C. C. Aggarwal, S. Yu, and . Philip, Privacy-Preserving Data Mining: A Survey, pp.431-460, 2007.
DOI : 10.1007/978-0-387-48533-1_18

O. Goldreich, The Foundations of Cryptography, 2004.

T. B. Pedersen, Y. Saygin, and E. Savas, Secret sharing vs. encryption-based techniques for privacy preserving data mining, In: UNECE/Eurostat Work Session on SDC, 2007.

S. R. Oliveira, Privacy preserving clustering by data transformation, 18th Brazilian Symposium on Databases, pp.304-318, 2003.

J. Vaidya and C. Clifton, -means clustering over vertically partitioned data, Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '03, 2003.
DOI : 10.1145/956750.956776

URL : https://hal.archives-ouvertes.fr/hal-01152276

A. Inan, S. V. Kaya, Y. Saygin, E. Savas, A. A. Hintoglu et al., Privacy preserving clustering on horizontally partitioned data, Data Knowl. Eng, pp.646-666, 2007.

G. Jagannathan and R. N. Wright, Privacy-preserving distributed k-means clustering over arbitrarily partitioned data, Proceeding of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining , KDD '05, pp.593-599, 2005.
DOI : 10.1145/1081870.1081942

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

P. Bunn and R. Ostrovsky, Secure two-party k-means clustering, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.486-497, 2007.
DOI : 10.1145/1315245.1315306

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

S. Jha, L. Kruger, and P. Mcdaniel, Privacy Preserving Clustering, 10th European symposium on research in computer security, pp.397-417, 2005.
DOI : 10.1007/11555827_23

M. Upmanyu, A. M. Namboodiri, K. Srinathan, and C. Jawahar, Efficient Privacy Preserving K-Means Clustering, pp.154-166, 2010.
DOI : 10.1007/978-3-642-13601-6_17

M. C. Doganay, T. B. Pedersen, Y. Saygin, E. Savas, and A. Levi, Distributed privacy preserving k-means clustering with additive secret sharing, Proceedings of the 2008 international workshop on Privacy and anonymity in information society, PAIS '08, pp.3-11, 2008.
DOI : 10.1145/1379287.1379291

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.
DOI : 10.1145/359168.359176

E. Forgey, Cluster analysis of multivariate data: Efficiency vs. interpretability of classification, Biometrics, vol.21, issue.768, 1965.

S. P. Lloyd, Least squares quantization in PCM, IEEE Transactions on Information Theory, vol.28, issue.2, pp.129-137, 1982.
DOI : 10.1109/TIT.1982.1056489

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

J. Macqueen, Some methods for classification and analysis of multivariate observations, Fifth Berkeley Symposium on Mathematical Statistics and Probability, pp.281-296, 1967.

M. Kantarcioglu and C. Clifton, Privacy-preserving distributed mining of association rules on horizontally partitioned data, IEEE Transactions on Knowledge and Data Engineering, vol.16, issue.9, pp.639-644, 2002.
DOI : 10.1109/TKDE.2004.45

S. Verykios, E. Bertino, I. Fovino, L. Provenza, Y. Saygin et al., State-of-the-art in privacy preserving data mining, ACM SIGMOD Record, vol.33, issue.1, pp.50-57, 2004.
DOI : 10.1145/974121.974131

E. Bertino, I. Fovino, and L. Provenza, A Framework for Evaluating Privacy Preserving Data Mining Algorithms*, Data Mining and Knowledge Discovery, vol.12, issue.4, pp.121-154, 2005.
DOI : 10.1007/s10618-005-0006-6

B. Pinkas, Cryptographic techniques for privacy-preserving data mining, ACM SIGKDD Explorations Newsletter, vol.4, issue.2, pp.12-19, 2002.
DOI : 10.1145/772862.772865

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

Y. Lindell and B. Pinkas, Secure Multiparty Computation for Privacy Preserving Data Mining, Journal of Privacy and Confidentiality, vol.1, issue.1, pp.59-98, 2009.
DOI : 10.4018/978-1-59140-557-3.ch189

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

M. Ben-or, S. Goldwasser, and A. Wigderson, Completeness theorems for non-cryptographic fault-tolerant distributed computation, Proceedings of the twentieth annual ACM symposium on Theory of computing , STOC '88, pp.1-10, 1988.
DOI : 10.1145/62212.62213

X. Ge, L. Yan, J. Zhu, and W. Shi, Privacy preserving distributed association rule mining based on a secret sharing technique, Second International Conference on Software Eng. and Data Mining, pp.345-350, 2010.

. Available, Information and Computer Science. COIL 1999 Competition Data, The UCI KDD Ar- chive, 1999.