL : https://link.springer.com/content/pdf/10.1007%2FBFb0094818.pdf
Prefixspan: mining sequential patterns efficiently by prefix projected pattern growth, Proc. of ICDE 01, 2001. ,
SPADE: An efficient algorithm for mining frequent sequences, Machine Learning Journal, vol.42, issue.1, pp.31-60, 2001. ,
Freespan: Frequent pattern-projected sequential pattern mining, Proc. of KDD 00, pp.355-359, 2000. ,
Sequential pattern mining using bitmap representation, Proc. of KDD 02, pp.439-435, 2002. ,
Clospan: Mining closed sequential patterns in large datasets, In: In SDM, pp.166-177, 2003. ,
Prism: A primal-encoding approach for frequent sequence mining, ICDM'07, pp.487-492, 2007. ,
Sampling for sequential pattern mining: From static databases to data streams, ICDM'07, pp.631-636, 2007. ,
URL : https://hal.archives-ouvertes.fr/lirmm-00204524
Privacy-preserving collaborative sequential pattern mining, Workshop on Link Analysis, Counter-terrorism, and Privacy in conjunction with SIAM Int. Conf. on Data Mining, pp.61-72, 2004. ,
Privacy preserving sequential pattern mining in distributed databases, 15th ACM International Conference on Information and Knowledge Management, CIKM 06, 2008. ,
URL : https://hal.archives-ouvertes.fr/lirmm-00135021
Privacy preserving sequential pattern mining in data stream, 4th International Conference on Intelligent Computing, 2008. ,
Privacy preserving data mining of sequential patterns for network tra?c data, Information Sciences: an International Journal, vol.178, issue.3, pp.694-713, 2008. ,